It was pointed out to me that the OCSP status of the misissued certificate that is valid for over 5 years is still "unknown" despite having been revoked a week ago. I asked KIR about this in the bug [1] and am surprised by their response:
This certificate is revoked on CRL. Because the certificate has been never > received by the customer its status on OCSP is "unknown". To make the > certificate "revoked" on OCSP first we should make it "valid" what makes no > sense. I know there is inconsistency between CRL and OCSP but there are > some scenarios when it can be insecure to make it valid just in order to > make it revoked. > Upon further questioning KIR states: Of course I can mark it as revoked after I make it valid, but I think it is > more secure practice not to change its status at all when the certificate > is not received by the customer. Let's suppose the scenario when your CA > generate certificate and the customer wants you to deliver it to its > office. What OCSP status the certificate should have when you are on your > way to the customer office? valid - I do not think so. When the certificate > is stolen you are in trouble. So the only option is "unknown" but then we > have different statuses on CRL and OCSP - but we are still safe. It is not > only my opinion, we had a big discuss with our auditors about that. > Does anyone other then KIR and their auditor (Ernst & Young) think this is currently permitted? At the very least, I believe that returning "unknown" for a revoked certificate is misleading to Firefox users who will receive the "SEC_ERROR_OCSP_UNKNOWN_CERT" error instead of "SEC_ERROR_REVOKED_CERTIFICATE". Does anyone other than KIR and Ernst & Young believe that this meets WebTrust for CAs control 6.8.12? [2] - Wayne [1] https://bugzilla.mozilla.org/show_bug.cgi?id=1523186 [2] http://www.webtrust.org/principles-and-criteria/docs/item85228.pdf On Tue, Jan 29, 2019 at 2:10 AM Kurt Roeckx via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > On 2019-01-29 1:29, Wayne Thayer wrote: > > Piotr just filed an incident report on the misissuance that was reported > on > > 18-January: https://bugzilla.mozilla.org/show_bug.cgi?id=1523186 > > I guess this part is not very clear to me: > > > We identified and removed from system the registration policy that > > issued the problematic certificate. The problematic policy template > > was not listed in policies allowed for Certificate Transparency > > logging but contained Signed Certificate Timestamp extension. The > > usage of such policy template should be blocked by the CT > > functionality. We had only one policy in such state. > > I could read that as: > 1) This certificate was not supposed to be logged in CT > 2) The issuing should have been prevented > > I assume 2) was meant. > > > Kurt > _______________________________________________ > dev-security-policy mailing list > dev-security-policy@lists.mozilla.org > https://lists.mozilla.org/listinfo/dev-security-policy > _______________________________________________ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy