Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

"capable of being used to" vs "intended to be used to"

43 views
Skip to first unread message

Rob Stradling

unread,
Jun 17, 2016, 8:11:46 AM6/17/16
to mozilla-dev-s...@lists.mozilla.org
Kathleen,

"Mozilla plans to add automation that will use the intermediate
certificate data in Salesforce to create a whitelist of
non-technically-constrained intermediate certificates chaining up to
root certificates in Mozilla's program" [1]

There are many disclosed intermediate certificates that are not intended
to be used to issue id-kp-serverAuth certificates, but which
nevertheless are technically capable of issuing such certificates.
(Example: https://crt.sh/?id=12721488 "GlobalSign Timestamping CA - G2")

Requiring disclosure of such intermediate certificates is perfectly
reasonable. However, ISTM that there is no good reason to whitelist
such intermediates.

So how about adding a tickbox to Salesforce, for each intermediate
certificate, which is unticked by default and is labelled "Not intended
to issue id-kp-serverAuth certs" ?

Then you could use this field to omit unnecessary entries from the
future whitelist, which would help to reduce the attack surface (e.g.
Imagine if the "GlobalSign Timestamping CA - G2" was compromised and the
attacker used it to issue an id-kp-serverAuth cert for www.mozilla.org).


[1]
https://wiki.mozilla.org/CA:SalesforceCommunity#Which_intermediate_certificate_data_should_CAs_add_to_Salesforce.3F


P.S. Once SHA-1 is no longer permitted in unexpired publicly-trusted TLS
certs, you'll be able to omit the (large) number of SHA-1 intermediate
certs from the whitelist too.

--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online

0 new messages