Hey Wayne - I take it that this "Mozilla recognizes a precertificate as proof 
that a corresponding certificate has been issued" means a CA issuing a precert 
without the final cert must respond "good" unless the pre-cert is revoked? 
Responding unknown means the CA wouldn't know that they issued the cert, which 
means they disagree with the proof that a corresponding cert has been issued.

Jeremy

-----Original Message-----
From: dev-security-policy <dev-security-policy-boun...@lists.mozilla.org> On 
Behalf Of Wayne Thayer via dev-security-policy
Sent: Wednesday, September 11, 2019 7:08 PM
To: mozilla-dev-security-pol...@lists.mozilla.org
Subject: Re: DigiCert OCSP services returns 1 byte

Mozilla has, to-date, not published policies related to Certificate 
Transparency, but this is a case where a clarification would be helpful. I 
propose adding the following language to our "Required Practices" wiki page
[1]:

The current implementation of Certificate Transparency does not provide any
> way for Relying Parties to determine if a certificate corresponding to 
> a given precertificate has or has not been issued. It is only safe to 
> assume that a certificate corresponding to every precertificate exists.
>
> RFC 6962 states “The signature on the TBSCertificate indicates the 
> certificate authority's intent to issue a certificate.  This intent is 
> considered binding (i.e., misissuance of the Precertificate is 
> considered equal to misissuance of the final certificate).”
>
>
>
> However, BR 7.1.2.5 state “For purposes of clarification, a 
> Precertificate, as described in RFC 6962 – Certificate Transparency, 
> shall not be considered to be a “certificate” subject to the 
> requirements of RFC
> 5280 - Internet X.509 Public Key Infrastructure Certificate and 
> Certificate Revocation List (CRL) Profile under these Baseline Requirements.”
>
> Mozilla interprets the BR language as a specific exception allowing 
> CAs to issue a precertificate containing the same serial number as the 
> subsequent certificate [2]. Mozilla recognizes a precertificate as 
> proof that a corresponding certificate has been issued.
>
> This means, for example, that the requirements for OCSP for end-entity 
> certificates apply even when a CA has issued a precertificate without 
> issuing a corresponding certificate.
>

I plan to add this to the wiki next week. I also plan to include this in in a 
future update to our Root Store Policy.

I will greatly appreciate your constructive feedback on this proposal.

- Wayne

[1] https://wiki.mozilla.org/CA/Required_or_Recommended_Practices
[2] https://cabforum.org/pipermail/public/2014-January/002694.html

On Thu, Aug 29, 2019 at 12:53 PM Jeremy Rowley via dev-security-policy < 
dev-security-policy@lists.mozilla.org> wrote:

