Re: TLS certificates for ECIES keys

2020-11-12 Thread Bailey Basile via dev-security-policy
Sorry! It looks like the attachments didn't come through. Here's each chain: Prio Statistics Facilitator_ XX.chain.pem -BEGIN CERTIFICATE- MIIDmTCCAz+gAwIBAgIQVUMIP1vPOWm3Rozjmb8qYzAKBggqhkjOPQQDAjBZMTUw MwYDVQQDDCxUZXN0IEFwcGxlIEFwcGxpY2F0aW9uIEludGVncmF0aW9uIENBIDYg

Re: TLS certificates for ECIES keys

2020-11-12 Thread Bailey Basile via dev-security-policy
Hi, all, Thank you for your feedback on this project. In order to address your comments, we have adjusted our design and implementation so that publicly-trusted certificates are no longer used and have modified our use of Certificate Transparency. All certificates for encrypting data for Prio

Re: TLS certificates for ECIES keys

2020-10-30 Thread Bailey Basile via dev-security-policy
Hi, Matt, We thought hard about the agility concerns for this particular application and the impact to the WebPKI and CT ecosystems. First, all certificates involved in this design are checked for expiration, revocation, and Certificate Transparency using all of the same logic that verifies

Re: TLS certificates for ECIES keys

2020-10-30 Thread Bailey Basile via dev-security-policy
Ryan, Thank you for the questions. Answers in line. Bailey On Friday, October 30, 2020 at 8:43:46 AM UTC-7, Ryan Sleevi wrote: > On Thu, Oct 29, 2020 at 2:07 PM Jacob Hoffman-Andrews via > dev-security-policy wrote: > > > The processor sends the resulting TLS certificate to Apple. Apple

Re: TLS certificates for ECIES keys

2020-10-31 Thread Bailey Basile via dev-security-policy
: > On Fri, Oct 30, 2020 at 10:49 AM Bailey Basile via dev-security-policy < > dev-secur...@lists.mozilla.org> wrote: > > > > > We specifically chose not to issue Apple certificates for these keys > > because we did not want users to have to trust only Apple's assertion

Re: TLS certificates for ECIES keys

2020-10-31 Thread Bailey Basile via dev-security-policy
Hi, Devon, The policy that evaluates the publicly-trusted certificates (note that there is no requirement that ISRG be the issuer for these certificates) does require id-kp-serverAuth. Yes, changing to a non-TLS certificate would require a change to the Apple clients and would require an