--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/dcb791eb-4754-4389-a0ca-2551c9d55a7an%40mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CAAbOY9JW0iMxdKBQZsBTKprZ40_p1pi5grsiLgbEjV1VrbCikw%40mail.gmail.com.
Agreed that this is allowed by the BRs. However, MRSP section 5.3 says:
“Intermediate certificates created after January 1, 2019, with the exception of cross-certificates that share a private key with a corresponding root certificate:
MUST contain an EKU extension;
MUST NOT include the anyExtendedKeyUsage KeyPurposeId; and
MUST NOT include both the id-kp-serverAuth and id-kp-emailProtection KeyPurposeIds in the same certificate.”
So, although this EKU-less cross-certificate issued to CA Gamma is perfectly compliant with the BRs, it would run afoul of MRSP as CA Gamma’s key is not certified by a root certificate in the Mozilla root store.
Thanks,
Corey
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CAEmnErcdThaHFDVYem3Sa6GXGJH5peP0sH9XfBO7aa3av2CqyA%40mail.gmail.com.
Aug 8, 2023 23:27:13 'Corey Bonnell' via dev-secur...@mozilla.org <dev-secur...@mozilla.org>:
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/DM6PR14MB2186AF17B2A0D30DBC6C2B90920DA%40DM6PR14MB2186.namprd14.prod.outlook.com.
BR 6.1.7 has the following set of restrictions of Root CA Private Keys:
“Private Keys corresponding to Root Certificates MUST NOT be used to sign Certificates except in
the following cases:
1. Self‐signed Certificates to represent the Root CA itself;
2. Certificates for Subordinate CAs and Cross‐Certified Subordinate CA Certificates;
3. Certificates for infrastructure purposes (administrative role certificates, internal CA
operational device certificates); and
4. Certificates for OCSP Response verification”
The CA issuing such a self-signed Root Certificate is a statement that the keypair in question will be used in accordance with BR 6.1.7. Notably, 6.1.7 does not allow the issuance of end-entity TLS certificates, so I doubt this loophole in the BRs would ever be (ab)used by a CA in practice.
Thanks,
Corey