All,
Here for comment is a first draft of a proposal to phase-out multi-purpose root CA certificates. This is tied to GitHub Issue #279, referenced in the subject line above.
This proposal is that a new Section 7.5 be added to the Mozilla Root Store Policy (MRSP). Other conforming changes would be made elsewhere in the MRSP to remove any implication that a root CA certificate could have both the websites trust bit and the email-protection trust bit after January 1, 2027.
Please provide any comments or suggestions you might have to improve or change this proposal.
Thanks,
Ben
7.5 Dedicated Root Certificates
Effective immediately, all root CA certificates being considered for inclusion in Mozilla's Root Store MUST be dedicated either to TLS server authentication or to S/MIME email protection. Existing root CA certificates that do not comply with this requirement MUST be replaced or transition to a dedicated hierarchy prior to January 1, 2027.
7.5.1 TLS Server Authentication Roots
Root CA certificates dedicated to TLS server authentication with the websites trust bit enabled MUST meet the following criteria:
7.5.2 S/MIME Roots
Root CA certificates dedicated to S/MIME with the email protection trust bit enabled MUST meet the following criteria:
7.5.3 Transition Plan for Existing Multi-Purpose Roots
Root CA certificates included in Mozilla's Root Store as of January 1, 2025, with both the websites and the email trust bits enabled, MAY continue to be trusted after January 1, 2026, if by such date the CA operator has submitted a transition plan that demonstrates a feasible migration to a dedicated hierarchy that will be completed prior to January 1, 2027.
Transition plans MUST address the following:
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaYWFREw%2B0KOU61bVgjZXxHZuvQyXmQDSbMgMZqVk18FTQ%40mail.gmail.com.
Ben,
As Jeremy also pointed out, the proposed deadline seems too strict for S/MIME purposes.
I’m assuming this will be done the same way as with the root deprecation based on key creation date, in that Mozilla will disable trust bits for roots on or after January 1, 2027. If so, S/MIME is already in trouble.
Even for the Multipurpose and Strict profiles, which allow issuance for 2 years (825 days). Any certificate issued based on those profiles today for the maximum term, would expire in 2027, i.e. past the stated deadline.
Regards,
Martijn Katerbarg
Sectigo
To view this discussion visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/83193857-0c75-4935-8002-1b846d560552n%40mozilla.org.
7.5 Dedicated Root Certificates
All root CA certificates added to Mozilla's Root Store after January 1, 2025, will only be trusted for either TLS server authentication (websites trust bit) or S/MIME email protection (email trust bit). Existing root CA certificates that do not comply with this requirement MUST transition to one or the other prior to December 31, 2028, i.e., by having one of their trust bits (websites or email) removed.
7.5.1 TLS Server Authentication Roots
Subordinate CA and end entity certificates issued under a Root CA certificate added after January 1, 2025, with the websites trust bit enabled, MUST include an extendedKeyUsage extension that asserts only id-kp-serverAuth or both id-kp-serverAuth and id-kp-clientAuth. They MUST NOT share a public key with any certificate that asserts any other extendedKeyUsage values.
7.5.2 S/MIME Roots
Subordinate CA and end entity certificates issued under a Root CA certificate added after January 1, 2025, with the email trust bit enabled MUST include an extendedKeyUsage extension that asserts id-kp-emailProtection. They MAY include other extendedKeyUsages, but they MUST NOT include extendedKeyUsages of id-kp-serverAuth, id-kp-codeSigning, id-kp-timeStamping, or anyExtendedKeyUsage. They MUST NOT share a public key with any certificate that asserts any other extendedKeyUsage values.
7.5.3 Transition Plan for Existing Roots
Root CA certificates included in Mozilla's Root Store as of January 1, 2025, that have both the websites and the email trust bits enabled MAY remain trusted after April 15, 2026, if the CA operator has submitted a transition plan by April 15, 2026, to migrate to dedicated hierarchies by December 31, 2028.
Transition plans MAY include:
To view this discussion visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/cefa00db-a7cd-4ea9-83b0-006c01ec5e3dn%40mozilla.org.
7.5 Dedicated Root Certificates
All root CA certificates added to Mozilla's Root Store after January 1, 2025, will only be trusted for either TLS server authentication (websites trust bit) or S/MIME email protection (email trust bit). Existing root CA certificates that do not comply with this requirement MUST transition to one or the other prior to December 31, 2028, i.e., by having one of their trust bits (websites or email) removed.
7.5.1 Server Authentication Hierarchies
Subordinate CA and end entity certificates issued under a Root CA certificate added after January 1, 2025, with the websites trust bit enabled MUST include an extendedKeyUsage extension that asserts only id-kp-serverAuth or both id-kp-serverAuth and id-kp-clientAuth.
7.5.2 S/MIME Hierarchies
Subordinate CA and end entity certificates issued under a Root CA certificate added after January 1, 2025, with the email trust bit enabled MUST include an extendedKeyUsage extension that asserts id-kp-emailProtection. They MAY include other extendedKeyUsages, but they MUST NOT include extendedKeyUsages of id-kp-serverAuth, id-kp-codeSigning, id-kp-timeStamping, or anyExtendedKeyUsage.
7.5.3 Transition Plan for Existing Roots
Root CA certificates included in Mozilla's Root Store as of January 1, 2025, that have both the websites and the email trust bits enabled MAY remain trusted after April 15, 2026, if the CA operator has submitted a transition plan by April 15, 2026, to migrate to dedicated hierarchies by December 31, 2028.
Transition plans MAY include:
Hey Ben,
Just a minor suggestion. In sections 7.5.1 and 7.5.2, we’re saying that all CA and “end entity certificates” must contain the applicable EKU. How do we classify OCSP signing certificates, are they “end entity certificates”? If so, then we should make a carve out for those, correct? Are there any other types of certificates that CAs need to issue under dedicated roots like this? I can’t think of any.
For my own educational benefit… In section 7.5.2, what EKUs other than id-kp-emailProtection and perhaps id-kp-clientAuth would ever be needed in an S/MIME dedicated hierarchy? RFC5280 has specific requirements around the hierarchical aspects of Certificate Policy (In a CA certificate, these policy information terms limit the set of policies for certification paths that include this certificate.), but there is no similar requirement around EKUs. Is there ever a need to supply EKUs outside of the set that browsers and root programs have applied this hierarchical rule to (basically the list that is in the current section)? If not, then I would change this:
To this:
Lastly, in section 7.5.3, can you say what happens when the trust bits are disabled in 2026 or 2028? Is this when CAs must stop issuing certificates, or is this when any certificate under that hierarchy is no longer trusted no matter when it was issued? Historically this is when they won’t be trusted in Mozilla while Chrome uses the SCTNotAfter date that aligns with when the certificate was issued. It’s hard to merge Mozilla and Chrom requirements into a CA action plan when this happens. It would be awesome if the Mozilla and Chrome policies aligned so it would be easier to understand all of these applicable milestones. And if Apple and Microsoft have similar plans, it would be great if they also pick up the same timelines for moving to dedicated roots. One timeline with the same rules per root type.
Doug
Doug