On Wed, Apr 25, 2018 at 1:03 PM, Wayne Thayer <[email protected]> wrote:

> On Tue, Apr 24, 2018 at 9:24 AM, Ryan Sleevi <[email protected]> wrote:
>
>> I'm not sure I underestand the use case. I'm hoping that they can clarify
>> more.
>>
>> Pedro - can you explain more about why this is important?
>
> That is, it would seem valuable as part of the technical constraint
>> exercise to ensure the EKUs are restsricted. This is particularly true due
>> to how nameConstraints work - they are blacklists (effectively), rather
>> than whitelists, which means that combined with EKUs, they can be used for
>> unconstrained purposes.
>>
>> Similar to the discussions regarding nameConstraints and name types, this
>> has the effect of discouraging the introduction of new EKUs, as such
>> intermediates would be unconstrained for these potential new and novel EKU
>> use cases.
>>
>> Ryan - can you explain this concern in more detail? If, for instance, the
> srvName type was added for TLS certificates, new intermediates would be
> required to constrain that name type due to the "fail open" nature of name
> constraints. If a single intermediate contained both the serverAuth and
> emailProtection EKUs, how does that make the situation worse? Is it just
> that now all of the S/MIME certificates issued under the intermediate  must
> also expire or be replaced so that the old intermediate (without a
> constraint on srvName) can be revoked?
>

You're absolutely correct that if an intermediate certificate contains
serverAuth and emailProtection EKUs, then we are bounded in the types of
certificates it issues. It is only in the situation where it lacks an EKU,
or where it's granted the anyExtendedKeyusage EKU, that we're in a
situation where we're failing "open".

My understanding of the proposal to "make an exception" for nameConstrained
CAs was to allow any of these - that is, a combination of explicit EKUs,
lacking an EKU, and an anyEKU. The consequence of this would be that the
introduction of srvName for TLS, in the case of (lacking an EKU, any EKU),
would mean that such an intermediate is unconstrained for TLS issuance -
even if it was only 'intended' for something such as S/MIME and smart-card
auth.

If the proposal is to allow multiple (explicit) EKUs on an intermediate,
when the intermediate also has constraints appropriate for each of the
enumerated EKUs, then I think we're in a better place, although we should
understand the motivation more :)
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to