I thought that the EKU "id-kp-OCSPSigning" was for the OCSP responder certificate itself (not the CA that issues the OCSP responder certificate). I don't think I've encountered a problem before, but I guess it would depend on the implementation?
-----Original Message----- From: dev-security-policy <[email protected]> On Behalf Of Ryan Sleevi via dev-security-policy Sent: Wednesday, September 4, 2019 9:01 AM To: [email protected] Cc: mozilla-dev-security-policy <[email protected]> Subject: Re: Question about the issuance of OCSP Responder Certificates by technically constrained CAs On Wed, Sep 4, 2019 at 9:47 AM Peter Mate, Erdosi via dev-security-policy < [email protected]> wrote: > My question is the following: is it allowed to issue an OCSP Responder > certificate with "id-kp-OCSPSigning" EKU from a technically > constrained CA if the "id-kp-OCSPSigning" EKU is not listed in the CA > certificate, This will fail, not because of policy reasons, but because of technical reasons (not Firefox). The code (for Firefox) is https://dxr.mozilla.org/mozilla-central/rev/fd891e83a7cd54038b0bcebb3ab85b68 18e2550e/security/nss/lib/mozpkix/lib/pkixcheck.cpp#819-888 , with the most salient logic at https://dxr.mozilla.org/mozilla-central/rev/fd891e83a7cd54038b0bcebb3ab85b68 18e2550e/security/nss/lib/mozpkix/lib/pkixcheck.cpp#873-884 , although the explanation in https://dxr.mozilla.org/mozilla-central/rev/fd891e83a7cd54038b0bcebb3ab85b68 18e2550e/security/nss/lib/mozpkix/lib/pkixcheck.cpp#863-869 explains the technical reasons. > in other words, is the inclusion of the "id-kp-OCSPSigning" EKU a > possible, mandatory or forbidden option for such CAs? > This is not forbidden by policy. That is, a technically constrained subordinate CA certificate can have id-kp-OCSPSigning and id-kp-serverAuth. As I see in the practice, if a technically constrained CA signs the OCSP > response itself, it can be done without the "id-kp-OCSPSigning" EKU > but with the "digitalSignature" KU bit in the CA certificate. > Correct, if the id-kp-OCSPSigning EKU is missing from the technically constrained intermediate, direct signing still works. _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

