For us at Siemens PKI this wording would work, because we establish a first 
channel for email encryption to every employee when he receives his corporate 
smart card / ID card. But I still think the community should have a broad 
discussion what is acceptable behavior for transmitting S/MIME P12s and what 
not. For example if the CA sends not the P12-file directly to the subject but a 
link to download the P12 via HTTPS from a server of the CA, the level of 
security is practically the same as sending the P12-file directly (in both 
cases the operator of the mail server can intercept the P12 file easily) but it 
would be an allowed practice.

/Rufus



Von: Wayne Thayer [mailto:[email protected]]
Gesendet: Freitag, 20. April 2018 22:00
An: Buschart, Rufus (GS IT HR 7 4)
Cc: mozilla-dev-security-policy; Wichmann, Markus Peter (GS IT ISEC TE DI IS); 
Grotz, Florian (GS IT HR 7 4)
Betreff: Re: Policy 2.6 Proposal: Add prohibition on CA key generation to policy

On Tue, Apr 17, 2018 at 6:10 AM, Buschart, Rufus via dev-security-policy 
<[email protected]<mailto:[email protected]>>
 wrote:
I believe the wording "insecure electronic channels" leaves a lot of space for 
interpretation. In corporate PKIs for email encryption it is quite common to 
transfer centrally generated email encryption p12-files to mobile device 
management systems, email encryption gateways or directly to mobile devices 
using a wide variety of 'electronic channels'. From the proposed wording it 
doesn't seem to be clear which of those channels are 'insecure' and which not. 
Even if not that common, the same applies for email signature p12-files for 
e.g. email signature on mail gateways or mobile devices. Most of the mobile 
devices out in the field neither support hardware token, key-pair-generation in 
the mailer software nor installation of downloaded p12-files (prohibited by app 
sandboxing).

Maybe it would be possible to restrict the new wording to the EKU kp-ServerAuth 
first and have a detailed discussion about email-encryption and user 
authentication with more interested parties in the next months?

Again, this is not new wording. It's already a requirement: 
https://wiki.mozilla.org/CA/Forbidden_or_Problematic_Practices#Distributing_Generated_Private_Keys_in_PKCS.2312_Files

Having said that, could we instead be more specific by replacing "insecure 
electronic channels" with "unencrypted email"? Limiting the scope of this 
statement to id-kp-serverAuth is meaningless since we forbid CA key generation 
for server certificates.

- Wayne
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to