<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=utf-8"><meta name=Generator content="Microsoft Word 15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
code
{mso-style-priority:99;
font-family:"Courier New";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
{mso-style-priority:34;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
span.EmailStyle22
{mso-style-type:personal-reply;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;
mso-ligatures:none;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
/* List Definitions */
@list l0
{mso-list-id:1382437042;
mso-list-template-ids:556304190;}
@list l0:level1
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l0:level2
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:1.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l0:level3
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:1.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l0:level4
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:2.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l0:level5
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:2.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l0:level6
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:3.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l0:level7
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:3.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l0:level8
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:4.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l0:level9
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:4.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l1
{mso-list-id:2025015333;
mso-list-template-ids:-505108394;}
ol
{margin-bottom:0in;}
ul
{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-US link=blue vlink=purple style='word-wrap:break-word'><div class=WordSection1><p class=MsoNormal>Absolutely. Any OID that comes from a Standards Development Organization is intended for use by other organizations, and everyone has the “right” to use them.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>-Tim<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><div style='border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in 4.0pt'><div><div style='border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in 0in 0in'><p class=MsoNormal><b>From:</b> Dimitris Zacharopoulos <dzacharo@harica.gr> <br><b>Sent:</b> Wednesday, January 10, 2024 12:48 PM<br><b>To:</b> Tim Hollebeek <tim.hollebeek@digicert.com>; SMIME Certificate Working Group <smcwg-public@cabforum.org><br><b>Cc:</b> Martijn Katerbarg <martijn.katerbarg@sectigo.com><br><b>Subject:</b> Re: [Smcwg-public] Certificate Template Information extension and SBR allowance<o:p></o:p></p></div></div><p class=MsoNormal><o:p> </o:p></p><div><p class=MsoNormal><span style='font-family:"Arial",sans-serif'>I also believe that any publicly supported and documented X.509 extension (e.g. defined by IETF or ITU-T) are allowed for use by CAs, as long as they are documented in the CA's CPS. <br><br>Is there anything that prevents it in the current CA/B Forum documents? <br><br><br>Thanks, <o:p></o:p></span></p></div><div><p><span style='font-family:"Arial",sans-serif'>DZ.<o:p></o:p></span></p></div><div><div><p><span style='font-family:"Arial",sans-serif'>Jan 10, 2024 20:38:19 Tim Hollebeek via Smcwg-public <<a href="mailto:smcwg-public@cabforum.org">smcwg-public@cabforum.org</a>>:<o:p></o:p></span></p></div><blockquote style='border:none;border-left:solid #CCCCCC 2.25pt;padding:0in 0in 0in 8.0pt;margin-left:0in;margin-right:0in'><p class=MsoNormal><span style='mso-ligatures:standardcontextual'>You don’t need a contract to have a right to use someone else’s extension.<o:p></o:p></span></p><p class=MsoNormal><span style='mso-ligatures:standardcontextual'>I would say that if Microsoft has public documentation that says or implies that the extension can and should be used by other organizations, then other organizations “have the right” to use that extension.<o:p></o:p></span></p><p class=MsoNormal><span style='mso-ligatures:standardcontextual'>That said, I have never liked this language, which comes from the TLS BRs. I would support making it more clear as to what is and isn’t allowed, and even maybe clarifying what problem is being solved with these requirements.<o:p></o:p></span></p><p class=MsoNormal><span style='mso-ligatures:standardcontextual'>-Tim<o:p></o:p></span></p><div style='border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in 4.0pt'><div><div style='border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in 0in 0in'><p class=MsoNormal><b>From:</b> Smcwg-public <<a href="mailto:smcwg-public-bounces@cabforum.org">smcwg-public-bounces@cabforum.org</a>> <b>On Behalf Of </b>Martijn Katerbarg via Smcwg-public<br><b>Sent:</b> Wednesday, January 10, 2024 5:54 AM<br><b>To:</b> SMIME Certificate Working Group <<a href="mailto:smcwg-public@cabforum.org">smcwg-public@cabforum.org</a>><br><b>Subject:</b> [Smcwg-public] Certificate Template Information extension and SBR allowance<span style='mso-ligatures:standardcontextual'><o:p></o:p></span></p></div></div><p class=MsoNormal><span lang=SV style='mso-ligatures:standardcontextual'>Hi all,</span><span style='mso-ligatures:standardcontextual'><o:p></o:p></span></p><p class=MsoNormal><span style='mso-ligatures:standardcontextual'>There’s been a request within the S/MIME working group to bring forward issues that have arisen since the adoption of the SBRs. While we’ve not seen a whole lot of issues, we believe we may have discovered one now.