Having received no comments on this proposal, I plan to go ahead and publish version 2.6.1 of the Mozilla Root Store Policy with the third paragraph of section 5.3 clarified as follows:
Intermediate certificates created after January 1, 2019, with the exception of cross-certificates that share a private key with a corresponding root certificate: * MUST contain an EKU extension; and, * MUST NOT include the anyExtendedKeyUsage KeyPurposeId; and, * MUST NOT include both the id-kp-serverAuth and id-kp-emailProtection KeyPurposeIds in the same certificate. - Wayne On Wed, Jul 18, 2018 at 11:55 AM Wayne Thayer <[email protected]> wrote: > Kathleen pointed out that one of the purposes of this section is to > require disclosure of cross-certificates, and my first attempted fix seems > to violate that purpose. Here is my second attempt to clarify the language > in section 5.3: > > > https://github.com/mozilla/pkipolicy/commit/43bdf5d6e97cdda0d8b11ee0f602a5282e848874 > > I would appreciate everyone's comments on this proposed change. > > If we agree that this achieves the intended effect of requiring separation > of intermediate certificates by usage but excluding cross-certificates from > this requirement, then I now believe it will be best for me to publish an > update of the policy. > > - Wayne > > On Tue, Jul 17, 2018 at 10:42 AM Bruce via dev-security-policy < > [email protected]> wrote: > >> On Monday, July 16, 2018 at 7:25:09 PM UTC-4, Wayne Thayer wrote: >> > On Fri, Jul 13, 2018 at 3:50 PM Tim Hollebeek via dev-security-policy < >> > [email protected]> wrote: >> > >> > > Yeah, I agree I don’t think it was intended. But now that I am aware >> of >> > > the issue, I think the crossing workaround per EKU is actually a good >> thing >> > > for people to be doing. Unless someone can point out why it's bad ... >> > > >> > > >> > > >> > I'd like to consider any new restrictions on cross-certificates >> separately. >> > I've created https://github.com/mozilla/pkipolicy/issues/145 to track >> this >> > idea, and added that if we go that far we should also think about >> > restricting roots to either the Mozilla websites or email trust bit. >> > >> > Might want to give people a little more time to plan and adapt to that >> > > change though since I doubt anyone thought of it and people need >> planning >> > > runway to change their procedures if it is going to be interpreted >> this way. >> > > >> > > >> > > >> > It seems that we have agreement that the current change was not >> intended to >> > apply to cross certificates. I think that is the meaning of the existing >> > language, but it would be clearer if the final paragraph of section 5.3 >> was >> > amended to: >> > >> > These requirements include all intermediate certificates signed by >> > cross-certificates which chain to a certificate that is included in >> > Mozilla’s CA Certificate Program. >> > >> > Questions: >> > - does anyone object to that new wording? >> > - should the official policy be updated with this change prior to 1-Jan >> > when the requirement to separate usages of new intermediate certificates >> > goes into effect, or can this wait since it is only a clarification? >> >> Since this is only a clarification, then I think the change can wait >> until the next update of the Mozilla policy. >> >> Thanks, Bruce. >> >> _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

