Mozilla's guidance for incident response lives at
https://wiki.mozilla.org/CA/Responding_To_An_Incident

I just made some significant changes to the Revocation section that reflect
the approach we took with the recent underscore sunset.

Most notably, the following paragraph:

However, it is not our intent to introduce additional problems by forcing
> the immediate revocation of certificates that are not BR-compliant when
> they do not pose an urgent security concern. Therefore, we request that
> your CA perform careful analysis of the situation. If there is
> justification to not revoke the problematic certificates, then your report
> will need to explain those reasons and provide a timeline for when the bulk
> of the certificates will expire or be revoked/replaced.
>

Has been replaced with:

Mozilla recognizes that in some exceptional circumstances, revoking
> misissued certificates within the prescribed deadline may cause significant
> harm, such as when the certificate is used in critical infrastructure and
> cannot be safely replaced prior to the revocation deadline. However,
> Mozilla does not grant exceptions to the BR revocation requirements. It is
> our position that your CA is ultimately responsible for deciding if the
> harm caused by following the requirements of BR section 4.9.1.1 outweighs
> the risks created by choosing not to meet this requirement.
>

Additions have also been made to our expectations when a CA doesn't revoke
on time, along with a number of minor updates.

You can view a comparison of all the changes at
https://wiki.mozilla.org/index.php?title=CA%2FResponding_To_An_Incident&type=revision&diff=1207675&oldid=1185707

I will greatly appreciate everyone's feedback on these changes.

- Wayne
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to