On 21/06/17 13:13, Doug Beattie wrote:
>> Do they have audits of any sort?
> 
> There had not been any audit requirements for EKU technically 
> constrained CAs, so no, there are no audits.

In your view, having an EKU limiting the intermediate to just SSL or to
just email makes it a technically constrained CA, and therefore not
subject to audit under any root program?

I ask because Microsoft's policy at http://aka.ms/auditreqs says:

"Microsoft requires that every CA submit evidence of a Qualifying Audit
on an annual basis for the CA and any non-limited root within its PKI
chain."

In your view, are these two intermediates, which are constrained only by
having the email and client auth EKUs, "limited" or "non-limited"?

>>> The other customer complies the prior words in the Mozilla policy
>> regarding "Business Controls".

By implication, and reading your previous emails, are you saying that
the first customer does not comply with those words?

> That is correct.  Enforcement is via contractual/business controls which is 
> compliant with the current policy, as vague and weak as that is (and you've 
> previously acknowledged).  Moving from this level of control to being audited 
> or having name constraints will take more time that just a couple of months.  

Leaving aside the requirements of other root programs, I agree this
arrangement with the second customer is compliant with our current
policy. For the new policy, they have 3 options: a) get an audit, b) use
a name-constrained intermediate, or c) move to a hosted service which
limits them to an approved set of domains.

Consistent with the principles outlined for Symantec regarding business
continuity, the fact that GlobalSign does not have the capability to
provide c) should not be a factor in us determining how long we should
allow this particular situation to continue.

It's worth noting that if we had discovered this situation for SSL -
that an unconstrained intermediate or uncontrolled power of issuance had
been given to a company with no audit - we would be requiring the
intermediate be revoked today, and probably taking further action as well.

> Two  further points:
> 1) It’s not clear of email applications work with name constrained CAs.  Some 
> have reported email applications do not work, however, I have not tested this 
> case. 

That sounds like something you might want to investigate as a matter of
urgency :-)

> Both of the customers are large US based companies with contractual 
> obligations to only issue secure email certificates to domains which they own 
> and control so I hope we can come to an agreement on the phased plan.

The size or geographic location of a company is not necessarily
correlated to their competence in handling unconstrained (for email)
intermediate CAs correctly. Our default assumption must be that, without
audit, they don't know how to handle it properly.

Gerv
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to