Eddy Nigg (StartCom Ltd.) wrote: > Except of the Mozilla CA policy suggesting to use intermediate CA > certificates or different roots according to different policies , > doesn't EV *require* the usage of intermediate CAs (no direct issuance)? > Does anybody know from memory about this? Else I'll look it up...
I looked it up just now. The EV guidelines do not contain the term "intermediate" CA, but do have several references to subordinate CAs. The guidelines specify how subordinate CAs must be set up for use with EV; basically, the subordinate CA certificate has to have a certificatePolicies extension marked as non-critical and containing either the EV policy OID or the special anyPolicy value. However as far as I can tell it is not mandatory to use a subordinate CA; there seems to be nothing in the guidelines that prevents issuing EV certificates directly from the root. Regarding the Mozilla CA policy, the language in the policy (section 13) is a recommendation only, because we couldn't reach consensus on making it mandatory. Also, recall that the purpose of the recommendation was "so that we or others may selectively enable or disable acceptance of certificates issued according to a particular policy, or may otherwise treat such certificates differently (e.g., in our products' user interfaces)." Arguably the use of EV policy OIDs can accomplish this same purpose, albeit in a slightly different way. In particular, for a CA issuing both EV and non-EV SSL certs, we could (at least in theory) choose any of the following options: 1. Support both EV and non-EV certs from that CA, by recognizing the EV policy OID and using a different UI for the different types of certs. 2. Recognize only EV certs from that CA, by rejecting certs without the EV policy OID. 3. Recognize only non-EV certs from that CA, by rejecting certs with the EV policy OID. 4. Treat EV certs from that CA as non-EV certs, by ignoring the EV policy OID. All of the above options could be implemented without requiring the use of separate roots (or separate intermediate CAs) for EV vs. non-EV certs. Granted, we don't currently have a preferences UI to allow end users to select these options, but that's ultimately our problem, not the CA's. Frank -- Frank Hecker [EMAIL PROTECTED] _______________________________________________ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto