On 6/20/2008 5:26 PM, Frank Hecker wrote:
> As promised, here is an update on where things stand with regard to 
> DigiNotar and Entrust. (Since a lot of this is based on information I 
> got from Nelson, he's invited to point out where I got things wrong.)
> 
> First, a recap for those who've forgotten:
> 
> Recently I approved inclusion of the DigiNotar Root CA root certificate 
> in Mozilla. Because DigiNotar does not at present meet Mozilla policy 
> requirements for verification of email accounts, that approval was for 
> SSL and object signing only; the email "trust bit" was set to off. 
> However the DigiNotar Root CA public key has also been cross-signed by 
> Entrust, so that DigiNotar Root CA can appear in cert chains as an 
> intermediate CA certificate under the Entrust.net Secure Server 
> Certification Authority root, one of the Entrust roots included in 
> Mozilla and marked as suitable for all uses. (To see an example of this, 
> go to https://www.diginotar.nl/ and view the cert chain.)
> 
> Based on the way NSS currently works, if (for example) a Thunderbird 
> user receives a signed email message with an accompanying cert chain 
> that chains up to the Entrust root, NSS apparently ignores the presence 
> of the included DigiNotar Root CA root cert, goes up the chain to the 
> Entrust root, and then uses the Entrust root as the trust anchor. Since 
> the email trust bit is enabled for that root, everything checks out 
> fine, even though the DigiNotar Root CA itself is not enabled for email.
> 
> (Incidentally, I can't remember exactly why NSS does path processing 
> like this, e.g., whether it's something it just does, whether it's based 
> on the relative expiry dates of the DigiNotar Root CA root cert vs. the 
> Entrust-issued DigiNotar Root CA intermediate cert, or what. That's a 
> question for Nelson or others who know the code better than I.)
> 
> Given the above, we have various options:
> 
> 1. Get DigiNotar to improve its practices with regard to certificates 
> that contain email addresses and could be used for S/MIME email. This is 
> my preferred solution, but DigiNotar hasn't yet committed to do this.
> 
> 2. Modify NSS to turn off the email trust bit associated with the 
> Entrust.net Secure Server Certification Authority root. This is my 
> least-preferred option, as it would disable recognition of all 
> Entrust-issued email certs and all email certs issued by other CAs whose 
> roots have been cross-signed by Entrust. (This includes a number of 
> other CAs that have their roots in Mozilla with the email trust bit 
> enabled. Unfortunately as I understand it we'd have the same problem 
> with them as with DigiNotar: NSS path processing would ignore the other 
> CAs' included roots and their trust bits, go up the chain, and take 
> email trust from the Entrust root.) In my judgement the potential 
> security threat in this case is not high enough to justify such a 
> drastic action.
> 
> 3. Find some other way to get NSS not to recognize DigiNotar certs for 
> email, perhaps in combination with some action by Entrust and/or 
> DigiNotar. For example, one idea is to have end users of DigiNotar certs 
> reconfigure their email clients to have cert chains that terminate in 
> the DigiNotar Root CA root; unfortunately that's not really workable IMO 
> (since every cert holder would have to do this). Another idea is to have 
> Entrust revoke the DigiNotar Root CA intermediate cert; however as I 
> understand it that would have no effect whatsoever, as NSS doesn't check 
> for revocation of CA certs (except in the EV case). There's perhaps a 
> possibility that adding the DigiNotar Root CA intermediate cert to the 
> preloaded cert list would help, but that's unclear at this point given 
> the current state of NSS.
> 
> So the bottom line is that there are still unanswered questions, and I'm 
> going to spend some more time trying to get them answered if I can.
> 
> Frank
> 

Is the problem here caused (or at least compounded) by the
implementation of bug #399045?  See
<https://bugzilla.mozilla.org/show_bug.cgi?id=399045>.

-- 
David E. Ross
<http://www.rossde.com/>

Go to Mozdev at <http://www.mozdev.org/> for quick access to
extensions for Firefox, Thunderbird, SeaMonkey, and other
Mozilla-related applications.  You can access Mozdev much
more quickly than you can Mozilla Add-Ons.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to