While a certain amount of latency in OCSP updates is expected when a
certificate is first issued or revoked, KIR intended this to be a permanent
"unknown" status for a revoked certificate. My conclusion from this
discussion is that such a policy is not permitted, and the existing
requirements are enough to make that clear.

I created another bug to track the issue with KIR's auditor, Ernst & Young
Poland: https://bugzilla.mozilla.org/show_bug.cgi?id=1525082

KIR has commented in the original bug, and I have confirmed that the
certificate is now revoked via OCSP as well as their CRL.

On Sun, Feb 3, 2019 at 2:26 PM bif via dev-security-policy <
[email protected]> wrote:

> On Friday, February 1, 2019 at 11:38:40 PM UTC+1, Kurt Roeckx wrote:
> > On Fri, Feb 01, 2019 at 03:02:17PM -0700, Wayne Thayer wrote:
> > > It was pointed out to me that the OCSP status of the misissued
> certificate
> > > that is valid for over 5 years is still "unknown" despite having been
> > > revoked a week ago.ntrol 6.8.12? [2]
> >
> > If you follow the RFC, the "unknown" answer can mean that it
> > doesn't know, and that an other option like a CRL can be tried.
> > With "unknown", it doesn't say anything about being valid or not.
> >
> > I don't think that interpretation is very useful. I think that the
> > OCSP server should know about the certificate before the customer
> > has the certificate.
>
> FWIW, with ACME and automated instant certificates this may be an
> interesting challenge for big CAs. While you can design to try to achieve
> this, there will always be a case of some update not getting through in
> time, and some members of the high availability OCSP responders pool not
> having 100% of issued certificates from the last minute (obviously the
> longer the time from issuance, the sharply lower probability of such an
> event should be, and after a day it is unwise to not have all answers).
>
>
> > I think that if you have a properly signed
> > certificate within it's validity period, the OCSP should always
> > return either "good" or "revoked", never "unknown". Once a
> > certificate is generated and it's not revoked it's valid.
> >
> > Would it be useful to have a requirement in the BRs that the OCSP
> > server should not answer with "unknown" for an issued certificate
> > within it's validity period?
> >
> >
> > Kurt
>
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to