{"id":2826,"date":"2021-12-09T08:00:50","date_gmt":"2021-12-09T16:00:50","guid":{"rendered":"https:\/\/blog.mozilla.org\/security\/?p=2826"},"modified":"2021-12-09T08:04:38","modified_gmt":"2021-12-09T16:04:38","slug":"improved-quality-of-intermediate-certificates-with-enhanced-oversight-and-automation","status":"publish","type":"post","link":"https:\/\/blog.mozilla.org\/security\/2021\/12\/09\/improved-quality-of-intermediate-certificates-with-enhanced-oversight-and-automation\/","title":{"rendered":"Improving the Quality of Publicly Trusted Intermediate CA Certificates with Enhanced Oversight and Automation"},"content":{"rendered":"<p>In keeping with our commitment to the security and privacy of individuals on the internet, Mozilla is increasing our oversight and adding automation to our compliance-checking of publicly trusted intermediate CA certificates (\u201c<a href=\"https:\/\/www.mozilla.org\/en-US\/about\/governance\/policies\/security-group\/certs\/policy\/#53-intermediate-certificates\">intermediate certificates<\/a>\u201d). This improvement in automation is important because intermediate certificates play a critical part in the web PKI (Public-Key Infrastructure). Intermediate CA keys directly sign server certificates, and we currently recognize nearly <a href=\"https:\/\/wiki.mozilla.org\/CA\/Intermediate_Certificates\">3,000 intermediate certificates<\/a>, which chain up to approximately <a href=\"https:\/\/wiki.mozilla.org\/CA\/Included_Certificates\">150 root CA certificates<\/a> embedded as trust anchors in NSS and Firefox. More specifically, we are updating the <a href=\"https:\/\/www.mozilla.org\/en-US\/about\/governance\/policies\/security-group\/certs\/policy\/\">Mozilla Root Store Policy<\/a> (MRSP) and <a href=\"https:\/\/wiki.mozilla.org\/CA\">associated guidance<\/a>, improving the public review of third-party intermediate certificates on the <a href=\"https:\/\/groups.google.com\/a\/mozilla.org\/g\/dev-security-policy\">Mozilla dev-security-policy list<\/a>, and enhancing automation in the<a href=\"https:\/\/www.ccadb.org\/\"> Common CA Database<\/a> (CCADB).<\/p>\n<h3><b>Recent and Upcoming Policy Updates\u00a0<\/b><\/h3>\n<p>In version 2.7.1 of the MRSP, we clarified that all unconstrained intermediate certificates, including those that share the same key pair, must be disclosed in the <a href=\"https:\/\/www.ccadb.org\/\">CCADB<\/a>, whether they are self-signed, doppelg\u00e4nger, reissued, cross-signed, or other types (<a href=\"https:\/\/www.mozilla.org\/en-US\/about\/governance\/policies\/security-group\/certs\/policy\/#53-intermediate-certificates\">MRSP \u00a7 5.3<\/a>).\u00a0 Currently, \u201ctechnically constrained\u201d intermediate certificates are not necessarily reported, but in version 2.8 of the MRSP we will begin to also require disclosure of intermediate certificates that are capable of issuing websites (TLS\/SSL) or email (S\/MIME) certificates even when they are technically constrained. According to <a href=\"https:\/\/www.mozilla.org\/en-US\/about\/governance\/policies\/security-group\/certs\/policy\/#531-technically-constrained\">MRSP \u00a7 5.3.1<\/a>, technical constraints are determined by a combination of the trust bits recognized by Mozilla for the root CA certificate (websites and\/or email trust bits) and the Extended Key Usage (EKU) and Name Constraints X.509v3 (with constraints on dNSName, iPAddress, DirectoryName, rfc822Name in permittedSubtrees) extensions in the intermediate certificate. For example, an intermediate certificate that contains the id-kp-serverAuth extended key usage in its EKU and is name-constrained according to section 7.1.5 of the<a href=\"https:\/\/cabforum.org\/baseline-requirements-documents\/\"> Baseline Requirements<\/a> (BRs) will be required (as of MRSP version 2.8) to be disclosed in the CCADB.<\/p>\n<p>We are also updating<a href=\"https:\/\/www.mozilla.org\/en-US\/about\/governance\/policies\/security-group\/certs\/policy\/#8-ca-operational-changes\"> MRSP \u00a7 8<\/a> to formalize requirements and procedures for CAs to follow when they plan to issue an unconstrained intermediate certificate to an external third party. For example, when a Root CA in Mozilla\u2019s program cross-signs a new CA they are essentially bypassing <a href=\"https:\/\/wiki.mozilla.org\/CA\/Application_Process\">Mozilla&#8217;s root inclusion process<\/a>, so the Root CA needs to take responsibility for the new CA and the Root CA needs to perform due diligence on the new CA before issuing the cross-signed certificate. The operator of a Mozilla-trusted Root CA is at all times completely and ultimately accountable for every certificate signed under the Root CA, whether directly or through subordinate CAs or cross-certified CAs. For more details, we refer you to our<a href=\"https:\/\/wiki.mozilla.org\/CA\/External_Sub_CAs_not_Technically_Constrained\"> Process for Review and Approval of Externally Operated Subordinate CAs that are not Technically Constrained<\/a>.