[cabfpub] (Eventually) requiring id-kpServerAuth for all certs in the chain?

Moudrick M. Dadashov md at ssc.lt
Thu Nov 13 21:25:24 UTC 2014


Ok, sounds like what you are offering perfectly works for ETSI TS 102 
042 audited CAs - all SSL capable intermediates pass audit so nobody 
cares what their EKUs were, right. If this is what you mean, I'm fine 
with it.

Thanks,
M.D.

On 11/13/2014 11:06 PM, Ryan Sleevi wrote:
> That's the fundamental difference between Gerv's proposal and mine.
>
> My proposal is that all of the certs capable must be audited, with 
> capable be defined as either the presence of (id-kp-serverAuth, 
> anyEKU) in the intermediate OR the absence of ALL EKUs in the 
> intermediate. If it's capable, it MUST be audited to the BRs.
>
> If you thus wish to exclude such an intermediate from the scope of a 
> BR audit (for example, because you intend to use it with some other 
> scheme), then you need to change your hierarchy. However, if you're 
> not such a CA running multiple schemes, then no action is required, 
> and all the intermediates stay useful.
>
> Then we can independently discuss any changes, but it solves the 
> near-term ambiguity.
>
> Gerv's proposal requires more drastic actions, and thus will naturally 
> take quite some time to phase in.
>
> On Thu, Nov 13, 2014 at 1:01 PM, Moudrick M. Dadashov <md at ssc.lt 
> <mailto:md at ssc.lt>> wrote:
>
>     Thanks, Ryan, I see the point.
>     Is there a non extreme approach here that preserves those valuable
>     libraries and doesn't kill those intermediates that have been in
>     use for years? Could it a transitional time frame after which we
>     have a single, widely supported solution?
>
>     Thanks,
>     M.D.
>
>
>     On 11/13/2014 10:53 PM, Ryan Sleevi wrote:
>>
>>     On Thu, Nov 13, 2014 at 12:51 PM, Moudrick M. Dadashov <md at ssc.lt
>>     <mailto:md at ssc.lt>> wrote:
>>
>>         It certainly does. I understand folks looking for a
>>         programmatic discovery of cert types, but still curious why
>>         EKU is more appropriate for this than any other predefined
>>         field that raises no conflict with standards.
>>
>>         Thanks,
>>         M.D.
>>
>>
>>     Because it's widely implemented in a variety of libraries and
>>     provides immediate security benefits for clients, and immediate
>>     clarifications for CAs about in scope vs out of scope, and
>>     doesn't conflict with any of the language in RFC 5280 - which,
>>     while was accurate at the time it was written ("In general, this
>>     doesn't appear in CA certs"), is NOT a prohibition against it,
>>     just an observation.
>
>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/public/attachments/20141113/1a8f58cc/attachment-0003.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 3653 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.cabforum.org/pipermail/public/attachments/20141113/1a8f58cc/attachment-0001.p7s>


More information about the Public mailing list