On 05/05/17 22:21, Jakob Bohm wrote:
> The issue would be implementations that only check the EE cert for
> their desired EKU (such as ServerAuth checking for a TLS client or
> EmailProtection checking for a mail client).  In other words, relying
> parties whose software would accept a chain such as
> 
> root CA (no EKUs) => SubCA (EmailProtection) => EE cert (ServerAuth).

Do you know of any such implementations?

> One other question: Does your proposal allow a TCSC that covers both
> ServerAuth and EmailProtection for the domains of the same organization?

I don't believe my proposal forbids this. Do you think it should?

> Does Mozilla as a Browser implementer have any policy or technical
> requirements on certificates that Mozilla products can use for
> ClientAuth 

No policy requirements to my knowledge. There may be technical
requirements (e.g. now we've turned off SHA-1 support, I doubt that
works with ClientAuth either).

Gerv
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to