On 10/13/2009 06:23 PM, Johnathan Nightingale:
As for ipsCA, I find myself agreeing with Eddy's point: that the null
bytes are a regrettable validation error that we should work with
ipsCA to ensure they fix; but NXDOMAIN on an OCSP server that appears
in issued certs is a bigger problem. I'm talking with Frank and
Kathleen about options there. I think contacting the CA and
understanding their situation is certain to be part of it. I think
suspension of their trust bits is a possible outcome, but it's
premature to talk about that before giving ipsCA a full chance to
explain things. We break 6k cert holders if we do that, which I'll
support if we don't have better options, but I don't see that we're
there yet.
Do others really feel like we've exhausted other options or that
attempts to communicate with the CA are fruitless?
I'd like to make two practical suggestions:
A) Follow up with CRLDP finally at Firefox and implement a fail-over
mechanism in case OCSP is down. For example StartCom has multiple
CRLDP's at different locations for such cases. That's also important for
us in case of a disaster (and recovery). Obviously it's of little help
in case the software ignores it. Also obviously this doesn't allow for
the current situation, it's primarily for unfortunate cases which can
happen for a short time. This leads me to the second suggestion...
B) File a bug for tracking ipsCA's conduct including the \0 bug and its
resolution, request follow-up with the next audit which covers the
period July-October 2009 (e.g. audit of the year 2009). Perform a review
discussion as we do for including a CA as soon as the audit report is
available. This should be processed at a higher priority than regular
inclusion requests.
#B is important because we are already month after the alleged bug
happened, plenty of time to get the act together. I think this warrants
some actions, a review and renewed confirmation of compliance might be a
good thing to do in this case.
--
Regards
Signer: Eddy Nigg, StartCom Ltd.
XMPP: [email protected]
Blog: http://blog.startcom.org/
Twitter: http://twitter.com/eddy_nigg
_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security