On Wed, May 8, 2019 at 10:36 PM Jakob Bohm via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> [ Note, I am arguing a neutral position on the specific proposal ]
>
> The common purpose of having an internally secured (managed or on-site)
> CA in a public hierarchy is to have end certificates which are
> simultaneously:
>

Despite my years of close experience with the implementation and details of
the certificate verification engines within Google Chrome and Android,
Mozilla Firefox, Apple iOS and macOS, and Microsoft Windows, including
extensive work with Enterprise PKIs, I must admit, I have never heard of
the scenario you're describing or actually being supported.

Given that the remark is that such a desire is common, perhaps you can
provide some external references documenting how one might go about
configuring such a set-up, particularly in the context of TLS trust?
Similarly, I'm not aware of any system that supports binding S/MIME
identities to a particularly CA (effectively, CA pinning) - perhaps you can
provide documentation and reference for systems that perform this?

Thanks for helping me understand how this 'common' scenario is actually
implemented, especially given that the underlying codebases do not support
such distinctions.
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to