Re: EKU is required in each Subordinate CA certificate

2020-08-29 Thread Ryan Sleevi via dev-security-policy
Glad to see you paying close attention to the Baseline Requirements changes!

On Thu, Aug 27, 2020 at 1:34 PM Sándor dr. Szőke via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> Yes, that date comes from the Mozilla Root Program, but this requirement
> is new for the other Root Programs and for the BR.
>

No, it's not. It's been a part of Microsoft's root program for even longer
than Mozilla's, at
https://docs.microsoft.com/en-us/security/trusted-root/program-requirements

You can see this all discussed in the CA/B Forum as part of the ballot, if
you need any assistance understanding where a change came from.


> The other thing is that without having an indicated effect date, the
> requirement can be interpreted in that way, that every valid Subordinate CA
> certificate shall comply this requirement, even if it has been issued years
> ago.
>

No, this is not correct. If you look closely at the changes that have been
made to the BRs in the past, particularly around cleanup ballots, it's to
remove effective dates that are in the past.

The BRs describe what to do at time of issuance. They have always done just
that.


> I would just like to get  confirmation  that this requirement does not
> mean that all subordinate CA certificates that are currently non-compliant
> shall be revoked, which were issued prior to the effective date.
>

You'll need to work with your root program. Mozilla's effective date is
just as it is stated, and Mozilla's policy says you are supposed to revoke
if you violate a root program requirement, as per
https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/


If you've misissued according to another program, which may have an earlier
date, you should work with that root program to figure the expectations for
how to handle root program violations.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: EKU is required in each Subordinate CA certificate

2020-08-27 Thread Sándor dr . Szőke via dev-security-policy
Yes, that date comes from the Mozilla Root Program, but this requirement is new 
for the other Root Programs and for the BR.

The other thing is that without having an indicated effect date, the 
requirement can be interpreted in that way, that every valid Subordinate CA 
certificate shall comply this requirement, even if it has been issued years ago.

I would just like to get  confirmation  that this requirement does not mean 
that all subordinate CA certificates that are currently non-compliant shall be 
revoked, which were issued prior to the effective date.

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


EKU is required in each Subordinate CA certificate

2020-08-27 Thread Sándor dr . Szőke via dev-security-policy
You could find the following requirement in the latest Baseline Requirement:

7. CERTIFICATE, CRL, AND OCSP PROFILES
7.1 Certificate profile
7.1.2 Certificate Content and Extensions; Application of RFC 5280
7.1.2.2 Subordinate CA Certificate
...
g. extkeyUsage (optional/required)
For Cross Certificates ...
For all other Subordinate CA Certificates, including Technically Constrained 
Subordinate CA Certificates:
This extension MUST be present and SHOULD NOT be marked critical.
...

If I understand this requirement correctly, each Subordinate CA certificate 
(excluding the above mentioned Cross Certificates) shall contain the EKU 
extension.

Does it mean that all Subordinate CA certificates issued after a specific date 
shall contain the EKU extension?
What is the effect date of this requirement?
Is it 20 August 2020, as the issue date of this version of the Baseline 
Requirement?
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy