Since I started requesting revocation for certificates with
known-compromised private keys, I've noticed a rather disturbing pattern
emerging in a few cases:

1. I find a private key on the Internet.

2. I request revocation from the CA on the basis that the private key is
   compromised, and provide suitable evidence thereof.

3. The certificate is revoked.

4. Some time later, I discover that a new certificate, using the same
   private key, has been issued by the same CA.  (Mad props to CT!)

5. "Da wah?!?" I say, and scurry off to the BRs and Mozilla Root Store
   Policy, only to find that there doesn't appear to be anything explicitly
   covering this rather disconcerting situation.

So, I'm asking the combined wisdom of this esteemed community the following
questions:

1. *Are* there explicit prohibitions on issuing a certificate for a private
   key which has been previously submitted *to that CA* as compromised 
   (assuming, of course, that the prior submission was valid), and I'm just
   not good at finding said prohibitions?

2. If there are not explicit prohibitions already in place, *should* there
   be?  If so, should it be a BR thing, or a Policy thing?

3. Can a CA be deemed to have "obtained evidence" of key compromise prior to
   the issuance of a certificate, via a previously-submitted key compromise
   problem report for the same private key?  If so, it would seem that, even
   if the issuance of the certificate is OK, it is a failure-to-revoke
   incident if the cert doesn't get revoked within 24 hours...

I greatly appreciate answers and general commentary from the learned members
of this community.

Thanks,
- Matt

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to