Possession of a CSR is not proof of compromise. For a quick demonstration, here
are 45k CSRs
<https://github.com/search?q=%22BEGIN+CERTIFICATE+REQUEST%22+MII&type=code>
which
I could submit to a revocation API, but for which I certainly do not
control -- nor know anything about the compromise status of -- the
corresponding private key.

Aaron

On Tue, Mar 25, 2025 at 12:29 AM Suchan Seo <tjtn...@gmail.com> wrote:

> I personally don't care, but Current moziila revocation reason policy
> <https://wiki.mozilla.org/CA/Revocation_Reasons#End_Entity_TLS_Certificate_CRLRevocation_Reasons>
> explictly not allow CSR as proof of key possesion:
>  The scope of revocation depends on whether the certificate subscriber has
> proven possession of the private key of the certificate. A CSR alone does
> not prove possession of the certificate’s private key for the purpose of
> initiating a revocation.
>
>    - If anyone requesting revocation for keyCompromise has previously
>    demonstrated or can currently demonstrate possession of the private key of
>    the certificate, then the CA operator MUST revoke all instances of that key
>    across all subscribers.
>    - If the certificate subscriber requests that the CA operator revoke
>    the certificate for keyCompromise, and has not previously demonstrated and
>    cannot currently demonstrate possession of the associated private key of
>    that certificate, the CA operator MAY revoke all certificates associated
>    with that subscriber that contain that public key. The CA operator MUST NOT
>    assume that it has evidence of private key compromise for the purposes of
>    revoking the certificates of other subscribers, but MAY block issuance of
>    future certificates with that key.
>
>
> 2025년 3월 25일 화요일 오후 3시 56분 10초 UTC+9에 Arabella Barks님이 작성:
>
> Suchan Seo,
>
> Regarding your concern about being included in the
> GlobalKeyCompromisedList without proof, I have a technical proposal: Since
> the CA definitely holds 100% of the CSR (Certificate Signing Request)
> submitted by the applicant when applying for a certificate, and the CSR
> contains the signature stamp of the private key on the application message,
> if the CA submits the CSR together when docking with the
> GlobalKeyCompromisedList, is it sufficient to prove that the applicant owns
> the private key?
>
> I'm not sure if this is enough to ease your concerns. If there are any
> errors on my part, I’m pleased and welcome to see your corrections.
>
>
>
> --
> You received this message because you are subscribed to the Google Groups "
> dev-security-policy@mozilla.org" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to dev-security-policy+unsubscr...@mozilla.org.
> To view this discussion visit
> https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/2c5ae5d4-e876-4a28-a18a-36bd2c2cc485n%40mozilla.org
> <https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/2c5ae5d4-e876-4a28-a18a-36bd2c2cc485n%40mozilla.org?utm_medium=email&utm_source=footer>
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"dev-security-policy@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to dev-security-policy+unsubscr...@mozilla.org.
To view this discussion visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CAEmnErcXrMoTRN29vc7BC%2BhgLEKa3ij-Y33LWsPnsm9tCzT5mA%40mail.gmail.com.

Reply via email to