Hi Dimitris,

Comments inline.

*       "MUST match exactly as they appear in the certificates issued by the 
corresponding CA"

 

I think the intent of this is to ensure that if a CRL URL is specified both in 
a certificate via the CRLDP and in CCADB, there’s no variation in casing, 
trailing slashes, etc. I don’t think it’s establishing a requirement for all 
certificates to include CRLDP. I agree that the language should be improved to 
make that clear. 

 

*  If populating a full and complete CRL URL:
*  the JSON Array of Partitioned CRL URLs field MUST be empty.
*  If populating a JSON Array of Partitioned CRL URLs:
*  the full and complete CRL URL MUST be empty.

 

Can you expand on why it’s useful for both fields to be populated? I think this 
requirement to populate only one makes sense, because a full CRL’s scope will 
necessarily include all certificates issued by the CA. Thus, any partitioned 
CRL information is redundant and need not be specified if a full CRL is 
specified.

 

Thanks,

Corey

 

From: 'Dimitris Zacharopoulos (HARICA)' via CCADB Public <[email protected]> 
Sent: Tuesday, July 1, 2025 12:19 PM
To: Chris Clements <[email protected]>; CCADB Public <[email protected]>
Cc: [email protected] <[email protected]>; [email protected] 
<[email protected]>; Ben Wilson <[email protected]>
Subject: Re: Further Improving the CCADB Policy (FEEDBACK REQUESTED)

 

 

On 27/6/2025 1:18 π.μ., Chris Clements wrote:

Hi Dimitris, 

 

It seems switching between full and partitioned CRLs is acceptable so long as 
at least one of the two corresponding fields in the CCADB is accurately 
populated at all times. If there are multiple full CRL URLs during a period of 
transition, at least one of those will need to be disclosed to the CCADB. With 
that said, is there a suggested wording change for the CCADB Policy? 


Hi Chris, 

I believe my biggest concern comes from the recent change introducing the 
following sentence: 

*       "MUST match exactly as they appear in the certificates issued by the 
corresponding CA"

Since a CA may change URLs arbitrarily, it is clear that this rule will fail 
because there will be a moment in time where an early-issued end-entity 
certificate will have "URL A", and a later-issued certificate will have "URL 
B". In that case, CCADB will have either "URL A" or "URL B" causing issues with 
the policy.

I suggest removing this sentence. If I recall correctly, the purpose of this 
field was to offer an out-of-band CRL checking mechanism that Certificate 
Consumers may use in addition to the CRLDP URL in the actual certificates, or 
the lack of such an extension. 

To assist with the interchange of full and partitioned URLs, I suggest removing 
the following two sentences because as described, the actual implementation is 
"either" and not "either or both":

*       If populating a full and complete CRL URL:
*       the JSON Array of Partitioned CRL URLs field MUST be empty.
*       If populating a JSON Array of Partitioned CRL URLs:
*       the full and complete CRL URL MUST be empty.


Best regards,
Dimitris.




 

Thank you

-Chris

On Thursday, June 26, 2025 at 1:37:02 PM UTC-4 [email protected] 
<mailto:[email protected]>  wrote:

This is the same for Apple. Whatever is populated will be picked up, so as long 
as at least one of the fields is populated at all times CAs can switch between 
full and partitioned CRLs as they’d like (from Apple’s perspective). 

 

Cheers,

-Clint

 

On Jun 26, 2025, at 10:27 AM, 'Ben Wilson' via CCADB Public <[email protected]> 
wrote:

 

For CRLite, populating both fields should not create a problem.  However, CAs 
should not populate the "Full CRL" field with more than one URL.

Thanks,

Ben

 

On Thu, Jun 26, 2025 at 10:56 AM 'Aaron Poulsen' via CCADB Public 
<[email protected]> wrote:

I am also interested to know if a process exists for transitioning from a full 
to partitioned CRL (or the reverse) in CCADB. I can't find any discussions that 
address this need. 

 

CCADB states that at least one field must be populated. Can we simply provide 
values for both fields?

