On Mon, Mar 7, 2016 at 12:04 PM, Jeremy Rowley <[email protected]>
wrote:

> Programmatic enforcement is outside the scope of the BRs.  I'd like to do
> something (as CAs) to remediate the issue.
>

But the potential for programmatic enforcement by browsers is a factor for
all CABF members to consider when creating the BRs.

-- Eric


>
> -----Original Message-----
> From: Rob Stradling [mailto:[email protected]]
> Sent: Monday, March 7, 2016 4:04 AM
> To: Jeremy Rowley
> Cc: [email protected]
> Subject: Fixing the BR scope (was Re: More SHA-1 certs)
>
> On 04/03/16 23:41, Jeremy Rowley wrote:
> > > My fix is much simpler (because the BRs have traditionally avoided
> requiring reissuance of sub CAs). Require that all certs with serverauth,
> anyEKU, or no EKU be covered by the BRs. CAs required to issue certs that
> are covered but cannot conform (because of another policy) will get a
> qualified audit that can then be addressed with the browsers.  There's no
> reason to make an exception since all three types can be used for server
> authentication. This gives everyone notice the CA is issuing non-compliant
> certs that may be risky but lets the browsers decide whether to accept the
> risk.
>
> [It's clearly time to change the Subject line :-) ]
>
> Hi Jeremy.  Your fix would be an improvement over the current BR scope, but
> I agree with Andrew and Ryan [1] that we need to go further than
> that: if a cert is in scope, then all certs issued by its issuer need to be
> in scope.
>
> I don't think relying on qualified audits is the way to go.  I'd like to
> see
> programmatic enforcement.  I think browsers should "blacklist"
> intermediates that don't intend to issue, but are nonetheless capable of
> issuing, publicly trusted TLS certs.
>
>
> [1]
>
> https://www.mail-archive.com/dev-security-policy%40lists.mozilla.org/msg0298
> 5.html
>
> --
> Rob Stradling
> Senior Research & Development Scientist
> COMODO - Creating Trust Online
>
>
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>
>


-- 
konklone.com | @konklone <https://twitter.com/konklone>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to