Nelson B Bolyard wrote:
Frank Hecker wrote, On 2009-02-20 16:53:
<snip>
"However, implementations that do not support this extension MUST either treat the status of any certificate *not listed on this CRL* as unknown or locate another CRL that does not contain any unrecognized critical extensions." [emphasis added]

That is a rather strange statement, IMO.

I thought this was weird, and am glad someone more knowledgeable than I agrees. Thanks for the detailed explanation.

Now, imagine with me that some short time down the road, because of some
new attack, we conclude that it's no longer safe to treat non-EV SSL server
certs as OK by default in the absence of revocation information that
affirmatively identifies the cert as unrevoked.

If that were the case prior to CRL DP support being implemented then that would cause a problem for every non-EV CA not supporting OCSP. Assuming CRL DP support were implemented by that point then it would cause a problem for every CA that didn't include a CRL DP extension in EE certs at all (are there any of these in our root list?), or for whom the CRL DP extension referenced (only) a partial CRL.

 It would force a choice
of either implementing full support for partial CRLs or (effectively)
distrusting HK Post's certs.  I think that's a high price to pay.  Is the
ability to support HK Post's certs worth all that investment?

We can certainly take the position that if we did need to force revocation by default (which I think would require implementation of CRL DP support as a prerequisite) and revocation checking of Hongkong Post certificates could not be done by default (because their CRL DP extension referenced only a partial CRL), then Firefox et.al. are going to throw errors on Hongkong Post-issued SSL certs (and not display the associated sites) until/unless Hongkong Post re-issues the certs with a CRL DP extension referencing a full CRL.

This is really up to Hongkong Post: Would they rather have their root cert included now, knowing that certs they issue may stop working in future, or would they rather wait to have the root included until such time as either we implement CIDP support or they reissue all their certs to include a URL for a full CRL? They can start adding the URL for the full CRL to the CRL DP extension (along with the URL for the partial URL) when issuing new certs, and this would minimize the likelihood of their certs causing problems in future.

To sum up:

1. Hongkong Post is not doing anything today contrary to our policy: Their certs work as is in Firefox et.al., by default, and people who want revocation checking can import the full CRL to enable it. In this respect they're no different than any other non-EV CA not supporting OCSP.

2. We can imagine a scenario in which Hongkong Post-issued certificates could cause technical problems. However at this point this is merely a hypothetical scenario; we have no idea whether it will come to pass or not.

3. If the hypothetical scenario were to come to pass, we don't need to do anything ourselves to fix the problem. Hongkong Post could fix the problem itself, by reissuing certs with the URL for the full CRL included. (Or even more simply, it could simply publish the full CRL at the URL previously used for the partial CRL.) I think Hongkong Post would be strongly motivated to fix the problem one way or the other.

So I don't think including the Hongkong Post root would cause problems for either us or our users. It would just mean that Hongkong Post will need to do some work of its own in order to minimize chances of its certs having problems in future.

Frank

--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to