[cabfpub] Questions regarding timestamping certificates

Dimitris Zacharopoulos jimmy at it.auth.gr
Thu Sep 8 06:03:13 MST 2016


On 8/9/2016 3:07 μμ, Bruce Morton wrote:
>
> Hi Dimitris,
>
> I think the best document to use for Time-stamping Authority is the 
> Minimum Requirements for Code Signing certificates, see 
> https://casecurity.org/wp-content/uploads/2016/07/Minimum-requirements-for-the-Issuance-and-Management-of-code-signing.pdf.
>
> Thanks, Bruce.
>

Thank you Bruce, you helped me find answers related to my second 
question. I am not 100% sure if it answers my first question. The 
minimum requirements for code signing document, describes a scenario 
where there are explicit Subordinate CA Certificates for TimeStamping 
but there is no requirement that forbids end-entity certificates to be 
issued directly from the Root (at least not one I could spot straight 
away).

I guess my 1st question is more focused on what is allowed under the 
currently approved CA/B Forum Baseline Requirements.


Best regards,
Dimitris.


> *From:*public-bounces at cabforum.org 
> [mailto:public-bounces at cabforum.org] *On Behalf Of *Dimitris Zacharopoulos
> *Sent:* Thursday, September 8, 2016 4:34 AM
> *To:* public at cabforum.org
> *Subject:* [cabfpub] Questions regarding timestamping certificates
>
> Hello everyone,
>
> We are setting up a new Timestamping Authority and we are looking for 
> specific rules that apply to certificates and subCA Certificates 
> related to timestamping. While reading various standards and the CA/B 
> Forum documents, and after looking at various existing implementations 
> of publicly-trusted CAs, I have some questions and would appreciate 
> any feedback from the forum. Although the BRs apply to SSL 
> certificates, some Root Certificates might be used for both SSL and 
> timestamping services. So the questions that follow, apply to CAs that 
> use the same Root Certificate for both SSL and timestamping purposes. 
> Of course, the EV CodeSigning requirements also define some rules for 
> "EV Timestamp Authorities".
>
>  1. Section 6.1.7 of the Baseline Requirements states that the Root CA
>     Private Keys MUST NOT be used to sign end-entity certificates with
>     some exceptions. This exception list does not specifically mention
>     end-entity certificates with EKU id-kp-timeStamping. Are Root CAs
>     allowed to directly issue end-entity certificates for timestamping
>     authorities (end-entity certificates with EKU only
>     id-kp-timeStamping)?
>  2. Section 4.9.7 describes the CRL issuance frequency for Subscriber
>     and Subordinate CA Certificates. If there is a Subordinate CA
>     Certificate constrained with EKU id-kp-timeStamping, is an
>     end-entity certificate (with only id-kp-timeStamping) issued from
>     that subCA considered a "Subscriber" Certificate? Should this
>     subCA issue CRLs every 7 days or every 12 months? My understanding
>     (according to section 1.1 of the BRs) is that the end-entity
>     certificates from that subCA are not required to comply with the
>     CA/B Forum BRs. This should allow the CA to choose the CRL
>     issuance (from that restricted subCA), to exceed the 7-day
>     requirement.
>
>
> Thank you in advance.
>
>
> Dimitris Zacharopoulos.
>
>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://cabforum.org/pipermail/public/attachments/20160908/f3f4d28b/attachment-0001.html 


More information about the Public mailing list