On 05/12/16 12:43, Brian Smith wrote:
> Let's consider the cases:
> 
> A root CA: It is in scope if it has the SSL trust bit.
> 
> An intermediate CA: It is in scope unless all the trusted certificates
> issued for it have an EKU that excludes id-kp-serverAuth.

No; it's in scope unless it has constraints which prevent the issue of
(or rather, the trust of) certificates which contain id-kp-serverAuth.

> This is true regardless of whether you require an explicit id-kp-serverAuth
> in the end-entity certificates, and/or if you base it on the subjectAltName
> entries like I suggest, right? Because, at any time, the CA could issue an
> end-entity certificate with id-kp-serverAuth in its EKU and/or a
> certificate with a dNSName or iPAddress in its subjectAltNames.

Right, so your initial formulation is not correct. It's in scope whether
or not "all the trusted certificates issued for it [so far] have an EKU
that excludes id-kp-serverAuth".

> However, I do think that if a CA certificate is name constrained to not
> allow any dNSName or iPAddress names, and/or it EKU that doesn't contain
> id-kp-serverAuth, then it shouldn't be in scope of the proposal. Either
> condition is sufficient.

Are there not other relevant name types, such as svrName (or whatever
it's called)?

Gerv
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to