Oops.  Does it look like I replied to wrong email?

Red-faced.  Tim.

> On Sep 4, 2014, at 1:33 PM, "Tim Moses" <tim.mo...@entrust.com> wrote:
> 
> Hi Mark. I think that makes sense.
> 
> Historically, the Development manager for the affected product has been 
> invited to SARB.  He or she has taken on the task of communicating with the 
> relevant product managers.
> 
> "Relevant" product managers should include those with responsibility for 
> services.
> 
> The service product managers should ensure that service components are 
> remediated in an expeditious manner and that (where not already publicly 
> disclosed) the security bulletin is not released until this has been done.
> 
> I don't think that contradicts anything in the proposed amendment.  We just 
> have to make sure that the Development manager brings ALL the relevant 
> product managers into the discussion.
> 
> All the best. Tim. 
> 
>> On Sep 4, 2014, at 12:41 PM, "Ben Wilson" <ben.wil...@digicert.com> wrote:
>> 
>> Options for trying this out might fit under an exception, if one were
>> created, for "test, experimental, temporary, pilot, provisional, etc."
>> certificate types. 
>> 
>> -----Original Message-----
>> From: dev-security-policy
>> [mailto:dev-security-policy-bounces+ben=digicert....@lists.mozilla.org] On
>> Behalf Of Gervase Markham
>> Sent: Thursday, September 4, 2014 4:22 AM
>> To: mozilla-dev-security-pol...@lists.mozilla.org
>> Subject: Short-lived certs
>> 
>> Short-lived certs are one plank of our future revocation strategy.[0]
>> Currently, it is not permitted by the CAB Forum Baseline Requirements to
>> revocation pointers out of a cert, ever. However, this is part of the big
>> value of short-lived certs, as it's what unlocks their speed-increasing
>> potential across all browsers. (The logic is that a 3-day expiry misissued
>> cert with no revocation pointers has a similar risk profile to a 1-year
>> expiry misissued cert where the attacker has captured a valid 3-day expiry
>> OCSP response they can staple to it).
>> 
>> I've just been reviewing discussions from July 2012 on the CAB Forum mailing
>> lists about short-lived certs. There was some significant opposition to
>> removing revocation information from short-lived certs at the time (although
>> things may be different now, I don't know). I personally think much of that
>> opposition was mistaken, but the discussion nevertheless did not result in
>> consensus.
>> 
>> How should we approach the issue of short-lived certs? It seems to me we can
>> do the following:
>> 
>> 0) Try and get a motion passed to change the BRs to allow short-lived certs
>> to not have any revocation information. This would probably require us to
>> review the original discussion and make a wiki page outlining our proposal
>> and rebutting objections. We may still run into heavy weather. We could also
>> discuss it at the face-to-face.
>> 
>> 1) Write an exception in Mozilla's policy that short-lived certs don't have
>> to have revocation info. This would likely have no effect, because CAs would
>> want to continue issuing to the BRs.
>> 
>> 2) Stop checking revocation information for short-lived certs unilaterally.
>> This would result in reduced take-up of the idea, because there would be no
>> advantage in other browsers, and one would still need to implement all the
>> mechanisms, both at the CA and at the site, for frequent cert renewals and
>> deployments.
>> 
>> 3) Configure Firefox to not bother checking revocation information for any
>> cert newer than N days. This way, you can "emulate" short-lived certs by
>> just reissuing an X-year cert every N days or less. It also 'fixes' the
>> clock-skew problem in one direction, because the certs will still work for
>> users whose clocks are some way in the future (although their browsers would
>> check revocation).
>> 
>> 4) Something else?
>> 
>> Gerv
>> 
>> [0] https://wiki.mozilla.org/CA:RevocationPlan
>> _______________________________________________
>> dev-security-policy mailing list
>> dev-security-policy@lists.mozilla.org
>> https://lists.mozilla.org/listinfo/dev-security-policy
>> _______________________________________________
>> dev-security-policy mailing list
>> dev-security-policy@lists.mozilla.org
>> https://lists.mozilla.org/listinfo/dev-security-policy
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to