Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Clarify that non-TLS leaf Certificates are not allowed to be issued from a server TLS-capable Issuing CA #532

Open
dzacharo opened this issue Jul 3, 2024 · 5 comments
Assignees
Labels
baseline-requirements Server Certificate CWG - Baseline Requirements

Comments

@dzacharo
Copy link
Contributor

dzacharo commented Jul 3, 2024

The TLS BRs need to clearly state that it is not allowed to issue non-TLS leaf Certificates from server TLS-capable Issuing CAs, not even single-purpose "client authentication" leaf Certificates (end-entity certificates with just the id-kp-clientAuth EKU), which was allowed before SC-62.

@dzacharo dzacharo added baseline-requirements Server Certificate CWG - Baseline Requirements clean-up Items for future clean-up ballot labels Jul 3, 2024
Copy link

github-actions bot commented Jul 3, 2024

This issue was created based on:

  • TLS BR Version 2.0.5
  • EVG Version 2.0.1

@CBonnell
Copy link
Member

CBonnell commented Jul 3, 2024

This is either closely related or a duplicate of #495.

@robstradling
Copy link
Member

@dzacharo "not allowed to issue non-TLS leaf Certificates from server TLS-capable Issuing CAs" would disallow the issuance of OCSP Signer Certificates from Server TLS-capable Issuing CAs. I presume that's not your intent?

@XolphinMartijn
Copy link
Member

@dzacharo I'm removing the clean-up tag. While I agree this needs to be clarified, it might entail more work then just adding one or two sentenses, for example by what Rob highlighted. Happy to drive a separate ballot for this however. Feel free to comment if you disagree

@XolphinMartijn XolphinMartijn removed the clean-up Items for future clean-up ballot label Oct 22, 2024
@CBonnell
Copy link
Member

CBonnell commented Dec 5, 2024

Related to #506, as it involves the use of TLS-capable CA key material to include and sign entries in a CRL with a forbidden CRL reasonCode.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
baseline-requirements Server Certificate CWG - Baseline Requirements
Projects
None yet
Development

No branches or pull requests

4 participants