On Wed, Feb 24, 2021 at 09:21:04PM +0200, Alexander Bokovoy via FreeIPA-users wrote: > On ke, 24 helmi 2021, Alan Latteri via FreeIPA-users wrote: > > Now that Mozilla and other browsers will not Trust a certificate with a > > validity length longer than a year, FreeIPA should change the default > > length to match. Currently IPA issues 2 year certificates, which make > > all the browsers view them as Un-Trusted. > > Do you have proof that this is really happening for the cases where a > browser trusts IPA CA manually? IPA CAs are not part of the preinstalled > Root CAs bundle anywhere so one have to add them manually. > > According to Apple it only affects server certificates issued by > commercial CAs trusted by the browsers as part of their 'Root CA' > bundles, https://support.apple.com/en-us/HT211025: > > ---------------- > This change will affect only TLS server certificates issued from the > Root CAs preinstalled with iOS, iPadOS, macOS, watchOS, and tvOS. > Additionally, this change will affect only TLS server certificates > issued on or after September 1, 2020; any certificates issued prior to > that date will not be affected by this change. > ---------------- > > Mozilla root certificate program says the same, it only applies to > certificates issued by those CAs who are part of their root CAs program: > > https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/#21-ca-operations > > ---------------- > CAs whose certificates are included in Mozilla's root program MUST: > > ... > 5. verify that all of the information that is included in SSL > certificates remains current and correct at time intervals of 825 days > or less; > ---------------- > > Chrome/Chromium root CA program explicitly states these requirements > don't apply to custom/enterprise CAs: > > https://www.chromium.org/Home/chromium-security/root-ca-policy > > ---------------- > If you’re an enterprise managing trusted CAs for your organization, > including locally installed enterprise CAs, the policies described in > this document do not apply to your CA. No changes are currently planned > for how enterprise administrators manage those CAs within Chrome. CAs > that have been installed by the device owner or administrator into the > operating system trust store are expected to continue to work as they do > today. > > ... > > The sections below describe the Chrome Root Program, and policies and > requirements for CAs to have their certificates included in a default > installation of Chrome, as part of the transition to the Chrome Root > Store. > ---------------- > > The only place that explicitly states 397 days validity period should be > used is CA Browser Forum BR 1.7.3 which added following change on > 2020-09-01: > > https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.7.3.pdf > ------------------------ > 6.3.2 Certificate operational periods and key pair usage periods > > Subscriber Certificates issued on or after 1 September 2020 SHOULD NOT > have a Validity Period greater than 397 days and MUST NOT have a > Validity Period greater than 398 days. Subscriber Certificates issued > after 1 March 2018, but prior to 1 September 2020, MUST NOT have a > Validity Period greater than 825 days. Subscriber Certificates issued > after 1 July 2016 but prior to 1 March 2018 MUST NOT have a Validity > Period greater than 39 months. > > For the purpose of calculations, a day is measured as 86,400 seconds. > Any amount of time greater than this, including fractional seconds > and/or leap seconds, shall represent an additional day. For this reason, > Subscriber Certificates SHOULD NOT be issued for the maximum permissible > time by default, in order to account for such adjustments. > ------------------------ > > However, CA Browser Forum BR is not mandatory for those CAs that aren't > included into Root CA programs: > > ----------------------- > This document describes an integrated set of technologies, protocols, > identity-proofing, lifecycle management, and auditing requirements that > are necessary (but not sufficient) for the issuance and management of > Publicly-Trusted Certificates; Certificates that are trusted by virtue > of the fact that their corresponding Root Certificate is distributed in > widelyavailable application software. The requirements are not mandatory > for Certification Authorities unless and until they become adopted and > enforced by relying-party Application Software Suppliers. > ----------------------- >
I agree with Alexander's comments. Browsers do not apply the BR rules to private / enterprise CAs. Alexander filed a ticket to discuss reducing FreeIPA's default certificate lifetime: https://pagure.io/freeipa/issue/8724. I left some comments there, but tl;dr I am in favour of reducing the default lifetime, but it is not something we need to rush into. Cheers, Fraser _______________________________________________ FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure