Dear Wayne,

   Those programs for checking field of ToBeSign SSL certificate are online on 
June 22. 

   We suggest that CA "in principle" must comply with the string length limit 
of RFC 5280 for organizationalUnitName or organizationName filed in Subject of 
a certificate. But if it is necessary after verification to express an 
organization’s name in the organizationalUnitName or organizationName filed of 
the subject field that exceeds the string length limit of RFC 5280, then 
Mozilla should not regard these special cases as errors of a CA. After all, 
X.500 standard has no limit on the length of the string, and let the issuing CA 
and the Subscriber who has accepted that SSL certificate may bear the 
possibility of any incompatibility issues. 

   For the unrevoked certificate with length of organizationalUnitName more 
than 64 characters https://crt.sh/?id=336874396, Its Subject DN is as below

            commonName                = www.gov.vc
            organizationalUnitName    = Information Technology Services Division
            organizationalUnitName    = Ministry of Finance, Economic Planning, 
Sustainable Development and Information Technology
            organizationName          = Government of Saint Vincent and the 
Grenadines
            countryName               = VC

   Because Saint Vincent and the Grenadines is a very, very small country with 
120 thousand citizens. Many Ministries are consolidated, so the 
organizationalUnitName of the Ministry becomes longer. Why not let the 
Registration Authority Officers fill in the name of the certificate subject 
with the correct organization’s full name? Or should it be expressed in short 
abbreviations with ambiguous meaning? 

  There is no consensus on the length of the string in the CAB Forum Baseline 
Requirements, but in the case we have encountered, more than 64 characters for 
an organization name does exist.

  Ben Wilson, Vice Chair of current CAB Forum, proposed to amend the Baseline 
Requirements to relax the length of the commonName and organizationName strings 
in April of 2017. Ben first posted his draft revision of BR amendment to PKIX's 
mailing list for comments. Because of the FQDN length in the commonName may be 
more than 64 characters, and the organization name in organizationName may 
exceed 64 characters.

Please read Https://www.ietf.org/mail-archive/web/pkix/current/msg33853.html

Ben's article was discussed in a series of PKIX mailing lists.

Erik Andersen, who is currently responsible for the revision of the X.500 
series standards, mentioned that since the 2008 version of the X.520 standard, 
the string definition of these attributes has been changed from DirectoryString 
to UnboundedDirectoryString, and UnboundedDirectoryString is basically 
unlimited. That is to say, the length of the string, from the source of RFC 
5280 : X.500 series is now not limited.

UnboundedDirectoryString ::= CHOICE {
  teletexString    TeletexString(SIZE (1..MAX)),
  printableString  PrintableString(SIZE (1..MAX)),
  bmpString        BMPString(SIZE (1..MAX)),
  universalString  UniversalString(SIZE (1..MAX)),
  uTF8String       UTF8String(SIZE (1..MAX)) }


   The main reason of the X.500 series of standards removed the string length 
limit is to let the ISO/ITU-T Directory standard compatible with LDAP, because 
the LDAP standard does not limit the string length of the attribute.

   However, when RFC 5280 was originally developed, the referenced X.500 
standard version has a limit on the length of the attribute string. In the PKIX 
discussion thread, because the RFC 5280 standard has been cited by the industry 
for many years, some people are worried that if you go back to the RFC 5280 
string length limit, or if the CA/Browser Forum jumps off the RFC 5280 string 
length limit, it is possible will cause compatibility problems, and finally 
this discussion string did not reach a conclusion.

