Hi Jacob,

I think you get confused by My colleague Li-Chun's email because he mentioned a 
lot about using self-issued certificates for key-rollover, AIA certificate 
chaining support, and the bug of Microsoft IIS (note: not IE browser) in 
handling self-issued certificates. All these are actually off-topic. We are 
sorry if his email confused you.

Here I would like to clarify that we are not here to asking for supporting 
self-issued certificates or AIA certificate chaining. We are here to simply 
request Mozilla to accept our second generation of Government Root CA 
certificate.

Currently, our first generation of Government Root CA certificate has alreading 
been in the trust list of Mozilla. After Mozilla accepting our second 
generation of Government Root CA certificate, our certificate chains for SSL 
will look like the following:

1. Government Root CA (first generation) --> GCA (first generation) --> SSL Cert
2. Government Root CA (second generation) --> GCA (second generation) --> SSL 
Cert

This is the same as the situation of other root CAs performing key-rollover.

One thing different with what other commercial CAs is that we do not change the 
issuer DN when our root CA perform key-rollover. I have already explain a lot 
of this in this discussion thread. According our tests, using the same issuer 
DN between generations of root CA certificates actually will not cause problem 
for browsers to perform certificate chaining. Therefore, please do not worry 
about it. 

> 
> The mistake was to use a part of those standards which is often
> problematic in the real world.  For example, according to your
> presentation, when IIS builds server certificate chains to send to
> clients, it compares only the DN, causing problems when non-AIA-
> downloading browsers visit IIS-powered sites with GCA certificates.

Since this is off-topic, I would not like to spend a lot time and space to 
discuss self-issued certificate and AIA issues here. However, to make a quick 
clarification, browsers do not have problem if the certificate chain contains 
self-issued certificates. Actually, even Microsoft's IE can handle certificate 
chains containing self-issued certificates. It is Microsoft's IIS can not 
correctly send the certificate chain to the client side. Other https server 
such aa Apache have no problem with certificate chains containing self-issued 
certificates.

> 
> It is a technical mistake in believing all software handles multiple
> certificates with the same DN, not a legal mistake in reading a
> document saying this should be permitted.
> 

As I have mentioned, browsers actually do not have problem with the same issuer 
DN between generations of root CA certificates.

Wen-Cheng Wang
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to