Looking at the BRs, specifically BR 4.9.1, the reasons that can lead 
to fast revocation fall into a few categories / groups:

(I will reference the numbered items with 24 hour limit as A#, the numbered 
items with 120 hour limit as B# and the numbered items in 4.9.1.2 as C#).

(Some of the numbered items A1 to C9 fall under different categories 
depending on concrete circumstances).

G1. Explicit actions by the subscriber themselves (A1, A2, B4, B6):
   These are triggered and timed by their own actions and are not really 
  unexpected or sudden.

G2. Dishonest actions by the subscriber themselves (A2, B2, B3, B4, 
   B5, B8):
   The subscriber brought this upon themselves, no (or little) mercy.

G3. An underlying security failure in the subscriber's 
  systems/organization (A3, B5, B11):
   These are easily explained by the actual security incident, and any 
  haste and recrimination goes to that incident, the certificate 
  revocation is a necessary action to protect the subscriber from the 
  effects of the security failure.

G4. Massive failure at the CA (B9, all of C):
   This is typically a major situation affecting large parts of the 
  Internet (unless it was an unusually small CA).  Global disaster
  mitigation is generally initiated in such rare situations.

G5. The CAB/F changes the minimum key strength requirements in BR 6.1.5 or
  6.1.6 without a transition period (B1, C3): This would typically be voted 
  down by a majority of CAs.

G6. The CA has second thoughts / doubts about how they validated the 
  information in the certificate even though that information is actually 
  correct (A4, B7):
   This is an operational failure at the CA, and rightly justifies blame 
  against the CA (however it would be nice if those two BR points allowed 
  retroactive correction similar to A2 and C2).

G7. The CA made a technical error in the certificate (B7, C5):
   Again an operational error that justifies blaming the CA.

G8. CA specific rules not required by the BRs (B10, C9):
   Clearly blameable on the CA, and possibly a reason to not choose that 
  CA in the first place.

So absent a bad CA, I wonder where there is a rule that subscribers 
should be ready to quickly replace certificates due to actions far 
outside their own control.


Enjoy

Jakob
-- 
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded 
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to