Le vendredi 20 septembre 2013 20:44:23 UTC+2, Michael Ströder a écrit :
> Kathleen Wilson wrote:
> > Let’s start the policy discussion about preloading revocations of 
> > intermediate
> > CA certificates.
> > 
> > https://wiki.mozilla.org/CA:ImprovingRevocation#Preload_Revocations_of_Intermediate_CA_Certificates
> > 
> > In particular, I’d like to discussion *when* a CA should notify Mozilla of a
> > revocation of an intermediate certificate, so that certificate can be 
> > included
> > in the revocation list push mechanism.
> 
> I'd recommend that a CA puts a revoked sub-CA cert immediatley on its CRL.
> So no need to inform Mozilla and no need for this insecure extra
> process/mechanism at all.

The issuing CA will still have to revoke the sub-CA certificate, and publish 
its revoked status (CRL+OCSP).

Some CAs have produced certificates without CRLDP or AIA:OCSP extension, 
revocation checking can't be performed for such certificates (hard-fail is a 
possible mitigation, but not a perfect one).

OCSP responder certificates can't be revoked, that was made possible by 
RFC2560, and made mandatory by CABF BR. Mozilla proposes to use that 
notification mechanism to solve this.

> Ah, the Mozilla developers removed CRL support...maybe Mozilla wants to
> finally be the one-and-only super CA.

Mozilla is already a super CA. Google, Microsoft, Adobe, Opera, Oracle, etc are 
all super CAs. Linux distribution vendors are also super CAs, because they too 
distribute root certificates (additional ones).
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to