[cabfpub] RFC5280

Jeremy Rowley jeremy.rowley at digicert.com
Wed Feb 24 19:17:01 UTC 2016


Thanks Ryan. I wouldn’t say these are proposals. Mostly questions about why things are set the way they are. I figured it’d be faster to ask here than do a lot of digging.

 

#1 - Since we are only talking about browsers in the CAB Forum (as the browsers have made absolutely clear many times), does the forum care if it breaks non-browser software? Seems irrelevant at the current CAB Forum level.

#2 – There’s a lot of CAs still using keyAgreement. Would you like to see the CAB forum officially deprecate it?

#3 – I haven’t looked at notBefore dates to see whether all CAs have moved to a true 2048-bit cert, but there are definitely still 2047-bit certs out there.

#4 – I don’t have strong opinions on teletext, but would really prefer UTF8 over printableString for international support. 

 

From: Ryan Sleevi [mailto:sleevi at google.com] 
Sent: Wednesday, February 24, 2016 12:08 PM
To: Jeremy Rowley
Cc: CABFPub
Subject: Re: [cabfpub] RFC5280

 


On Feb 24, 2016 10:56 AM, "Jeremy Rowley" <jeremy.rowley at digicert.com <mailto:jeremy.rowley at digicert.com> > wrote:
>
> I’ve been playing around with Peter Bowen’s certlint (an excellent tool) and, looking at the cert universe as a whole, there are some noticeable issues with the BRs and RFC 5280 that I though merited a public CAB Forum discussion.  Some of this is likely me not knowing the entire history of 5280, so I appreciated any explanation. If there’s exceptions we would like to make to RFC5280, we should probably also push a bis with IETF at the same time.
>
>  
>
> Here’s what I’m noticing are common issues:
>
> 1)      Org names, common names,  and address fields are limited to 64 characters. Very few international companies can comply with this restriction. It’s even worse if you are converting an IDN to a printable string.  I don’t think any browsers limit this to 64 characters?  Is there a strong objection to permitting longer strings in these fields?

Yes. Plenty of tools rely on the schema as defined by 5280 - and as such, ignoring it causes real compatibility issues.

> 2)      keyAgreement isn’t specifically prohibited in the BRs or 5280. However, keyAgreement should no longer be used in ECC certs because of security issues as explained by Ryan Sleevi in previous emails . We should update the BRs to prohibit keyAgreement.
>
> 3)      Years ago, we discussed that 2047 bit certs were equivalent to 2048 bit certs (although the discussion may have occurred solely on the Mozilla mailing list).  We should codify this exception.

IMO, this is a giant hack that browsers did because CAs have trouble counting (see also: serial numbers), which itself is a statement that the underlying libraries played a very liberal definition.

I would prefer not.

>
> 4)      Why is teletext string not permissible on a lot of these fields? I also don’t understand the weird requirement to use printablestring over UTRF8 for some fields. Specifically, requiring a printable string for subject:serialNumber could cause issues with the EV Guidelines if a country uses an IDN as part of their registration number.  

TeletexString is the worst string - good luck trying to find a single parser that properly understands it, or a single version of the spec that is unambiguous.

It would be different if you are talking UTF-8 string, but certainly any new appearances of TeletexString should be forbidden.

We have zero desire to support this string, and if CAs followed RFC5280, that would not really be an issue.

Overall, your proposals 1/4 will explicitly fragment the market and the specs - and that's something that should not be supported or encouraged. 2 is basic operational sanity, and 3 is one of those gross things that would ideally be deprecated rather than codified.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/public/attachments/20160224/749de3e4/attachment-0003.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4964 bytes
Desc: not available
URL: <http://lists.cabforum.org/pipermail/public/attachments/20160224/749de3e4/attachment-0001.p7s>


More information about the Public mailing list