On Thu, Apr 05, 2018 at 09:05:07PM +0200, Jakob Bohm via dev-security-policy 
wrote:
> On 04/04/2018 04:27, Matt Palmer wrote:
> > On Tue, Apr 03, 2018 at 01:49:58AM +0200, Jakob Bohm via 
> > dev-security-policy wrote:
> > > On 02/04/2018 18:26, Tom Delmas wrote:
> > > > Following the discussion on
> > > > https://community.letsencrypt.org/t/non-logging-of-final-certificates/58394
> > > > 
> > > > What is the position of Mozilla about the submission to ct-logs of the
> > > > final certificate when there is already a pre-certificate?
> > > > 
> > > > As it helps discover bugs (
> > > > https://twitter.com/_quirins/status/979788044994834434 ), it helps
> > > > accountability of CAs and it's easily enforceable, I feel that it should
> > > > be mandatory.
> > > 
> > > If such a policy were to be enacted, an alternative to submitting the
> > > final certificate should be to revoke the certificate in both a
> > > published CRL and in OCSP.  It would be counter to security to require
> > > issuance in the few cases where misissuance is detected between CT
> > > Pre-cert logging and actual issuance.
> > 
> > Logging the precert is considered demonstration of intent to issue, and is
> > considered misissuance to the exact same degree as actually issuing the
> > cert.  So revoke or whatever, you still done goofed, and so you should be
> > checking for misissuance *before* you log the precert, not afterwards.
> 
> Of cause, I am just saying we should not force CAs to make a misissuance
> worse in the rare cases where they /actually/ spot the mistake between
> precert signing and actual cert signing.

Who is forcing CAs to misissue a certificate?

- Matt

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to