<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body style="overflow-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;">Hey Ryan,<div>Please note that I sent a correction saying that…</div><div><div>Where I said “you can’t propose clientAuth-only certs that work in Chrome”</div><div>I wanted to say “you can’t propose clientAuth-only certs that chain to Chrome Store”</div></div><div><br></div><div>Now, about your question, I don’t think that there’s a use case where the browser can decide which issuer to trust or not when processing a clientAuth certificate. This is a decision of the application that is consuming the certificate for the authentication.</div><div><br></div><div>But, on the other hand, we did find also (as mentioned by Dimitris in the form of public tenders) situations where the customer expected clientAuth certificates that were issued under a certain “compliance umbrella”, which in most cases translates in their mind to be trusted but all the relevant Root Programs… In our case, we do issue some clientAuth certs, from the same CAs that are used for personal certs, and so far it seems fine for our particular needs, but maybe we could struggle to fulfil some customer expectations if we only had Roots trusted for serverAuth purposes and we gave them a clientAuth cert that “seems untrusted” (even if not relevant in practice).</div><div><div><br></div><div>In particular, as far as I remember we only found an interoperability issue with Android, as (unless my memory fails me, something that happens) the strong authentication with clientAuth was not working because the client cert was not under a trusted chain.</div><div><br></div><div></div><div>Right now, the only Root Program that seems to consider clientAuth certs is Microsoft[1], and in their particular case they require WTCA audits, not WTBR.</div><div><br></div><div>In summary, I don’t have any strong opinion here. But maybe it could be found beneficial to establish that compliance criteria to set minimums acceptable for these certs, when issued from a CA that is trusted for serverAuth purposes… maybe...</div><div><br></div><div>BR/P</div><div><br></div></div><div><br></div><div>[1] <a href="https://learn.microsoft.com/en-us/security/trusted-root/audit-requirements">https://learn.microsoft.com/en-us/security/trusted-root/audit-requirements</a></div><div><div><br><blockquote type="cite"><div>On 16 May 2024, at 16:02, Ryan Dickson <ryandickson@google.com> wrote:</div><br class="Apple-interchange-newline"><div><meta http-equiv="Content-Type" content="text/html; charset=utf-8"><div dir="ltr"><span id="m_-6172325774992934045gmail-docs-internal-guid-4264e437-7fff-2cf9-0a98-20cd9716a554"><div style="line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-family: Arial, sans-serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;">Hi Pedro,</span></div><br><div style="line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-family: Arial, sans-serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;">Sharing our perspective below:</span></div><br><div style="line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-family: Arial, sans-serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;">> I don’t know if you didn’t mention Chrome for a particular reason, but actually that’s the Root program that makes me scratch my head while reading these discussions… because AFAIK they only include Roots for TLS serverAuth purposes, and not for clientAuth. So (again AFAIK, I may be wrong) you can’t propose clientAuth-only certs that work in Chrome unless these come from a Root that is included for TLS serverAuth.</span></div><br><div style="line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-family: Arial, sans-serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;">For applicants to the Chrome Root Store, your description above is correct. Specifically, our current expectations for applicant hierarchies are described in </span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__www.chromium.org_Home_chromium-2Dsecurity_root-2Dca-2Dpolicy_-234-2Ddedicated-2Dtls-2Dserver-2Dauthentication-2Dpki-2Dhierarchies&d=DwMFaQ&c=euGZstcaTDllvimEN8b7jXrwqOf-v5A_CdpgnVfiiMM&r=AFTYu1HAQdkStwzgxyDbKOLyDwTHEezL5yeqoxeZ0fc&m=kXyArKCCVIqitaP6Uq7rVvwQDnuSe1MGTZswZGso_L9LYYi3KBLXOg-dmRCOV2Kq&s=nElULCZFCaU40AtnBW82KQdRdcgtLfQUWZ6lX8Xj5WA&e=" style="text-decoration-line:none" target="_blank"><span style="font-family:Arial,sans-serif;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;font-variant-alternates:normal;text-decoration-line:underline;vertical-align:baseline">Section 4</span></a><span style="font-family: Arial, sans-serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;"> of our policy (which, for now, allows the clientAuth EKU so long as it’s accompanied by the serverAuth EKU).