On 05/05/16 10:57, Rob Stradling wrote:
<snip>
Consider a certificate chain of this form:
  Root
    Intermediate 1 (contains Name Constraints / EKU)
      Intermediate 2 (does not contain Name Constraints / EKU)
        End-entity
<snip>
Since Intermediate 2 is effectively technically constrained, you might
imagine that it should be exempt from the disclosure requirement.
However, the "certificate MUST include...extension" language in both the
Mozilla CA Policy and the BRs seems to clearly state that:
  - Intermediate 1 need not be disclosed.
  - Intermediate 2 MUST be disclosed.

Similarly, consider a certificate chain that is technically constrained using EKU alone:

  Root (with "websites" trust bit enabled)
    Intermediate 1 (contains EKU with one OID: id-kp-clientAuth)
      Intermediate 2 (does not contain EKU)
        End-entity

Again, ISTM that Intermediate 2 MUST be disclosed (as per policy) even though NSS/Firefox would not trust serverAuth certs issued by it.


(Note: https://crt.sh/mozilla-disclosures currently classifies Intermediate 2 as "Technically Constrained (id-kp-serverAuth ∉ EKU", but I'm wondering if I should change that to match my understanding of the policy).

--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to