At 4:23 PM -0700 9/23/08, Nelson B Bolyard wrote:
>Paul Hoffman wrote:
>>  At 2:29 PM -0700 9/22/08, Nelson B Bolyard wrote:
>
>>>  In CA certs, NSS understands the EKUs to mean "this CA can only issue
>>>  certs valid for these purposes", rather than meaning that the CA cert
>>>  itself can be used for those purposes.
>>
>>  I would argue that that interpretation of the MUST above is
>>  completely wrong. I see nothing in section 4.2.1.12 that indicates
>>  that this extension is meant to limit CAs, and there is plenty of
>>  opportunity for it to do so. Following this logic, a CA with no EKUs
>>  would not be able to issue certs with any EKU at all. Remember, new
>>  EKUs are defined by the IETF all the time.
>
>A cert with no EKU extension is understood to be valid for all the
>possible usages (except for a very few).  An EKU extension is restrictive.
>It doesn't say "The cert is ALSO ADDITIONALLY good for these usages".
>It says "the cert is not good for any usages other than these".
>When the restrictive extension is absent, the cert is unconstrained with
>respect to usages.

Completely true for end-entity certificates. But we are talking about 
root certificates here. I do not find any words in RFC 5280 to 
support the interpretation that "a set of EKUs in a CA cert means 
that that CA can only issue certs that also contain one or more from 
that set". I could be wrong (this stuff is described in different 
places in the document), but I just don't see it yet.

>  >>>   * support email addresses go in
>>>>       + E field?  (Is 'E' the name?)
>>>  For email certs, email addresses MUST go in the Subject Alternative Name
>>>  extension.  That's the standardized place for email addresses in email
>>>  certs.  If the email address is just a reference for support, and the
>>>  cert itself is not acting as an email signing or encryption cert, then
>>>  I suppose it could go in the cert Subject Name.
>>
>>  Gaaah. Why is there an email address in a root certificate?
>
>I think it's just to provide relying parties a way (not necessarily secure)
>to contact the CA, for support purposes (or sales :)

Oh, please, no. Not in an email-denoted slot. In free text somewhere, 
maybe, but not in an email slot....

>  >> In that same NIST publication there is a table of recommended key sizes
>>>  to use for secrets that need to be protected until year 2010, 2030, and
>>>  beyond.  It's table 4, page 66.
>>
>>  Table 4 is *not* talking about lifetimes of digital signature
>>  algorithms: it is talking about symmetric algorithms that do not
>>  weaken with research. RSA has already weakened twice, and it is
>>  likely to weaken again within its lifetime.
>
>If that were true, then the table would not supply minimum key sizes for
>DSA, RSA and ECDSA.  But the table does, in fact, supply those sizes,
>and associates them with different retention periods.  The page says:
>"The algorithms and key sizes in the table are considered appropriate
>for the protection of data during the given time periods."  It does not
>say that the table applies only to symmetric algorithms.

We are splitting hairs here, something that I'm getting bad at with 
respect to this document.

>  > If you use a signature algorithm
>>  that is not supported by all the relying parties you care about, then
>>  those that don't support it will label your trust anchor as unusable.
>
>I agree with that, up to a point.  But by that logic, the world of SSL
>would still all be using SSL2 with 40-bit ciphers, because for many years,
>those were the only ones universally supported by all browsers.

Actually, what you say supports what I said. At some point, you 
decide to ignore the people who can only use the old stuff and move 
forwards. But that choice is always painful.

>There also products today that cannot handle SHA-2 hashes, and that limit
>RSA key/signature sizes to 2k bits.  I would not advise any CA to limit
>itself to those limits just for those few straggling products.  Much as
>I don't like to say it, the big question is: does MSIE support it?
>If IE and FF both support SHA-2, then go for it.  If users say "I have to
>switch away from <favorite browser> to MSIE to shop at site xxx.com",
>you can be sure that other products will play catch-up, quickly.

I think it is the opposite. Last I heard, MSIE didn't support 
RSA-with-SHA256 on XP but did on Vista. I heard conflicting stories 
about Microsoft's intention to fix that in an XP upgrade. Others on 
this list certainly know more about this than I do (and may even be 
able to test it).
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to