BR 6.1.1.3 states “The CA SHALL reject a certificate request if the requested 
Public Key does not meet the requirements set forth in Sections 6.1.5 and 6.1.6 
or if it has a known weak Private Key (such as a Debian weak key, see 
http://wiki.debian.org/SSLkeys).”

My assumption is a certificate which has been revoked due to compromise has a 
“weak Private Key.” As such, based on the current BRs, a CA should reject 
certificate requests using a key from a certificate that they revoked due to 
compromise.

Bruce.

From: Public [mailto:[email protected]] On Behalf Of Tim Hollebeek 
via Public
Sent: August 21, 2018 4:55 PM
To: Jeremy Rowley <[email protected]>; Ryan Sleevi 
<[email protected]>; CA/Browser Forum Public Discussion List 
<[email protected]>
Subject: [EXTERNAL]Re: [cabfpub] Issuance of certificates for keys reported as 
compromised

Yes, certainly, at a minimum, CAs should not be issuing new certificates for 
keys they themselves have previously determined to be compromised.

As you correctly note, this is currently a fairly common occurrence.

-Tim

From: Jeremy Rowley
Sent: Tuesday, August 21, 2018 4:51 PM
To: Ryan Sleevi <[email protected]<mailto:[email protected]>>; CA/Browser Forum 
Public Discussion List <[email protected]<mailto:[email protected]>>; Tim 
Hollebeek <[email protected]<mailto:[email protected]>>
Subject: RE: [cabfpub] Issuance of certificates for keys reported as compromised

I think Tim is proposing the CA should check their own database of keys revoked 
for compromise to make sure they don’t issue a cert with the same key. For 
example, we re-issued the Blizzard cert that was revoked when the key was 
posted online. We’ve found that regardless of the reason for revocation pretty 
much every CA will issue a cert with a previous key.

If the key is compromised, eventually you just get it revoked with enough CAs 
that people don’t use that same key. It’s not exactly hard to generate a new 
end entity key.


From: Public <[email protected]<mailto:[email protected]>> 
On Behalf Of Ryan Sleevi via Public
Sent: Tuesday, August 21, 2018 1:34 PM
To: Tim Hollebeek 
<[email protected]<mailto:[email protected]>>; CABFPub 
<[email protected]<mailto:[email protected]>>
Subject: Re: [cabfpub] Issuance of certificates for keys reported as compromised

I seem to recall we've discussed this before. There are a number of practical 
challenges with this, and that any reasonable proposal would need to provide 
interoperable guidance for. In short, it was substantial work, for questionable 
gain, and while it sounds sensible, the devil is in the details.

We need to define what a compromised key is, how it was reported, and how it 
was determined. Without these basic things, you have the potential for 
malicious DoS. For example, we know of some CAs that revoke certificates as 
compromised even with faulty demonstration of proof, or insufficient proof. 
We've had substantial discussions about what counts as reasonable proof versus 
not - e.g. the signing of nonces or the like.

You then have to have CAs consistently reporting (e.g. through CRLs and OCSP) 
the reason for revocation. All CAs would need to check all other CAs, or there 
would need to be some meta-service to aggregate. If there is an aggregated 
metaservice, you have to determine how to authenticate that metaservice and its 
information - it becomes a single point of attack for DoS.

Once you've built a system that allows revoking an entire key off the Internet, 
you then have to deal with the policy ramifications of such a centralized risk, 
such as giving a single avenue for political or external attacks, such as 
revoking keys as 'compromised' if, for example, they are used to host 
'objectionable' content.

As you can see, these are just a few of the issues that present themselves.

On Tue, Aug 21, 2018 at 2:42 PM Tim Hollebeek via Public 
<[email protected]<mailto:[email protected]>> wrote:

Should we update the BRs to disallow issuance of certificates for key pairs 
that have been previously reported as compromised?

I’m not aware of any CAs that currently do that check today, but it’s not that 
difficult to do.  It might be a sensible thing to add in the future.  However 
it only works if all CAs do it, otherwise subscribers will just get their 
compromised key signed by a different CA.

-Tim
_______________________________________________
Public mailing list
[email protected]<mailto:[email protected]>
https://cabforum.org/mailman/listinfo/public
_______________________________________________
Public mailing list
[email protected]
https://cabforum.org/mailman/listinfo/public

Reply via email to