Re: restricting the scope of CA certificates

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Friday 03 June 2016 15:14:23 Tomas Mraz wrote:
> On Pá, 2016-06-03 at 15:06 +0200, Nikos Mavrogiannopoulos wrote:
> > On Fri, 2016-06-03 at 14:30 +0200, Tomas Mraz wrote:
> > > > Sorry, I didn't realize that my question was worded ambiguously.
> > > > 
> > > > Let me rephrase it: Is it possible to express that only the Red
> > > > Hat 
> > > > internal CA may issue certificates under *.corp.redhat.com, and
> > > > no
> > > > other 
> > > > CAs may issue certificates for this subtree?
> > > 
> > > Not in the terms of stapled extensions - as the extensions would
> > > have
> > > to be stapled onto some concrete certificates. You would have to
> > > basically create stapled extensions for every CA in your trusted
> > > list
> > > except for the Red Hat internal CA. And if any additional CA is
> > > added
> > > to the trusted list, it would have to get this stapled extension
> > > too.
> > 
> > Well you could do that by stapling every other certificate than Red
> > Hat's with corp.redhat.com being on the excluded subtrees.
> 
> Yes, that's what I wrote above however that would not be very
> practical as you would have to monitor the trusted list for additions
> and staple them too once they are added.

well, if it is really needed, I don't see why we couldn't create some 
kind of /etc/p11-kit.d directory that houses scripts that will do such 
transform on certificates on package upgrade/downgrade/reinstall
-- 
Regards,
Hubert Kario
Senior Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic

Attachment: signature.asc
Description: This is a digitally signed message part.

--
security mailing list
security@xxxxxxxxxxxxxxxxxxxxxxx
https://lists.fedoraproject.org/admin/lists/security@xxxxxxxxxxxxxxxxxxxxxxx

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [KDE Users]     [Coolkey]

  Powered by Linux