Aaron

On Monday, June 23, 2025 at 2:42:46 AM UTC-6 Dimitris Zacharopoulos (HARICA) 
wrote:

Hi Chris,

Regarding the URLs of CRLDPs, it is non uncommon for a CA to change the URL of 
the CRLDP. Obviously, there are redirects until the certificates with the old 
URL expire. What is the expectation if there are multiple URLs to be included 
in CCADB?

Also, what is the process for switching from sharded to full CRLs and 
vice-versa?


Best regards,
Dimitris.

 

On 17/6/2025 3:45 μ.μ., 'Chris Clements' via CCADB Public wrote:

All,

 

The updated CCADB Policy <https://www.ccadb.org/policy>  and Incident Reporting 
Guidelines <https://www.ccadb.org/cas/incident-report>  have been published 
with an effective date of July 15, 2025. This date is in line with the 
expectation that CA Owners will have updated their in-use TLS server 
authentication certificate validation methods for publicly-trusted hierarchies, 
following the recent 
<https://groups.google.com/a/ccadb.org/g/public/c/QOFzi8wGf8Y/m/Tg3ULE0KAgAJ>  
CCADB enhancement.

 

CA Owners are strongly encouraged to align their CCADB disclosures with the 
expectations that become effective on July 15, 2025, as soon as reasonably 
possible. 

 

Please note, to comply with the updated CRL disclosure requirements described 
in  <https://www.ccadb.org/policy#62-certificate-revocation-list-disclosures> 
Section 6.2, it is expected some CAs will need to update existing certificate 
records (e.g., modifying CRL disclosures to exactly match those included in 
certificates).

 

Thank you

-Chris, on behalf of the CCADB Steering Committee

 

 

On Fri, May 30, 2025 at 4:26 PM Chris Clements <[email protected] 
<mailto:[email protected]> > wrote:

All, 

Thank you to everyone who provided valuable feedback on the proposed 
<https://github.com/mozilla/www.ccadb.org/pull/198>  updates to the CCADB 
Policy and the Incident Reporting Guidelines (IRGs). Both artifacts have been 
enhanced thanks to the insightful recommendations and suggestions.

We want to reiterate the original objectives for this update:

*       Clarifying Root Store Operator expectations for CCADB disclosures.
*       Streamlining requirements across different root programs to reduce 
redundancy.
*       Enhancing the simplicity and readability of the policy.

We plan to publish the updated CCADB Policy and IRGs later in June, with an 
effective date of July 1, 2025.

We appreciate your continued collaboration in making the CCADB a more effective 
and transparent resource for the community.

-Chris, on behalf of the CCADB Steering Committee

 

On Fri, May 2, 2025 at 10:48 AM Chris Clements <[email protected] 
<mailto:[email protected]> > wrote:

All,

Following the community’s recent iteration 
<https://groups.google.com/a/ccadb.org/g/public/c/GIBHz9FUjHY/m/XOOLNpOFCAAJ>  
and improvement on the updated CCADB Incident Reporting Guidelines 
<https://www.ccadb.org/cas/incident-report>  (IRGs), the CCADB Steering 
Committee has collaborated on an updated draft of the CCADB Policy.

The set of proposed updates are available here 
<https://github.com/mozilla/www.ccadb.org/pull/198> . 


Objectives for this update include:

*       Clarifying Root Store Operator expectations related to CCADB 
disclosures. Some of these clarifications were motivated by public Incident 
Reports filed to Bugzilla over the past year.
*       Creating opportunities to (a) remove redundant/similar requirements 
located across root program policies related to CCADB disclosures and (b) 
encourage future simplicity.
*       Promoting simplicity and improving readability through a reorganization 
of normative and non-normative requirements.

Additionally, minor updates are proposed to the IRGs (e.g., further 
streamlining the incident reporting closure process).

These proposals should not be considered “final”, but instead a “work 
in-progress” that we hope to enhance through community contributions. We 
welcome your feedback on these proposed updates and recommendations by May 23, 
2025. Please share your thoughts by replying to this email or, preferably, by 
suggesting edits directly on GitHub.

