On Thursday, March 10, 2016 at 4:14:45 PM UTC-8, Jakob Bohm wrote:
> General: Throughout this document you use phrases such as "all
> certificates that directly or transitively chain to your root
> certificate(s) included in Mozilla's CA Certificate Program",
> shouldn't those phrases exclude technically constrained subCAs,
> such as subCAs used exclusively for codesigning (which has a near
> indefinite need for SHA-1 certs due to Microsoft actions).
> 


I think this only applies to the SHA1 action item...

ACTION 1 -- SHA1
I think we want this action item to apply to all S/MIME and TLS/SSL 
certificates chaining up to included roots, regardless of whether the 
intermediate is constrained or not. Correct?

ACTION 2 -- enter intermediate certs into CA Community in Salesforce
Says ...  that are not technically constrained as described in section 9 of 
Mozilla's CA Certificate Inclusion Policy.

ACTION 3 -- OneCRL
Says ...and were not technically constrained as described in section 9 of 
Mozilla's CA Certificate Inclusion Policy.

ACTION 4 -- removing workarounds from mozilla::pkix
It won't matter if the intermediates are technically constrained, the code will 
still reject certs that are issued after the date with those problems.

ACTION 5 -- removing retired roots
Constraints not applicable

ACTION 6 -- test certs
I guess it depends if we say anything further about test certificates other 
than all certs must comply with Mozilla's CA Cert Policy. Should we say 
anything else here?


Thanks,
Kathleen


_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to