On Mon, Dec 2, 2013 at 5:56 PM, Brian Smith <[email protected]> wrote:
> An implementation that requires the validity period of the issuer's
> certificate to subsume the validity period of the issued certificate
> would be implementing a non-standard and overly-restrictive
> constraint. Let's see some evidence of a web browser that does enforce
> such a non-standard constraint, before we attempt to accommodate such
> creatures.

Besides the replies on the list, I did get some replies off-list about
this, where the CA seems to be wanting to do the straightforward way,
but where compatibility concerns prompt CAs to try to back-date certs.

Four thoughts:

1. I think it is 100% fine to define this as a problematic practice in
our CA program strongly encourage CAs not to do it, and refuse to
tolerate backdating that is done to get around our policies.

2. It still seems reasonable, for lack of any better alternative, to
use the notBefore date as the best approximation of the
creation/issuance/start-of-trust date, when implementing things like
bug 942515.

3. It still isn't clear that, in the cases where backdating may be
necessary for backward compatibility, that the certificate in question
needs to be also valid for three years into the future. So, for
example, we may still be able to implement checks for maximum
certificate lifetime of 3 or 5 years or whatever is ultimately
decided.

4. This is more evidence that mandatory CT is a good idea, because CT
provides a fairly tamperproof mechanism for determining certificate
issuance (or, rather, the start of the period in which the browser
will trust the certificate).

Cheers,
Brian
-- 
Mozilla Networking/Crypto/Security (Necko/NSS/PSM)
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to