Re: WISeKey root inclusion request (re-start public discussion)

2008-11-29 Thread Eddy Nigg
On 11/29/2008 06:43 AM, Frank Hecker: On the WISeKey end, they could mandate use of SAN in BlackBox-issued certificates (as opposed to just including it in the default template), and from the NSS end we could disallow use of CN for storing domain names. At least you could have made it a

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-29 Thread Eddy Nigg
On 11/29/2008 05:27 PM, Frank Hecker: Made what a requirement? Mandating use of SAN in BlackBox? Yes, that's what I actually meant. But my understanding (based on your hypothetical scenario) is that this would not be sufficient, since someone could remove the key material and try to issue

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-29 Thread Kyle Hamilton
OMG, maybe just maybe the OpenSSL folks should perhaps be told of this issue and concept so they can update! -Kyle H On Mon, Nov 24, 2008 at 11:35 AM, Eddy Nigg [EMAIL PROTECTED] wrote: On 11/24/2008 07:33 PM, Nelson B Bolyard: The only solution to this that is apparent to me is for the web

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-28 Thread Frank Hecker
Eddy Nigg wrote: Frank: I think the critical issues what Mozilla concerns have been addressed! I agree, and am going to proceed with approval of this request. We need to make sure that naming constraints work as expected. I read through the thread on that, and will read it again to confirm

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-28 Thread Frank Hecker
Frank Hecker wrote: Per the CA schedule, the next CA on the list for public comment is WISeKey, which has applied to add its (one) root CA certificate to the Mozilla root store, as documented in the following bug: https://bugzilla.mozilla.org/show_bug.cgi?id=371362 and in the pending

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-28 Thread Frank Hecker
Frank Hecker wrote: Frank Hecker wrote: Per the CA schedule, the next CA on the list for public comment is WISeKey, which has applied to add its (one) root CA certificate to the Mozilla root store, as documented in the following bug: https://bugzilla.mozilla.org/show_bug.cgi?id=371362 and

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-24 Thread Eddy Nigg
On 11/23/2008 12:32 AM, Nelson B Bolyard: There's no foolproof test for determining if a string is a DNS name or some other kind of name. Various heuristics can be devised, but they all have problems. This worries me somewhat and I question the usefulness of the name-constraints then...

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-24 Thread Nelson B Bolyard
Eddy Nigg wrote, On 2008-11-24 09:14: On 11/23/2008 12:32 AM, Nelson B Bolyard: There's no foolproof test for determining if a string is a DNS name or some other kind of name. Various heuristics can be devised, but they all have problems. This worries me somewhat and I question the

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-24 Thread Eddy Nigg
On 11/24/2008 07:33 PM, Nelson B Bolyard: The only solution to this that is apparent to me is for the web to evolve to the point where browsers no longer accept DNS names in non-standard locations in the cert, such as in the Subject Common Name. Which in itself might create quite some

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-24 Thread Nelson B Bolyard
Eddy Nigg wrote, On 2008-11-24 11:35: On 11/24/2008 07:33 PM, Nelson B Bolyard: The only solution to this that is apparent to me is for the web to evolve to the point where browsers no longer accept DNS names in non-standard locations in the cert, such as in the Subject Common Name. Which

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-22 Thread kgb
Hi Eddy, On Nov 21, 10:37 pm, Eddy Nigg [EMAIL PROTECTED] wrote: On 11/21/2008 10:12 PM, kgb: Only validated and approved domain names can be included in a cert, whether in the Subject DN or the SAN. It is the default template, and best practice that the SAN (e.g. RFC822, dnsName) to

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-22 Thread Eddy Nigg
On 11/22/2008 12:32 PM, kgb: Mandatory inclusion of the SAN extension in a certificate is a policy we can apply and monitor in the future. To my understanding NSS ignores the subject line according to the RFC. DNS name constraints constrain subject alt name extensions, not CN= attributes in

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-22 Thread Nelson B Bolyard
Eddy Nigg wrote, On 2008-11-22 04:10: On 11/22/2008 12:32 PM, kgb: Mandatory inclusion of the SAN extension in a certificate is a policy we can apply and monitor in the future. To my understanding NSS ignores the subject line according to the RFC. I think you mean subject NAME, not subject

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-21 Thread kgb
Hi Eddy, On Nov 21, 12:36 am, Eddy Nigg [EMAIL PROTECTED] wrote: On 11/20/2008 06:34 PM, kb:   Probably the most important change in stated practice, is that it is reflected that every CA is audited at least once annually. This is the case for all active CAs. Kevin, thanks for

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-21 Thread Eddy Nigg
On 11/21/2008 10:57 AM, kgb: There is not. There are no sub CAs within our public hierarchy, that are not of the BlackBox type, which are external to our physical infrastructure. There are several PRIVATE CAs (linked to a private customer Root CA) that use our software and practices and

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-21 Thread Eddy Nigg
On 11/18/2008 05:31 AM, Eddy Nigg: On 11/18/2008 03:54 AM, Eddy Nigg: Frank, I greatly missed the thorough and systematic work of Kathleen in this bug and it's a pity she didn't perform another round of information gathering in case some new evidence was provided. Anyhow, I couldn't find

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-21 Thread kgb
Hi Frank, On Nov 20, 9:21 pm, Frank Hecker [EMAIL PROTECTED] wrote: Eddy Nigg wrote: The Wisekey case could be where we might draw the line. I'm not sure exactly which message (of mine or someone else's) you're responding to. In any case I don't think there's a bright line between the

