Ian G wrote: > Nelson B Bolyard wrote: > The curiosity here is that the Certificate Policies extension may > not be shown prominently by software. As the point of the cert is > to make some claim to the user, and the essence of that claim is > somehow pertinent to the user's choice, it is understandable that > issuers have been frustrated in the past by lack of display of the > nature of the claim....
For PKI to work with ordinary mom-N-pop users, there must be a small set of claims common to all CAs honored by a browser. Mom-n-pop are less likely to read CPS than they are to read click-through EULAs, even if those CPSs are right there for them to read (as EULA text usually is). So, I think that, realistically, CPS info in a cert is a waste of time. Mom-n-Pop trust that Mozilla has not included any CAs whose CPSs are absurd. Someone with more savvy won't base his decision on the tiny summary in the cert, but will read the whole CPS. Regarding choice of hash in the signature in a root CA cert, I will add that NSS doesn't even check the signature on a trusted root CA cert. The fact that the cert is marked trusted (if it is) tells NSS to use that cert's public key without verifying the signature. So, the signature on the root cert is superfluous ... to NSS. Dunno about other libraries. >> NIST published some tables of equivalent strengths of hashes, >> ciphers and key sizes. They show equivalent key sizes for DSA, RSA, ECDSA, >> symmetric ciphers (3DES, AES) and hashes. See tables 2 and 3, pp 63-64 in >> http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57-Part1-revised2_Mar08-2007.pdf > > Ah, good point. http://keylength.net/ might be easier to read :) I don't know if the tables at keylength.net are equivalent to NIST's or not. There are lots of groups (including some with real cryptographers :) that have published their own tables for this purpose, tables that do NOT have equivalent values to NIST's. Some of them include tables with time resolutions in single years, not in decades (like NIST's), which some CAs find desirable. Many of these tables are less strict than NIST's, allowing shorter keys to be used longer than NIST's tables allow. :( In finality, you have to pick a table from someone you believe has done a really good job of analyzing it. Given that NIST's tables are the basis for the US Government's protection of its own secrets, which it guards jealously, I'm inclined to accept them as adequately conservative. :) > OK. Logic above. That applies to the root though, less so than to > any sig on a cert. >> An AIA extension in a cert is a hint on how to find the cert or the OCSP >> responder for the issuer of that cert. > > OK, certs only. It does seem rather odd that such things as checks > on certificates were not in for example the subroots... but, no problem. >>> * OCSP and CRL URLs go in the root or the intermediates or certs? >> URLs in a cert provide hints about how to get additional info that will >> be used in validating that cert. > > OK, certs. Ian, I suspect (guess) from the way you use the word cert above, that you use it to mean End Entity cert, as opposed to CA cert. My statement above, about the placement of AIA extensions, was not limited to EE certs. It applies to all certs, EEs and intermediate CAs. In *any* cert, information about how to find the cert of its issuer, and the revocation information from its issuer, may be contained in that cert's AIA extension. Roots don't need that info, however, since a) the root is its own signer, and b) if a root cert was listed in its own CRL, would you believe it? If a CRL, signed by a root, said "Everything this root tells you is a lie" ... what could you conclude from it? >> All this stuff is documented in the standards, but typical OpenSSL users >> never read those. Any competent CA should have lots of people who are >> thoroughly familiar with RFC 3280 and RFC 5280. It should be a "core >> competence" for all but the janitors. > > :) I have another perspective: "if it is not written down by you > (the CA) it doesn't exist." Standards can be useful, but a bit > unfulfilling in this field. My perspective is: any CA that says "we don't need to know the standards" and hence "makes it up as they go" does not belong in Mozilla's root list. Unfortunately, in the past, that attitude was conveyed by one or more representatives of a certain CA. I hope that, going forward, that attitude will be noticeably absent in all root cert inclusion requests. _______________________________________________ dev-tech-crypto mailing list [email protected] https://lists.mozilla.org/listinfo/dev-tech-crypto

