Nelson Bolyard wrote:
> Eddy Nigg (StartCom Ltd.) wrote, On 2008-02-08 14:47:
>
>   
>> [...] any limitation put into place by the 
>> CA will be essentially _useless_!!!! The system is already compromised, 
>> why would you believe that it's still bound to a certain domain? There 
>> is no way to limit a CA certificate to a certain domain name only.
>>     
>
> Eddy, I think perhaps you misunderstand what Frank was saying.
>
> The rest of your argument in the message to which I am reply seems to
> hinge on this assumption that "there is no way to limit a [subordinate]
> CA to a certain domain".  But in fact there *IS* a way for a superior
> CA to constrain the name space in which a subordinate CA may issue certs.
> Certs issued by the subordinate CA that attempt to certify names outside
> of the constrained space fail to pass validation checks.
>   
Thanks Nelson! As you indicated  in your previous mail, neither you nor 
did I ever see such a restricted CA in real life. If this is the case 
with the intermediate CA issued by WISeKey, one quarter or my argument 
wouldn't be valid. Maybe....

...and only maybe, because the user using an application with NSS (being 
it FF, TB or anything else) is the relying party, not the XYZ customer 
of some sub CA. It could be me, you or anybody else receiving a mail or 
visiting a site which was issued from such a compromised system. Hence 
it just limits the scope of the compromise, not the severity itself.

Therefore even if the CA indeed limits the domain with the name 
constraints, the relying party can still fall victim. It's a very common 
mistake to think that digital certification is about the subscriber or 
issuer, but it's really about the relying parties, Mozilla itself being 
one...
> The superior CA puts a "Name Constraints" extension into the subordinate
> CA's cert.  Those extensions will be examined in the course of verifying any
> cert issued by the subordinate CA.  If the extension says (say)
> "Only names in the domain foo.com" and the subordinate CA attempts to
> issue a cert for a name in bar.com, that cert will not pass verification.
>
> Or it shouldn't.  But see bug 394919.
>   
This bug actually confirms that NSS can't handle name constraints 
correctly....not nice...


-- 
Regards 
 
Signer:         Eddy Nigg, StartCom Ltd. <http://www.startcom.org>
Jabber:         [EMAIL PROTECTED] <xmpp:[EMAIL PROTECTED]>
Blog:   Join the Revolution! <http://blog.startcom.org>
Phone:          +1.213.341.0390
 

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to