On Wed, Jan 24, 2018 at 6:52 AM Doug Beattie via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> We don't allow customers to set the notBefore date into the past.
>
> And regarding the Mozilla checks for
> https://bugzilla.mozilla.org/show_bug.cgi?id=908125, perhaps the
> "notBefore" date used in the check should be the earlier of the certificate
> NotBefore or the date the included SCT was created.


This has a variety of both technical problems (e.g. when logs are
disqualified) and policy problems (using CT as a trusted timestamping
service rather than disclosure) that makes this, as a practical matter,
non-viable.

I don't know how Chrome would handle this certificate, but if it marks it
> as invalid, it would be good to know so we can relay this to customers that
> have set the notBefore date after March 1st.


As of Chrome 66, It will be rejected as an invalid certificate and users
will be forced to click through. I would have included this in Chrome 65 or
earlier, but in general, I try to land enforcement code in a way that it
rolls out approximate to the transition date, in the event of any issues.
The use of the notBefore as a proxy for issuance date has been a behavior
of a Chrome for nearly 5 years now, and was originally behavior contributed
by Opera, which had similar checks even longer.

In general, a certificate with a given notBefore is minimally expected to
comply with all of the policies as of that date. NotBefore backdating
attempts to circumvent that, which is problematic, but notBefore
forward-dating runs the risk that the certificate will be unusable at the
time it is valid, because it does not comply with the policies of its
validity period.


>
> Doug
>
> > -----Original Message-----
> > From: dev-security-policy [mailto:dev-security-policy-
> > bounces+doug.beattie=globalsign....@lists.mozilla.org] On Behalf Of
> Gervase
> > Markham via dev-security-policy
> > Sent: Wednesday, January 24, 2018 5:05 AM
> > To: David E. Ross <nobody@nowhere.invalid>; mozilla-dev-security-
> > pol...@lists.mozilla.org
> > Subject: Re: GlobalSign certificate with far-future notBefore
> >
> > On 24/01/18 04:57, David E. Ross wrote:
> > > I am not sure about prohibiting forward-dating the notBefore date.  I
> > > can picture a situation where an existing site certificate is going to
> > > expire.  The site's administration decides to obtain a new certificate
> > > from a different certification authority.  Because of various
> > > administrative processes, the switch to the new site certificate
> > > cannot be accomplished quickly (e.g., moving the server); so they
> > > establish a notBefore date that is a month in the future.
> >
> > Why would that be _necessary_? What would go wrong if the cert was cut
> > with a notBefore of the current date, apart from the fact that they'd
> need to
> > renew it a month earlier?
> >
> > Gerv
> > _______________________________________________
> > dev-security-policy mailing list
> > dev-security-policy@lists.mozilla.org
> > https://lists.mozilla.org/listinfo/dev-security-policy
> _______________________________________________
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to