I am having trouble understanding the following phrase under 4.
/"//that are not inconsistent with id-kp-emailProtection" /
and I'm not sure if it is because of a double negative or something else
missing. Ben, or anyone, can you please share some examples of
"consistent" and "inconsistent" EKUs with id-kp-emailProtection to make
this requirement a bit more clear?
1. and 3. are already covered in 4. You use "encourage" to recommend
something. I suggest we avoid using RFC 2119 specific terms like "SHOULD
NOT" if it is just to "encourage" a practice.
In order to have some symmetry between the email and server
certificates, I made an attempt to consolidate the information. Here is
a proposed change:
Current section 5.3.1 text:
/"We encourage CAs to technically constrain all intermediate
certificates. For a certificate to be considered technically
constrained, the certificate MUST include an //Extended Key Usage (EKU)
<http://tools.ietf.org/html/rfc5280#section-4.2.1.12>//extension
specifying all extended key usages that the subordinate CA is authorized
to issue certificates for. The anyExtendedKeyUsage KeyPurposeId MUST NOT
appear within this extension./
//
/If the certificate includes the id-kp-serverAuth extended key usage,
then to be considered technically constrained, the certificate MUST be
Name Constrained as described in section 7.1.5 of version 1.3 or later
of the //Baseline Requirements
<https://cabforum.org/baseline-requirements-documents/>//. The
conformance requirements defined in section 2.3 of this policy also
apply to technically constrained intermediate certificates./
//
/If the certificate includes the id-kp-emailProtection extended key
usage, then to be considered technically constrained, it MUST include
the Name Constraints X.509v3 extension with constraints on rfc822Name,
with at least one name in permittedSubtrees, each such name having its
ownership validated according to section 3.2.2.4 of the //Baseline
Requirements <https://cabforum.org/baseline-requirements-documents/>//."/
Suggested text:
/"We encourage CAs to technically constrain all intermediate
certificates. For a CA certificate to be considered technically
constrained for email certificates, //the CA certificate: /
/- MUST include an //Extended Key Usage (EKU)
<http://tools.ietf.org/html/rfc5280#section-4.2.1.12>//extension that
includes the id-kp-emailProtection KeyPurposeID. The values
id-kp-serverAuth, id-kp-codeSigning, id-kp-timeStamping, and
anyExtendedKeyUsage MUST NOT be present. The value id-kp-clientAuth MAY
be present. Other values that the CA is allowed to use, and that are
documented in the CA’s CPS MAY be present, and;
/
/- MUST include a Name Constraints X.509v3 extension with constraints on
rfc822Name values, with at least one name in permittedSubtrees, each
such name having its ownership validated according to section 3.2.2.4 of
the //Baseline Requirements
<https://cabforum.org/baseline-requirements-documents/>//./
/For a CA certificate to be considered technically constrained for
server certificates, the CA certificate: //
/
/- MUST include an //Extended Key Usage (EKU)
<http://tools.ietf.org/html/rfc5280#section-4.2.1.12>//extension that
includes the id-kp-serverAuth KeyPurposeID. The values
id-kp-emailProtection, id-kp-codeSigning, id-kp-timeStamping, and
anyExtendedKeyUsage MUST NOT be present. The value id-kp-clientAuth MAY
be present. Other values that the CA is allowed to use, and that are
documented in the CA’s CPS MAY be present, and;
/
/- //MUST //include a Name Constraints X.509v3 extension with
constraints //as described in section 7.1.5 of version 1.3 or later of
the //Baseline Requirements
<https://cabforum.org/baseline-requirements-documents/>//./
/We encourage CAs not to include more than a single KeyPurposeID in the
EKU extension."/
//
Thank you,
Dimitris.
On 11/11/2021 12:23 π.μ., Ben Wilson wrote:
Next week, I will be closing discussion on this issue so that we can
move on to others.
I intend to modify section 5.3.1. of the MRSP regarding technically
constrained CAs by:
1 - Replacing "all extended key usages" with "the extended key
usage(s) allowed for the type of end entity certificates that the
subordinate CA is authorized to issue." (This provision begins with a
"MUST").
2 - Adding "CAs SHOULD NOT include more than a single KeyPurposeID in
the EKU extension." (This is a recommendation, not a requirement.)
