On Thursday, October 27, 2016 at 4:14:35 AM UTC-7, Rob Stradling wrote:
> So, to ensure that no CA can claim that they didn't know, I'd like to
> see the "must keep disclosing intermediates to Salesforce on an ongoing
> basis" requirement explicitly stated:
>   1. in the next version of the Mozilla CA Policy.

Noted here: 
https://wiki.mozilla.org/CA:CertificatePolicyV2.3#General_Policy_Cleanup

>   2. in the next CA Communication.

Noted in my list for the next CA Communication to all CAs. This is currently on 
hold, awaiting for when the New Validation Rules in BRs are all settled. 

I started the new section in the wiki page:
https://wiki.mozilla.org/CA:SalesforceCommunity#CA_Responsibilities
Will appreciate feedback on it.
Note that the email draft has been updated to point to this section in the wiki 
page.

Here's the updated text for this current email that I will hopefully send out 
today using the new email capability that we added to the production instance 
of the CA Community in Salesforce yesterday. 
~~
Subject: ACTION REQUIRED: Non-Disclosed non-technically-constrained 
Intermediate Certs

Message:
Dear Certification Authority,

You are receiving this email because we have become aware that there are 
non-technically-constrained intermediate certificates that chain up to your 
root certificates that are included in Mozilla’s program that have not been 
entered into the CA Community in Salesforce. The deadline for CAs to disclose 
their intermediate certificate data in the CA Community in Salesforce was June 
2016. Mozilla is going to begin discussions in the mozilla.dev.security.policy 
forum about action to take for any remaining non-disclosed 
non-technically-constrained intermediate certificates and the CAs who are 
responsible for those CA hierarchies.

Please see https://wiki.mozilla.org/CA:SalesforceCommunity#CA_Responsibilities 
for information about which intermediate certificate data you are expected to 
enter into the CA Community in Salesforce, and instructions on how to do so.

The following was stated in Mozilla’s March 2016 CA Communication 
(https://wiki.mozilla.org/CA:Communications#March_2016):
Beginning with Version 2.1 of Mozilla's CA Certificate Policy, for any 
certificate which directly or transitively chains to the root certificates you 
currently have included in Mozilla's CA Certificate Program, which are capable 
of being used to issue new certificates, and which are not technically 
constrained as described in Section 9 of Mozilla's CA Certificate Inclusion 
Policy, you are required to provide public-facing documentation about the 
certificate verification requirements and annual public attestation of 
conformance to said requirements. This includes certificates owned by, operated 
by, or issued by third parties, whether or not those issuing certificates are 
already part of Mozilla's CA Certificate Program, if they have been 
cross-signed by a certificate that directly or transitively chains to your root 
certificate.
To facilitate this public disclosure, Mozilla is requiring that these 
certificates, as well as their CP/CPS and audit statements, be entered into 
Mozilla's CA Community in Salesforce. This includes the full PEM data of every 
intermediate certificate that directly or transitively chains to your included 
root certificates, provided that the root certificate is enabled with the 
Websites trust bit and the intermediate certificate is not Technically 
Constrained, as described in Section 9 of Mozilla's CA Certificate Inclusion 
Policy.
This also includes every variation of these certificates, in the event they 
were reissued, such as to change the contents of extensions or validity dates.

In particular, CAs must add records to the CA Community in Salesforce for all 
certificates that are capable of being used to issue new certificates, and 
which directly or transitively chain to their certificate(s) included in 
Mozilla’s CA Certificate Program that are not Technically Constrained via 
Extended Key Usage and Name Constraint settings.

Intermediate certificates are considered to be technically constrained, and do 
not need to be added to the CA Community in Salesforce if:
- The intermediate certificate has the Extended Key Usage (EKU) extension and 
the EKU does not include any of these KeyPurposeIds: anyExtendedKeyUsage, 
id-kp-serverAuth; or
- The EKU extension in the intermediate certificate includes the 
anyExtendedKeyUsage or id-kp-serverAuth KeyPurposeIds, and the intermediate 
certificate includes the Name Constraints extension as described in section 
7.1.5 of the CA/Browser Forum's Baseline Requirements; or
- The root certificate is not enabled with the Websites trust bit.

Records should also be added to the CA Community in Salesforce for revoked 
certificates that were capable of being used to issue new certificates, and 
which directly or transitively chain to their certificate(s) included in 
Mozilla’s CA Certificate Program and were not Technically Constrained via 
Extended Key Usage and Name Constraint settings.

If you are still unclear about which intermediate certificates your CA still 
needs to disclose in the CA Community in Salesforce, one resource for 
identifying such intermediate certificates is here: 
https://crt.sh/mozilla-disclosures#undisclosed

Regards,
Kathleen Wilson, Mozilla CA Program Manager
~~
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to