Frank Hecker wrote: > Nelson B Bolyard wrote: >> Frank Hecker wrote: >>> For the record, I am pretty sure that we have CAs already in the >>> root list that have issued test certs under their hierarchies. >>> IIRC the last instance of this I saw was a CA that had a >>> subordinate CA used to testing purposes, under the root CA that >>> we include. > <snip> >> Please elaborate. What CA did that? >> Is the subordinate CA that did so still valid (unexpired)? > > I have no idea. This is just a vague remembrance on my part, and I > can't vouch for its accuracy. > >> IMO, this is a serious enough breach that it warrants calling for the >> removal of the CA that did it. If the subordinate CA is still valid >> and is not revoked, this calls for drastic action. > > Let's ignore for a moment the question of whether a CA did this or > not (because as I noted above, my recollection may be faulty). I'm > still unclear on why issuing issuing one or more test certs from a > CA hierarchy is in and of itself a problem, *irrespective of the > circumstances under which they were issued*. I'm not referring to > issuing test certs to people outside the CA, in a way that bypasses > normal controls; that's clearly out of bounds.
And, That's the scenario of concern, the one that's "out of bounds". > I'm talking about internal testing by the CA's operations staff. As long as there are sufficient controls on such internal CA testing, that's fine. > If I'm running a CA, and I want to test my procedures for issuing > certs, then what's the problem with having my internal staff issue > a test cert under a given hierarchy, in order to verify technical > details, compatibility with applications, etc., and then destroying > the private key for the cert to ensure it can't be further used? > You're telling me that no one at a CA has ever done this, and should > never do it? No, I'm not talking about controlled CA testing. The case of which I had previously heard was of a corporate CA that was subordinate to a public root CA that was trusted in Mozilla, but expired a few years ago. The corporate CA issued two subordinate CA certs to subordinate internal corporate CAs. One of those internal CAs was intended to issue official SSL server certs for use by official company internal SSL servers, and applications for certs from that CA were verified for authenticity and required management approval for issuance (or so I was told). The other of those two internal subordinate CAs was a "Test CA". It was available to all company employees and no authentication whatsoever of any information in the cert was performed. Employees could instantly get SSL server certs for any DNS name of their choosing within the company's own domains and subdomains. Certs from the test CA locked the browser's lock icon just as well as certs from the official CA, in nearly any browser on earth, and had normal validity periods, so they didn't expire soon after issuance. (The description given of TurkTrust's test CA reminded me of that, except that I'm not sure TurkTrust's test CA limits the DNS domain in which the cert can be issued.) The certs from this "test CA" contained a string in the subject name that disclaimed that the subject name was unverified (or some similar disclaimer), and the people who ran the test CA naively thought that was sufficient to prevent the test CA certs from being abused. But of course, no browser user ever looks at the actual SSL server certs unless the server cert fails to validate and causes a browser warning. If the browser shows the lock, then browser users are satisfied that the CA has done its job of authenticating the cert's subject. (TurkTrust's repeated insistence that its test certs are not recognized as valid under Turkish law reminded me of that, as if users are capable of distinguishing valid-but-not-legally-recognized certs from valid and legally recognized ones.) I suspect you can guess what happened. Fortunately, the root CA cert itself expired soon thereafter, and all the certs subordinate to that root are no longer valid. But if this ever happens again, we need to take swift action against any CA that allows that to happen, IMO. Regarding TurkTrust, if (as they say) the test certs come from a CA that chains up a separate, untrusted root, then all is well. But perhaps you could ask for a test cert and its chain, just to make sure it doesn't chain up to a to-be-trusted root? _______________________________________________ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto