Perhaps the CA didn't intend them to be used for Web PKI, making them out of
scope of the BRs. Playing devil's advocate, I'd say anything issued without
serverAuth isn't intended to be used for server authentication by the CA.
Because of this, either the CAB Forum should define all certs with anyEKU,
serverAuth or no EKU as in scope of the BRs or the browsers should require
an EKU to function. 

-----Original Message-----
From: dev-security-policy
[mailto:dev-security-policy-bounces+jeremy.rowley=digicert.com@lists.mozilla
.org] On Behalf Of Peter Bowen
Sent: Wednesday, November 9, 2016 11:50 AM
To: Gervase Markham <[email protected]>
Cc: [email protected]
Subject: Re: Can we require id-kp-serverAuth now?

On Wed, Nov 9, 2016 at 1:58 AM, Gervase Markham <[email protected]> wrote:
> So, it is now possible to change Firefox to mandate the presence of 
> id-kp-serverAuth for EE server certs from Mozilla-trusted roots? Or is 
> there some reason I've missed we can't do that?

Here are some certs that appear to be for server authentication but don't
have that EKU:

https://crt.sh/?id=10621190
https://crt.sh/?id=32333854
https://crt.sh/?id=10621157
https://crt.sh/?id=12283906
https://crt.sh/?id=12797412
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to