On Mon, Feb 08, 2016 at 12:42:46PM -0800, Kathleen Wilson wrote:
> One topic currently under discussion in Bug #1201423 is regarding root
> certificates with serial number of 0. The error being returned by
> http://cert-checker.allizom.org/ is "Serial number must be positive".
> 
> Arguments raised in the bug:
> 
> >>> RFC 5280 is not ambiguous as to whether zero is positive or not.
> >>> https://tools.ietf.org/html/rfc5280#section-4.2.1.10
> >>>    Note: Non-conforming CAs may issue certificates with serial numbers
> >>>    that are negative or zero.  Certificate users SHOULD be prepared to
> >>>    gracefully handle such certificates.
> >>> So zero is clearly non-conforming.
> 
> >> The whole RFC5280 section 4.1 refers to the information associated with
> >> the subject of the certificate and the CA that issued it.  This is not
> >> a certificate issued by a CA, it is a self-signed certificate, which is
> >> the trust-anchor itself.
> 
> > We believe that this section applies to issued certificates.
> > Quoting the beginning of the section:
> >    The sequence TBSCertificate contains information associated with the
> >    subject of the certificate and the CA that issued it.
> >
> > Thus, it only applies to certificates issued by a CA, and not to the CA
> > itself.
> 
> Does section 4.1 of RFC5280 apply to root certificates?

My understanding of the terminology is that a CA is not a certificate, it is
a role (or person, or organisation, or function).  To put it another way,
"certificates don't issue certificates, CAs issue certificates".  In this
way, it becomes fairly clear that the self-signed certificate which is
usually used as the trust anchor is a "certificate issued by a CA", as much
as any other.

- Matt

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to