[Smcwg-public] SecureMail EKU in Document signing certs

Dimitris Zacharopoulos (HARICA) dzacharo at harica.gr
Mon Jun 14 05:15:18 UTC 2021


Hi Doug,

I believe you are describing an ideal situation and I wish things were 
as simple as stated :-)

I don't recall the WG having a "scope" discussion based on the 
certificatePolicies extension but rather on EKU. My understanding is 
that if an EE or intermediate CA Certificate includes the 
id-kp-emailProtection keyPurposeId, it will be in scope of these new 
SMBRs. That's why Stephen and others are trying to be as inclusive as 
possible to accommodate other purposes so that it will not break 
existing implementations. It will take us years before S/MIME 
Certificate Consumers reach a level of restricting certificates based on 
policy OIDs. So far, such a restriction has failed in the TLS world.


Dimitris.



On 10/6/2021 4:18 μ.μ., Doug Beattie via Smcwg-public wrote:
> I'm sorry I missed the working group meeting, but wanted to point out
> something that might help us focus on the charter and how to address other
> use cases for EE certificates that need to contain the Secure Mail EKU.
>
> It's my understanding that this WG is defining rules for secure mail
> certificates and those will have a specific Cert Policy OID in them to
> indicate that they comply.  That will show adherence to the spec and
> auditors will audit these certs against this spec.  Certificates without one
> of these CABF EKUs are outside the scope of this spec and WG.  I don't think
> (please correct me, I could be wrong) this spec precludes CAs from
> continuing to issue pubic trust certificates with the secure mail EKU but
> with other certificate policies, does it?  Of course they won't be trusted
> by email clients that have taken steps to only trust compliant certificates.
> Basically I'm assuming that mail clients will look at the Root, CA, EE
> certificate for proper EKU AND EE certificate certificate policy to
> determine trust.
>
> Assuming this is true, then CAs can continue issuing certificates with the
> secure mail EKU in them for other purposes, such as document signing so long
> as they do not include the CABF Cert Policy OIDs.
>
> Am I making poor assumptions?
>
> Doug
>
>
>
> -----Original Message-----
> From: Smcwg-public <smcwg-public-bounces at cabforum.org> On Behalf Of Stephen
> Davidson via Smcwg-public
> Sent: Wednesday, June 9, 2021 2:28 PM
> To: SMIME Certificate Working Group <smcwg-public at cabforum.org>
> Subject: [Smcwg-public] Approved Minutes of SMCWG May 26, 2021
>
>
> Minutes of SMCWG
>
>
> May 26, 2021
>
>   
>
> These are the Minutes of the Teleconference described in the subject of this
> message. Corrections and clarifications where needed are encouraged by
> reply.
>
>
> Attendees
>
>
> Adrian Mueller (SwissSign), Ali Gholami (Telia Company), Andrea Holland
> (SecureTrust), Andreas Henschel (D-TRUST), Atsushi Inaba  (GlobalSign), Ben
> Wilson (Mozilla), Bruce Morton (Entrust), Chris Kemmerer  (SSL.com), Clint
> Wilson (Apple), Corey Bonnell  (DigiCert), Curt Spann (Apple), Dimitris
> Zacharopoulos (HARICA), Don Sheehy (WebTrust), Hazhar Ismail (MSC
> Trustgate.com), Hongquan Yin  (Microsoft), Inigo Barreira (Sectigo), Klauss
> Voss (Zertificon), Mads Henriksveen  (BuyPass), Mauricio Fernandez
> (TeleTrust), Morad Abou Nasser (TeleTrust), Niko Carpenter (SecureTrust),
> Pedro Fuentes (OISTE), Rebecca Kelley (Apple), Renne Rodriguez (Apple), Russ
> Housley (Vigil Security), Sebastian Schulz (GlobalSign), Stefan Selbitschka
> (rundQuadrat), Stephen Davidson (DigiCert), Tadahiko Ito (SECOM Trust
> Systems), Thomas Zermeno (SSL.com), Tim Crawford (WebTrust), Wendy Brown
> (Federal PKI)
>
>
> 1. Roll Call
>
>
> The Roll Call was taken.
>
>
> 2. Read Antitrust Statement
>
>
> The Antitrust/Compliance Statement was read.
>
>
> 3. Review Agenda
>
>
> 4. Approval of minutes from last teleconference
>
>
> The minutes of the May 12 teleconference were approved.
>
>
> 5. Discussion of certificate profile
>
>