<o:p></o:p></span></p><p class=MsoNormal><span style='mso-ligatures:standardcontextual'>We offer support for Windows’s own auto-enrollment features. In the past we used to include the “Certificate Template Information” extension (OID 1.3.6.1.4.1.311.21.7) for this purpose. Since we started issuing SBR compliant certificates prior to September 1<sup>st</sup>, we removed support for this extension on publicly trusted S/MIME certificates.<o:p></o:p></span></p><p class=MsoNormal><span style='mso-ligatures:standardcontextual'>As we now have noticed, this has led to a partial breakdown of the auto-enrollment system. From what we understand, the auto-enrollment mechanism is specifically looking for this extension in certificates, if a certificate for a particular required Certificate Template (as specified through AD) is not found, auto-enrollment will “do its job”, and request a new certificate. This can lead to multiple new certificates being installed in a single day, all because the extension is missing.<o:p></o:p></span></p><p class=MsoNormal><span style='mso-ligatures:standardcontextual'>We’ve investigated bringing back support for the extension, and are led to the conclusion that no, this extension would not be allowed per the current language. A breakdown:<o:p></o:p></span></p><p class=MsoNormal><span style='mso-ligatures:standardcontextual'>Section 7.1.2.4 (<a href="https://url.avanan.click/v2/___https:/github.com/cabforum/smime/blob/main/SBR.md%237124-all-certificates___.YXAzOmRpZ2ljZXJ0OmE6bzphYmIxNjU3ZGU1ZTYwODNjM2Q3N2NjOTI2NDlhNTFhNzo2Ojk4ZDE6N2VhYmQyYzcxNDdhYjlhZDExZmE0MDI3ZWVmYzEyNDY0YzM5YjI1Yzc0NjEzZmUwZTU2MGJjMzhiM2QxMWRjMDpoOkY" title="Protected by Avanan: https://github.com/cabforum/smime/blob/main/SBR.md#7124-all-certificates">https://github.com/cabforum/smime/blob/main/SBR.md#7124-all-certificates</a> ) states:<o:p></o:p></span></p><p class=MsoNormal><i><span style='mso-ligatures:standardcontextual'>“All fields and extensions SHALL be set in accordance with <a href="https://url.avanan.click/v2/___https:/datatracker.ietf.org/doc/html/rfc5280___.YXAzOmRpZ2ljZXJ0OmE6bzphYmIxNjU3ZGU1ZTYwODNjM2Q3N2NjOTI2NDlhNTFhNzo2OmIzZWM6YWE0NTVlYmI4ZDk2OWMwMzJkZmQ1NzM5YzE3YzAwOGUyOGFiYWE2ZTMyNDA4YWY4YTc2MzQyZWVlNDNlMjIzNTpoOkY" title="Protected by Avanan: https://datatracker.ietf.org/doc/html/rfc5280">RFC 5280</a>. The CA SHALL NOT issue a Certificate that contains a </span></i><code><i><span style='font-size:10.0pt;mso-ligatures:standardcontextual'>keyUsage</span></i></code><i><span style='mso-ligatures:standardcontextual'> flag, </span></i><code><i><span style='font-size:10.0pt;mso-ligatures:standardcontextual'>extKeyUsage</span></i></code><i><span style='mso-ligatures:standardcontextual'> value, Certificate extension, or other data not specified in <a href="https://url.avanan.click/v2/___https:/github.com/cabforum/smime/blob/main/SBR.md%237121-root-ca-certificates___.YXAzOmRpZ2ljZXJ0OmE6bzphYmIxNjU3ZGU1ZTYwODNjM2Q3N2NjOTI2NDlhNTFhNzo2OmZjMDg6MzYxZGEyOGIzOWI5YmEzY2Y4MjRiOTczYzlkZGMzYmIyNTk4YWU4ZjRkNTRhNzdmNGNlNGI4Y2E3MGZhOGVjZDpoOkY" title="Protected by Avanan: https://github.com/cabforum/smime/blob/main/SBR.md#7121-root-ca-certificates">Section 7.1.2.1</a>, <a href="https://url.avanan.click/v2/___https:/github.com/cabforum/smime/blob/main/SBR.md%237122-subordinate-ca-certificates___.YXAzOmRpZ2ljZXJ0OmE6bzphYmIxNjU3ZGU1ZTYwODNjM2Q3N2NjOTI2NDlhNTFhNzo2OmU0MTg6MzE4Mzc4YTg4NThmMzMxOWY3Yjk3OGM1MmMyNzgzNTNkYzRiMmRiNTg4NWM0YmFlOTQ4MDAyZTMxZWQyYWY0NzpoOkY" title="Protected by Avanan: https://github.com/cabforum/smime/blob/main/SBR.md#7122-subordinate-ca-certificates">Section 7.1.2.2</a>, or <a href="https://url.avanan.click/v2/___https:/github.com/cabforum/smime/blob/main/SBR.md%237123-subscriber-certificates___.YXAzOmRpZ2ljZXJ0OmE6bzphYmIxNjU3ZGU1ZTYwODNjM2Q3N2NjOTI2NDlhNTFhNzo2OmRmM2E6ZDE5OTU5Yjg2ODJhYmVkOGZhYjUzMDcwNGY3MDNiZTQ2ZTQ3YTkxMWQ1NjE0OGMxOTJmNjQwYmIxNTI0ZDAwZjpoOkY" title="Protected by Avanan: https://github.com/cabforum/smime/blob/main/SBR.md#7123-subscriber-certificates">Section 7.1.2.3</a> unless the CA is aware of a reason for including the data in the Certificate. If the CA includes fields or extensions in a Certificate that are not specified but are otherwise permitted by these Requirements, then the CA SHALL document the processes and procedures that the CA employs for the validation of information contained in such fields and extensions in its CP and/or CPS.”