On Tue, Apr 17, 2018 at 6:10 AM, Buschart, Rufus via dev-security-policy <
[email protected]> wrote:

> I believe the wording "insecure electronic channels" leaves a lot of space
> for interpretation. In corporate PKIs for email encryption it is quite
> common to transfer centrally generated email encryption p12-files to mobile
> device management systems, email encryption gateways or directly to mobile
> devices using a wide variety of 'electronic channels'. From the proposed
> wording it doesn't seem to be clear which of those channels are 'insecure'
> and which not. Even if not that common, the same applies for email
> signature p12-files for e.g. email signature on mail gateways or mobile
> devices. Most of the mobile devices out in the field neither support
> hardware token, key-pair-generation in the mailer software nor installation
> of downloaded p12-files (prohibited by app sandboxing).
>
> Maybe it would be possible to restrict the new wording to the EKU
> kp-ServerAuth first and have a detailed discussion about email-encryption
> and user authentication with more interested parties in the next months?
>

Again, this is not new wording. It's already a requirement:
https://wiki.mozilla.org/CA/Forbidden_or_Problematic_Practices#Distributing_Generated_Private_Keys_in_PKCS.2312_Files

Having said that, could we instead be more specific by replacing "insecure
electronic channels" with "unencrypted email"? Limiting the scope of this
statement to id-kp-serverAuth is meaningless since we forbid CA key
generation for server certificates.

- Wayne
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to