[Servercert-wg] Discussion about single-purpose client authentication leaf certificates issued from a server TLS Issuing CA

Dimitris Zacharopoulos (HARICA) dzacharo at harica.gr
Wed May 15 05:19:21 UTC 2024



On 15/5/2024 7:35 π.μ., Roman Fischer via Servercert-wg wrote:
>
> Dear Aaron,
>
> Interesting line of argumentation. Wouldn’t that conclude that -every- 
> mis-issuance of a leaf certificate would be a violation of "all 
> certificates that it issues MUST comply with one of the following 
> certificate profiles" and thus would require the ICA to be revoked? 
> That can’t be the intent of the regulation, right?
>

Roman,

TC non-TLS subCAs already have a defined certificate profile described 
in the BRs so there is no need to revoke such an ICA. I think you might 
be referring to non-TLS Subscriber Certificates issued by those TC 
non-TLS SubCAs?


Dimitris.

> Rgds
> Roman
>
> *From:*Servercert-wg <servercert-wg-bounces at cabforum.org> *On Behalf 
> Of *Aaron Gable via Servercert-wg
> *Sent:* Dienstag, 14. Mai 2024 16:59
> *To:* Dimitris Zacharopoulos (HARICA) <dzacharo at harica.gr>; CA/B Forum 
> Server Certificate WG Public Discussion List <servercert-wg at cabforum.org>
> *Subject:* Re: [Servercert-wg] Discussion about single-purpose client 
> authentication leaf certificates issued from a server TLS Issuing CA
>
> On Tue, May 14, 2024, 02:33 Dimitris Zacharopoulos (HARICA) via 
> Servercert-wg <servercert-wg at cabforum.org> wrote:
>
>     Is it ok for such an Issuing CA to create a single-purpose client
>     authentication TLS Certificate, one that is structured according
>     to RFC 5280 (thus can be successfully parsed by Relying Party RFC
>     5280-conformant software), contains an extKeyUsage extension which
>     contains the /id-kp-clientAuth/ and DOES NOT include the
>     /id-kp-serverAuth/ KeyPurposeId?
>
> Speaking in a personal capacity, it is my opinion that no, such 
> issuance is not acceptable.
>
> I agree that the resulting end-entity client-auth-only certificate is 
> out of scope of the BRs, and is not in and of itself misissued. 
> However, the issuing intermediate itself is still in scope of the BRs, 
> and its behavior can be contained by them. By virtue of issuing the 
> clientAuth cert, the issuing intermediate has violated the BRs 
> requirement that "all certificates that it issues MUST comply with one 
> of the following certificate profiles".
>
> One could even argue that, having issued a certificate which does not 
> comply with a BR profile, the issuing intermediate must be revoked 
> within 7 days, per BRs Section 4.9.1.2 (5): "The Issuing CA SHALL 
> revoke a Subordinate CA Certificate [if...] the Issuing CA is made 
> aware that the... Subordinate CA has not complied with this document".
>
> Aaron
>
>
> _______________________________________________
> Servercert-wg mailing list
> Servercert-wg at cabforum.org
> https://lists.cabforum.org/mailman/listinfo/servercert-wg
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/servercert-wg/attachments/20240515/31219169/attachment.html>


More information about the Servercert-wg mailing list