Andrew Ayer filed two bugs yesterday [1] [2] that might be worthy of a bit
of discussion. They both appear to be in reference to root certificates
included in the Mozilla program that are cross-signed by a different TSP
(CA). In both cases the TSP that signed the cross-certificate has had it
audited, and disclosed it in CCADB as operating under their own CPS.

For example:
TSP 1 has Root A (subject A, issuer A, public key A) included in the
Mozilla root store
TSP 2 has Root B (subject B, issuer B, public key B) also included in the
Mozilla root store
TSP 2 has signed a cross certificate (subject A, issuer B, public key A)
with Root B.
TSP 2 has disclosed the cross-certificate in CCADB, has it included in
their audit, and asserts that it is operated under their CP/CPS.

One issue, that I recall having been been previously discussed, is that TSP
1 has no way of knowing if another TSP has cross-signed one of their CA
certificates, so it makes sense to require disclosure from the TSP that
issued the cross-certificate.

I think Andrew is asserting that the cross-certificate is really operated
by the root TSP that is in control of the key-pair (TSP 1), and should be
audited and disclosed as such. Should that be our policy?

A secondary question is if the disclosures made by GoDaddy and Sectigo and
documented the bugs filed by Andrew violate our current policies?

- Wayne

[1] https://bugzilla.mozilla.org/show_bug.cgi?id=1567060
[2] https://bugzilla.mozilla.org/show_bug.cgi?id=1567061
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to