[cabf_validation] OU attribute in CA Certificates

Dimitris Zacharopoulos (HARICA) dzacharo at harica.gr
Fri Oct 14 08:22:33 UTC 2022


The breakdown makes it clearer, thanks Doug. We just need to see how 
this will appear in the table via markdown.

Dimitris.

On 13/10/2022 11:05 μ.μ., Doug Beattie wrote:
>
> Hi Dimitris,
>
> I’d lean towards you option #2:
>
>  2. Update 7.1.2.10.2, add the Attribute Type OU, and in the Presence
>     column state "MUST NOT," except for Non-TLS Subordinate CA
>     Certificates that meet the Certificate Profile described in
>     section 7.1.2.3".
>
> Just a suggestion:
>
>  2. Update 7.1.2.10.2, add the Attribute Type OU, and in the Presence
>     column state:
>       * MUST NOT for TLS Subordinate CA Certificates defined in
>         section 7.1.2.3,
>       * SHOULD NOT for all other CAs"
>
> *From:* Validation <validation-bounces at cabforum.org> *On Behalf Of 
> *Dimitris Zacharopoulos (HARICA) via Validation
> *Sent:* Thursday, October 13, 2022 12:31 PM
> *To:* validation at cabforum.org
> *Subject:* [cabf_validation] OU attribute in CA Certificates
>
> [Moving this discussion to the validation subcommittee]
>
> On 13/10/2022 5:36 μ.μ., Dimitris Zacharopoulos (HARICA) via 
> Servercert-wg wrote:
>
>     I'd like to ask for a few minutes to discuss about the OU
>     attribute in CA Certificates as described in
>     https://github.com/cabforum/servercert/pull/394 so we can decide
>     on next steps.
>
>     Thanks,
>     Dimitris.
>
>
> Following up on todays SCWG call, I did a quick review at the profiles 
> ballot and unfortunately the current draft describes 5 different CA 
> Certificate profiles (actually there is one more for Cross 
> Certificates in 7.1.2.2 
> <https://github.com/cabforum/servercert/blob/profiles/docs/BR.md#7122-cross-certified-subordinate-ca-certificate-profile> 
> but that doesn't seem to create any issues):
>
>  1. 7.1.2.1 Root CA Certificate Profile
>     <https://github.com/cabforum/servercert/blob/profiles/docs/BR.md#7121-root-ca-certificate-profile>
>  2. 7.1.2.3 Technically Constrained Non-TLS Subordinate CA Certificate
>     Profile
>     <https://github.com/cabforum/servercert/blob/profiles/docs/BR.md#7123-technically-constrained-non-tls-subordinate-ca-certificate-profile>
>  3. 7.1.2.4 Technically Constrained Precertificate Signing CA
>     Certificate Profile
>     <https://github.com/cabforum/servercert/blob/profiles/docs/BR.md#7124-technically-constrained-precertificate-signing-ca-certificate-profile>
>     (we should fix the internal broken link to this pointer in section
>     7.1.2)
>  4. 7.1.2.5 Technically Constrained TLS Subordinate CA Certificate
>     Profile
>     <https://github.com/cabforum/servercert/blob/profiles/docs/BR.md#7125-technically-constrained-tls-subordinate-ca-certificate-profile>
>  5. 7.1.2.6 TLS Subordinate CA Certificate Profile
>     <https://github.com/cabforum/servercert/blob/profiles/docs/BR.md#7126-tls-subordinate-ca-certificate-profile>
>
> that all point to a common section 7.1.2.10.2 
> <https://github.com/cabforum/servercert/blob/profiles/docs/BR.md#712102-ca-certificate-naming> 
> for the subjectDN CA Certificate Naming.
>
> If we want to disallow OU in CA Certificates (new Roots and 
> Intermediates), shouldn't that only affect 7.1.2.5 and 7.1.2.6? I'm 
> not sure about 7.1.2.4 as I am not so familiar with Precertificate 
> Signing CAs but it looks like it needs to follow the "TLS CA" rules. 
> If there is agreement, here are some ways to tackle this problem:
>
>  1. Rename 7.1.2.10.2 from "CA Certificate Naming" to "TLS CA
>     Certificate Naming", use "MUST NOT" for the OU field, create a
>     7.1.2.10.3 "Non-TLS CA Certificate Naming" with exactly what's in
>     today's 7.1.2.10.2 and shift all sections at the same level by one; or
>  2. Update 7.1.2.10.2, add the Attribute Type OU, and in the Presence
>     column state "MUST NOT," except for Non-TLS Subordinate CA
>     Certificates that meet the Certificate Profile described in
>     section 7.1.2.3".
>
> Thoughts or other ideas?
>
> Dimitris.
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/validation/attachments/20221014/03dca3a9/attachment-0001.html>


More information about the Validation mailing list