Confirmed users
546
edits
(→Complete Audit History: Added information about "parked keys") |
(Updated based on single-purpose roots required by MRSP v.3.0) |
||
| Line 171: | Line 171: | ||
* If any corresponding certificate with the same serial number and issuer exists, and can not be verified to match the precertificate using the algorithms in RFC 6962, it will be considered misissued. | * If any corresponding certificate with the same serial number and issuer exists, and can not be verified to match the precertificate using the algorithms in RFC 6962, it will be considered misissued. | ||
* In examining historical issuance, the CA must consider both final certificates and precertificates, even if the precertificate did not ultimately result in the issuance of a certificate. | * In examining historical issuance, the CA must consider both final certificates and precertificates, even if the precertificate did not ultimately result in the issuance of a certificate. | ||
=== Single-Purpose Root Certificates === | |||
A single-purpose root is required. See https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/#75-dedicated-root-certificates. | |||
== Recommended Practices == | == Recommended Practices == | ||
| Line 176: | Line 180: | ||
=== CA Hierarchy === | === CA Hierarchy === | ||
The single top-level root's public certificate is supplied for Mozilla's root list; subordinate CA certificates (including other self-signed root CA certificates that chain to the trusted root) must be reported in the CCADB. | |||
CAs that issue certificates under multiple | CAs that issue certificates under multiple different CA hierarchies (i.e. in an inclusion application with multiple root CAs with different purposes) should provide additional information as noted: | ||
* The CA should provide a graphical or textual description of the CA hierarchy or hierarchies, including which subordinates are under which root CAs. | * The CA should provide a graphical or textual description of the CA hierarchy or hierarchies, including which subordinates are under which root CAs. | ||
* Where a CP/CPS applies to multiple CA hierarchies, the CA should indicate whether particular sections of the CP/CPS apply to different hierarchies and, if so, what the differences are. | |||
* Where a CP/CPS applies to | |||
=== Document Handling of IDNs in CP/CPS === | === Document Handling of IDNs in CP/CPS === | ||
| Line 191: | Line 193: | ||
=== Usage of Appropriate Constraints === | === Usage of Appropriate Constraints === | ||
Root certificates in Mozilla's program can have either the Websites trust bit set | Root certificates in Mozilla's program can have either the Websites trust bit set or the Email trust bit. If only one of those bits is set, relying software will trust certificates in that hierarchy for only that purpose. Nevertheless, intermediate CA certificates must also contain EKU constraints of either id-kp-serverAuth or id-kp-emailProtection, as appropriate, such that end-entity certificates are still appropriately constrained. | ||
=== OCSP Responses === | === OCSP Responses === | ||
Including additional, superfluous certificates in an OCSP response wastes bandwidth. Therefore, CA operators should limit certificates delivered to a single Authorized Responder certificate, when that is necessary. | Including additional, superfluous certificates in an OCSP response wastes bandwidth. Therefore, CA operators should limit certificates delivered to a single Authorized Responder certificate, when that is necessary. | ||