[Servercert-wg] [External Sender] Discussion about single-purpose client authentication leaf certificates issued from a server TLS Issuing CA
Clint Wilson
clintw at apple.com
Fri May 17 23:24:32 UTC 2024
Hi Pedro,
All CAs in the Apple Root Program are required to complete an audit based on either WebTrust Principles and Criteria for Certification Authorities or ETSI EN 319 411-1 LCP, NCP, or NCP+ per Section 1.1.1 of the ARP Policy. For clientAuth-only CAs, these are currently the only audit criteria.
I appreciate the comment regarding TLS CAs; I’ll look at improving this language, but this specifically is referencing CAs capable of asserting the serverAuth EKU as clientAuth is not required for TLS. That is, the serverAuth EKU is required at a protocol level to establish a secure TLS connection, while the clientAuth EKU is only used in specific contexts, such as mTLS — which is almost always a use-case better (or perhaps more ideally) solved by Enterprise or Private PKIs.
Thanks!
-Clint
> On May 17, 2024, at 2:32 AM, Pedro FUENTES <pfuentes at wisekey.com> wrote:
>
> I also oversaw that…
>
> Anyhow… @Clint, what are the audit requirements for these clientAuth CAs?
> In your program you mention WTBR as a requirement for "TLS CAs”, but there’s no distinction between clientAuth or serverAuth… while both are used to secure TLS handshakes.
>
>> On 17 May 2024, at 11:22, Dimitris Zacharopoulos (HARICA) <dzacharo at harica.gr> wrote:
>>
>>
>>
>> On 16/5/2024 10:29 μ.μ., Clint Wilson wrote:
>>>> AFAIK Apple and Mozilla also don't have a specific "trust bit" for Client Authentication. Only Microsoft does.
>>> FWIW, Apple does indeed have a specific trust bit for id-kp-clientAuth EKU and allows for (and ships) dedicated clientAuth Root CAs in the Apple Root Program (as outlined in 2.1.3 of the ARP Policy).
>>>
>>
>> Thanks for the correction Clint. I had the impression that you shipped only Apple Roots for clientAuth. My bad.
>>
>> Dimitris.
>>
>>
>>
>
>
> WISeKey SA
> Pedro Fuentes
> CSO - Trust Services Manager
> Office: + 41 (0) 22 594 30 00
> Mobile: + 41 (0) 791 274 790
> Address: Avenue Louis-Casaï 58 | 1216 Cointrin | Switzerland
> Stay connected with WISeKey <http://www.wisekey.com/>
>
> THIS IS A TRUSTED MAIL: This message is digitally signed with a WISeKey identity. If you get a mail from WISeKey please check the signature to avoid security risks
>
> CONFIDENTIALITY: This email and any files transmitted with it can be confidential and it’s intended solely for the use of the individual or entity to which they are addressed. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. If you have received this email in error please notify the sender
>
> DISCLAIMER: WISeKey does not warrant the accuracy or completeness of this message and does not accept any liability for any errors or omissions herein as this message has been transmitted over a public network. Internet communications cannot be guaranteed to be secure or error-free as information may be intercepted, corrupted, or contain viruses. Attachments to this e-mail are checked for viruses; however, we do not accept any liability for any damage sustained by viruses and therefore you are kindly requested to check for viruses upon receipt.
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/servercert-wg/attachments/20240517/69d2a961/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 3621 bytes
Desc: not available
URL: <http://lists.cabforum.org/pipermail/servercert-wg/attachments/20240517/69d2a961/attachment.p7s>
More information about the Servercert-wg
mailing list