Eddy Nigg (StartCom Ltd.) wrote:
> Except of the Mozilla CA policy suggesting to use intermediate CA 
> certificates or different roots according to different policies , 
> doesn't EV *require* the usage of intermediate CAs (no direct issuance)? 
> Does anybody know from memory about this? Else I'll look it up...

I looked it up just now. The EV guidelines do not contain the term 
"intermediate" CA, but do have several references to subordinate CAs. 
The guidelines specify how subordinate CAs must be set up for use with 
EV; basically, the subordinate CA certificate has to have a 
certificatePolicies extension marked as non-critical and containing 
either the EV policy OID or the special anyPolicy value. However as far 
as I can tell it is not mandatory to use a subordinate CA; there seems 
to be nothing in the guidelines that prevents issuing EV certificates 
directly from the root.

Regarding the Mozilla CA policy, the language in the policy (section 13) 
is a recommendation only, because we couldn't reach consensus on making 
it mandatory. Also, recall that the purpose of the recommendation was 
"so that we or others may selectively enable or disable acceptance of 
certificates issued according to a particular policy, or may otherwise 
treat such certificates differently (e.g., in our products' user 
interfaces)." Arguably the use of EV policy OIDs can accomplish this 
same purpose, albeit in a slightly different way.

In particular, for a CA issuing both EV and non-EV SSL certs, we could 
(at least in theory) choose any of the following options:

1. Support both EV and non-EV certs from that CA, by recognizing the EV 
policy OID and using a different UI for the different types of certs.
2. Recognize only EV certs from that CA, by rejecting certs without the 
EV policy OID.
3. Recognize only non-EV certs from that CA, by rejecting certs with the 
EV policy OID.
4. Treat EV certs from that CA as non-EV certs, by ignoring the EV 
policy OID.

All of the above options could be implemented without requiring the use 
of separate roots (or separate intermediate CAs) for EV vs. non-EV 
certs. Granted, we don't currently have a preferences UI to allow end 
users to select these options, but that's ultimately our problem, not 
the CA's.

Frank

-- 
Frank Hecker
[EMAIL PROTECTED]
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to