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-21 Thread Eddy Nigg
On 11/21/2008 05:16 PM, kgb: Frank, I agree with you. Our CA controls, audits, etc. are designed to ensure that all identities are validated appropriately prior to certificate issuance. BlackBox CAs are an extremely restricted CA context where certificates issued at the CA are restricted to

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-21 Thread kgb
Hi Eddy, On Nov 21, 8:16 pm, Eddy Nigg [EMAIL PROTECTED] wrote: On 11/21/2008 05:16 PM, kgb: Frank, I agree with you. Our CA controls, audits, etc. are designed to ensure that all identities are validated appropriately prior to certificate issuance. BlackBox CAs are an extremely

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-21 Thread Eddy Nigg
On 11/21/2008 10:12 PM, kgb: Only validated and approved domain names can be included in a cert, whether in the Subject DN or the SAN. It is the default template, and best practice that the SAN (e.g. RFC822, dnsName) to be filled in the certificates. Its the case for some but not all customers.

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-20 Thread kb
On Nov 19, 2:27 am, Eddy Nigg [EMAIL PROTECTED] wrote: On 11/19/2008 01:59 AM, kgb: Hi Kevin, WISeKey has made some changes to its practices, since the last public discussion period. I'm glad to hear that! Can you point to what specifically has been changed since then? Probably the

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-20 Thread kb
Hi Eddy, On Nov 19, 3:14 am, Eddy Nigg [EMAIL PROTECTED] wrote: Frank: TheWisekeycase could be where we might draw the line. Provided that - there is a *good compelling reason* for using sub-ordinate certificates in first place, limited to the domains under the control of the owner (via

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-20 Thread Frank Hecker
Eddy Nigg wrote: The Wisekey case could be where we might draw the line. I'm not sure exactly which message (of mine or someone else's) you're responding to. In any case I don't think there's a bright line between the various scenarios involving independently-operated subordinate CAs.

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-20 Thread Eddy Nigg
On 11/20/2008 10:21 PM, Frank Hecker: Eddy Nigg wrote: The Wisekey case could be where we might draw the line. I'm not sure exactly which message (of mine or someone else's) you're responding to. I refereed to the general discussion about sub roots. In any case I don't think there's a

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-20 Thread Eddy Nigg
On 11/20/2008 06:34 PM, kb: Probably the most important change in stated practice, is that it is reflected that every CA is audited at least once annually. This is the case for all active CAs. Kevin, thanks for clarifying this. It indeed was one of the concerns raised last time. The

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-19 Thread Michael Ströder
Eddy Nigg wrote: The Wisekey case could be where we might draw the line. Provided that - there is a *good compelling reason* for using sub-ordinate certificates in first place, limited to the domains under the control of the owner (via name-constraints) and with reasonable controls in place

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-18 Thread Ian G
Eddy Nigg wrote: I believe that the policy (and/or other relevant policy guiding statements) should be clear in respect what Mozilla requires from the CAs. It's a nice ideal, but I wonder myself whether it can be achieved. This is one of the reasons why we have ended up with the

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-18 Thread Eddy Nigg
On 11/18/2008 05:14 PM, Ian G: Eddy Nigg wrote: I believe that the policy (and/or other relevant policy guiding statements) should be clear in respect what Mozilla requires from the CAs. It's a nice ideal, but I wonder myself whether it can be achieved. This is one of the reasons why we have

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-18 Thread kgb
On Nov 18, 2:54 am, Eddy Nigg [EMAIL PROTECTED] wrote: On 11/14/2008 11:12 PM, Frank Hecker:  ...in the short term I'm going to try to restart CA public In this particular case I think that the practice in question doesn't meet the requirements of the Mozilla CA policy. This includes in

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-18 Thread Eddy Nigg
On 11/19/2008 01:59 AM, kgb: Hi Kevin, WISeKey has made some changes to its practices, since the last public discussion period. I'm glad to hear that! Can you point to what specifically has been changed since then? BlackBox Subordinate CAs are restricted to issue certificates for domains

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-18 Thread Eddy Nigg
Frank: The Wisekey case could be where we might draw the line. Provided that - there is a *good compelling reason* for using sub-ordinate certificates in first place, limited to the domains under the control of the owner (via name-constraints) and with reasonable controls in place (like

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-17 Thread Eddy Nigg
On 11/14/2008 11:12 PM, Frank Hecker: ...in the short term I'm going to try to restart CA public discussions on a regular schedule. Nice to see you back here! First, the general issue of auditing subordinate CAs was something we didn't think through much when we did our Mozilla CA policy: We

Re: WISeKey root inclusion request (re-start public discussion)

2008-11-17 Thread Eddy Nigg
On 11/18/2008 03:54 AM, Eddy Nigg: Frank, I greatly missed the thorough and systematic work of Kathleen in this bug and it's a pity she didn't perform another round of information gathering in case some new evidence was provided. Anyhow, I couldn't find anything new in the bug since the last

WISeKey root inclusion request (re-start public discussion)

2008-11-14 Thread Frank Hecker
First, my sincere apologies for being missing from this group over the past few weeks. A combination of illness (both my own and family), out-of-town trips, and other Mozilla Foundation business kept me from having any significant time to devote to CA matters. I am working on ways to ensure