Closed
Bug 1016587
Opened 11 years ago
Closed 8 years ago
Update CA Certificate Policy to allow CAs to create certificates with duplicate serial numbers for CT
Categories
(CA Program :: CA Certificate Root Program, task)
CA Program
CA Certificate Root Program
Tracking
(Not tracked)
RESOLVED
FIXED
People
(Reporter: kathleen.a.wilson, Assigned: kathleen.a.wilson)
Details
(Whiteboard: [ca-program] https://github.com/mozilla/pkipolicy/issues/41)
http://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/inclusion/
"4. We reserve the right to not include a particular CA certificate in our software products.
...
This also includes (but again is not limited to) cases where we believe that including a CA certificate (or setting its "trust bits" in a particular way) might cause technical problems with the operation of our software, for example, with CAs that issue certificates that have
- ASN.1 DER encoding errors;
- invalid public keys (e.g., RSA certificates with public exponent equal to 1);
- duplicate issuer names and serial numbers;"
The line "duplicate issuer names and serial numbers" will need to be updated to take CT into account.
Suggestion:
CT requires that the signed TBS certificate posted to the CT logs and the “real” cert have the same issuer, Serial number, keys, and most other data. It also has a “poison” extension which makes it unusable as an SSL certificate. It breaks a lot of the standard PKI rules, but it is a standard that CAs are following. You might want to add “…duplicate issuer names and serial numbers, except as permitted under CT;”
| Assignee | ||
Updated•8 years ago
|
Status: NEW → RESOLVED
Closed: 8 years ago
Resolution: --- → FIXED
Whiteboard: [ca-program] https://github.com/mozilla/pkipolicy/issues/41
Updated•8 years ago
|
Product: mozilla.org → NSS
Updated•3 years ago
|
Product: NSS → CA Program
You need to log in
before you can comment on or make changes to this bug.
Description
•