I think it makes sense to have a new doc that applies to all CAs and
specifies when requirements apply to certificates.  That way we can
say "SSL BRs apply if X, S/MIME BRs apply if Y, Code Signing applies
if Z, this doc applies to subCAs when A".

On Wed, Nov 9, 2016 at 10:55 AM, Jeremy Rowley
<[email protected]> wrote:
> Perhaps the CA didn't intend them to be used for Web PKI, making them out of
> scope of the BRs. Playing devil's advocate, I'd say anything issued without
> serverAuth isn't intended to be used for server authentication by the CA.
> Because of this, either the CAB Forum should define all certs with anyEKU,
> serverAuth or no EKU as in scope of the BRs or the browsers should require
> an EKU to function.
>
> -----Original Message-----
> From: dev-security-policy
> [mailto:dev-security-policy-bounces+jeremy.rowley=digicert.com@lists.mozilla
> .org] On Behalf Of Peter Bowen
> Sent: Wednesday, November 9, 2016 11:50 AM
> To: Gervase Markham <[email protected]>
> Cc: [email protected]
> Subject: Re: Can we require id-kp-serverAuth now?
>
> On Wed, Nov 9, 2016 at 1:58 AM, Gervase Markham <[email protected]> wrote:
>> So, it is now possible to change Firefox to mandate the presence of
>> id-kp-serverAuth for EE server certs from Mozilla-trusted roots? Or is
>> there some reason I've missed we can't do that?
>
> Here are some certs that appear to be for server authentication but don't
> have that EKU:
>
> https://crt.sh/?id=10621190
> https://crt.sh/?id=32333854
> https://crt.sh/?id=10621157
> https://crt.sh/?id=12283906
> https://crt.sh/?id=12797412
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to