Frank Hecker wrote:
Per the CA schedule, the next CA on the list for public comment is WISeKey, which has applied to add its (one) root CA certificate to the Mozilla root store, as documented in the following bug:

  https://bugzilla.mozilla.org/show_bug.cgi?id=371362

and in the pending certificates list here:

  http://www.mozilla.org/projects/security/certs/pending/#WISeKey

We've now completed the scheduled time for public discussion on this request. Based on my reading of the prior material for this request (e.g., in the bug and in the newsgroup) and my reading of the discussion thread for this discussion period, there were two issues of note:

First is auditing of subordinate CAs as implemented by the BloackBox product. As noted by Kevin Blackman, WISeKey now does annual onsite audits of BlackBox customers. This satisfies any concerns I might have had on the subject of audits.

Second is constraining subordinate CAs to issue certificates only within their own domain(s). My understanding from the WISeKey documents and from Kevin Blackman's comments is that WISeKey implements both contractual and technical constraints in connection with the BlackBox products. Based on comments by Eddy, Nelson, et.al., there are apparently theoretical cases where such constraints could be evaded and the evasion would not be picked up by NSS (based on NSS not checking domain constraints on CN or any other values outside of the SAN stuff).

On the WISeKey end, they could mandate use of SAN in BlackBox-issued certificates (as opposed to just including it in the default template), and from the NSS end we could disallow use of CN for storing domain names. These may be good ideas for future consideration, but I can't justify holding up this request till they get implemented.


Frank

--
Frank Hecker
[EMAIL PROTECTED]
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to