On Sun, July 27, 2014 7:41 pm, Jeremy Rowley wrote:
>  You can tell which BR version
>  the cert complies with by looking at the issuance date,

No. You can't.

Surely you don't mean to tell me that if I go find a cert DigiCert issued
last week that I can safely assume it's going to conform to BR 1.1.8, do
you?

The most recent WebTrust Seal linked from your page, Seal ID 1527,
documents that DigiCert was audited to WebTrust 2.0 by KPMG, dated 12 July
2013, and covering through 31 March 2013.

Your CP (v4.06) and CPS (v4.06) are both dated May 14, 2014. But BR 1.1.8
is dated 5 June 2014 (Replacing 1.1.7, dated 3 April 2014). Can I tell,
from looking at the issuance date, which BR version a cert issued on July
20 2014 was issued?

Would I be safe in assuming 1.1.8, even though it's newer than your
CP/CPS? Should I assume your CP/CPS were updated to reflect through 1.1.7?

What about the fact that WebTrust for BR, v1.1 (Amended), the most recent
version published by AICPA, is set with an effective Jan 31, 2013 date,
which corresponds to the time between BR 1.1.1 and BR 1.1.2 (1.1.2
introducing the language regarding wildcard certs and gTLDs)?

There's no reasonable, programatic way to determine which, out of all
these criteria, DigiCert is claiming conformance to. Short of manually
inspecting CP/CPSes.

This is where the OID nightmare comes from. There are 15 versions of the
BRs. There are three versions of WebTrust for BRs. I haven't bothered to
count how many ETSI versions. From the DigiCert repository (
http://www.digicert.com/ssl-cps-repository.htm ) I see there have been
four versions of your CP/CPS since the BRs went into effect.

And this, of course, ignores the practice that some CAs (but presumably
not Digicert) practice, of 'backdating' the issuance date of certs for
compatibility reasons (or, allegedly, accounting, although that's a bit
specious).

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to