On Friday, 19 May 2017 20:41:20 UTC+1, Matthew Hardeman  wrote:
> From a perspective of risk to the broader web PKI, it would appear that a 
> properly name constrained intermediate with (for example)  only the Server 
> and Client TLS authentication ekus with name constraints limited to 
> particular validated domains (via dnsName constraint along with excluding 
> wildcard IP/netmask for IPv4 and IPv6)  is really no substantively more risky 
> than a multi-SAN wildcard certificate with the same domains.

Unlike a wildcard, the constrained intermediate impacts all names under that 
tree. For example a certificate for *.example.com definitely isn't valid for 
mail.research.example.com, www.research.example.com etc. whereas a constrained 
intermediate for example.com _is_ able to issue for those names.

But yes, overall Matt's approach makes sense to me, lightweight disclosure such 
as via CT logging of such intermediates is appropriate from what I can see. 
Issuance _of_ the intermediates needs to have good oversight, but we don't need 
to freak out about the issuance _from_ them too much. If they're badly run they 
will join in that a huge number of poorly looked after end entity certificates, 
and have not dissimilar risk, narrowed to just the affected subject domain(s).
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to