Hi Ben,
A scenario came to mind that may deserve further clarity in the text, so I wanted to raise it here. Suppose Root CA “A” kicks off the information-gathering and review process for Sub CA “B” (as outlined on the Wiki page) for the issuance of a subordinate CA certificate containing solely id-kp-emailProtection. The discussion ends favorably and Sub CA B is marked in CCADB as an “approved” organization. Some time later, Sub CA B wishes to obtain a subordinate certificate containing id-kp-serverAuth. Since this organization has previously been approved, according to the proposed language, there is no need to undergo the review and approval process again despite the difference in technical capability and audit requirements of the subordinate CAs.
Is this an accurate read of the proposed language?
Thanks,
Corey
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaZX%2B_vWSyZe2tMGREjurRRV7y66AVMQyLkPz8LE4BbsUw%40mail.gmail.com.
Hi Ben,
I think the expectation can be clarified by amending the paragraph starting with “The process outlined herein applies to subCA operators not already in the Mozilla root program”. I suggest explicitly mentioning the three different types of trust, namely Email, (non-EV) Websites, and EV Websites and requiring the process be followed whenever an organization is to receive a subCA certificate that grants one or more of those technical capabilities that the organization did not have in the Mozilla root program. As a concrete proposal:
“The process outlined herein applies to organizations that do not control a Root or subCA certificate trusted by the Mozilla root program. Additionally, the process outlined herein applies to organizations that control a subCA or Root CA certificate in Mozilla’s root program but the new subCA certificate will grant technical capability for the issuance of additional types of certificates. Specifically, the process outlined herein MUST be followed when an organization does not control a subCA or Root CA certificate that grants capability to issue certificates of one or more of the following types and the new subCA certificate will grant such capability: S/MIME (Email trust bit), (DV/IV/OV) TLS Server Authentication (Websites trust bit), and/or EV TLS Server Authentication (Websites trust bit with EV-enablement).”
Thanks,
Corey
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/DM6PR14MB2186D6FBA3B3CC7FD7EAF7C492949%40DM6PR14MB2186.namprd14.prod.outlook.com.
> Is it necessary to start a new discussion every time a new CA Certificate is about to be issued for that same type and class, or not ? Ben, would it make sense to add a new section to address this issue so there is no confusion?
One major downside of mandating a public discussion for the issuance of a subCA certificate of the same type and class is one of agility: the requirement for public discussion would be a disincentive for shorter subCA certificate validity periods. Additionally, if revocation is required for a subCA certificate, the requirement for a public discussion and approval for its replacement would likely be an impediment to the timely revocation and replacement process.
Thanks,
Corey
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/DM6PR14MB21865C2697186531420A39FD92949%40DM6PR14MB2186.namprd14.prod.outlook.com.
Also, where would the information about the unconstrained external SubCAs that have passed public discussion and have been approved or denied be located?
Thanks,
Dimitris.
"Unconstrained SubCA Discussion" |
---|
And, if a new or modified CA certificate is to be issued to the same operator having already undergone the full process for the type of end entity certificates being issued, then there is no need to repeat this process.
For example, if the prior process only involved a review for issuance of email certificates, and the CA operator then wants a CA certificate with the serverAuth EKU in order to issue server certificates, then that part of the review process not fully performed must be repeated because of the different requirements and performance expectations. And vice versa, if the CA operator were first approved to issue server certificates and then wanted a CA certificate with the emailProtection EKU to issue email certificates, then any relevant part of the review process that was missed would need to be performed.