Restricting by root isn't feasible. The browsers limit the number of root
CAs each CA can have., meaning most CAs chain Code Signing and Client chain
to the same root as server certs.

-----Original Message-----
From: dev-security-policy
[mailto:dev-security-policy-bounces+jeremy.rowley=digicert.com@lists.mozilla
.org] On Behalf Of Jakob Bohm
Sent: Monday, March 7, 2016 4:50 PM
To: [email protected]
Subject: Re: More SHA-1 certs

On 07/03/2016 11:36, Rob Stradling wrote:
> On 04/03/16 23:14, Matt Palmer wrote:
>> On Fri, Mar 04, 2016 at 09:19:36PM +0000, Rob Stradling wrote:
>>> Maybe we need to take a different approach that ignores the 
>>> end-entity certificate profile completely.  How about we propose that...
>>>
>>>    - An X.509 certificate is in scope for the BRs if it's signed by 
>>> an Issuing CA that is in scope.
>>>
>>>    - An Issuing CA is in scope if:
>>>      i) it chains to a Root Certificate that is trusted for server 
>>> authentication
>>
>> You'll want to describe *who* trusts the root.
>
> Hi Matt.  I thought somebody might point that out.  Sorry for my 
> handwaviness.  ;-)
>
> "*who* trusts" is indeed important, but it wasn't the aspect of the 
> scope problem I was trying to solve with my previous post.
>
>> I trust lots of private PKI
>> roots for server authentication in my own gear, but they're never 
>> going mainstream.
>>
>> Perhaps "it chains to a Root Certificate that is trusted, or is 
>> intended to be trusted, by one or more Browser members of the 
>> CA/Browser Forum for server authentication"?  The "intended to be 
>> trusted" is to make sure that candidates for browser trust programs 
>> know they're on the hook, too.
>>
>> - Matt
>


How about "It chains to a Root certificate claiming compliance with
these BRs".   This is a clear condition with a well-defined and
controllable meaning.  Either a CA root is intended as a CAB/F compliant
root submitted to all the relevant browser related trust lists and thus
would seek compliance with the BR, or that root (even if operated by the
same entity as a BR compliant root) doesn't do that.

And while we are at it, we also need to look at what the scope rules would
be for e-mail and code certificates and CAs.  E-mail because of Thunderbird.

Code certificates because while the Mozilla corporate folks have abandoned
the concept, many other people have not, and this Mozilla forum remains the
primary contact point between the open source community and the CAs,
partially because many Open Source distributions (including at least Debian
and Ubuntu) use the Mozilla CA list as the basis for their system-wide
general purpose certificate stores.





Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com Transformervej
29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10 This public discussion
message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to