Hi Corey,

I think Apple has clarified that they expect the full CRL URL to be added for CAs that are for the issuance of email protection or TLS certificates. It should not be required for CAs that contain an EKU with only id-kp-timeStamping or id-kp-codeSigning or id-kp-clientAuth. If I recall correctly, this was also confirmed by Kathleen during a CCADB presentation in February 2022.


Thanks,
Dimitris.

On 20/1/2023 6:00 μ.μ., 'Corey Bonnell' via [email protected] wrote:

Hi Ben,

I think this change is fine from a Mozilla Policy standpoint, as Mozilla only requires the disclosure of CRL URLs for TLS-capable CAs in CCADB. Apple, on the other hand, requires the disclosure of CRL URLs for all CAs regardless of technical capability (i.e., non-TLS CAs also have this disclosure requirement).  Further guidance in the Apple root program policy on the encoding requirements for IDPs may be needed to cover the non-TLS CA case.

Thanks,

Corey

*From:* Ben Wilson <[email protected]>
*Sent:* Thursday, January 19, 2023 5:46 PM
*To:* Corey Bonnell <[email protected]>
*Cc:* Aaron Gable <[email protected]>; [email protected] <[email protected]>; Andrew Ayer <[email protected]> *Subject:* Re: Policy 2.8.1: MRSP Issue #256: Requirement that Partitioned CRLs include an Issuing Distribution Point extension

I am proposing that instead of having a section 6.3 (CRLs) we have a section 6.1.2 (TLS Certificate CRL Issuing Distribution Points) - thoughts, comments, suggestions?

See

https://github.com/BenWilson-Mozilla/pkipolicy/commit/f634a41671fe1319b1449a9ffe253449b380fcf9

On Wed, Dec 7, 2022 at 12:38 PM Ben Wilson <[email protected]> wrote:

    For review, see
    
https://github.com/BenWilson-Mozilla/pkipolicy/commit/de5e462f4ac16bd1e33c470a149061927b805e99.


    On Sun, Dec 4, 2022 at 11:21 PM Corey Bonnell
    <[email protected]> wrote:

        I like this solution. It establishes the CCADB-specific
        requirement in the section dedicated to CCADB but also
        specifies the CRL profile with details that are not
        necessarily specific to CCADB.

        Thanks,

        Corey

        *From:* Ben Wilson <[email protected]>
        *Sent:* Wednesday, November 30, 2022 3:15 PM
        *To:* Aaron Gable <[email protected]>
        *Cc:* Corey Bonnell <[email protected]>;
        [email protected] <[email protected]>;
        Andrew Ayer <[email protected]>
        *Subject:* Re: Policy 2.8.1: MRSP Issue #256: Requirement that
        Partitioned CRLs include an Issuing Distribution Point extension

        What about adding something in both locations?

        (1) Making the change in MRSP section 4.1 to say, "Each CRL
        referenced by the JSON Array of Partitioned CRLs MUST contain
        a critical Issuing Distribution Point extension _as described
        in section 6.3_. The Issuing Distribution Point extension MUST
        contain a distributionPoint containing a
        UniformResourceIdentifier whose value equals the URL of the
        CRL in the JSON Array of Partitioned CRL;"

        _AND_

        (2) making Corey's suggested change to MRSP section 6.3 so
        that it says,

        A CRL whose scope does not include all unexpired certificates
        that are issued by the CA SHALL contain a critical Issuing
        Distribution Point extension. The distributionPoint field of
        the extension SHALL include a UniformResourceIdentifier whose
        value is derived from one of the two following sources:

        1.    The UniformResourceIdentifier as encoded in the
        distributionPoint field of an issued certificate's CRL
        Distribution Points extension (see RFC 5280 section 5.2.5); or

        2.    The URL as included in the "JSON Array of Partitioned
        CRLs" field in the CCADB entry corresponding to the
        certificate for the issuing CA.

        Will that create any conflicting language or leave a gap that
        would allow CRL swapping?  If not, then I don't mind if it's
        slightly redundant in some aspects.

        Thanks,

        Ben

        On Mon, Nov 28, 2022 at 5:17 PM Aaron Gable
        <[email protected]> wrote:

            I think you make a really good point! I'm not a fan of
            repeating ourselves, but clarity is very valuable.

            I'd be happy with this requirement in either phrasing.

            Aaron

            On Tue, Nov 22, 2022 at 8:30 AM Corey Bonnell
            <[email protected]> wrote:

                Hi Aaron,

                I prefer explicitly stating that something is allowed,
                because we have seen previously that the lack of
                explicit allowance (or prohibition) in these
                requirements is the source of much disagreement. For
                this reason, I think explicitly enumerating what is
                allowed provides the most clarity (and less room for
                future disagreements).

                That being said, I agree that your proposal is much
                more concise than the other proposals. If folks think
                my concern about explicitly enumerating allowances is
                unreasonable, then I think your language is fine.

