RFC6962 defines 4 OIDs under Google's OID arc.

1.3.6.1.4.1.11129.2.4.3 (the Precertificate Poison certificate extension) and 1.3.6.1.4.1.11129.2.4.4 (the Precertificate Signing Certificate EKU OID) are both no longer required, due to the Precertificate format change. They've both been removed from 6962-bis.

That leaves us with 1.3.6.1.4.1.11129.2.4.2 (the SignedCertificateTimestampList certificate extension) and 1.3.6.1.4.1.11129.2.4.5 (the SignedCertificateTimestampList OCSP Response extension). Ticket #10 (see comments 6 and 8) intends to extend and merge these two extensions into one new extension with a new OID.

I see no reason why we shouldn't use an OID from an IETF OID arc, as I wrote in ticket #10 comment 9.

6962-bis currently defines 1.3.6.1.4.1.11129.2.4.6 (the Redacted Labels certificate extension) and 1.3.6.1.4.1.11129.2.4.7 (the certificate extension to permit a Name-constrained intermediate CA certificate to be logged in place of end-entity certificates).
I see no reason why we shouldn't reassign these from an IETF OID arc too.

I am working on the assumption that "Russ, we're gonna need some OIDs for some cert/OCSP extensions - please can you assign some now, even though we haven't finished specifying the contents of these extensions yet?" would be greeted by a firm "No". Hence why the draft is still using OIDs under Google's OID arc.


[1] http://trac.tools.ietf.org/wg/trans/trac/ticket/10

On 29/03/15 16:00, Russ Housley wrote:
In this case, the document was published with OIDs from a non-IETF OID
arc long ago.  I see no reason to disrupt those implementations, and in
fact, having two OIDs with exactly the same semantics is confusing.

If new OIDs are needed, we ought to assign them from an IETF arc managed
by IANA.

Russ


On Mar 28, 2015, at 1:14 AM, Massimiliano Pala wrote:

Hi Rich,

I do not think there is any precedence about using private OIDs for
I-Ds - the use of Google's OIDs is ok at Google, not for a standard.
The first reason is because Google's controls its own sub-tree and can
change the sub tree at any time - not appropriate for an RFC. The
second reason is that, since the document is defining extensions for
certificates and OCSP messages (both under PKIX), the natural place is
actually under PKIX.

I also want to point out that OIDs are not just opaque identifiers -
if that was the case, we would not use a hierarchical structure. The
sub-tree where the OID is is actually important.

This said, I have two questions for you:

 1. Why this would not be the appropriate base OID ?
 2. Which base OID are you referring to when you say "under IETF" ?

Cheers,
Max


On 3/27/15 10:58 PM, Salz, Rich wrote:

OID’s are just distributed opaque identifiers.  Doesn’t bother me,
but if the WG wants to change OID’s and break deployed software, go
for it

It will might be hard to get a PKIX arc.  A Trans arc under IETF
seems more feasible.

--

Senior Architect, Akamai Technologies

IM: [email protected] Twitter: RichSalz

--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to