On 20/07/17 15:24, Gervase Markham via dev-security-policy wrote:
On 12/07/17 21:18, Ben Wilson wrote:
For CAs with emailProtection and proper name constraints, where would such CAs 
appear in https://crt.sh/mozilla-disclosures?  
https://crt.sh/mozilla-disclosures#constrainedother?  Or a new section of the 
list, yet to be determined?

I believe Rob has now split the list into two.

Ben, these intermediate certs should appear in https://crt.sh/mozilla-disclosures#constrained (if they've not been disclosed to CCADB).

https://crt.sh/mozilla-disclosures#constrainedother is for intermediate certs for which there is a signature chain up to a root that is trusted by Mozilla, but which are trusted for neither Server Authentication nor Secure Email. (Mostly they're Code Signing intermediates, it seems).

And for CAs where EKU contains emailProtection, what are the programmatic 
criteria that determine whether the CA will be in such list as properly name 
constrained, since the Baseline Requirements don’t cover email certificates?  
(Presumably, a properly name-constrained email CA would not require any audit.)

Rob would be able to say. But the criteria for whether an email
intermediate is properly name constrained are in Mozilla policy 2.5.

The purpose of the https://crt.sh/mozilla-disclosures page is to track compliance with the Mozilla Root Store Policy. BRs, or the lack of them, are only relevant to this page insofar as the Mozilla Root Store Policy says they're relevant.

So yes, this page uses the criteria from Mozilla Root Store Policy v2.5.

--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to