On Thu, Feb 2, 2017 at 3:59 PM, Jakob Bohm <[email protected]> wrote:

> On 02/02/2017 00:46, Kathleen Wilson wrote:
>
>> All,
>>
>> I've added another Potentially Problematic Practice, as follows.
>>
>> https://wiki.mozilla.org/CA:Problematic_Practices#Issuer_Encoding_in_CRL
>> The encoding of the Issuer field in the CRL should be byte-for-byte
>> equivalent with the encoding of the Issuer in the certificate; that is,
>> using the exact same string types and field contents. The specs (RFC 2459,
>> RFC 3280, RFC 5280) permit them to mismatch, but that causes compatibility
>> issues with various clients -- in such cases client software might not find
>> the entry for the revoked certificate in the CRL.
>>
>> As always, I will appreciate your thoughtful and constructive feedback.
>>
>> We ran into this situation several times while adding entries to OneCRL
>> for revoked intermediate certificates, because our script pulled the data
>> from the CAs' CRLs where possible.
>>
>> We have filed https://bugzilla.mozilla.org/show_bug.cgi?id=1330968 to
>> update the OneCRL client to be encoding agnostic when doing the Issuer
>> comparisons.
>>
>>
> What should a CA do if they have used different encodings of the same
> issuer DN in different certs that point to the same CRL location?
>
> Wouldn't a more proper set of rules be:
>
> 1. The encoding of the Issuer field in the CRL must be the same as in
>   the SubjectDN in the issuing certificate.
>
> 2. The IssuerDN in all future issued certificates must the same as in
>   the SubjectDN in the issuing certificate.
>
> 3. If any previously issued certificates did not follow rule 2, the CA
>   must publish a list of the exact IssuerDN encodings used in such
>   certificates.
>

What value does 3 provide?
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to