                Thanks,

                Corey

                *From:* Aaron Gable <[email protected]>
                *Sent:* Thursday, November 17, 2022 5:32 PM
                *To:* Corey Bonnell <[email protected]>
                *Cc:* Ben Wilson <[email protected]>;
                [email protected] <[email protected]>
                *Subject:* Re: Policy 2.8.1: MRSP Issue #256:
                Requirement that Partitioned CRLs include an Issuing
                Distribution Point extension

                I believe that my proposal addresses that case. It
                only establishes a single requirement: that the URLs
                in CCADB and (one of) the URIs in the CRLs match. It
                doesn't matter why the CA is producing those CRLs
                (specifically for CCADB, or for use directly by
                relying parties, or both) or what the sharding
                strategy is: the important thing here is that the URL
                requested by CRLite infrastructure contains a CRL with
                a matching distributionPoint.

                Aaron

                On Thu, Nov 17, 2022 at 2:21 PM Corey Bonnell
                <[email protected]> wrote:

                    I think the proposal may need accommodate the case
                    where issued certificates have a CRLDP that
                    contain a URI which points to a sharded CRL that
                    may not be disclosed in CCADB. In other words, it
                    is possible that the CA employs one sharding
                    strategy for CCADB while using a different
                    strategy for the CRLs that are referenced in the
                    CRLDP of certificates it issues. The CA may be
                    producing more CRLs than strictly necessary in
                    this case, but I’m unaware of anything prohibiting
                    such practice today and am hard-pressed to think
                    of any issues that may arise with such an
                    arrangement. I attempted to capture this
                    consideration in my language proposal on Github [1].

                    Thanks,

                    Corey

                    [1]
                    
https://github.com/mozilla/pkipolicy/issues/256#issuecomment-1315648591

                    *From:* 'Aaron Gable' via
                    [email protected]
                    <[email protected]>
                    *Sent:* Thursday, November 17, 2022 4:03 PM
                    *To:* Ben Wilson <[email protected]>
                    *Cc:* [email protected]
                    <[email protected]>
                    *Subject:* Re: Policy 2.8.1: MRSP Issue #256:
                    Requirement that Partitioned CRLs include an
                    Issuing Distribution Point extension

                    Thanks Ben, this language seems reasonable to me
                    (with one edit: the last acronym "CRL" needs to be
                    plural).

                    That said, rather than repeating-and-extending the
                    BRs language, I would consider turning this
                    requirement on its head:

                    "Each URL listed in the JSON Array of Partitioned
                    CRLs MUST match a distributionPoint
                    UniformResourceIdentifier value in the referenced
                    CRL."

                    Basically, because the CRLs are already required
                    to include the distributionPoint field, there's no
                    need to specify that again. Instead, just specify
                    that the URL listed in CCADB must match the
                    distributionPoint, because otherwise Mozilla won't
                    trust the fetched CRL.

                    Does that approach seem reasonable as well?

                    Aaron

                    On Wed, Nov 16, 2022 at 9:01 PM Ben Wilson
                    <[email protected]> wrote:

                        This discussion thread is to address Issue
                        #256
                        <https://github.com/mozilla/pkipolicy/issues/256>
                        and the need to clarify that partitioned CRLs
                        need to include a critical Issuing
                        Distribution Point extension.

                        The language proposed for addition to Mozilla
                        Root Store Policy section 4.1
                        
<https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/#41-additional-requirements>
                        would read, "Each CRL referenced by the JSON
                        Array of Partitioned CRLs MUST contain a
                        critical Issuing Distribution Point extension.
                        The Issuing Distribution Point extension MUST
                        contain a distributionPoint containing a
                        UniformResourceIdentifier whose value equals
                        the URL of the CRL in the JSON Array of
                        Partitioned CRL".

                        Please provide any comments or suggestions.

                        Thanks,

                        Ben

-- You received this message because you are
                        subscribed to the Google Groups
                        "[email protected]" group.
                        To unsubscribe from this group and stop
                        receiving emails from it, send an email to
                        [email protected].
                        To view this discussion on the web visit
                        
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaZ3nUbS9_hQUJ5rUzb%3DyPYkA-3ienthPwqMGdP8Fo-86g%40mail.gmail.com
                        
<https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaZ3nUbS9_hQUJ5rUzb%3DyPYkA-3ienthPwqMGdP8Fo-86g%40mail.gmail.com?utm_medium=email&utm_source=footer>.

-- You received this message because you are
                    subscribed to the Google Groups
                    "[email protected]" group.
                    To unsubscribe from this group and stop receiving
                    emails from it, send an email to
                    [email protected].
                    To view this discussion on the web visit
                    
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CAEmnErdgaxi9TROWe5GdQ%3DFpMXpQcQcquL8xgGgrVfxCyOeydw%40mail.gmail.com
                    
<https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CAEmnErdgaxi9TROWe5GdQ%3DFpMXpQcQcquL8xgGgrVfxCyOeydw%40mail.gmail.com?utm_medium=email&utm_source=footer>.

--
You received this message because you are subscribed to the Google Groups "[email protected]" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/DM6PR14MB2186105AA08E6F862CEA599592C59%40DM6PR14MB2186.namprd14.prod.outlook.com <https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/DM6PR14MB2186105AA08E6F862CEA599592C59%40DM6PR14MB2186.namprd14.prod.outlook.com?utm_medium=email&utm_source=footer>.

--
You received this message because you are subscribed to the Google Groups 
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/71a7667c-3858-cf91-8e65-b09ce6c4c44f%40it.auth.gr.

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to