Thank you
-Chris, on behalf of the CCADB Steering Committee

-- 
You received this message because you are subscribed to the Google Groups 
"CCADB Public" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected] <mailto:[email protected]> .
To view this discussion visit 
https://groups.google.com/a/ccadb.org/d/msgid/public/CAAbw9mApWKw1J2ZJ2-1ft7LgJK7CDiYvHKLFjtNEiH1EH%3DmYtQ%40mail.gmail.com
 
<https://groups.google.com/a/ccadb.org/d/msgid/public/CAAbw9mApWKw1J2ZJ2-1ft7LgJK7CDiYvHKLFjtNEiH1EH%3DmYtQ%40mail.gmail.com?utm_medium=email&utm_source=footer>
 .

 

 

-- 
You received this message because you are subscribed to the Google Groups 
"CCADB Public" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion visit 
https://groups.google.com/a/ccadb.org/d/msgid/public/48947bbc-ca5d-4922-a9fd-9bb74fd82bf9n%40ccadb.org
 
<https://groups.google.com/a/ccadb.org/d/msgid/public/48947bbc-ca5d-4922-a9fd-9bb74fd82bf9n%40ccadb.org?utm_medium=email&utm_source=footer>
 .

 

-- 
You received this message because you are subscribed to the Google Groups 
"CCADB Public" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].

To view this discussion visit 
https://groups.google.com/a/ccadb.org/d/msgid/public/CA%2B1gtaZh0hjfGtc_6aKeF2vJtQqRh3SLpkTeSdiipDzePVgkOg%40mail.gmail.com
 
<https://groups.google.com/a/ccadb.org/d/msgid/public/CA%2B1gtaZh0hjfGtc_6aKeF2vJtQqRh3SLpkTeSdiipDzePVgkOg%40mail.gmail.com?utm_medium=email&utm_source=footer>
 .

 

 

-- 
You received this message because you are subscribed to the Google Groups 
"CCADB Public" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected] <mailto:[email protected]> .
To view this discussion visit 
https://groups.google.com/a/ccadb.org/d/msgid/public/4572ee58-1af2-4c4a-90c8-e20bd6c8ea07%40harica.gr
 
<https://groups.google.com/a/ccadb.org/d/msgid/public/4572ee58-1af2-4c4a-90c8-e20bd6c8ea07%40harica.gr?utm_medium=email&utm_source=footer>
 .

-- 
You received this message because you are subscribed to the Google Groups 
"CCADB Public" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion visit 
https://groups.google.com/a/ccadb.org/d/msgid/public/DS0PR14MB621605C01ACB29C62680090E9241A%40DS0PR14MB6216.namprd14.prod.outlook.com.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

  • Further Improving the C... 'Chris Clements' via CCADB Public
    • Re: Further Improv... 'Chris Clements' via CCADB Public
      • Re: Further Im... 'Chris Clements' via CCADB Public
        • Re: Furthe... 'Dimitris Zacharopoulos (HARICA)' via CCADB Public
          • Re: Fu... 'Aaron Poulsen' via CCADB Public
            • R... 'Ben Wilson' via CCADB Public
              • ... 'Clint Wilson' via CCADB Public
                • ... 'Chris Clements' via CCADB Public
                • ... 'Dimitris Zacharopoulos (HARICA)' via CCADB Public
                • ... 'Corey Bonnell' via CCADB Public
                • ... 'Chris Clements' via CCADB Public
                • ... 'Ben Wilson' via CCADB Public
                • ... 'Corey Bonnell' via CCADB Public
              • ... 'Clint Wilson' via CCADB Public
          • URLs o... 'Dimitris Zacharopoulos (HARICA)' via CCADB Public
        • Re: Furthe... 'Rob Stradling' via CCADB Public
          • Re: Fu... 'Chris Clements' via CCADB Public
            • R... 'Rob Stradling' via CCADB Public

Reply via email to