In version 2.6 of our Root Store Policy, we added the requirement to
section 5.3 that intermediate certificates contain an EKU and separate
serverAuth and emailProtection uses. Version 2.6.1 updated the requirement
to exclude cross certificates [1]. Last month, an issue [2] was filed
requesting that we add "Policy Certification Authorities" (PCAs) as another
exception.

PCAs are described in RFC 5280 as a CA certificate that is only used to
issue other CA certificates, so excluding PCAs from this requirement would
not in theory weaken it. However, I'm not aware of any way to technically
enforce that PCAs not issue end-entity certificates, and allowing more
exceptions would seem to make this policy more difficult to enforce. In
addition, RFC 5280 section 3.2 appears to reference PCAs as an example of
an architecture that should be abandoned in favor of x509v3 certificate
extensions:

   With X.509 v3, most of the requirements addressed by RFC 1422 can be
   addressed using certificate extensions, without a need to restrict
   the CA structures used.  In particular, the certificate extensions
   relating to certificate policies obviate the need for PCAs...

This is https://github.com/mozilla/pkipolicy/issues/172

I will appreciate everyone's input on this proposal.

- Wayne

[1]
https://github.com/mozilla/pkipolicy/commit/a8353e12db6128d9a01de7ab94949180115a2d92
[2] https://github.com/mozilla/pkipolicy/issues/172
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to