On 19/4/2022 11:11 μ.μ., Ben Wilson wrote:
See responses below.
[...]


Although RFC 5280 does use "end entity certificate" (without the hyphen), the current MRSP already uses "end-entity certificate" with the hyphen, so changing it now would require that I replace it in those other places as well.  Should we add this as a GitHub issue to resolve in a future version of the MRSP?

I don't have any strong feelings about this. I just noticed this subtle difference and brought it to the community's attention. I thought of it as similar to other proposed changes (SSL --> TLS, "CA operators", subordinate --> intermediate, etc).



    Section 6.1.1
    - *cessationOfOperation*

    /"the CA is made aware of any circumstance indicating that use of
    a fully‐qualified domain name or IP address in the certificate is
    no longer legally permitted (e.g. a court or arbitrator has
    revoked a domain name registrant’s right to use the domain name, a
    relevant licensing or services agreement between the domain name
    registrant and the applicant has terminated, or the domain name
    registrant has failed to renew the domain name)."/

    This looks like a CA-driven revocationReason and seems to fit the
    privilegeWithdrawn reason better.

This third bullet, quoted above, is very similar to the other two bullets in this section for cessationofOperation ("the certificate subscriber no longer controls, or is no longer authorized to use, all of the domain names in the certificate;" "the certificate subscriber will no longer be using the certificate because they are discontinuing their website;").  Therefore, we think it fits here, too.  A subscriber can make the CA aware of such circumstances, and these circumstances might not constitute a violation of the certificate subscriber agreement (the intention of privilegeWithdrawn).

    -*superseded
    *

      * /"//the CA obtains reasonable evidence that the validation of
        domain authorization or control for any fully‐qualified domain
        name or IP address in the certificate should not be relied
        upon; or"/
      * /"the CA has revoked the certificate for compliance reasons
        such as the certificate does not comply with this policy, the
        CA/Browser Forum's Baseline Requirements, or the CA’s CP or CPS."/

    *
    *Looking at these reasons, we have very similar intent for the
    reason "privilegeWithdrawn". Most probably, the intent of the
    revocationReason is to indicate /why/ a certificate has been
    revoked. Relying Parties probably don't care if a new certificate
    has been issued to replace a revoked one or not, but are more
    interested on why a particular certificate was revoked.


What if we combine the second and third bullets (failure of domain/IP address verification and compliance reasons) to read, "the CA has revoked the certificate because it was not issued in full compliance with this policy, the CA/Browser Forum's Baseline Requirements, or the CA’s CP or CPS."?  The reason being that we want "superseded" to encompass certificate replacement situations where there has not been a Subscriber's breach (privilegeWithdrawn).

I guess the term "breach" is a bit ambiguous because the current wording in "privilegeWithdrawn" considers reasons like "the CA is made aware of a material change in the information contained in the certificate" which doesn't clearly indicate a Subscriber's breach.

If the intent is to add all related "subscriber-side violations/breach of subscriber agreement/terms-of-use" reasons under "privilegeWithdrawn", perhaps an opening paragraph describing this intention -similar to the opening paragraph of cessationOfOperation/affiliationChanged- is needed for privilegeWithdrawn as well.


    ITU-T X.509's description doesn't shed too much light either:

    /"//*superseded*//indicates that the public-key certificate has
    been superseded but there is no cause to suspect that the private
    key has been compromised."/

    We recommend adding these two bullets under the
    "privilegeWithdrawn" reason so that CAs have a "preferred" reason
    to indicate compliance, domain validation/authorization,
    subscriber violation issues.


It seems that "privilegeWithdrawn" best fits the six bulleted items already there.

See above. If the intent is to separate the revocation reasons between a subscriber-side breach of the subscriber agreement/terms-of-use and a CA-side violation/failure with "privilegeWithdrawn" and "superseded" reasons respectively, then the bullet

 * /"//the CA obtains reasonable evidence that the validation of domain
   authorization or control for any fully‐qualified domain name or IP
   address in the certificate should not be relied upon; or"/

means that there was something wrong with the CA practices/implementation and validation information should not be relied upon; nothing caused by the Subscriber. If that's the case, then it's fine to remain under "superseded" as long as we clarify the intent a bit more. I believe the implementation by CAs would be easier if they knew that "privilegeWithdrawn" is targeted to subscriber-side violations and "superseded" to CA-side violations, without being able to predict cases which might fall under both :)

Dimitris.

--
You received this message because you are subscribed to the Google Groups 
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/bc8d7bd7-d0be-3e1c-0051-223a2f8714fd%40it.auth.gr.

Reply via email to