RE: Violation report - Comodo CA certificates revocation delays

2018-12-17 Thread Tim Hollebeek via dev-security-policy
n Behalf Of please please via dev-security-policy > Sent: Monday, December 17, 2018 5:51 PM > To: Wayne Thayer > Cc: MDSP > Subject: Re: Violation report - Comodo CA certificates revocation delays > > A lot of things changes in 3 months it seems. ?? > > The wording for t

Re: Violation report - Comodo CA certificates revocation delays

2018-12-17 Thread please please via dev-security-policy
mailto:pleaseiwantt...@hotmail.com>> Sent: October 11, 2018 19:19 To: Wayne Thayer Cc: MDSP Subject: Re: Violation report - Comodo CA certificates revocation delays I was under the impression that CAs were allowed to remove CRL entries and OCSP support for expired certificates for some

Re: Violation report - Comodo CA certificates revocation delays

2018-12-17 Thread Wayne Thayer via dev-security-policy
---- > *From:* please please > *Sent:* October 11, 2018 19:19 > *To:* Wayne Thayer > *Cc:* MDSP > *Subject:* Re: Violation report - Comodo CA certificates revocation delays > > I was under the impression that CAs were allowed to remove CRL entries and > OCSP suppo

Re: Violation report - Comodo CA certificates revocation delays

2018-12-17 Thread please please via dev-security-policy
yer Cc: MDSP Subject: Re: Violation report - Comodo CA certificates revocation delays I was under the impression that CAs were allowed to remove CRL entries and OCSP support for expired certificates for some reason. Good to know! On a slightly-unrelated note, you might also want to poke Co

Re: Violation report - Comodo CA certificates revocation delays

2018-11-27 Thread waryde--- via dev-security-policy
Friday, October 12, 2018 14:28:47 UTC+2 Robin Alden wrote: > I understand the OP's concern and will respond to the bug shortly. Given that 45 days passed now, the internal definition of "shortly" used by Comodo seems to differ a lot from the common use of the term.

Re: Violation report - Comodo CA certificates revocation delays

2018-10-19 Thread Rob Stradling via dev-security-policy
On 19/10/2018 10:42, Ben Laurie wrote: > On Fri, 19 Oct 2018 at 10:38, Rob Stradling wrote: FWIW, we (Comodo CA) do maintain an archive of all the CRLs we've ever signed.>>> Put it in Trillian? :-) That had occurred to me.  ;-) Would it be useful? To be properly useful you would

Re: Violation report - Comodo CA certificates revocation delays

2018-10-19 Thread Ben Laurie via dev-security-policy
On Fri, 19 Oct 2018 at 10:38, Rob Stradling wrote: > On 18/10/2018 22:55, Ben Laurie wrote: > > On Fri, 12 Oct 2018 at 19:01, Rob Stradling wrote: > > > > On 12/10/18 16:40, Ryan Sleevi via dev-security-policy wrote: > > > On Fri, Oct 12, 2018 at 8:33 AM Ben Laurie >

Re: Violation report - Comodo CA certificates revocation delays

2018-10-19 Thread Rob Stradling via dev-security-policy
On 18/10/2018 22:55, Ben Laurie wrote: On Fri, 12 Oct 2018 at 19:01, Rob Stradling wrote: On 12/10/18 16:40, Ryan Sleevi via dev-security-policy wrote: > On Fri, Oct 12, 2018 at 8:33 AM Ben Laurie mailto:b...@google.com>> wrote: >> This is one of the reasons we also need

Re: Violation report - Comodo CA certificates revocation delays

2018-10-18 Thread Ben Laurie via dev-security-policy
On Fri, 12 Oct 2018 at 19:01, Rob Stradling wrote: > On 12/10/18 16:40, Ryan Sleevi via dev-security-policy wrote: > > On Fri, Oct 12, 2018 at 8:33 AM Ben Laurie wrote: > > >> This is one of the reasons we also need revocation transparency. > > > > As tempting as the buzzword is, and as much

Re: Violation report - Comodo CA certificates revocation delays

2018-10-15 Thread Jakob Bohm via dev-security-policy
On 12/10/2018 20:01, Rob Stradling wrote: On 12/10/18 16:40, Ryan Sleevi via dev-security-policy wrote: On Fri, Oct 12, 2018 at 8:33 AM Ben Laurie wrote: This is one of the reasons we also need revocation transparency. As tempting as the buzzword is, and as much as we love motherhood and

Re: Violation report - Comodo CA certificates revocation delays

2018-10-12 Thread Ben Laurie via dev-security-policy
On Fri, 12 Oct 2018 at 16:41, Ryan Sleevi wrote: > > > On Fri, Oct 12, 2018 at 8:33 AM Ben Laurie wrote: > >> >> >> On Fri, 12 Oct 2018 at 03:16, Ryan Sleevi via dev-security-policy < >> dev-security-policy@lists.mozilla.org> wrote: >> >>> I believe that may be misunderstanding the concern. >>>