<\/p>\n<h3><b>CCADB Automation Improvements<\/b><\/h3>\n<p>With the <a href=\"https:\/\/www.ccadb.org\/\">CCADB<\/a>, Mozilla has provided a variety of tools to examine the status of intermediate certificates where none existed before. These include improvements that allow us to automatically process CA audit reports using Audit Letter Validation (ALV), advise CAs on the status of their intermediate certificates, and provide CAs and root store operators with lists of tasks relevant to intermediate certificates listed in the CCADB.<\/p>\n<p><b>Automated Audit Letter Validation<\/b> (ALV) is an automated process that parses and validates the information in CA audit reports, and it is now used to verify that intermediate CAs are properly audited (<a href=\"https:\/\/wiki.mozilla.org\/CA\/Audit_Statements#Audit_Letter_Validation\">CA\/Audit Statements:#ALV<\/a>) according to their technical capabilities; such as issuing certificates for email (S\/MIME), websites (TLS\/SSL), and EV TLS. For example, a certificate that is technically capable of issuing certificates that can be recognized for EV TLS must have a current EV audit statement that lists the intermediate CA certificate as having been in scope of the EV audit.<\/p>\n<p><b>Task Lists<\/b> on home pages in the CCADB alert CAs about certificates whose audit statements need to be renewed and to problems such as unaudited intermediate certificates. These task lists help minimize the prompting and reminding that would otherwise be required of root program managers.<\/p>\n<p><a href=\"https:\/\/blog.mozilla.org\/security\/files\/2021\/12\/Task_List_for_CAs.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2827\" src=\"https:\/\/blog.mozilla.org\/security\/files\/2021\/12\/Task_List_for_CAs.png\" alt=\"\" width=\"560\" height=\"443\" srcset=\"https:\/\/blog.mozilla.org\/security\/files\/2021\/12\/Task_List_for_CAs.png 560w, https:\/\/blog.mozilla.org\/security\/files\/2021\/12\/Task_List_for_CAs-300x237.png 300w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/><\/a><\/p>\n<p><b>Image 1: CCADB lists CA tasks involving intermediate certificates<br \/>\n<\/b><\/p>\n<p>The CCADB also generates task lists for root program managers so that we can be aware of items needing our attention.<\/p>\n<p><a href=\"https:\/\/blog.mozilla.org\/security\/files\/2021\/12\/Task_List_for_Root_Programs.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-2828\" src=\"https:\/\/blog.mozilla.org\/security\/files\/2021\/12\/Task_List_for_Root_Programs.png\" alt=\"\" width=\"1457\" height=\"600\" srcset=\"https:\/\/blog.mozilla.org\/security\/files\/2021\/12\/Task_List_for_Root_Programs.png 1457w, https:\/\/blog.mozilla.org\/security\/files\/2021\/12\/Task_List_for_Root_Programs-300x124.png 300w, https:\/\/blog.mozilla.org\/security\/files\/2021\/12\/Task_List_for_Root_Programs-600x247.png 600w, https:\/\/blog.mozilla.org\/security\/files\/2021\/12\/Task_List_for_Root_Programs-768x316.png 768w, https:\/\/blog.mozilla.org\/security\/files\/2021\/12\/Task_List_for_Root_Programs-1000x412.png 1000w\" sizes=\"(max-width: 1457px) 100vw, 1457px\" \/><\/a><\/p>\n<p><b>Image 2: CCADB lists tasks for managers of Mozilla&#8217;s root store program<br \/>\n<\/b><\/p>\n<h3><b>Conclusion<\/b><\/h3>\n<p>Updating the Mozilla Root Store Policy and adding automation to the CCADB demonstrate Mozilla\u2019s commitment to continue to advance the security and privacy of individuals on the internet. The recent and in-progress updates to the MRSP and the CCADB improve oversight of the issuance and management of intermediate certificates, which play a critical part in the web PKI by directly signing server certificates for TLS\/SSL. These updates to policy and automation enable us to proactively identify and resolve problems with the approximately <a href=\"https:\/\/wiki.mozilla.org\/CA\/Intermediate_Certificates\">3,000 intermediate certificates<\/a> that can issue certificates that are recognized as valid by NSS and Firefox.