Re: [cabfpub] How do you handle mass revocation requests?

2018-03-02 Thread philliph--- via Public
Going back to the original question. We have a format for a certificate request (well a few actually). Do we have a PKIX feature that can be used to allow a key holder to request revocation? I can’t think of a PKIX standard for one and it does appear to be a missing feature. Ron Rivest and But

Re: [cabfpub] [Ext] BR Authorized Ports, add 8443

2018-03-02 Thread Paul Hoffman via Public
On Mar 1, 2018, at 7:51 AM, Ben Wilson via Public wrote: > > Forwarding from Richard Wang: > > The current BRs say: > > Authorized Ports: One of the following ports: 80 (http), 443 (http), 25 > (smtp), 22 (ssh). > > But many internal networks use the port 8443, broadly used in Apache server,

Re: [cabfpub] [Ext] How do you handle mass revocation requests?

2018-03-02 Thread Paul Hoffman via Public
On Mar 2, 2018, at 6:04 AM, philliph--- via Public wrote: > > Going back to the original question. > > We have a format for a certificate request (well a few actually). Do we have > a PKIX feature that can be used to allow a key holder to request revocation? > I can’t think of a PKIX standard

Re: [cabfpub] [Ext] BR Authorized Ports, add 8443

2018-03-02 Thread Phillip via Public
To clarify what Paul said, We need to distinguish between the use of a port for certificate validation and the use of a port for delivery of an Internet service. The fact that we use SSL on every port to provide a service does not mean that we should allow that use for validation. I do think we

Re: [cabfpub] [Ext] How do you handle mass revocation requests?

2018-03-02 Thread Phillip via Public
I have proposed this as an AOB topic for LAMPS. On the wider problem, please remember I do not work for ComodoCA and have no more information on this than anyone else. I do find some aspects of the situation troubling though not necessarily the ones others are finding troubling. That a reselle

Re: [cabfpub] [Ticket#2018022801003595] How do you handle mass revocation requests?

2018-03-02 Thread Ryan Sleevi via Public
This does not seem like a good idea. On Thu, Mar 1, 2018 at 8:05 AM, LeaderTelecom B.V. wrote: > It will be great to have daily / monthly limit for revocation for each > reseller. For example, daily limit 1% from all active certificates (minimum > 10 pcs). Monthly limit can be 20% from all activ

Re: [cabfpub] [Ext] BR Authorized Ports, add 8443

2018-03-02 Thread Ryan Sleevi via Public
On Fri, Mar 2, 2018 at 10:08 AM, Paul Hoffman via Public < public@cabforum.org> wrote: > On Mar 1, 2018, at 7:51 AM, Ben Wilson via Public > wrote: > > > > Forwarding from Richard Wang: > > > > The current BRs say: > > > > Authorized Ports: One of the following ports: 80 (http), 443 (http), 25 >

Re: [cabfpub] [Ext] BR Authorized Ports, add 8443

2018-03-02 Thread Ryan Sleevi via Public
On Fri, Mar 2, 2018 at 10:35 AM, Phillip via Public wrote: > To clarify what Paul said, > > We need to distinguish between the use of a port for certificate validation > and the use of a port for delivery of an Internet service. The fact that we > use SSL on every port to provide a service does n

Re: [cabfpub] [Ext] BR Authorized Ports, add 8443

2018-03-02 Thread Phillip via Public
??? I think it is fairly clear that with the necessary privs, I can request a TCP/IP socket on any port (other than 0) and then bind a TLS provider to it. The point I am making is that the fact the subscriber might use the certificate on port 8443 or for that matter on any port in the range [

Re: [cabfpub] [Ext] BR Authorized Ports, add 8443

2018-03-02 Thread Tim Hollebeek via Public
We’re willing to continue talking through those issues in an attempt to reach a solution. I do think SRVNames would be a useful improvement. For us, the lack of movement has had more to do with time constraints than technical constraints! While SRVNames do offer a way to scope the authority

Re: [cabfpub] [Ext] BR Authorized Ports, add 8443

2018-03-02 Thread Ryan Sleevi via Public
On Fri, Mar 2, 2018 at 11:11 AM, Phillip wrote: > ??? I think it is fairly clear that with the necessary privs, I can > request a TCP/IP socket on any port (other than 0) and then bind a TLS > provider to it. > > > > The point I am making is that the fact the subscriber might use the > certificat

Re: [cabfpub] [Ext] BR Authorized Ports, add 8443

2018-03-02 Thread Ryan Sleevi via Public
For sure. Apologies if that was worded confusing - we're hugely supportive of SRVNames, but solving the technical and policy issues around them is thorny and will require technical expertise, and I think most of the technical expertise of the Forum has been otherwise occupied by a number of more pr

Re: [cabfpub] [Ext] BR Authorized Ports, add 8443

2018-03-02 Thread Phillip via Public
From: Ryan Sleevi [mailto:sle...@google.com] Sent: Friday, March 2, 2018 11:22 AM To: Phillip Cc: CA/Browser Forum Public Discussion List ; Paul Hoffman ; Ben Wilson Subject: Re: [cabfpub] [Ext] BR Authorized Ports, add 8443 More importantly though, how many validation approaches do w

[cabfpub] Browser implementation of cert requirements

2018-03-02 Thread Peter Bowen via Public
I’m working on updating cablint to make sure it has checks that match browser checks. These will be INFO level items if they don’t align with the BRs, but I think having them is valuable. I’m hoping that the browsers can confirm a couple of things, so I get it right in cablint: 1) Safari and

[cabfpub] Logistics for the F2F

2018-03-02 Thread Peter Bowen via Public
A few details for those attending the F2F next week, either for the working group day or for the members’ plenary: 1) When you arrive at the office, enter the doors and tell the desk you are there for CA/Browser Forum meeting. They will request an ID, confirm you are on the list, and issue you

Re: [cabfpub] Browser implementation of cert requirements

2018-03-02 Thread Ryan Sleevi via Public
On Fri, Mar 2, 2018 at 2:05 PM, Peter Bowen via Public wrote: > I’m working on updating cablint to make sure it has checks that match > browser checks. These will be INFO level items if they don’t align with > the BRs, but I think having them is valuable. > > I’m hoping that the browsers can con

Re: [cabfpub] [EXTERNAL] Logistics for the F2F

2018-03-02 Thread Kirk Hall via Public
I have added this information to the wiki. Peter has included "test" Chime meeting IDs below, and I strongly suggest that anyone planning to participate remotely install and test Chime now to make sure there are no problems. The real Chime meeting IDs will be emailed to participants later vi

[cabfpub] Return of SRV names

2018-03-02 Thread Tim Hollebeek via Public
No problem, I knew what you meant. I just wanted to fish the topic out of your long email and emphasize it. Since I’m on a plane on a Friday afternoon, and need some mindless work, I collected some references to refresh people’s memories: https://cabforum.org/pipermail/public/2016-April/