[cabfpub] Ballot 105 ­ Technical Constraints for Subordinate Certificate Authorities yielding broader and safer PKI adoption.

Steve Roylance steve.roylance at globalsign.com
Fri Jul 12 09:25:23 MST 2013


Dear all.

PDF and Word versions attached based on an update to 1.1.3 (As an example).

Please note I'm out for the next week but will try to answer where possible
any questions.  Responses may therefore be delayed

Steve

Ballot 105 ­ Technical Constraints for Subordinate Certificate Authorities
yielding broader and safer PKI adoption.

Steve Roylance made the following motion, and Gervase Markham from Mozilla
and Stephen Davidson from Quovadis endorsed it:

Motion Begins

EFFECTIVE IMMEDIATELY, this ballot provides clarity to the language covering
external audits for Subordinate CAs, removing ambiguity as well as providing
better alignment of the Baseline Requirements to the Mozilla CA Root program
where the subject is already covered and accepted by the wider PKI
community. In addition, the proposal sets out to aid wider and broader PKI
adoption by Subordinate CAs by defining the use of Technical Constraints and
highlighting how additional barriers to adoption within the guidelines can
be optional when using Name Constraints, specifically the requirement for
ŒOCSP Good¹ responses originally proposed in Ballot 100. We propose amending
the Baseline Requirements Guidelines as follows:

Section 1 ­ Scope (Adding scope)

These Requirements are applicable to all Certification Authorities within a
chain of trust starting at the Root CA and flowing down through successive
Subordinate CAs.

Section 4 ­ Definitions (Additional Definition)

Technically Constrained Subordinate CA: A Subordinate CA that uses a
combination of Extended Key Usage settings and Name Constraint settings to
limit the scope within which a Subordinate CA may issue Certificates.

Section 9.2 Subject Information (Amending the section title)

9.2 Subject Information ­ End Entity Certificates

Section 9.2.7 Other Subject Attributes (Moving to 9.2.8)

Section 9.2.7 Subject Information ­ Subordinate CA Certificates (Adding a
new section)

By issuing a Subordinate CA Certificate, the CA represents that it followed
the procedure set forth in its Certificate Policy and/or Certification
Practice Statement to verify that, as of the Certificate¹s issuance date,
all of the Subject Information was accurate.

Section 9.4 Validity Period (Clarifying the Validity Period for Subscriber
Certificates)

Was:-

9.4 Validity Period Certificates issued after the Effective Date MUST have a
Validity Period no greater than 60 months. Except as provided for below,
Certificates issued after 1 April 2015 MUST have a Validity Period no
greater than 39 months. Beyond 1 April 2015, CAs MAY continue to issue
Certificates with a Validity Period greater than 39 months but not greater
than 60 months provided that the CA documents that the Certificate is for a
system or software that:

Amended to:-

9.4 Validity Period 9.4.1 Subscriber Certificates Subscriber Certificates
issued after the Effective Date MUST have a Validity Period no greater than
60 months. Except as provided for below, Subscriber Certificates issued
after 1 April 2015 MUST have a Validity Period no greater than 39 months.
Beyond 1 April 2015, CAs MAY continue to issue Subscriber Certificates with
a Validity Period greater than 39 months but not greater than 60 months
provided that the CA documents that the Certificate is for a system or
software that:

