On 03/12/2016 09:34, lcchen.ci...@gmail.com wrote:
Kathleen Wilson於 2016年11月15日星期二 UTC+8上午9時20分09秒寫道:
All,
I will greatly appreciate it if you will review this request from Government of
Taiwan, Government Root Certification Authority (GRCA) to include their
Government Root Certification Authority root certificate, and turn on the
Websites and Email trust bits. This root cert will eventually replace the
previous GRCA root certificate that was included via Bugzilla Bug #274106.
Thanks,
Kathleen
In CA/Browser Forum 34th F2F meeting, the minutes is in
https://cabforum.org/2015/03/11/2015-03-11-minutes-of-cupertino-f2f-meeting-34/. Li-Chun Chen
(me) of Chunghwa Telecom presented a discussion about "behaviors of web servers and
browsers if a PKI follows RFC 4210 & RFC 5280 6.1 for Root CA key Update". The
presentation file is in
https://cabforum.org/wp-content/uploads/Chunghwatelecom201503cabforumV4.pdf.
I explained the rollover certificate process outlined in RFC 4210 by signing the old public
key with the new private key and the new public key with the old private key. I also gave
the definition of Self-issued certificates (Self-issued certificates are generated to
support changes in policy or operations. So there will be values in certificate policies
extension filed of self-issued certificates) and Self-signed certificates (CA certificates
in which the issuer and subject are the same entity. For a Root CA self-signed certficae,
there will be no value in certificate policies extension.) as RFC 5280. Following RFC 5280
6.1, a certificate is self-issued if the same DN appears in the subject and issuer fields.
The Taiwanese Government Root CA (GRCA) has switched over from SHA1 to SHA256 (in 2012),
but we have encountered IIS issues following the processes found in the RFCs. See Slide
pp.8-pp.13. IIS 7 falsely treated GRCA’s Self-Issued certificate (new with old) as a
Self-Signed certificate, because it has the same issuer and subject name. We found SSL
Cert –> GCA Cert –> new-with-old GRCA Cert –> old GRCA cert in IIS side, but IIS
only sends SSL Cert –> GCA Cert to client. For Mozilla Firefox, it uses its own trust
list and it only trusts old GRCA and new GRCA is waiting to be built in NSS. So there are
lots of complaints of Firefox users connected to IIS sites. Because Windows clients support
AIA chasing there are less chaining problems.
Chunghwa Telecom requested Microsoft to solve the bug of IIS ASAP through
Premium support last spring. But until now Microsoft IIS team has not yet solve
the bug.
Chunghwa Telecom suggested to make AIA mandatory and browsers must support
fetching intermediate certificates through AIA. Supporting AIA will also reduce
some web site administrators forget to install intermediate certificates to their
server follow CAs or web server’s manuals. (In SSL protocol, SSL servers should
send intermediate certificate & SSL certificate to SSL client)
It seems that Mozilla Firefox has not yet suppot AIA. So the best solution to
solve the bug is to include the new Taiwna Government Root Certification
Authority root certificate in Mozilla NSS, and turn on the Websites and Email
trust bits. It will significantly reduces complaints from Mozilla User and
administrators of Taiwan government entities's websites that use IIS.
In CA/Browser Form 34th F2F meeting minutes, There are [ Additionally, Brian
Smith commented separately via email, “It is also possible, and recommended,
for the rollover certificate to be added to Firefox’s certificate store. Then
Firefox will be able to use it even if IIS doesn’t send it.”]
You have made a fundamental technical mistake.
Using two different public keys with the same exact full distinguished
name is generally not expected to work. Some implementations may use
additional checks (such as the key identifier or certificate serial
number) to disambiguate, but this is generally known to be a frequent
cause of errors and bugs, such as the ones observed in your
presentation.
All in all, the "self-issued but not self-signed" concept never worked
and is effectively dead.
Asking for mandatory AIA is a bad solution.
Maybe you need to generate a new third generation "Taiwan-GRCA 2016"
root with a unique name, along with the needed "2016 with 2016", "2016
with 2012" and "2016 with original" certificates, such that web servers
can send at least one valid chain. IIS could send the chain that ends
in "2016 with original" (by installing that cert to the
machine\Intermediaries part of the Windows certificate store and not
installing the "2016 with 2016" cert on the IIS server), while Apache
can send a list that ends with all 3 2016 certificates. The AIA cert
download URL in certificates issued by 2016 would probably have to
return "2016 with 2012", while the AIA cert download URL in "2016 with
2012" would return "2012 with original", this is based on the assumption
that AIA-supporting browsers will check for trusted certs before
attempting AIA download and that the most widespread
AIA-supporting browsers will not be confused by the self-issued "2012
with original" cert.
To ensure a pure SHA-256 chain when chaining all the way back to the
original, it is advisable (if it can be done securely, as is not the
case with ECC and DSA), for the "2012 with original" and "2016 with
original" certificates to be signed using SHA-256 and the original key
pair.
When providing repudiation/revocation checks for end certificates
issued using SHA-1 by the original private key, these checks should be
signed by dedicated SHA-1 "CRL signing" and "OCSP signing" certificates
issued using SHA-1 by the original private key, which (under the
current twisted CA/B forum rules) implies that the "original with 2012"
certificate needs to be revoked and that a special CA/B forum
permission is needed to issue/renew the revocation SHA-1 certificates
while the original certificate is still trusted by any CA/B member
browser. Certificates issued by the original key pair using SHA-256,
such as, usually, the "2012 with original" and "2016 with original"
certificates) should point to different CRL and OCSP URLs that are
signed with SHA-256, but still reports all the old revoked SHA-1 certs.
P.S.
Be careful when revoking the "original with 2012" certificate, when
GlobalSign recently did the same with their similar "R1 with R3"
certificate, it triggered a bug in their OCSP server solution which
suddenly told all clients that a lot of other certificates were also
revoked.
Enjoy
Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy