On Thu, Jun 19, 2025 at 11:51:54AM +0200, Filippo Valsorda wrote:
> 2025-06-19 09:52 GMT+02:00 Viktor Dukhovni <ietf-d...@dukhovni.org>:
> > One might, for example, instead dedicate to this end
> > intermediate issuer CAs having a serverAuth EKU, that will in many (be
> > they for now ad hoc, rather than RFC5280-blessed) TLS stacks be
> > intepreted as restricting any issued EE certificates to that EKU
> > (implicit or explicit).
> 
> If making a serverAuth intermediate is acceptable, then it sounds like
> there is no issue here: just self-sign it and submit that to the
> Chrome Root Program. The policy doesn't say anything about the parents
> of the roots. (That would be indeed outrageous!)

I'm guessing the rationale for Google's change is to protect apps that
support client certificates poorly (usually the norm) that

 - use WebPKI trust anchors by default just because

 - support no naming constraints whatsoever

 - use certificate subject distinguished names (typically only the CN
   attribute)

 - maybe support rfc822Name SANs

from accepting certificates issued by WebPKI CAs that they really should
not.

However, I would think that apps that support client certificates only
with dNSName SANs should be able to continue to work with WebPKI _if_
that's what they were already doing.  Are there any such?  It sounds
from this thread like "yes", there are.

Does Google's change break previously-working use cases?

I think perhaps what is desired is a policy that WebPKI root CAs (the
ones in browsers' default trust anchors) should only issue intermediate
CA certificates that only issue certificates with:

 - empty DN

 - dNSName SANs

 - no other SANs of any other kind

Then allowing clientAuth would be well enough, I suppose.

Nico
-- 

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to