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In keeping with our commitment to the security and privacy of individuals on the internet, Mozilla is increasing our oversight and adding automation to our compliance-checking of publicly trusted intermediate &hellip; <a class=\"go\" href=\"https:\/\/blog.mozilla.org\/security\/2021\/12\/09\/improved-quality-of-intermediate-certificates-with-enhanced-oversight-and-automation\/\">Read more<\/a><\/p>\n","protected":false},"author":1800,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45538,69],"tags":[466103,45506,466102,466101,466100],"coauthors":[452979,45544],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Improving the Quality of Publicly Trusted Intermediate CA Certificates with Enhanced Oversight and Automation - Mozilla Security Blog<\/title>\n<meta name=\"description\" content=\"The Mozilla root program is improving the quality of publicly trusted intermediate CA certificates with enhanced oversight and CCADB automation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.mozilla.org\/security\/2021\/12\/09\/improved-quality-of-intermediate-certificates-with-enhanced-oversight-and-automation\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ben Wilson, Kathleen Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.mozilla.org\/security\/2021\/12\/09\/improved-quality-of-intermediate-certificates-with-enhanced-oversight-and-automation\/\",\"url\":\"https:\/\/blog.mozilla.org\/security\/2021\/12\/09\/improved-quality-of-intermediate-certificates-with-enhanced-oversight-and-automation\/\",\"name\":\"Improving the Quality of Publicly Trusted Intermediate CA Certificates with Enhanced Oversight and Automation - Mozilla Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.mozilla.org\/security\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.mozilla.org\/security\/2021\/12\/09\/improved-quality-of-intermediate-certificates-with-enhanced-oversight-and-automation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.mozilla.org\/security\/2021\/12\/09\/improved-quality-of-intermediate-certificates-with-enhanced-oversight-and-automation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.mozilla.org\/security\/files\/2021\/12\/Task_List_for_CAs.png\",\"datePublished\":\"2021-12-09T16:00:50+00:00\",\"dateModified\":\"2021-12-09T16:04:38+00:00\",\"author\":{\"@id\":\"https:\/\/blog.mozilla.org\/security\/#\/schema\/person\/567811235606b64dd0f242f33d73296e\"},\"description\":\"The Mozilla root program is improving the quality of publicly trusted intermediate CA certificates with enhanced oversight and CCADB automation.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.mozilla.org\/security\/2021\/12\/09\/improved-quality-of-intermediate-certificates-with-enhanced-oversight-and-automation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.mozilla.org\/security\/2021\/12\/09\/improved-quality-of-intermediate-certificates-with-enhanced-oversight-and-automation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.mozilla.org\/security\/2021\/12\/09\/improved-quality-of-intermediate-certificates-with-enhanced-oversight-and-automation\/#primaryimage\",\"url\":\"https:\/\/blog.mozilla.org\/security\/files\/2021\/12\/Task_List_for_CAs.png\",\"contentUrl\":\"https:\/\/blog.mozilla.org\/security\/files\/2021\/12\/Task_List_for_CAs.png\",\"width\":560,\"height\":443},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.mozilla.org\/security\/2021\/12\/09\/improved-quality-of-intermediate-certificates-with-enhanced-oversight-and-automation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.mozilla.org\/security\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Improving the Quality of Publicly Trusted Intermediate CA Certificates with Enhanced Oversight and Automation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.mozilla.org\/security\/#website\",\"url\":\"https:\/\/blog.mozilla.org\/security\/\",\"name\":\"Mozilla Security Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.mozilla.org\/security\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.mozilla.org\/security\/#\/schema\/person\/567811235606b64dd0f242f33d73296e\",\"name\":\"Ben Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.mozilla.org\/security\/#\/schema\/person\/image\/41743ae2317d18057bd67baef8923420\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/01529deaafc1a9fb5aa0a376a7bea560?