9.5 Subscriber Public Key (Alignment of Key checking for all certificates)

9.5 Public Key

9.7 Additional Technical Requirement (Moving to Section 9.8)

9.7 Technical Constraints in Subordinate CAs via Name Constraints & EKU (New
section)

9.7 Technical Constraints in Subordinate CAs via Name Constraints & EKU For
a Subordinate CA certificate to be considered Technically Constrained, the
certificate MUST include an Extended Key Usage (EKU) extension specifying
all extended key usages that the Subordinate CA is authorized to issue
certificates for. The anyExtendedKeyUsage KeyPurposeId MUST NOT appear
within this extension. If the Subordinate CA certificate includes the
id-kp-serverAuth extended key usage, then the Subordinate CA MUST include
the Name Constraints X.509v3 extension with constraints on dNSName,
iPAddress and DirectoryName as follows:-
> 
> (a) For each dNSName in permittedSubtrees, the CA MUST confirm that the
> Applicant has registered the dNSName or has been authorized by the domain
> registrant to act on the registrant's behalf in line with the verification
> practices of section 11.1
> 
> (b) For each iPAddress range in permittedSubtrees, the CA MUST confirm that
> the Applicant has been assigned the iPAddress range or has been authorized by
> the assigner to act on the assignee's behalf.
> 
> (c) For each DirectoryName in permittedSubtrees the CA MUST confirm the
> Applicants and/or Subsidiary¹s Organizational name and location such that end
> entity certificates issued from the subordinate CA will be in compliancy with
> section 9.2.4 and 9.2.5.

If the Subordinate CA is not allowed to issue certificates with an
iPAddress, then the Subordinate CA certificate MUST specify the entire IPv4
and IPv6 address ranges in excludedSubtrees. The Subordinate CA certificate
MUST include within excludedSubtrees an iPAddress GeneralName of 8 zero
octets (covering the IPv4 address range of 0.0.0.0/0). The Subordinate CA
certificate MUST also include within excludedSubtrees an iPAddress
GeneralName of 32 zero octets (covering the IPv6 address range of ::0/0).
Otherwise, the subordinate CA certificate MUST include at least one
iPAddress in permittedSubtrees.

A decoded example for issuance to the domain and sub domains of example.com
by organization :- Example LLC, Boston, Massachusetts, US would be:-

X509v3 Name Constraints:

Permitted:

DNS:example.com 

DirName: C=US, ST=MA, L=Boston, O=Example LLC

Excluded:

IP:0.0.0.0/0.0.0.0 

IP:0:0:0:0:0:0:0:0/0:0:0:0:0:0:0:0

If the Subordinate CA is not allowed to issue certificates with dNSNames,
then the subordinate CA certificate MUST include a zero-length dNSName in
excludedSubtrees. Otherwise, the subordinate CA certificate MUST include at
least one dNSName in permittedSubtrees.

Section 11.1.1 Authorization by Domain Name Registrant (Adding
clarification)

Note: FQDNs may be listed in Subscriber Certificates using dNSNames in the
subjectAltName extension or in Subordinate CA Certificates via dNSNames in
permittedSubtrees within the Name Constraints extension.

Section 11.1.2 Authorization for an IP Address (Adding clarification)

Note: IPAddresses may be listed in Subscriber Certificates using IPAddress
in the subjectAltName extension or in Subordinate CA Certificates via
IPAddress in permittedSubtrees within the Name Constraints extension.

Section 13.2.6 Response for non-issued certificates (Amending applicability)

Was:-

13.2.6 Response for non-issued certificates If the OCSP responder receives a
request for status of a certificate that has not been issued, then the
responder SHOULD NOT respond with a "good" status. The CA SHOULD monitor the
responder for such requests as part of its security response procedures.
Effective 1 August 2013, OCSP responders MUST NOT respond with a "good"
status for such certificates.

Amended to:-

13.2.6 Response for non-issued certificates If the OCSP responder receives a
request for status of a certificate that has not been issued, then the
responder SHOULD NOT respond with a "good" status. The CA SHOULD monitor the
responder for such requests as part of its security response procedures.
Effective 1 August 2013, OCSP responders for CAs which are not Technically
Constrained in line with Section 9.7 MUST NOT respond with a "good" status
for such certificates.

