[cabfpub] 17.5 Audit of Delegated Functions

Ryan Hurst ryan.hurst at globalsign.com
Fri Dec 21 21:24:36 UTC 2012


My understanding is the same as Robs.

Ryan Hurst
Chief Technology Officer
GMO Globalsign

twitter: @rmhrisk
email: ryan.hurst at globalsign.com
phone: 206-650-7926

Sent from my phone, please forgive the brevity.

On Dec 21, 2012, at 1:15 PM, Rob Stradling <rob.stradling at comodo.com> wrote:

> On 21/12/12 18:43, Rick Andrews wrote:
>> CABF members,
>> It’s come to our attention that several people are interpreting this
>> section of BR:
>> *17.5 Audit of Delegated Functions*
>> If a Delegated Third Party is not currently audited in accordance with
>> Section 17 and is not an Enterprise RA, then
>> prior to certificate issuance the CA SHALL ensure that the domain
>> control validation process required under Section
>> 11.1 has been properly performed by the Delegated Third Party by either
>> (1) using an out-of-band mechanism
>> involving at least one human who is acting either on behalf of the CA or
>> on behalf of the Delegated Third Party to
>> confirm the authenticity of the certificate request or the information
>> supporting the certificate request or (2)
>> performing the domain control validation process itself.
>> to mean that a Delegated Third Party that runs an External SubCA can
>> avoid audit indefinitely if it simply has a name constraint in the SubCA
>> limiting the domain names that it can issue to. The CA would be
>> complying with “(2) performing the domain control validation itself”
>> before it put the name constraint in the SubCA.
>> This seems like a loophole to us, because without an audit, there’s no
>> way to be sure that the Delegated Third Party is putting properly vetted
>> info in the Subject DN field
> 
> The Sub-CA certificate could include directoryName constraints as well 
> as dNSName constraints (and iPAddress constraints).  If the 
> directoryName constraint permits only the full organization name and 
> address of the Delegated Third Party, then I'd say that this would 
> effectively force them to put "properly vetted info in the Subject DN 
> field".
> 
> (Mozilla's draft CA policy v2.1 currently requires a directoryName 
> constraint for name-constrained Code Signing CAs, but not for 
> name-constrained SSL Server CAs.  Perhaps this is a loophole that should 
> be fixed).
> 
>> , and populating certs with the required extensions.
> 
> True, but is this really enough to justify demanding that the 
> name-constrained Delegated Third Party undergo a WebTrust or ETSI audit?
> 
> Even an audited CA might fail to populate certs with the required 
> extensions, and (IINM) their auditor might not notice for months.
> 
> There are other ways for the PKI community to spot CAs that are failing 
> to include required extensions in the certificates they issue: the EFF 
> SSL Observatory highlighted some of these sorts of issues; Certificate 
> Transparency will make it impossible for a public cert with missing 
> required extensions to remain undetected (assuming somebody writes some 
> code to monitor and analyze all certs that CT logs).
> 
>> I doubt this was the intent, because I had the impression that most
>> people thought External SubCAs were a risky practice that needed to be
>> more tightly controlled.
> 
> IINM, the main "loophole" that "most people" have regarded as "risky" is 
> that unaudited External SubCAs have been able to issue certs to any 
> domain name.  If an audited Issuing CA limits the permitted domain names 
> and performs the domain control validation for each one, then  this 
> loophole is closed.
> 
>> This seems to allow them to be less tightly controlled. Comments?
> 
> I don't understand how you can reach this conclusion.
> 
>> -Rick
> 
> -- 
> Rob Stradling
> Senior Research & Development Scientist
> COMODO - Creating Trust Online
> _______________________________________________
> Public mailing list
> Public at cabforum.org
> https://cabforum.org/mailman/listinfo/public



More information about the Public mailing list