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/01529deaafc1a9fb5aa0a376a7bea560?s=96&d=identicon&r=g\",\"caption\":\"Ben Wilson\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Improving the Quality of Publicly Trusted Intermediate CA Certificates with Enhanced Oversight and Automation - Mozilla Security Blog","description":"The Mozilla root program is improving the quality of publicly trusted intermediate CA certificates with enhanced oversight and CCADB automation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.mozilla.org\/security\/2021\/12\/09\/improved-quality-of-intermediate-certificates-with-enhanced-oversight-and-automation\/","twitter_misc":{"Written by":"Ben Wilson, Kathleen Wilson","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.mozilla.org\/security\/2021\/12\/09\/improved-quality-of-intermediate-certificates-with-enhanced-oversight-and-automation\/","url":"https:\/\/blog.mozilla.org\/security\/2021\/12\/09\/improved-quality-of-intermediate-certificates-with-enhanced-oversight-and-automation\/","name":"Improving the Quality of Publicly Trusted Intermediate CA Certificates with Enhanced Oversight and Automation - Mozilla Security Blog","isPartOf":{"@id":"https:\/\/blog.mozilla.org\/security\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mozilla.org\/security\/2021\/12\/09\/improved-quality-of-intermediate-certificates-with-enhanced-oversight-and-automation\/#primaryimage"},"image":{"@id":"https:\/\/blog.mozilla.org\/security\/2021\/12\/09\/improved-quality-of-intermediate-certificates-with-enhanced-oversight-and-automation\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mozilla.org\/security\/files\/2021\/12\/Task_List_for_CAs.png","datePublished":"2021-12-09T16:00:50+00:00","dateModified":"2021-12-09T16:04:38+00:00","author":{"@id":"https:\/\/blog.mozilla.org\/security\/#\/schema\/person\/567811235606b64dd0f242f33d73296e"},"description":"The Mozilla root program is improving the quality of publicly trusted intermediate CA certificates with enhanced oversight and CCADB automation.","breadcrumb":{"@id":"https:\/\/blog.mozilla.org\/security\/2021\/12\/09\/improved-quality-of-intermediate-certificates-with-enhanced-oversight-and-automation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mozilla.org\/security\/2021\/12\/09\/improved-quality-of-intermediate-certificates-with-enhanced-oversight-and-automation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.mozilla.org\/security\/2021\/12\/09\/improved-quality-of-intermediate-certificates-with-enhanced-oversight-and-automation\/#primaryimage","url":"https:\/\/blog.mozilla.org\/security\/files\/2021\/12\/Task_List_for_CAs.png","contentUrl":"https:\/\/blog.mozilla.org\/security\/files\/2021\/12\/Task_List_for_CAs.png","width":560,"height":443},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mozilla.org\/security\/2021\/12\/09\/improved-quality-of-intermediate-certificates-with-enhanced-oversight-and-automation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.mozilla.org\/security\/"},{"@type":"ListItem","position":2,"name":"Improving the Quality of Publicly Trusted Intermediate CA Certificates with Enhanced Oversight and Automation"}]},{"@type":"WebSite","@id":"https:\/\/blog.mozilla.org\/security\/#website","url":"https:\/\/blog.mozilla.org\/security\/","name":"Mozilla Security Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mozilla.org\/security\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.mozilla.org\/security\/#\/schema\/person\/567811235606b64dd0f242f33d73296e","name":"Ben Wilson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.mozilla.org\/security\/#\/schema\/person\/image\/41743ae2317d18057bd67baef8923420","url":"https:\/\/secure.gravatar.com\/avatar\/01529deaafc1a9fb5aa0a376a7bea560?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/01529deaafc1a9fb5aa0a376a7bea560?s=96&d=identicon&r=g","caption":"Ben Wilson"}}]}},"_links":{"self":[{"href":"https:\/\/blog.mozilla.org\/security\/wp-json\/wp\/v2\/posts\/2826"}],"collection":[{"href":"https:\/\/blog.mozilla.org\/security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mozilla.org\/security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/security\/wp-json\/wp\/v2\/users\/1800"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/security\/wp-json\/wp\/v2\/comments?post=2826"}],"version-history":[{"count":0,"href":"https:\/\/blog.mozilla.org\/security\/wp-json\/wp\/v2\/posts\/2826\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.mozilla.org\/security\/wp-json\/wp\/v2\/media?parent=2826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mozilla.org\/security\/wp-json\/wp\/v2\/categories?post=2826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mozilla.org\/security\/wp-json\/wp\/v2\/tags?post=2826"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mozilla.org\/security\/wp-json\/wp\/v2\/coauthors?post=2826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}