[cabf_validation] [EXTERNAL] Re: Section 7.1.2.10.5 CA Certificate Certificate Policies for cross signing certificates
Dimitris Zacharopoulos
dzacharo at harica.gr
Sat Sep 7 05:49:42 UTC 2024
I believe sometimes we forget that the CABF is maintaining a list of "baseline requirements", so why is it problematic to have an issuing CA that is technically capable of issuing DV and OV, or OV and EV or any other combination of end-entity certificates?
I am having second thoughts about the entire "Affiliate - non-Affiliate" separation. Ultimately we are talking about the same key management and policies. Let's take a quick example.
We have two publicly-trusted Trust Service Providers A and B. TSP(A) has more ubiquity.
TSP(B) has a Root CA and, according to the requirements, Root CAs do not allow the certificatePolicies extension which practically leads to "anyPolicy".
TSP(B) issues an ICA that is technically capable of issuing all types of TLS Certificates (DV, OV, EV) using the anyPolicy value in the certificatePolicies extension. It also limits the scope to TLS using the EKU. Again, everything is by the book.
Now, TSP(B) wants to get cross signed by TSP(A) for more ubiquity. According to the current rules, the cross certificate, even for the ICA, must include only one reserved CABF OID.
Why should the rules require TSP(B) to practically change their CA structure when in fact the WebPKI approves their existing behavior?
I think it should be allowed for a CA Certificate to include more than one reserved CABF OIDs. It should be up to the TSP to decide the structure and separation of DV, OV, IV or EV per ICA and enforce it via policy OID or not.
Best regards,
Dimitris.
Sep 6, 2024 23:19:13 Bruce Morton via Validation <validation at cabforum.org>:
> Hi Clint,
> I think the requirement should apply to a certificate to a CA, which can issue CA certificates. I’m not sure of the right terminology, but I categorize this as a Root-to-Root CA or a Root-to-Intermediate CA Certificate. It would not apply to a CA certificate where the CA issues Subscriber certificates.
> Bruce.
> *From:* Validation <validation-bounces at cabforum.org> *On Behalf Of *Clint Wilson via Validation
> *Sent:* Friday, September 6, 2024 2:45 PM
> *To:* Paul van Brouwershaven <Paul.vanBrouwershaven at entrust.com>; CA/Browser Forum Validation SC List <validation at cabforum.org>
> *Subject:* [EXTERNAL] Re: [cabf_validation] Section 7.1.2.10.5 CA Certificate Certificate Policies for cross signing certificates
> Hi Paul,
> One concern I have with this change is its impact on the cross-certification of subordinate CAs which directly issue end-entity TLS certificates. That is, I think it appropriate to maintain the requirement/limitation that only one Reserved Certificate Policy Identifier be included in the Cross-Certified Subordinate CA Certificate where the CA Certificate being signed/certified is a Subordinate CA Certificate as opposed to a Root CA Certificate.
> Since the introduction to this Profile in Section 7.1.2.2 states that the Profile is the same regardless of whether the “source” CA Certificate is a Root CA Certificate or a Subordinate CA Certificate, I /think/ this newly added Section 7.1.2.2.6 would need to indicate clearly its scope of applicability against Cross-Certified Subordinate CA Certificate which are the result of issuing a CA Certificate using the same Subject Name and Subject Public Key Information as an existing Root CA Certificate.
> It also seems like it may be helpful to clarify that the Certificate Policies extension defined in this newly added Section 7.1.2.2.6 needs to be compatible between the Cross-Certified Subordinate CA and its Issuing CA (though, perhaps, obvious, this would also help ensure that the separation of pre- and post-SC-062 CA Certificates is maintained, at least in the cases where the `anyPolicy` Policy Identifier is not used). I’m not entirely sure this is necessary, as I suspect it’s required elsewhere within Section 7, but I couldn’t find it in a quick search so thought I’d mention it.
> Thanks!
> -Clint
>
> On Sep 6, 2024, at 6:21 AM, Paul van Brouwershaven via Validation <validation at cabforum.org> wrote:
> Following yesterday's discussion in the validation subcommittee teleconference, we are now seeking two members to endorse the ballot. Feedback is also welcome, either here or on the pull request.
