On Friday, April 20, 2018 at 9:31:32 AM UTC-4, Tim Shirley wrote:
> First of all, it's important to distinguish between the BR requirement, which 
> is defined in terms of certificate *issuance* dates, and the value in the 
> "Not Before" field.  I'm guessing the "Not Before" value in this certificate 
> is not the actual issuance timestamp, since it's unlikely it was issued right 
> at the stroke of midnight.  The CA is probably rounding, but we don't know if 
> they're rounding up or down.  But it would only be mis-issuance if the 
> issuance occurred outside of the allowed time window.  There's nothing I can 
> see to show when the certificate was actually issued; it first showed up in 
> CT logs on March 13, so we know it was issued on or before that, but that's 
> all we know for sure about the issuance time.
> 
> So what is the allowed time window according to the BRs?  I'd argue that the 
> intent was that it be >=.  If you read the first bullet's "after" as >, then 
> you have to also read the second bullet's "prior to" as <.  So what rule 
> applies to certificates issued ON March 1, 2018?  Apparently none.  Certainly 
> that wasn't the intent, which is why I interpret the requirement as >=.  That 
> is, the dividing line is the moment in time when we moved from February into 
> March, such that one rule or the other is always in effect.

I agree, it was not the intent, nor is it consistent with the other 
modifications in 193 ( 
https://cabforum.org/2017/03/17/ballot-193-825-day-certificate-lifetimes/ ).

> But even if you accept my premise there, then you have to ask "in what 
> timezone?"  March 1 00:00:00 2018 GMT in North America is February 28.  So I 
> could see someone making the argument that issuance at that moment in time is 
> fine if the CA is in North America but it's mis-issuance if the CA is in 
> Europe, since the requirements don't state that the measurement is UTC.  This 
> is why I'm not a fan of such precise enforcements of date-related compliance. 
>  There are a lot of different ways to interpret dates/times, but none of the 
> readings materially change the net effect of the rule.  That is, all readings 
> change the max validity period to ~825 days (which itself is subject to 
> debate as to its precise meaning in terms of seconds) within a day or two of 
> each other.  So, enforcing the date as Mar 1 as opposed to Mar 2 doesn't seem 
> to add a lot of value and leads to confusion like this.

I'm curious how auditors would view this, since I think this says that's all 
that matters.

>From the client side, we continue to take the most restrictive interpretation 
>that is reasonable, and thus in Chrome, any certificate whose notBefore is >= 
>2018-03-01 00:00:00 UTC and whose difference (in days measured as 60*60*24 
>seconds) is greater than 825 days from the notAfter is rejected.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to