>Thoughts? Disagreements? I know that Apple has already publicly shared an 
opinion <Original 
URL:&#10;https://bugzilla.mozilla.org/show_bug.cgi?id=1886467#c13&#10;&#10;Click
 to follow link.> on this matter so I'm hoping to get more feedback from 
Members here :) 

I do agree with the quoted statement. If compliance is asserted by the 
inclusion of a Policy OID, it would come into scope. If not, then indeed it 
would seem, it’s not in scope. 

To me this mainly raises the question: What is a CA allowed to do with a SubCA 
Private Key. Section 6.1.7 states what a private key corresponding to a Root 
Certificate may be used for. Do we need something similar for private keys 
corresponding to Subordinate CAs? 

Such a requirement could then indicate which type of objects may be signed 
(such as CRLs, OCSP responses, TLS certs, precerts. Since the requirements are 
related to TLS Certificates, in my opinion it would be in scope to say that a 
Subordinate CA capable of issuing TLS Certificates, may or may not issue 
clientAuth-only certificates, and if so, according to which profile. 

Regards,

Martijn 

From: Servercert-wg <servercert-wg-boun...@cabforum.org> on behalf of Dimitris 
Zacharopoulos (HARICA) via Servercert-wg <servercert-wg@cabforum.org>
Date: Tuesday, 14 May 2024 at 11:33
To: CA/B Forum Server Certificate WG Public Discussion List 
<servercert-wg@cabforum.org>
Subject: [Servercert-wg] Discussion about single-purpose client authentication 
leaf certificates issued from a server TLS Issuing CA 

CAUTION: This email originated from outside of the organization. Do not click 
links or open attachments unless you recognize the sender and know the content 
is safe. 


Dear Members,

Following-up on an interesting public incident 
<https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fbugzilla.mozilla.org%2Fshow_bug.cgi%3Fid%3D1886467%23c11&amp;data=05%7C02%7Cmartijn.katerbarg%40sectigo.com%7Ccc5e5bc3c5844518497708dc73f8f6c9%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C638512760354862106%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=WphkYw9Fbr%2FL0dqrFc83nBZLcYw2t7edPk3xMtDIz5Y%3D&amp;reserved=0>,
 I would like to have a discussion about the scope of the TLS BRs as specified 
in the SCWG Charter and in the actual TLS BRs, especially when it comes to 
single-purpose "client authentication" certificates (i.e. leaf certificates 
that include the id-kp-clientAuth and DO NOT include the id-kp-serverAuth 
KeyPurposeId in their extKeyUsage extension). 
The TLS BRs describe the profiles of Subordinate CA Certificates issued from a 
Root that is in-scope for server TLS authentication, even for the case of 
Technically-Constrained non-TLS CA Certificates. There was a lot of discussion 
about whether this is permitted based on the SCWG Charter and there was 
consensus that Browsers want to make sure that there are some minimum 
expectations about the structure of such non-TLS CA certificates, especially 
the adherence to RFC 5280. I recall that there was also consensus that whatever 
is issued off of these TC non-TLS CAs is not in scope of the TLS BRs. 
Does this seem like a fair statement about intent of the group on the 
expectations of TC non-TLS CAs and their leaf certificates? 
Technically Constrained non-TLS Issuing CAs have a defined profile in the TLS 
BRs but IMO it cannot, and should not mandate the profile of non-TLS leaf 
certificates based on the CA/Browser Forum Server Certificate Working Group 
Charter 
<https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcabforum.org%2Fworking-groups%2Fserver%2Fcharter%2F&amp;data=05%7C02%7Cmartijn.katerbarg%40sectigo.com%7Ccc5e5bc3c5844518497708dc73f8f6c9%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C638512760354875906%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=EE7jB9F8aXgkXT8pAgZExAJsuhFDwBQ%2FEmQP%2BpVxBrc%3D&amp;reserved=0>
 which states (emphasis mine): 
(a) To specify Baseline Requirements, Extended Validation Guidelines, and other 
acceptable practices for the issuance and management of TLS server certificates 
used for authenticating servers accessible through the Internet 
It gets more interesting when an Issuing CA that is technically capable of 
issuing server authentication TLS Certificates (by including the 
id-kp-serverAuth KeyPurposeId in its extKeyUsage extension), also includes the 
id-kp-clientAuth KeyPurposeId, thus being technically capable of issuing client 
authentication TLS Certificates. 
Please recall that a few years back multi-purpose Issuing CAs existed, where 
the EKU was not present, and even if it was, it allowed the inclusion of 
various KeyPurposeIds. 
Is it ok for such an Issuing CA to create a single-purpose client 
authentication TLS Certificate, one that is structured according to RFC 5280 
(thus can be successfully parsed by Relying Party RFC 5280-conformant 
software), contains an extKeyUsage extension which contains the 
id-kp-clientAuth and DOES NOT include the id-kp-serverAuth KeyPurposeId? 
My understanding is that these particular leaf certificates are allowed to be 
issued by a server TLS capable CA and they are considered out-of-scope of the 
BRs, in the sense that they are not TLS Server Certificates. The SCWG has 
accepted this "risk" with the client authentication certificates by allowing 
the co-existence of id-kp-clientAuth and id-kp-serverAuth KeyPurposeIds and the 
explicit dis-allowance of id-kp-emailProtection, id-kp-codeSigning, 
id-kp-timeStamping, anyExtendedKeyUsage in the CA Certificate profiles. 
The first paragraph of the TLS BRs (section 1.1) states: 
.....for the issuance and management of Publicly-Trusted TLS Server 
Certificates; 
Provided these certificates follow RFC 5280 and can be properly parsed, 
Browsers should never consider such certificates server TLS certificates. They 
are by design "technically constrained".

Thoughts? Disagreements? I know that Apple has already publicly shared an 
opinion 
<https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fbugzilla.mozilla.org%2Fshow_bug.cgi%3Fid%3D1886467%23c13&amp;data=05%7C02%7Cmartijn.katerbarg%40sectigo.com%7Ccc5e5bc3c5844518497708dc73f8f6c9%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C638512760354884136%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=QWqJjIw8XcHlSKQ17G9764glFPOvtujhS%2BwOtvMSuG4%3D&amp;reserved=0>
 on this matter so I'm hoping to get more feedback from Members here :)


Thanks,
Dimitris.






Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
Servercert-wg mailing list
Servercert-wg@cabforum.org
https://lists.cabforum.org/mailman/listinfo/servercert-wg

Reply via email to