[Servercert-wg] [EXTERNAL]Re: Critical Name Constraints (Was: Re: Question on BR 3.2.2.6)

Dimitris Zacharopoulos (HARICA) dzacharo at harica.gr
Tue Mar 3 09:09:50 MST 2020


Thanks Bruce,

Similarly with the code signing CA example, the same should apply for a 
subCA that only has an EKU of id-kp-emailProtection.


Dimitris.

On 2020-03-03 5:43 μ.μ., Bruce Morton wrote:
>
> Hi Dimitris,
>
> I think that we have determined that the scope is based on the EKU(s) 
> which are in the end entity certificates. If there is no EKU, then all 
> scope would apply based on what the root is trusted for. We also have 
> requirements in the BRs and from Mozilla, where we are not allowed to 
> mix specific EKU values. I assume that this is in place, so that we 
> will not have a certificate, which is meeting multiple and potentially 
> conflicting policies.
>
> So I agree, that if the only EKU in the certificate is for Code 
> Signing, then the (SSL) BR requirements do not directly apply.
>
> Bruce.
>
> *From:* Servercert-wg <servercert-wg-bounces at cabforum.org> *On Behalf 
> Of *Dimitris Zacharopoulos (HARICA) via Servercert-wg
> *Sent:* Tuesday, March 3, 2020 10:11 AM
> *To:* Pedro FUENTES <pfuentes at WISEKEY.COM>
> *Cc:* CA/B Forum Server Certificate WG Public Discussion List 
> <servercert-wg at cabforum.org>
> *Subject:* [EXTERNAL]Re: [Servercert-wg] Critical Name Constraints 
> (Was: Re: Question on BR 3.2.2.6)
>
> *WARNING:* This email originated outside of Entrust Datacard.
> *DO NOT CLICK* links or attachments unless you trust the sender and 
> know the content is safe.
>
> ------------------------------------------------------------------------
>
> On 2020-03-03 2:42 μ.μ., Pedro FUENTES wrote:
>
>     Hi Dimitris,
>
>     Just to clarify that what I said is that the decision can’t be
>     taken only considering serverAuth, because this requirement
>     applies to every subordinate CA issued under a Root that undergoes
>     BR compliance.
>
>     To be clear: a SubCA that only has emailProtection, but that is
>     issued by a Root that needs to be compliant with BR, will need to
>     have the nameConstraints extension set as critical or not
>     depending of the BR mandate, as in other case the Root won’t be
>     compliant with BR.
>
>     So even if this WG is not for S/MIME, the decision must be taken
>     considering the impact in other scopes that “the WebPKI”.
>
>     Best,
>
>     Pedro
>
>     PS Personally I can’t give more information on interoperability
>     issues. We had issues in the past with Apple software, but it
>     seems that it's already solved.
>
>
>
> I would like to ask other members if this interpretation is accurate. 
> If the CA Certificate is out of scope of the BRs (i.e. not technically 
> capable of issuing TLS Certificates), I believe it does not need to 
> comply with the BRs. For example, if we create -say- a code-signing 
> CA, the CA Certificate Profile described in 7.1.2.2 and 7.1.4.3.1 do 
> not apply. This is my understanding after following many discussions 
> and conversations in the Forum and SCWG over the last couple of years.
>
>
> Thanks,
> Dimitris.
>
>
>
>
>
>
>         El 3 mar 2020, a las 10:10, Dimitris Zacharopoulos (HARICA)
>         <dzacharo at harica.gr <mailto:dzacharo at harica.gr>> escribió:
>
>         On 3/3/2020 10:36 π.μ., Pedro FUENTES wrote:
>
>             Hello,
>
>             On my side… I’d be keen to align with #2, as I think it’s
>             the way to go, but for that we’d need some objective data
>             to assess the impact and be sure we aren’t shooting in our
>             foot… Do we have any idea of what software nowadays would
>             reject certificates or would malfunction if we enforce the
>             critical thing?
>
>
>         Hello Pedro,
>
>         One of the purposes of this thread is to collect some
>         objective data to assess the impact :-) If you have evidence
>         to share about TLS Certificate Issuing CAs, it would be very
>         helpful.
>
>
>
>             Just as a side comment… In our case, we mostly used name
>             constraints for subordinates intended for "S/MIME
>             certificates" (in reality this means "personal
>             certificates used for authentication, digital signature
>             and secure email", but let’s go for the over-simplified
>             term “S/MIME Certificates” I see it’s used in the Forum)
>             so assuming a rule that is only considering “the webPKI”
>             is maybe not something appropriate. We must see
>             interoperability as a whole as these decisions won't only
>             impact TLS certs, because this rule of the BR applies to
>             all subordinates, not only the ones having the serverAuth EKU.
>
>             Best,
>             Pedro
>
>
>
>
>         I don't think conflating S/MIME with serverAuth is useful for
>         this thread. According to several Root programs, you should
>         not include emailProtection and serverAuth Extended Key Usages
>         in the same Issuing CA. Also, please remember that this
>         Working Group does not discuss issues related to S/MIME
>         Certificates.
>
>         It would help if you have been using name constraints for
>         serverAuth Issuing CAs and share your experience with legacy
>         software.
>
>
>         Thanks,
>         Dimitris.
>
>     *WISeKey SA*
>
>     *Pedro Fuentes
>     *CSO - PM eSecurity Solutions
>     Office: + 41 (0) 22 594 30 00
>     Mobile: + 41 (0) 791 274 790
>
>     Address: 29, Rte de Pré-Bois - CP 853 | Geneva 1215 CH - Switzerland
>     *Stay connected with WISeKey <http://www.wisekey.com>
>     *
>
>     *THIS IS A TRUSTED MAIL*: This message is digitally signed with a
>     WISeKey identity. If you get a mail from WISeKey please check
>     the signature to avoid security risks
>
>
>
>     *CONFIDENTIALITY: *This email and any files transmitted with it
>     can be confidential and it’s intended solely for the use of
>     the individual or entity to which they are addressed. If you are
>     not the named addressee you should not disseminate, distribute or
>     copy this e-mail. If you have received this email in error
>     please notify the sender
>
>     *DISCLAIMER: *WISeKey does not warrant the accuracy
>     or completeness of this message and does not accept any liability
>     for any errors or omissions herein as this message has
>     been transmitted over a public network. Internet
>     communications cannot be guaranteed to be secure or error-free as
>     information may be intercepted, corrupted, or contain viruses.
>     Attachments to this e-mail are checked for viruses; however, we do
>     not accept any liability for any damage sustained by
>     viruses and therefore you are kindly requested to check for
>     viruses upon receipt.
>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cabforum.org/pipermail/servercert-wg/attachments/20200303/2a575954/attachment.html>


More information about the Servercert-wg mailing list