Re: TLS certificates for ECIES keys

2020-10-30 Thread Devon O'Brien via dev-security-policy
Hi Bailey, You mention that all certificates involved in this design are checked for expiration, revocation, and Certificate Transparency using all of the same logic that verifies TLS certificates on Apple platforms, but notably, the custom evaluation policy for the Apple-issued certificate can

Re: TLS certificates for ECIES keys

2020-10-30 Thread Matthew Hardeman via dev-security-policy
On Fri, Oct 30, 2020 at 10:49 AM Bailey Basile via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > > We specifically chose not to issue Apple certificates for these keys > because we did not want users to have to trust only Apple's assertion that > this key is for a third par

Re: TLS certificates for ECIES keys

2020-10-30 Thread Bailey Basile via dev-security-policy
Ryan, Thank you for the questions. Answers in line. Bailey On Friday, October 30, 2020 at 8:43:46 AM UTC-7, Ryan Sleevi wrote: > On Thu, Oct 29, 2020 at 2:07 PM Jacob Hoffman-Andrews via > dev-security-policy wrote: > > > The processor sends the resulting TLS certificate to Apple. Apple sign

Re: Policy 2.7.1: MRSP Issue #186: Requirement to Disclose Self-signed Certificates

2020-10-30 Thread Ryan Sleevi via dev-security-policy
On Fri, Oct 30, 2020 at 12:38 PM Jakob Bohm via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > On 2020-10-30 16:29, Rob Stradling wrote: > >> Perhaps add: "And also include any other certificates sharing the same > >> private/public key pairs as certificates already included

Re: Policy 2.7.1: MRSP Issue #186: Requirement to Disclose Self-signed Certificates

2020-10-30 Thread Jakob Bohm via dev-security-policy
On 2020-10-30 16:29, Rob Stradling wrote: Perhaps add: "And also include any other certificates sharing the same private/public key pairs as certificates already included in the requirements." (this covers the situation you mentioned where a self-signed certificate shares the key pair of a certi

Re: TLS certificates for ECIES keys

2020-10-30 Thread Bailey Basile via dev-security-policy
Hi, Matt, We thought hard about the agility concerns for this particular application and the impact to the WebPKI and CT ecosystems. First, all certificates involved in this design are checked for expiration, revocation, and Certificate Transparency using all of the same logic that verifies TLS

Re: TLS certificates for ECIES keys

2020-10-30 Thread Ryan Sleevi via dev-security-policy
On Thu, Oct 29, 2020 at 2:07 PM Jacob Hoffman-Andrews via dev-security-policy wrote: > The processor sends the resulting TLS certificate to Apple. Apple signs a > second, non-TLS certificate from a semi-private Apple root. This root is > trusted by all Apple devices but is not in other root progr

Re: Policy 2.7.1: MRSP Issue #186: Requirement to Disclose Self-signed Certificates

2020-10-30 Thread Rob Stradling via dev-security-policy
> Perhaps add: "And also include any other certificates sharing the same > private/public key pairs as certificates already included in the > requirements." (this covers the situation you mentioned where a > self-signed certificate shares the key pair of a certificate that chains > to an included

Re: TLS certificates for ECIES keys

2020-10-30 Thread Jakob Bohm via dev-security-policy
On 2020-10-30 01:50, Matthew Hardeman wrote: On Thu, Oct 29, 2020 at 6:30 PM Matt Palmer via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: The way I read Jacob's description of the process, the subscriber is "misusing" the certificate because they're not going to present i