Sincerely Yours,

           Li-Chun 




Wayne Thayer於 2018年7月11日星期三 UTC+8上午7時10分20秒寫道:
> The specific CP/CPS concerns that I identified have been addressed in the
> latest version of these documents (attached to bug #1341604).
> 
> Some of the misissuances [1] have been addressed - in particular, the 10
> "dedicated server application software certificates" have been revoked and
> replaced with certificates that are beyond the scope of the Mozilla program
> because they assert a custom EKU OID.
> 
> Some of the certificates listed in [1] are still unrevoked, including:
> * missing stateOrProvince or localityName
> * organizationName or organizationalUnitName > 64 characters
> 
> Chunghwa Telecom did provide a detailed response [2] explaining their
> position on each of these issues and stating that they will no longer issue
> certificates containing these errors. Other than the two "mistakes"
> identified and revoked by Chunghwa Telecom [3], no misissuances have been
> detected since 5-May.
> 
> This discussion began on 18-May. I would like ask to everyone to post any
> comments you have on this request to include the Chunghwa Telecom eCA root
> certificate (ePKI Root Certification Authority - G2) no later than Monday
> 16-July.
> 
> - Wayne
> 
> [1]
> https://crt.sh/?CAID=1770&opt=cablint,zlint,x509lint&minNotBefore=2015-01-01
> [2] https://bug1341604.bmoattachments.org/attachment.cgi?id=8974418
> [3] https://bug1341604.bmoattachments.org/attachment.cgi?id=8974418#c66
> 
> 
> On Tue, Jul 10, 2018 at 7:58 AM lcchen.cissp--- via dev-security-policy <
> [email protected]> wrote:
> 
> > [email protected]於 2018年6月5日星期二 UTC+8下午5時22分40秒寫道:
> > > Wayne Thayer於 2018年5月19日星期六 UTC+8上午8時13分15秒寫道:
> > > > This request is for inclusion of the Chunghwa Telecom eCA as
> > documented in
> > > > the following bug:
> > https://bugzilla.mozilla.org/show_bug.cgi?id=1341604
> > >
> > >
> > >
> > >
> > > > ==Bad==
> > > > * A large number of certificates have been misissued from the “Public
> > > > Certification Authority - G2” intermediate [1] (recent example: [2]).
> > Many
> > > > of these certificates remain valid. Chunghwa Telecom has published a
> > > > response to these errors [3] in the inclusion bug. My main concern
> > with the
> > > > response is the assertion that some of these are not SSL certificates
> > bound
> > > > to follow the BRs because they do not contain the CAB Forum OV OID in
> > the
> > > > certificate policies extension. This assertion contradicts section 1.1
> > of
> > > > Mozilla policy.
> > > >
> > > > This begins the 3-week comment period for this request [4].
> > > >
> > > > I will greatly appreciate your thoughtful and constructive feedback on
> > the
> > > > acceptance of this root into the Mozilla CA program.
> > > >
> > > > - Wayne
> > > >
> > > > [1]
> > > >
> > https://crt.sh/?CAID=1770&opt=cablint,zlint,x509lint&minNotBefore=2015-01-01
> > > > [2] https://crt.sh/?id=290793483&opt=zlint,cablint,x509lint
> > > > [3] https://bug1341604.bmoattachments.org/attachment.cgi?id=8974418
> > > > [4] https://wiki.mozilla.org/CA/Application_Process
> > >
> > > Dear Wayne,
> > >
> > >    We have already paused the issuance of this type of certificate in
> > argue, i.e., dedicated server application software certificate.
> > >
> > >    There are 10 such type of certificates that are still valid, as
> > listed in https://bugzilla.mozilla.org/attachment.cgi?id=8983333.
> > >
> > >    By the way, the certificate of 綠金石平台(
> > https://crt.sh/?id=290793483&opt=zlint,cablint,x509lint) that Mozilla
> > mentioned in Ref [2] of Comment 55 of
> > https://bugzilla.mozilla.org/show_bug.cgi?id=1341604 was revoked on May
> > 21th this year, and hence not listed in this attached file.
> > >
> > >    All these 10 certificates are used by the systems owned by our
> > company, i.e., Chunghwa Telecom Co., Ltd..
> > >
> > >    Although these 10 certificates have a SubjectAltnativeName that
> > includes DNSName, they are never used as SSL certificates. Here are our
> > solutions for handling these 10 certificates.
> > >
> > > 1. We plan to modify the format of this type of certificate. The new
> > certificate format will contain an EKU that excludes anyPolicy,
> > emailProtection and serverAuth; besides, there will be no SubjectAltName
> > anymore. In other words, neither DNSName nor IPAddress will be included in
> > this type of certificate.
> > >
> > > 2. We plan to notify the owners of the 10 certificates to make an
> > application for revoking their original certificates and re-issuing a new
> > one according to the new format.
> > >
> > >    After discussing with the owners of the 10 dedicated server
> > application software certificates, they are all willing to re-issue these
> > certificates with the new format and revoke the old ones. However, before
> > that we still have some work to do, such as system modification, electronic
> > process, and so on.
> > >
> > >    We plan to finish the re-issuing and revocation processes of all
> > these 10 certificates before early July.  Of course we will also report
> > immediately if we finish that in advance.
> > >
> > >    Thank you.
> > >
> > > Sincerely Yours,
> > >
> > >            Li-Chun
> >
> >
> >
> > Dear Wayne,
> >
> >    After re-issuing and testing the new certificates with the new format
> > by those applications, the rest 5 proprietary server application software
> > certificates [1] are also revoked.
> >
> >    So we update the information for these certificates in the attached
> > file  (https://bugzilla.mozilla.org/attachment.cgi?id=8991008)
> >
> >    As you can see in that file, all the Status column are already marked
> > as ‘revoked’ with the revocation time in the parentheses.
> >
> >    Besides, the information of the new certificates with the new format
> > are specified in the New Certificate column.
> >
> >    We also provide these new certificates as attached zip fil(
> > https://bugzilla.mozilla.org/attachment.cgi?id=8991015) for your
> > reference.
> >
> > [1]We call them "dedicated server application software certificates"
> > before, but these certificates are using  propriety protocol (unlike TLS
> > protocol, are widely using protocol). After discussing with my colleague
> > and you, we call them "proprietary server application software
> > certificates"  to communicate the fact that these certificates are not for
> > SSL and are not BR-compliant.
> >
> >
> > Sincerely Yours,
> >
> >                    Li-Chun
> > _______________________________________________
> > dev-security-policy mailing list
> > [email protected]
> > https://lists.mozilla.org/listinfo/dev-security-policy
> >

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to