Re: Violation report - Comodo CA certificates revocation delays

2018-10-12 Thread Ryan Sleevi via dev-security-policy
On Fri, Oct 12, 2018 at 8:33 AM Ben Laurie wrote: > > > On Fri, 12 Oct 2018 at 03:16, Ryan Sleevi via dev-security-policy < > dev-security-policy@lists.mozilla.org> wrote: > >> I believe that may be misunderstanding the concern. >> >> Once these certificates expire, there's not a good way to

Re: Violation report - Comodo CA certificates revocation delays

2018-10-12 Thread Rob Stradling via dev-security-policy
On 12/10/18 13:53, Jakob Bohm via dev-security-policy wrote: On 12/10/2018 14:33, Ben Laurie wrote: This is one of the reasons we also need revocation transparency. Or just a crt.sh enhancement to remember the previously collected revocations. crt.sh already remembers previously collected

Re: Violation report - Comodo CA certificates revocation delays

2018-10-12 Thread Ben Laurie via dev-security-policy
On Fri, 12 Oct 2018 at 13:54, Jakob Bohm via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > On 12/10/2018 14:33, Ben Laurie wrote: > > On Fri, 12 Oct 2018 at 03:16, Ryan Sleevi via dev-security-policy < > > dev-security-policy@lists.mozilla.org> wrote: > > > >> I believe

Re: Violation report - Comodo CA certificates revocation delays

2018-10-12 Thread Jakob Bohm via dev-security-policy
On 12/10/2018 14:33, Ben Laurie wrote: On Fri, 12 Oct 2018 at 03:16, Ryan Sleevi via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: I believe that may be misunderstanding the concern. Once these certificates expire, there's not a good way to check whether or not they were

Re: Violation report - Comodo CA certificates revocation delays

2018-10-12 Thread Ben Laurie via dev-security-policy
On Fri, 12 Oct 2018 at 03:16, Ryan Sleevi via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > I believe that may be misunderstanding the concern. > > Once these certificates expire, there's not a good way to check whether or > not they were revoked, because such revocation

Re: Violation report - Comodo CA certificates revocation delays

2018-10-12 Thread Robin Alden via dev-security-policy
I understand the OP's concern and will respond to the bug shortly. Regards Robin Alden Comodo CA Ltd. ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy

Re: Violation report - Comodo CA certificates revocation delays

2018-10-11 Thread Ryan Sleevi via dev-security-policy
I believe that may be misunderstanding the concern. Once these certificates expire, there's not a good way to check whether or not they were revoked, because such revocation information may be culled after certificate expiration. Similarly, if one is looking to verify the claims about revocation

Re: Violation report - Comodo CA certificates revocation delays

2018-10-11 Thread Matt Palmer via dev-security-policy
On Thu, Oct 11, 2018 at 11:19:18PM +, please please via dev-security-policy wrote: > I was under the impression that CAs were allowed to remove CRL entries and > OCSP support for expired certificates for some reason. Good to know! CT logs are not CRLs or OCSP responders, nor do they track

Re: Violation report - Comodo CA certificates revocation delays

2018-10-11 Thread please please via dev-security-policy
! Guillaume Fortin-Debigaré From: Wayne Thayer Sent: October 11, 2018 13:53 To: pleaseiwantt...@hotmail.com Cc: MDSP Subject: Re: Violation report - Comodo CA certificates revocation delays I just poked Comodo in the bug - https://bugzilla.mozilla.org/show_bug.cgi?id

Re: Violation report - Comodo CA certificates revocation delays

2018-10-11 Thread Wayne Thayer via dev-security-policy
e > earliest expiration date among the affected certificates. > > Guillaume Fortin-Debigaré > -- > *From:* please please > *Sent:* September 17, 2018 23:39 > *To:* Wayne Thayer > *Cc:* MDSP > *Subject:* Re: Violation report - Comodo CA certific

Re: Violation report - Comodo CA certificates revocation delays

2018-10-10 Thread please please via dev-security-policy
, the earliest expiration date among the affected certificates. Guillaume Fortin-Debigaré From: please please Sent: September 17, 2018 23:39 To: Wayne Thayer Cc: MDSP Subject: Re: Violation report - Comodo CA certificates revocation delays Good to know, and thank you

Re: Violation report - Comodo CA certificates revocation delays

2018-09-17 Thread please please via dev-security-policy
...@hotmail.com Cc: MDSP Subject: Re: Violation report - Comodo CA certificates revocation delays I have created a bug and requested a response from Comodo: https://bugzilla.mozilla.org/show_bug.cgi?id=1492006 As noted, there are no specific requirements regarding how CAs validate revocation

Re: Violation report - Comodo CA certificates revocation delays

2018-09-17 Thread Wayne Thayer via dev-security-policy
I have created a bug and requested a response from Comodo: https://bugzilla.mozilla.org/show_bug.cgi?id=1492006 As noted, there are no specific requirements regarding how CAs validate revocation requests in the BRs. Every CA may do this however they choose, so I don't believe there is any action

Violation report - Comodo CA certificates revocation delays

2018-09-16 Thread please please via dev-security-policy
Hello, I am the domain owner of debigare.com. I would like to make you aware that Comodo CA took more than 5 days to revoke certificates they had signed for my domain and subdomains after requesting them to do through their sslabuse email address, past the 24 hours maximum mentioned in the