On 3/10/16 9:25 PM, Eric Mill wrote:
Would this be a good opportunity to ask CAs to do an audit of any
undisclosed cross-signatures they may have to other unconstrained roots?

For example, there were two recently discovered cross-signatures to the
Federal Bridge by commercial CAs, Identrust and Symantec. Once it was
identified that Identrust had not disclosed this cross-signature, Identrust
revoked it:
https://bugzilla.mozilla.org/show_bug.cgi?id=1037590#c26

While services like censys.io and crt.sh are doing wonders for finding
things like this, it would also be beneficial to have CAs use their own
vantage point over their cross-signatures to identify other possible gaps
between what Mozilla understands their root store to trust and what it
could potentially be made to trust.


I agree, but not sure what else to say in the communication.

~~
ACTION #2: Version 2.1 of Mozilla's CA Certificate Policy added the requirement that CAs must provide public-facing documentation about certificate verification requirements and annual public attestation of conformance to the stated certificate verification requirements for all certificates that are capable of being used to issue new certificates, and which directly or transitively chain to their certificate(s) included in Mozilla's CA Certificate Program that are not technically constrained as described in section 9 of Mozilla's CA Certificate Inclusion Policy.

Respond with the date by which you plan to complete entry into Mozilla's CA Community in Salesforce of the PEM data, CP/CPS, and audit statements for all certificates that are capable of being used to issue new certificates, and which directly or transitively chain to your certificate(s) included in Mozilla’s CA Certificate Program that are not technically constrained as described in section 9 of Mozilla's CA Certificate Inclusion Policy. This includes every intermediate certificate (chaining up to your root certificates in Mozilla's program with the Websites trust bit enabled) that is not Technically Constrained via Extended Key Usage and Name Constraint settings.

The date that you enter must be on or before [DATE TBD]. (Required)
~~

If it is not clear enough that cross-certs are included in this, then what additional wording do you recommend?

Thanks,
Kathleen

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to