RE: Do We Now Require Separate Cross-certificates for SSL and S/MIME?

2018-07-13 Thread Tim Hollebeek via dev-security-policy
Yeah, I agree I don’t think it was intended. But now that I am aware of the issue, I think the crossing workaround per EKU is actually a good thing for people to be doing. Unless someone can point out why it's bad ... Might want to give people a little more time to plan and adapt to that

Re: Chunghwa Telecom eCA Root Inclusion Request

2018-07-13 Thread Ryan Sleevi via dev-security-policy
On Sat, Jul 14, 2018 at 2:16 AM Wayne Thayer via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > On Fri, Jul 13, 2018 at 3:03 AM lcchen.cissp--- via dev-security-policy < > dev-security-policy@lists.mozilla.org> wrote: > > > Dear Wayne, > > > >Those programs for checking

Re: Chunghwa Telecom eCA Root Inclusion Request

2018-07-13 Thread Wayne Thayer via dev-security-policy
On Fri, Jul 13, 2018 at 3:03 AM lcchen.cissp--- via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > Dear Wayne, > >Those programs for checking field of ToBeSign SSL certificate are > online on June 22. > >We suggest that CA "in principle" must comply with the string

Re: Do We Now Require Separate Cross-certificates for SSL and S/MIME?

2018-07-13 Thread Bruce via dev-security-policy
Agreed that old cross-certificates will not be impacted, but this does impact new cross-certificates. I assume the work around would be to just issue more than one cross-certificate with different EKUs, but I don't assume that was intended by this policy change. Bruce. On Friday, July 13,

RE: Do We Now Require Separate Cross-certificates for SSL and S/MIME?

2018-07-13 Thread Tim Hollebeek via dev-security-policy
Doesn't the "created after January 1, 2019" mean that there is no problem with old crosses? It would just be a new policy for new crosses as of next year? -Tim > -Original Message- > From: dev-security-policy [mailto:dev-security-policy- >

Re: Chunghwa Telecom eCA Root Inclusion Request

2018-07-13 Thread Kurt Roeckx via dev-security-policy
On 2018-07-13 12:02, lcchen.ci...@gmail.com wrote: We suggest that CA "in principle" must comply with the string length limit of RFC 5280 for organizationalUnitName or organizationName filed in Subject of a certificate. But if it is necessary after verification to express an organization’s

Re: Chunghwa Telecom eCA Root Inclusion Request

2018-07-13 Thread lcchen.cissp--- via dev-security-policy
Dear Wayne, Those programs for checking field of ToBeSign SSL certificate are online on June 22. We suggest that CA "in principle" must comply with the string length limit of RFC 5280 for organizationalUnitName or organizationName filed in Subject of a certificate. But if it is