Section 17 Audit (Clarification notes added to the section heading)

Certificates that are capable of being used to issue new certificates MUST
either be Technically Constrained in line with section 9.7 and audited in
line with section 17.9 only, or Unconstrained and fully audited in line with
all remaining requirements from section 17. A Certificate is deemed as
capable of being used to issue new certificates if it contains an X.509v3
basicConstraints extension, with the cA boolean set to true and is therefore
by definition a Root CA or a Subordinate CA.

Section 17.9 Regular Quality Assessment of Technically Constrained
Subordinate CAs (New Section)

During the period in which a Technically Constrained Subordinate CA issues
Certificates, the CA which signed the Subordinate CA SHALL monitor adherence
to the CA¹s Certificate Policy and the Subordinate CA¹s Certification
Practice Statement. On at least a quarterly basis, against a randomly
selected sample of the greater of one certificate or at least three percent
of the Certificates issued by the Subordinate CA, during the period
commencing immediately after the previous audit sample was taken, the CA
shall ensure all applicable Baseline Requirements are met.

Appendix B - Certificate Extensions (Normative) (Clarify F and add G)

Was:-

F. nameConstraints (optional) If present, this extension SHOULD be marked
critical*. * Non-critical Name Constraints are an exception to RFC 5280 that
MAY be used until the Name Constraints extension is supported by Application
Software Suppliers whose software is used by a substantial portion of
Relying Parties worldwide.

Amended to:-

F. nameConstraints (optional) If present, this extension SHOULD be marked
critical*. * Non-critical Name Constraints are an exception to RFC 5280
(4.2.1.10), however, they MAY be used until the Name Constraints extension
is supported by Application Software Suppliers whose software is used by a
substantial portion of Relying Parties worldwide. G. extkeyUsage (optional)
For Subordinate CA Certificates to be Technically constrained in line with
section 9.8, then either the value id-kp-serverAuth [RFC5280] or
id-kp-clientAuth [RFC5280] or both values MUST be present**. Other values
MAY be present. ** Generally Extended Key Usage will only appear within end
entity certificates (as highlighted in RFC 5280 (4.2.1.12)), however,
Subordinate CAs MAY include the extension to further protect relying parties
until the use of the extension is consistent between Application Software
Suppliers whose software is used by a substantial portion of Relying Parties
worldwide.

The review period for this ballot shall commence on July 15th, 2013 and will
close on July 22nd, 2013. Unless the motion is withdrawn during the review
period, the voting period will start immediately thereafter and will close
at July 29, 2013. Votes must be cast by posting an on-list reply to this
thread.

Motion Ends

A vote in favor of the motion must indicate a clear 'yes' in the response. A
vote against must indicate a clear 'no' in the response. A vote to abstain
must indicate a clear 'abstain' in the response. Unclear responses will not
be counted. The latest vote received from any representative of a voting
member before the close of the voting period will be counted. Voting members
are listed here: http://www.cabforum.org/forum.html In order for the motion
to be adopted, two thirds or more of the votes cast by members in the CA
category and one half or more of the votes cast by members in the browser
category must be in favor. Also, at least seven members must participate in
the ballot, either by voting in favor, voting against, or abstaining.



-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://cabforum.org/pipermail/public/attachments/20130712/d4f079ec/attachment-0001.html 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: Ballot 105 ? Technical Constraints for Subordinate Certificate Authorities yeilding broader and safer PKI adoption - As applied to version 1.1.3 of the guidelines.pdf
Type: application/pdf
Size: 351162 bytes
Desc: not available
Url : https://cabforum.org/pipermail/public/attachments/20130712/d4f079ec/attachment-0001.pdf 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: Ballot 105 ? Technical Constraints for Subordinate Certificate Authorities yeilding broader and safer PKI adoption - As applied to version 1.1.3 of the guidelines.docx
Type: application/vnd.openxmlformats-officedocument.wordprocessingml.document
Size: 203408 bytes
Desc: not available
Url : https://cabforum.org/pipermail/public/attachments/20130712/d4f079ec/attachment-0001.bin 


More information about the Public mailing list