On Wed, 2010-04-07 at 05:17 +0300, Eddy Nigg wrote:
> On 04/07/2010 05:01 AM, Matt McCutchen:
> > But I do want to allow many more people to have their own sub-CAs,
> > unless there is an actual technical reason why it is a bad idea, in
> > which case I am hoping you will tell me.
>
> Yes, for example do all potential client software enforce
> name-constraining?

No.  But since the name constraint extension is critical, client
software that does not support name constraints is required to reject
the intermediate certificate, which is safe.  If client software
accepts the certificate but does not properly enforce the name
constraints (e.g., NSS bug 394919), that is the client software's
vulnerability.

CAs could start doing as I propose today.  NSS users would be
vulnerable and, strictly speaking, it would be their own fault.  Users
of client software that does not support name constraints (MSIE?)
would be completely unaffected since their software would reject all
the new sub-CAs.

> How are the keys  secured? Are the sub CAs going to
> be audited (including site visit) as the root CA? How are the validation
> requirements enforce? And a couple of more such questions...

This is not an issue.  The name constraint makes it impossible for a
domain registrant to issue a certificate that validates for a server
name outside that domain.  Hence, anything bad I do with my
intermediate certificate could only hurt me as registrant of
mattmccutchen.net.

--
Matt
-- 
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to