</span></div><br><div style="line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-family: Arial, sans-serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;">As I understand it, common use cases for clientAuth include smart card logon and mTLS. Neither of these cases are relevant to browsers for the purpose of establishing encrypted connections to websites. They, instead, are relevant to the relying party servers looking to authenticate someone or something (e.g., another server or a device) before granting access or initiating communications. </span></div><br><div style="line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-family: Arial, sans-serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;">During our last F2F update (</span><a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__cabforum.org_uploads_5-2DCABF-2DF2F-2D60-2DChrome-2DBrowser-2DUpdate.pdf&d=DwMFaQ&c=euGZstcaTDllvimEN8b7jXrwqOf-v5A_CdpgnVfiiMM&r=AFTYu1HAQdkStwzgxyDbKOLyDwTHEezL5yeqoxeZ0fc&m=kXyArKCCVIqitaP6Uq7rVvwQDnuSe1MGTZswZGso_L9LYYi3KBLXOg-dmRCOV2Kq&s=Icbe8ZErIf-QdVWXmRdIp5rWmOCoGpobxLCNwBp2epQ&e=" style="text-decoration-line:none" target="_blank"><span style="font-family:Arial,sans-serif;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;font-variant-alternates:normal;text-decoration-line:underline;vertical-align:baseline">October 2023</span></a><span style="font-family: Arial, sans-serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;">), we described future exploration related to phasing out clientAuth use cases from the CAs included in the Chrome Root Store. From our perspective, de-coupling public and private PKI use cases such as mTLS creates opportunities for increased simplicity (e.g., help focus policies, profiles, and corresponding practices with intended relying party use cases) and agility (e.g., automation). Doing so also presents the opportunity for CA Owners to better serve their unique customer enterprise use cases without being beholden to root program policies, and possibly even the BRs. We are and will continue to explore this proposed change.</span></div><br><div style="line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-family: Arial, sans-serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;">Are you, or anyone else, able to share:</span></div><div style="line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-family: Arial, sans-serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;">(1) a use case for how or why browsers need to rely on the clientAuth EKU for establishing encrypted connections to websites?</span></div><div style="line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-family: Arial, sans-serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;">(2) the perceived benefit to root program operators and their product users for supporting clientAuth use cases in the root stores that are intended to serve website authentication use cases? </span></div><br><div style="line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-family: Arial, sans-serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;">Thanks,</span></div><div style="line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-family: Arial, sans-serif; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; vertical-align: baseline;">Ryan (on behalf of the Chrome Root Program)</span></div></span><br></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Thu, May 16, 2024 at 5:20 AM Pedro FUENTES via Servercert-wg <<a href="mailto:servercert-wg@cabforum.org" target="_blank">servercert-wg@cabforum.org</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div>Hello Dimitris,<div>I’m following closely this as I find very important.</div><div><br><div>About…</div><div><blockquote type="cite"><div>This is easy to answer. Some use cases need single-purpose client authentication certificates. There are numerous use cases where client authentication certificates are used for strong authentication, I'm sure you are aware of such use cases. While client authentication use cases can ALL be supported by non-public CAs, there are some regulatory requirements that demand such certificates be issued from an audited and publicly-trusted CA. In fact, HARICA has participated in public tenders where client authentication certificates need to be issued from a CA that chains to Apple, Microsoft and Mozilla Root Stores. Client authentication certificates are asked in addition to server TLS certificates.