> Let me try that again since I didn't explain my original post very well.
> Totally worth it since I got a sweet Yu-gi-oh reference out of fit.
>
> What happened at DigiCert is that the OCSP service failed to return a 
> signed response for a certificate where a pre-certificate existed by a 
> certificate had not issued for whatever reason. The question asked was 
> what type of OCSP services are required for a pre-cert if there is no 
> other certificate. The answer we came up with is it should respond 
> "GOOD" based on the Mozilla policy, not Unknown or any other response. 
> Note that this was a bug in the DigiCert system but it lead to a fun internal 
> discussion.
> What I'm sharing is the outcome of the internal discussion - it's only 
> tangentially related to the bug, not the cause or remediation of it.
>
> Summary: Pre-certs require a standard OCSP response as if the pre-cert 
> was a normal cert. In fact, it's a mistake to ever think of pre-certs 
> as anything other than TLS certs, even if the poison extension exists.
>
> The question comes up because the BRs don't cover pre-certs. However, 
> as Ryan points out, the browsers sort-of cover this as does the 
> Mozilla policy. The browser say this is a promise to issue the cert 
> and mis-issuance of a pre-cert is the same as mis-issuance of a cert. 
> Although this isn't mis-issuance in the traditional profile sense, the 
> lack of OCSP services for the pre-cert is a violation of the Mozilla 
> policy. I couldn't figure out if it's a violation of the Chrome policy 
> since Chrome says it's a promise to issue a cert. If the cert hasn't 
> issued, then I'm not sure where that puts the OCSP service for Chrome. 
> Regardless, according to Mozilla's policy, the requirement is that 
> regardless of how long the cert takes to issue, the CA must provide 
> OCSP services for the pre-cert. The reason is Mozilla requires an OCSP 
> for each end-entity certificate listing an AIA in the certificate. Pre-certs 
> are end-entity certificates.
>
> Jeremy
>
> -----Original Message-----
> From: dev-security-policy 
> <dev-security-policy-boun...@lists.mozilla.org>
> On Behalf Of Jeremy Rowley via dev-security-policy
> Sent: Thursday, August 29, 2019 11:55 AM
> To: Peter Bowen <pzbo...@gmail.com>; Ryan Sleevi <r...@sleevi.com>
> Cc: Curt Spann <csp...@apple.com>;
> mozilla-dev-security-pol...@lists.mozilla.org
> Subject: Re: DigiCert OCSP services returns 1 byte
>
> Yes. That was the point of my post. There is a requirement fo return 
> an ocsp repsonse for a pre cert where the cert hasn't issued because 
> of the Mozilla policy. Hence our failure was a Mozilla policy 
> violation even if no practical system can use the response because no 
> actual cert (without a posion extension) exists.
> ________________________________
> From: Peter Bowen <pzbo...@gmail.com>
> Sent: Thursday, August 29, 2019 11:44:11 AM
> To: Ryan Sleevi <r...@sleevi.com>
> Cc: Jeremy Rowley <jeremy.row...@digicert.com>; Curt Spann < 
> csp...@apple.com>; mozilla-dev-security-pol...@lists.mozilla.org < 
> mozilla-dev-security-pol...@lists.mozilla.org>
> Subject: Re: DigiCert OCSP services returns 1 byte
>
>
>
> On Thu, Aug 29, 2019 at 10:38 AM Ryan Sleevi via dev-security-policy <
> dev-security-policy@lists.mozilla.org<mailto:
> dev-security-policy@lists.mozilla.org>> wrote:
> On Thu, Aug 29, 2019 at 1:15 PM Jeremy Rowley via dev-security-policy 
> <
> dev-security-policy@lists.mozilla.org<mailto:
> dev-security-policy@lists.mozilla.org>> wrote:
>
> > Thanks for posting this Curt.  We investigated and posted an 
> > incident report on Bugzilla. The root cause was related to pre-certs 
> > and an error in generating certificates for them. We're fixing the 
> > issue (should be done shortly).  I figured it'd be good to document 
> > here why pre-certs fall under the requirement so there's no 
> > confusion for other
> CAs.
> >
>
> Oh, Jeremy, you were going so well on the bug, but now you've 
> activated my trap card (since you love the memes :) )
>
> It's been repeatedly documented every time a CA tries to make this 
> argument.
>
> Would you suggest we remove that from the BRs? I'm wholly supportive 
> of this, since it's known I was not a fan of adding it to the BRs for 
> precisely this sort of creative interpretation. I believe you're now 
> the ... fourth... CA that's tried to skate on this?
>
> Multiple root programs have clarified: The existence of a 
> pre-certificate is seen as a binding committment, for purposes of 
> policy, by that CA, that it will or has issued an equivalent certificate.
>
> Is there a requirement that a CA return a valid OCSP response for a 
> pre-cert if they have not yet issued the equivalent certificate?
>
> Is there a requirement that a CA return a valid OCSP response for a 
> serial number that has never been assigned?  I know of several OCSP 
> responders that return a HTTP error in this case.
>
> Thanks,
> Peter
> _______________________________________________
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>
> _______________________________________________
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to