On 16/5/2024 12:20 μ.μ., Pedro FUENTES wrote:
Hello Dimitris,
I’m following closely this as I find very important.

About…
This is easy to answer. Some use cases need single-purpose client authentication certificates. There are numerous use cases where client authentication certificates are used for strong authentication, I'm sure you are aware of such use cases. While client authentication use cases can ALL be supported by non-public CAs, there are some regulatory requirements that demand such certificates be issued from an audited and publicly-trusted CA. In fact, HARICA has participated in public tenders where client authentication certificates need to be issued from a CA that chains to Apple, Microsoft and Mozilla Root Stores. Client authentication certificates are asked in addition to server TLS certificates.

I don’t know if you didn’t mention Chrome for a particular reason,

No particular reason. It's just a relatively new Root Program compared to others and I haven't bumped into a public tender that requires it :)

but actually that’s the Root program that makes me scratch my head while reading these discussions… because AFAIK they only include Roots for TLS serverAuth purposes, and not for clientAuth. So (again AFAIK, I may be wrong) you can’t propose clientAuth-only certs that work in Chrome unless these come from a Root that is included for TLS serverAuth.

AFAIK Apple and Mozilla also don't have a specific "trust bit" for Client Authentication. Only Microsoft does.


Apart of that, just to say that my current understanding is that the BR as they are today don’t allow the issuance of these certificates,

Sure, but that's not what we are discussing here. We are looking whether this was done "on purpose" or "by accident"

so maybe it’s more pragmatic to assume the status-quo, and focus the discussion if the BR should be modified to implicitly or explicitly allow this.

I don't want to assume the status-quo is here to stay without a confirmation that the current rules are intended to be this way. If they were not intended and there is no opposition to keeping this restriction, fine. We will just add some language to clarify this.

If there is opposition and CAs want to allow the right to issue clientAuth Certificates from serverTLS issuing CAs, then we need to discuss more. I'm not sure if there are any other options.


Dimitris.


Just my two cents…

P


*
WISeKey SA
*
*Pedro Fuentes
*CSO - Trust Services Manager
Office: + 41 (0) 22 594 30 00
Mobile: + 41 (0) 791 274 790
Address: Avenue Louis-Casaï 58 | 1216 Cointrin | Switzerland
*Stay connected with WISeKey <http://www.wisekey.com>
*
*THIS IS A TRUSTED MAIL*: This message is digitally signed with a WISeKey identity. If you get a mail from WISeKey please check the signature to avoid security risks

*CONFIDENTIALITY: *This email and any files transmitted with it can be confidential and it’s intended solely for the use of the individual or entity to which they are addressed. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. If you have received this email in error please notify the sender

*DISCLAIMER: *WISeKey does not warrant the accuracy or completeness of this message and does not accept any liability for any errors or omissions herein as this message has been transmitted over a public network. Internet communications cannot be guaranteed to be secure or error-free as information may be intercepted, corrupted, or contain viruses. Attachments to this e-mail are checked for viruses; however, we do not accept any liability for any damage sustained by viruses and therefore you are kindly requested to check for viruses upon receipt.

_______________________________________________
Servercert-wg mailing list
[email protected]
https://lists.cabforum.org/mailman/listinfo/servercert-wg

Reply via email to