</div><div></div></blockquote></div><div><br></div><div>I don’t know if you didn’t mention Chrome for a particular reason, but actually that’s the Root program that makes me scratch my head while reading these discussions… because AFAIK they only include Roots for TLS serverAuth purposes, and not for clientAuth. So (again AFAIK, I may be wrong) you can’t propose clientAuth-only certs that work in Chrome unless these come from a Root that is included for TLS serverAuth.</div><div><br></div><div>Apart of that, just to say that my current understanding is that the BR as they are today don’t allow the issuance of these certificates, so maybe it’s more pragmatic to assume the status-quo, and focus the discussion if the BR should be modified to implicitly or explicitly allow this.</div><div><br></div><div>Just my two cents…</div><div><br></div><div>P <br id="m_-6172325774992934045m_-2223910880218366958lineBreakAtBeginningOfMessage"><div><br></div><br><div>
<div dir="auto" style="text-align:start;text-indent:0px"><div dir="auto" style="text-align:start;text-indent:0px"><div dir="auto" style="text-align:start;text-indent:0px"><div style="text-align:start;text-indent:0px"><div style="text-align:start;text-indent:0px"><div style="text-align:start;text-indent:0px"><div style="text-align:start;text-indent:0px"><div style="text-align:start;text-indent:0px"><div style="text-align:start;text-indent:0px"><div style="text-align:start;text-indent:0px"><font style="letter-spacing: normal; text-transform: none; white-space: normal; word-spacing: 0px; text-decoration: none; font-size: 12px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-variant-numeric: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-weight: normal; line-height: normal; text-align: start; text-indent: 0px;"><b><font color="#f62400" style="font-size:11px"><br>WISeKey SA<br></font></b></font><div style="letter-spacing: normal; text-transform: none; white-space: normal; word-spacing: 0px; text-decoration: none; font-variant-ligatures: normal; font-variant-caps: normal; font-variant-numeric: normal; font-variant-alternates: normal; font-variant-east-asian: normal; line-height: normal; text-align: start; text-indent: 0px;"><font style="font-size: 12px; font-weight: normal; font-style: normal;"><span style="font-size:11px"><b>Pedro Fuentes<br></b>CSO - Trust Services Manager</span><br><font size="1">Office: <a href="tel:+41%2022%20594%2030%2000" value="+41225943000" target="_blank">+ 41 (0) 22 594 30 00</a><br>Mobile: + 41 (0) </font></font><span style="font-size: x-small; font-weight: normal; font-style: normal;">791 274 790</span></div><div style="font-variant-ligatures:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-variant-east-asian:normal;line-height:normal;text-align:start;text-indent:0px"><font style="font-size: 12px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; text-transform: none; white-space: normal; word-spacing: 0px; text-decoration: none;"><font size="1">Address: </font></font><font size="1">Avenue Louis-Casaï 58 | </font><span style="font-size:x-small">1216 Cointrin | Switzerland</span></div><div style="font-variant-ligatures:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-variant-east-asian:normal;line-height:normal;text-align:start;text-indent:0px"><font><font size="1" style="font-size: 12px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; text-transform: none; white-space: normal; word-spacing: 0px; text-decoration: none;"><b>Stay connected with <a href="http://www.wisekey.com/" target="_blank"><font color="#f62400">WISeKey</font></a><br></b></font></font><span style="color:rgb(169,169,169);font-size:10px;font-style:normal;font-variant-caps:normal;font-weight:normal;letter-spacing:normal;text-transform:none;white-space:normal;word-spacing:0px;text-decoration:none"><br></span></div><div style="letter-spacing: normal; text-transform: none; white-space: normal; word-spacing: 0px; text-decoration: none; font-size: 12px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-variant-numeric: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-weight: normal; line-height: normal; text-align: start; text-indent: 0px;"><div style="font-variant-ligatures:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-variant-east-asian:normal;line-height:normal"><span><font