CA/Forbidden or Problematic Practices: Difference between revisions

From MozillaWiki
< CA
Jump to navigation Jump to search
(Create initial page)
 
No edit summary
Line 1: Line 1:
== Problematic CA Practices ==
== Problematic CA Practices ==


This page contains draft comments about various CA practices that we consider problematic for various reasons. In general these practices are not explicitly addressed by the [http://www.mozilla.org/projects/security/certs/policy Mozilla CA certificate policy], but we want to highlight them because they've occasioned concern in the past. Some of these practices may be addressed in future versions of the policy.
This page contains draft comments about various CA practices that have been the subject of discussion in past CA evaluations. In general these practices are not explicitly addressed by the [http://www.mozilla.org/projects/security/certs/policy Mozilla CA certificate policy], and we do not necessarily consider them security risks. However we want to highlight them because they've occasioned concern in the past and have in some cases caused approval of applications to be delayed. Some of these practices may be addressed in future versions of the policy.


=== Long-lived DV certificates ===
=== Long-lived DV certificates ===


To be written.
Some CAs issue domain-validated certificates that have expiration times several years in the future. A DV certificate attests only to ownership and control of a domain name, and the owner of a domain name may have acquired it from others. It is therefore possible for the previous


=== Wildcard SSL certificates ===
=== Wildcard SSL certificates ===
Line 13: Line 13:
=== Issuing end entity certificates directly from roots ===
=== Issuing end entity certificates directly from roots ===


To be written.
Some CAs issue end entity certificates directly from the root (i.e., signed using the root CA private key). This is not as secure as using an offline root and issuing certificates using a subordinate CA.

Revision as of 16:57, 2 May 2008

Problematic CA Practices

This page contains draft comments about various CA practices that have been the subject of discussion in past CA evaluations. In general these practices are not explicitly addressed by the Mozilla CA certificate policy, and we do not necessarily consider them security risks. However we want to highlight them because they've occasioned concern in the past and have in some cases caused approval of applications to be delayed. Some of these practices may be addressed in future versions of the policy.

Long-lived DV certificates

Some CAs issue domain-validated certificates that have expiration times several years in the future. A DV certificate attests only to ownership and control of a domain name, and the owner of a domain name may have acquired it from others. It is therefore possible for the previous

Wildcard SSL certificates

To be written.

Issuing end entity certificates directly from roots

Some CAs issue end entity certificates directly from the root (i.e., signed using the root CA private key). This is not as secure as using an offline root and issuing certificates using a subordinate CA.