</span></i><span style='mso-ligatures:standardcontextual'><o:p></o:p></span></p><p class=MsoNormal><span style='mso-ligatures:standardcontextual'>So far, we could see allowing the extension. We have “a reason for including the data in the Certificate”, and we could update our CPS. However, the language continues with an additional SHALL NOT:<o:p></o:p></span></p><p><i>“CAs SHALL NOT issue a Certificate with:</i><o:p></o:p></p><ol start=1 type=1><li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l1 level1 lfo1'><i><span style='mso-fareast-language:EN-GB'>Extensions that do not apply in the context of the public Internet (such as an </span></i><i><span style='font-size:10.0pt;font-family:"Courier New";mso-fareast-language:EN-GB'>extKeyUsage</span></i><i><span style='mso-fareast-language:EN-GB'> value for a service that is only valid in the context of a privately managed network), unless:<br>i. such value falls within an OID arc for which the Applicant demonstrates ownership, or<br>ii. the Applicant can otherwise demonstrate the right to assert the data in a public context; or</span></i><span style='mso-ligatures:standardcontextual'><o:p></o:p></span></li><li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l1 level1 lfo1'><i><span style='mso-fareast-language:EN-GB'>Field or extension values which have not been validated according to the processes and procedures described in these Requirements or the CA's CP and/or CPS.</span></i><span style='mso-ligatures:standardcontextual'>”<o:p></o:p></span></li></ol><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span style='mso-ligatures:standardcontextual;mso-fareast-language:EN-GB'>So while the first section might allow us to incorporate the extension, it seems we also need to meet one of the statements in this block:</span><span style='mso-ligatures:standardcontextual'><o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span style='mso-ligatures:standardcontextual;mso-fareast-language:EN-GB'>“</span><i><span style='mso-fareast-language:EN-GB'>Extensions that do not apply in the context of the public Internet (such as an </span></i><i><span style='font-size:10.0pt;font-family:"Courier New";mso-fareast-language:EN-GB'>extKeyUsage</span></i><i><span style='mso-fareast-language:EN-GB'> value for a service that is only valid in the context of a privately managed network), unless:”<br></span></i><span style='mso-fareast-language:EN-GB'>This extension indeed does not apply in the context of the public Internet. So, we move into the exception cases:</span><span style='mso-ligatures:standardcontextual'><o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><i><span style='mso-fareast-language:EN-GB'>”i. such value falls within an OID arc for which the Applicant demonstrates ownership, or”<br></span></i><span style='mso-fareast-language:EN-GB'>No. Neither us, nor the Applicant owns the OID. It’s an OID under the Microsoft OID arc.</span><span style='mso-ligatures:standardcontextual'><o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span style='mso-fareast-language:EN-GB'>”<i> ii. the Applicant can otherwise demonstrate the right to assert the data in a public context; or”<br></i>Unless the Applicant gets a contract stating they were given the right by Microsoft, we don’t see how this requirement is met. </span><span style='mso-ligatures:standardcontextual'><o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span style='mso-fareast-language:EN-GB'>Then we’re left with “</span><i><span style='mso-ligatures:standardcontextual'>Field or extension values which have not been validated according to the processes and procedures described in these Requirements or the CA's CP and/or CPS.”<br></span></i><span style='mso-ligatures:standardcontextual'>This one is a bit odd. Does this suddenly suggest or imply that the CA may include any field or extension that has been validated according only to the CA’s CP and/or CPS? Item “(ii)” ends with an “or”. However, we believe this is an incorrect editorial bit that should be updated, since the list shifts back to a previous indentation.<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span style='mso-ligatures:standardcontextual'>All in all, we’re left with the understanding that, no, this extension is not allowed (with the exception that if Microsoft were to be the Applicant, it would be allowed).<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span style='mso-ligatures:standardcontextual'>With this breakdown, we’re left with a few questions:<o:p></o:p></span></p><ul type=disc><li class=MsoListParagraph style='mso-list:l0 level1 lfo2'><span style='mso-ligatures:standardcontextual'>Have other CAs run into the same issue?<o:p></o:p></span></li><li class=MsoListParagraph style='mso-list:l0 level1 lfo2'><span style='mso-ligatures:standardcontextual'>Do other CAs share the same conclusion?<o:p></o:p></span></li><li class=MsoListParagraph style='mso-list:l0 level1 lfo2'><span style='mso-ligatures:standardcontextual'>If this does appear to be an issue, should an extension by the platform of one of our Certificate Consumers, be specifically added as an allowed extension?<o:p></o:p></span></li></ul><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span style='mso-ligatures:standardcontextual'>Regards,<br><br>Martijn<br>Sectigo<o:p></o:p></span></p></div></blockquote></div></div></div></body></html>