size="1" color="#78a600"><b>THIS IS A TRUSTED MAIL</b>: This message is digitally signed with a WISeKey identity. If you get a mail from WISeKey please check the signature to avoid security risks</font></span></div><div style="font-variant-ligatures:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-variant-east-asian:normal;line-height:normal"><span style="font-size:9px"><font color="#a9a9a9"><br></font></span></div><div style="font-variant-ligatures:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-variant-east-asian:normal;line-height:normal"><div><font color="#a9a9a9" style="font-size:9px"><b>CONFIDENTIALITY: </b>This email and any files transmitted with it can be confidential and it’s intended solely for the use of the individual or entity to which they are addressed. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. If you have received this email in error please notify the sender</font></div><div><font color="#a9a9a9" style="font-size:9px"><br></font></div><div><font color="#a9a9a9" style="font-size:9px"><b>DISCLAIMER: </b>WISeKey does not warrant the accuracy or completeness of this message and does not accept any liability for any errors or omissions herein as this message has been transmitted over a public network. Internet communications cannot be guaranteed to be secure or error-free as information may be intercepted, corrupted, or contain viruses. Attachments to this e-mail are checked for viruses; however, we do not accept any liability for any damage sustained by viruses and therefore you are kindly requested to check for viruses upon receipt.</font></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div>
<br></div></div></div>_______________________________________________<br>
Servercert-wg mailing list<br>
<a href="mailto:Servercert-wg@cabforum.org" target="_blank">Servercert-wg@cabforum.org</a><br>
<a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.cabforum.org_mailman_listinfo_servercert-2Dwg&d=DwMFaQ&c=euGZstcaTDllvimEN8b7jXrwqOf-v5A_CdpgnVfiiMM&r=AFTYu1HAQdkStwzgxyDbKOLyDwTHEezL5yeqoxeZ0fc&m=kXyArKCCVIqitaP6Uq7rVvwQDnuSe1MGTZswZGso_L9LYYi3KBLXOg-dmRCOV2Kq&s=mnfqiM5Phhlnf-Tpz3d9oDfOeepsntKogke_tgXdF9M&e=" rel="noreferrer" target="_blank">https://lists.cabforum.org/mailman/listinfo/servercert-wg</a><br>
</blockquote></div>
</div></blockquote></div><br><div>
<meta charset="UTF-8"><div dir="auto" style="text-align: start; text-indent: 0px; word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;"><div dir="auto" style="text-align: start; text-indent: 0px; word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;"><div dir="auto" style="text-align: start; text-indent: 0px; word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;"><div style="text-align: start; text-indent: 0px; word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;"><div style="text-align: start; text-indent: 0px; word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;"><div style="text-align: start; text-indent: 0px; word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;"><div style="text-align: start; text-indent: 0px; word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;"><div style="text-align: start; text-indent: 0px; word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;"><div style="text-align: start; text-indent: 0px; word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;"><div style="text-align: start; text-indent: 0px; word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;"><font style="caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0); letter-spacing: normal; text-transform: none; white-space: normal; word-spacing: 0px; text-decoration: none; -webkit-text-stroke-width: 0px; font-size: 12px; font-style: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant-caps: normal; font-variant-numeric: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-weight: normal; line-height: normal; text-align: start; text-indent: 0px;"><b><font color="#f62400" style="font-size: 11px;"><br class="Apple-interchange-newline">WISeKey SA<br></font></b></font><div style="caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0); letter-spacing: normal; text-transform: none; white-space: normal; word-spacing: 0px; text-decoration: none; -webkit-text-stroke-width: 0px; font-variant-ligatures: normal; font-variant-position: normal; font-variant-caps: normal; font-variant-numeric: normal; font-variant-alternates: normal; font-variant-east-asian: normal; line-height: normal; text-align: start; text-indent: 0px;"><font style="color: rgb(0, 