There's no requestor control of validityNotBefore for an offline CA signing
event, and certainly none with an online CA since the Playstation attack.
There's limited control of toBeSigned: CAs will grab the asserted subject
DN, public key, and toss the decorations in the PKCS#10 away.  They'll amend
the DN as they see fit based on vetting and any omissions and set validity
dates based on the moment the offline root is exposed to perform the event.
They're bringing multiple humans together at an externally unpredictable
time (timezone even) and day.

Even though subordination can be external or beyond core PKI realm, you
can't get chosen plaintext or birthday with an offline CA.  RapidSSL was
another story entirely and even though they were an outlier, the 20-bit
serial entropy that resulted was certainly warranted at the end entity tier.

-----Original Message-----
From: dev-security-policy
[mailto:dev-security-policy-bounces+steve.medin=verizonbusiness....@lists.mo
zilla.org] On Behalf Of Jakob Bohm
Sent: Thursday, February 11, 2016 1:23 PM
To: mozilla-dev-security-pol...@lists.mozilla.org
Subject: Re: New requirement: certlint testing

It remains an important security measure when signing anything requested
from outside, including 3rd party sub-CA certificates, cross certificates
for the roots of other CAs, certificates for more remote parts of the CA's
organization (such as certificates for the Symantec software business issued
by a Symantec owned CA) etc.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to