> The discussion regarding the Mailbox-validation Legacy profile continued.
>
>   
>
> Discussion took place between regarding the overlap between certificates
> intended for S/MIME and those intended for document signing, both of which
> may use the emailProtection EKU. The document signing certs may not have an
> email address or the digitalSignature keyUsage.
>
>   
>
> In our effort to improve the S/MIME ecosystem we must be mindful of the
> SMCWG Charter proscription of breaking other use cases.
>
>   
>
> There was a reminder of the IETF Internet-draft to create a generic EKU for
> document signing, which would assist in separating the S/MIME and document
> signing use cases.
>
>   
>
> The SMCWG Charter defines both that our deliverable address certs that
> contain the contain the emailProtection EKU and elsewhere as certificates to
> be used for S/MIME.  There was concern that the scope of the S/MIME BR be
> clearly delineated, for example to prevent future linters from sweeping in
> document signing certs.
>
>   
>
> It was agreed that a certificate with the emailProtection EKU and containing
> an email address in the Subject or SAN should be considered in scope.
> Following points made by Dimitris Zacharopoulos and Wendy Brown it was
> agreed that that any Issuing CA that issued any certs of that type would be
> in scope. The goal of the Legacy/Multipurpose profiles is to accommodate
> those "crossover certs" with the intent that those profiles ultimately would
> be phased out in favor of the Strict.  Client Wilson said that the long term
> goal must be to separate the S/MIME and document signing use cases as other
> areas have shown the policy and agility risks of multipurpose certificates.
>
>   
>
> Wendy Brown, Thomas Connelly, and Russ Housely discussed that there is a
> cost of separating certs by use case, and that current client software UI
> may present a challenge for users in identifying which certificate they are
> looking at, particularly over time when managing expired certificates
> required to view historic emails.
>
>   
>
> The discussion turned to EKU.  Stephen Davidson pointed out that a review of
> S/MIME certs found on the internet showed that even "strict-looking" ICA
> profiles used additional EKU beyond emailProtection.  These include
> clientAuth, a range of Microsoft EKU, and document signing EKU.
>
>   
>
> Curt Spann indicated that while it may be acceptable in Legacy/Multipurpose
> profiles, it would be unusual to allow in the Stricter policies.  Dimitris
> pointed out that no standards existed for clientAuth and other BR allowed
> its use.
>
>   
>
> It was agreed that the Microsoft EKU and the document signing EKU would be
> acceptable in Legacy/Multipurpose.  Ben Wilson asked CAs to consider their
> issuance and to make the case for EKU combinations that may be required.
> Curt raised that it may be that the Legacy/Multipurpose profiles could be
> combined once the actual differences in the "identity" profiles are
> considered.
>
>   
>
> Stephen Davidson raised the question of the smimeCapabilities extension and
> asked if other specialist extensions were commonly used in S/MIME. Stephen
> noted that an additional tab called "leaf profile" has been added to the
> worksheet starting to lay out the other leaf certificate fields that will be
> in common across the profile types.
>
>   
>
>
> 6. Any Other Business
>
>
>   
>
> None
>
>
> 7. Next call
>
>
> Next call: Wednesday, June 9, 2021 at 11:00 am Eastern Time
>
>
> Adjourned
>
>
>   
>
> _______________________________________________
> Smcwg-public mailing list
> Smcwg-public at cabforum.org
> https://lists.cabforum.org/mailman/listinfo/smcwg-public
>
> _______________________________________________
> Smcwg-public mailing list
> Smcwg-public at cabforum.org
> https://lists.cabforum.org/mailman/listinfo/smcwg-public

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/smcwg-public/attachments/20210614/b3526780/attachment.html>


More information about the Smcwg-public mailing list