0, 0); font-size: 12px; font-weight: normal; font-style: normal;"><span style="font-size: 11px;"><b>Pedro Fuentes<br></b>CSO - Trust Services Manager</span><br><font size="1">Office: + 41 (0) 22 594 30 00<br>Mobile: + 41 (0) </font></font><span style="color: rgb(0, 0, 0); font-size: x-small; font-weight: normal; font-style: normal;">791 274 790</span></div><div style="font-variant-ligatures: normal; font-variant-position: normal; font-variant-numeric: normal; font-variant-alternates: normal; font-variant-east-asian: normal; line-height: normal; text-align: start; text-indent: 0px;"><font style="caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0); font-size: 12px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; text-transform: none; white-space: normal; word-spacing: 0px; text-decoration: none; -webkit-text-stroke-width: 0px;"><font size="1">Address: </font></font><font size="1">Avenue Louis-Casaï 58 | </font><span style="font-size: x-small;">1216 Cointrin | Switzerland</span></div><div style="font-variant-ligatures: normal; font-variant-position: normal; font-variant-numeric: normal; font-variant-alternates: normal; font-variant-east-asian: normal; line-height: normal; text-align: start; text-indent: 0px;"><font><font size="1" style="caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0); font-size: 12px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; text-transform: none; white-space: normal; word-spacing: 0px; text-decoration: none; -webkit-text-stroke-width: 0px;"><b>Stay connected with <a href="http://www.wisekey.com"><font color="#f62400">WISeKey</font></a><br></b></font></font><span style="caret-color: rgb(0, 0, 0); color: rgb(169, 169, 169); font-size: 10px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; text-transform: none; white-space: normal; word-spacing: 0px; text-decoration: none; -webkit-text-stroke-width: 0px; orphans: 2; widows: 2;"><br></span></div><div style="caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0); letter-spacing: normal; text-transform: none; white-space: normal; word-spacing: 0px; text-decoration: none; -webkit-text-stroke-width: 0px; font-size: 12px; font-style: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant-caps: normal; font-variant-numeric: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-weight: normal; line-height: normal; text-align: start; text-indent: 0px;"><div style="font-variant-ligatures: normal; font-variant-position: normal; font-variant-numeric: normal; font-variant-alternates: normal; font-variant-east-asian: normal; line-height: normal;"><span style="orphans: 2; widows: 2;"><font size="1" color="#78a600"><b>THIS IS A TRUSTED MAIL</b>: This message is digitally signed with a WISeKey identity. If you get a mail from WISeKey please check the signature to avoid security risks</font></span></div><div style="font-variant-ligatures: normal; font-variant-position: normal; font-variant-numeric: normal; font-variant-alternates: normal; font-variant-east-asian: normal; line-height: normal;"><span style="orphans: 2; widows: 2; font-size: 9px;"><font color="#a9a9a9"><br></font></span></div><div style="font-variant-ligatures: normal; font-variant-position: normal; font-variant-numeric: normal; font-variant-alternates: normal; font-variant-east-asian: normal; line-height: normal;"><div style="orphans: 2; widows: 2;"><font color="#a9a9a9" style="font-size: 9px;"><b>CONFIDENTIALITY: </b>This email and any files transmitted with it can be confidential and it’s intended solely for the use of the individual or entity to which they are addressed. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. If you have received this email in error please notify the sender</font></div><div style="orphans: 2; widows: 2;"><font color="#a9a9a9" style="font-size: 9px;"><br></font></div><div style="orphans: 2; widows: 2;"><font color="#a9a9a9" style="font-size: 9px;"><b>DISCLAIMER: </b>WISeKey does not warrant the accuracy or completeness of this message and does not accept any liability for any errors or omissions herein as this message has been transmitted over a public network. Internet communications cannot be guaranteed to be secure or error-free as information may be intercepted, corrupted, or contain viruses. Attachments to this e-mail are checked for viruses; however, we do not accept any liability for any damage sustained by viruses and therefore you are kindly requested to check for viruses upon receipt.</font></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div>
<br></div></body></html>