>
> ### Purpose of the Ballot
> This ballot duplicates the content of section 7.1.2.10.5 (CA Certificate Certificate Policies) into section 7.1.2.2 (Cross-Certified Subordinate CA Certificate Profile) as section 7.1.2.2.6 (Cross-Certified Subordinate CA Certificate Certificate Policies), modifying the requirement from "MUST contain exactly one Reserved Certificate Policy Identifier" to "MUST include at least one Reserved Certificate Policy Identifier" to allow the inclusion of multiple Reserved Certificate Policy Identifiers in a Cross-Certified Subordinate CA Certificate.
> The following motion has been proposed by Paul van Brouwershaven (Entrust) and endorsed by XXX (XXX) and XXX (XXX).
> GitHub pull request for this ballot: https://github.com/cabforum/servercert/pull/544
> ### Motion begins
> MODIFY the "Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates" ("TLS Baseline Requirements") based on Version 2.0.6 as specified in the following redline:
> https://github.com/cabforum/servercert/compare/929d9b4a1ed1f13f92f6af672ad6f6a2153b8230...89f80028b40ce6a1a5c52b406d37e5534460a1a1
> ### Motion ends
> This ballot proposes a Final Maintenance Guideline. The procedure for approval of this ballot is as follows:
> Discussion (7+ days)
> - Start time: TBC
> - End time: TBC
> Vote for approval (7 days)
>
> - Start time: TBC
> - End time: TBC
> ----------------------------------------
> *From:* Validation <validation-bounces at cabforum.org> on behalf of Paul van Brouwershaven via Validation <validation at cabforum.org>
> *Sent:* Thursday, September 5, 2024 16:40
> *To:* CABforum3 <validation at cabforum.org>
> *Subject:* [EXTERNAL] [cabf_validation] Section 7.1.2.10.5 CA Certificate Certificate Policies for cross signing certificates
>
> We would like to clarify the following requirement in section 7.1.2.10.5 CA Certificate Certificate Policies, specifically for cross signing certificates.
> RFC 5280 states that you can have one CertPolicyId within the PolicyInformation, see below:
> /certificatePolicies ::= SEQUENCE SIZE (1..MAX) OF PolicyInformation/
> /PolicyInformation ::= SEQUENCE {/
> / policyIdentifier *CertPolicyId*,/
> / policyQualifiers SEQUENCE SIZE (1..MAX) OF/
> / PolicyQualifierInfo OPTIONAL }/
> */CertPolicyId /*/::= OBJECT IDENTIFIER/
> Section 7.1.2.10.5 of the TLS BR states for the policyIdentifier:
> /The CA MUST include _*at least one*_ Reserved Certificate Policy Identifier (see Section 7.1.6.1) associated with the given Subscriber Certificate type (see Section 7.1.2.7.1) directly or transitively issued by this Certificate./
> This 'at least one' seems to contradict RFC 5280 which indicates that we can only have one policyIdentifier in the PolicyInformation sequence.
> Then at the bottom of this section the TLS BRs states that entire certificate policies extension MUST contain exactly one Reserved Certificate Policy Identifier:
> /Regardless of the order of PolicyInformation values, the Certificate Policies extension _*MUST contain exactly one*_ Reserved Certificate Policy Identifier./
> While we can repeat the PolicyInformation within the certificatePolicies extension does this mean that CAs are prohibited from issuing a cross signing certificate (from a multi-purpose root to another multi-purpose root) with policy contrains that include DV, OV and EV reserved certificate policy identifiers. If our reading of this section is correct, this would mean that CAs need to issue three seperate cross signing certificates in that case.
> Paul
> /Any email and files/attachments transmitted with it are intended solely for the use of the individual or entity to whom they are addressed. If this message has been sent to you in error, you must not copy, distribute or disclose of the information it contains. _Please notify Entrust immediately and delete the message from your system./_
> _______________________________________________
> Validation mailing list
> Validation at cabforum.org
> https://lists.cabforum.org/mailman/listinfo/validation
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/validation/attachments/20240907/77ce785a/attachment-0001.html>
More information about the Validation
mailing list