On 03/19/2015 02:45 AM, Ryan Sleevi wrote:
> On Thu, March 19, 2015 1:35 am, LuxTrust CA wrote:
>>  Regarding issue #2 : OCSP responds "good" to a non-issued certificate
>>  (serials FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF and 00) (BR Section
>>  13.2.6) :
>>  LuxTrust’s OCSP application currently does not support this feature
>>  (technical limitation). LuxTrust is currently analyzing the possibility of
>>  an alternative solution / technical improvements.
>>  Pending a technical alternative, LuxTrust would like to underline that the
>>  risks raised by the “good� response to a non-issue certificate are
>>  mitigated
>>  by compensatory controls: even if LuxTrust’s OCSP responder provides an
>>  inadequate “good� response, the certificate will not pass the step of
>>  validation of the CA information (trust anchor) because the certificate is
>>  not signed by LuxTrust’s CA (provided that the certificate validation
>>  check
>>  is compliant with RFC 5280, section 6.1 Basic path validation).
> 
> This is not an accurate representation of the security risks.
> 
> The Baseline Requirements incorporated this change in part due to the
> compromise of Diginotar, in which the issuing CA was unable to account for
> or present records of validly signed certificates. This failure, combined
> with a failure to monitor its OCSP logs, allowed for the scope of the
> compromise to be significantly underestimated.
> 
> So the description of why this is not an issue is not correct, nor would
> it be compliant with the Baseline Requirements.
> 
> This has been a requirement of the CA/Browser Forum since 2013-08-01, or 1
> year and 7 months. This seems to have been ample time to evaluate
> alternative solutions or technical improvements to comply with this
> requirement, which itself predates LuxTrust's request for inclusion.
> 
> This does seem to be an item that needs remedying. According to 7.3.6 of
> ETSI TS 102 042 (which you have been audited to), Item h, PTC-BR
> certificates must conform to the BRG Section 13.2, which establishes this
> as a requirement in Section 13.2.5.
> 
> So this is non-complying with the ETSI TS 102 042 criteria to which you've
> been audited, in addition to the Mozilla Root Inclusion Policy
> requirements of BRG conformance.

I'm still seeing "good" responses to non-issued certificates. Does
LuxTrust have an update on their progress in resolving this issue?

Thanks,
David
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to