3 - Adding "The id-kp-clientAuth EKU MAY also be present." (To allow
for the clientAuth EKU in server certificates. I realize that this is
slightly contradictory with 2 above.)
4 - Adding "If the intermediate CA certificate includes the
id-kp-emailProtection extended key usage, then to be considered
technically constrained, it MUST include the Name Constraints X.509v3
extension with constraints on rfc822Name, with at least one name in
permittedSubtrees, each such name having its ownership validated
according to section 3.2.2.4 of the Baseline Requirements
<https://cabforum.org/baseline-requirements-documents/>. The values
id-kp-serverAuth, id-kp-codeSigning, id-kp-timeStamping, and
anyExtendedKeyUsage MUST NOT be present. id-kp-clientAuth MAY be
present. Other values that the CA is allowed to use, that are not
inconsistent with id-kp-emailProtection, and that are documented in
the CA’s CPS MAY be present." (I realize that this is slightly
contradictory with 2 above.)
I'll give everyone a week to make any additional comments. See
https://github.com/BenWilson-Mozilla/pkipolicy/blob/Issue228-5/rootstore/policy.md
(and please let me know if I've missed anything discussed).
Thanks,
Ben
On Tue, Nov 2, 2021 at 7:24 AM Ben Wilson <[email protected]> wrote:
Here is wording to address the email trust bit in MRSP section
5.3.1 -
If the intermediate CA certificate includes the
id-kp-emailProtection extended key usage, then to be considered
technically constrained, it MUST include the Name Constraints
X.509v3 extension with constraints on rfc822Name, with at least
one name in permittedSubtrees, each such name having its ownership
validated according to section3.2.2.4 of the Baseline
Requirements. The values id-kp-serverAuth, id-kp-codeSigning,
id-kp-timeStamping, and anyExtendedKeyUsage MUST NOT be present.
id-kp-clientAuth MAY be present. Other values that the CA is
allowed to use, that are not inconsistent with
id-kp-emailProtection, and that are documented in the CA’s CPS MAY
be present
On Mon, Nov 1, 2021 at 2:10 PM Ben Wilson <[email protected]> wrote:
Thinking about this more, we will need to address this for
SMIME, too. I might need to put more detail down in the other
two paragraphs of MRSP seciton 5.3.1 that explain what it
means to technically constrain issuing CAs for TLS server
certificates and for SMIME certificates.
On Mon, Nov 1, 2021 at 1:43 PM Ben Wilson
<[email protected]> wrote:
I could a parenthetical - (For Subordinate CA
Certificates that will be used to issue TLS certificates,
the clientAuth EKU MAY be present.)
On Mon, Nov 1, 2021 at 1:37 PM Ryan Sleevi
<[email protected]> wrote:
On Mon, Nov 1, 2021 at 3:34 PM Corey Bonnell
<[email protected]> wrote:
> I'm accepting your suggestion and phrasing it,
"CAs SHOULD NOT include more than a single
KeyPurposeID in the EKU extension."
This is quite a bit more onerous than the current
BRs, which explicitly allow for id-kp-clientAuth
to be included alongside id-kp-serverAuth. Is the
deprecation of id-kp-clientAuth KP in serverAuth
TLS certificates intentional?
I'm not sure I follow? A SHOULD NOT is not any more
onerous, as it's not a prohibition.
From RFC 2119, which Mozilla policy incorporates by
reference
SHOULD NOT This phrase, or the phrase "NOT
RECOMMENDED" mean that
there may exist valid reasons in particular
circumstances when the
particular behavior is acceptable or even useful,
but the full
implications should be understood and the case
carefully weighed
before implementing any behavior described with
this label.
--
You received this message because you are subscribed to the Google
Groups "[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send
an email to [email protected].
To view this discussion on the web visit
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaYyDqCvrD0F5VKq%2BJm4NeBCh73O0mX48MoabxWS3rqWpA%40mail.gmail.com
<https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaYyDqCvrD0F5VKq%2BJm4NeBCh73O0mX48MoabxWS3rqWpA%40mail.gmail.com?utm_medium=email&utm_source=footer>.
--
You received this message because you are subscribed to the Google Groups
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To view this discussion on the web visit
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/853d8ecb-ecbf-e16b-8ffb-c8190b71a7fa%40it.auth.gr.