On 09/09/16 00:32, Matt Palmer wrote:
> On Thu, Sep 08, 2016 at 09:44:04AM -0700, Ryan Sleevi wrote:
>> On Thursday, September 8, 2016 at 4:09:25 AM UTC-7, Rob Stradling wrote:
>>>>  1. Enforce CT only after a certain date, after which WoSign will need
>>>>     to embed qualified SCTs. This check can be bypassed if the CA
>>>>     backdates certificates (which is problematic, given the history of
>>>>     backdating certificates in this particular case.)
>>>
>>> AIUI, Chrome doesn't currently consider the difference between the
>>> certificate's notBefore date and the corresponding SCTs' timestamps when
>>> evaluating whether or not the certificate is "CT qualified".
>>>
>>> To guard against backdating, ISTM that future versions of Chrome (and
>>> hopefully Firefox too) could require, for certain CAs, that:
>>>   1. The certificate MUST be "CT qualified".
>>>   and
>>>   2. In addition to the standard requirements for being "CT qualified",
>>> the SCT timestamps MUST be within N seconds of the certificate's
>>> notBefore date.
>>
>> Without wanting to derail this thread with discussions of Chrome's CT
>> implementations, to the point it's relevant to a Firefox implementation,
>> this is something better as part of the monitoring ecosystem (and with a
>> CA/B Forum Guideline) than as a client enforcement.
> 
> I read Rob's proposal as one specifically for CAs under some sort of
> "quintuple secret probation" arrangement, where there has been a history of
> shenanigans with notBefore dates.

Yes, precisely that.

-- 
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to