-
Notifications
You must be signed in to change notification settings - Fork 132
Draft Ballot SC-XX: Improve Certificate Problem Reports and Clarify the Meaning of Revocation #622
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Changes from 8 commits
270572f
a37126e
c704cd0
4a6b8ce
bd57535
ab72e67
7612e9d
5c81321
df07211
31a6479
be40b46
342ff48
65085bd
4bb06c1
594427d
91f8e5e
4e43a30
cf05e90
332ac9e
a2a51e2
b4bb5c5
9093e46
9642e7b
0b97d0d
0f2553b
c32f356
ef4e201
f0b7e46
2ad1582
f010ab1
fb938d0
572ee86
9db978c
8193abc
53df8aa
339b88d
90856b8
2840471
d25aa9b
d7c86f8
267cdf4
9112942
6cf96bd
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -1382,6 +1382,32 @@ No stipulation. | |
|
|
||
| No stipulation. | ||
|
|
||
| ### 4.4.4 Problem reports | ||
| For this section, prior to 2026-05-15, the CA SHALL adhere to these Requirements or Version 2.1.7 of the Baseline Requirements for TLS Server Certificates. Effective 2026-05-15, the CA SHALL adhere to these Requirements. | ||
XolphinMartijn marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| The CA SHALL provide Subscribers, Relying Parties, Application Software Suppliers, and other third parties with clear instructions for reporting suspected Private Key Compromise, Certificate misuse, or other types of fraud, compromise, misuse, inappropriate conduct, or any other matter related to Certificates. The CA SHALL publicly disclose the instructions through a readily accessible online means and in Section 1.5.2 of their CPS. | ||
XolphinMartijn marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| Within twenty four (24) hours after receiving a Certificate Problem Report, the CA SHALL investigate the facts and circumstances related to the report and determine if it's "actionable." | ||
|
|
||
| A Certificate Problem Report is considered actionable if it includes: | ||
| 1. at least one serial number or hash of a time-valid and unrevoked Certificate issued by the CA, either directly or transitively (e.g., by attaching a Certificate file); and | ||
XolphinMartijn marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
| 2. a description of either: | ||
| - how the Certificate(s) in question violates these Requirements or a CA's own policies; or | ||
| - a reason for Certificate revocation (e.g., a demonstration of key compromise, or a Subscriber request aligned with [Section 4.9.1](#491-circumstances-for-revocation)). | ||
XolphinMartijn marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| A CA MAY take measures to prevent submission of non-actionable Certificate Problem Reports (e.g., input control validation on a form used to collect Certificate Problem Reports), but MUST be able to receive actionable Certificate Problem Reports. | ||
|
|
||
| Within twenty four (24) hours after determining a Certificate Problem Report is actionable: | ||
| 1. The CA SHALL provide a report on its findings to the entity who filed the Certificate Problem Report. | ||
XolphinMartijn marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
| 2. The CA SHOULD provide a report on its findings to Subscriber(s). | ||
XolphinMartijn marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
| 3. If the CA determines the Certificate Problem Report requires an action of revocation for the Certificate(s) specified within, the CA SHOULD work with the Subscriber to determine the date and time which the CA will revoke the Certificate. The period from the time the Certificate Problem Report was determined actionable to published revocation MUST NOT exceed the time frame set forth in [Section 4.9.1.1](#4911-reasons-for-revoking-a-subscriber-certificate). | ||
XolphinMartijn marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| Within one hundred and twenty (120) hours after determining a Certificate Problem Report is actionable, the CA SHALL have evaluated all time-valid and unrevoked Certificates issued by the CA to detect additional instances of the non-compliance described in the report. The period from the time the additional affected Certificates were first identified to published revocation MUST NOT exceed the time frame set forth in [Section 4.9.1.1](#4911-reasons-for-revoking-a-subscriber-certificate). | ||
XolphinMartijn marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| Within twenty four (24) hours after determining a Certificate Problem Report is not actionable, the CA MUST provide a report on its findings to the entity who filed the Certificate Problem Report and request the information necessary to satisfy the above requirements of an actionable Certificate Problem Report. | ||
|
|
||
| **Note**: If a non-actionable Certificate Problem Report is later amended by the reporter to satisfy the requirements of an actionable report described above, the time of receipt of the requested missing information is the basis for subsequent revocation timelines, if determined necessary. | ||
|
|
||
| ## 4.5 Key pair and certificate usage | ||
|
|
||
| ### 4.5.1 Subscriber private key and certificate usage | ||
|
|
@@ -1531,23 +1557,26 @@ The Issuing CA SHALL revoke a Subordinate CA Certificate within seven (7) days i | |
| The Subscriber, RA, or Issuing CA can initiate revocation. Additionally, Subscribers, Relying Parties, Application Software Suppliers, and other third parties may submit Certificate Problem Reports informing the issuing CA of reasonable cause to revoke the certificate. | ||
|
|
||
| ### 4.9.3 Procedure for revocation request | ||
XolphinMartijn marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| Prior to 2026-05-15, for Section 4.9.3 of these Requirements, the CA SHALL adhere to these Requirements or Version 2.1.7 of the Baseline Requirements for TLS Server Certificates. Effective 2026-05-15, the CA SHALL adhere to these Requirements. | ||
XolphinMartijn marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
XolphinMartijn marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| The CA SHALL provide a process for Subscribers to request revocation of their own Certificates. The process MUST be described in the CA's Certificate Policy or Certification Practice Statement. The CA SHALL maintain a continuous 24x7 ability to accept and respond to revocation requests and Certificate Problem Reports. | ||
| The CA’s Certificate Policy or Certification Practice Statement MUST describe: | ||
XolphinMartijn marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
| - a process for Subscribers to request revocation of their own Certificates; and | ||
| - when the revocation reason is "Key Compromise", the circumstances that necessitate the CA to (1) reject subsequent certificate requests containing the same public key and (2) perform a cascading revocation of all time-valid certificates containing the same public key. | ||
XolphinMartijn marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| The CA SHALL provide Subscribers, Relying Parties, Application Software Suppliers, and other third parties with clear instructions for reporting suspected Private Key Compromise, Certificate misuse, or other types of fraud, compromise, misuse, inappropriate conduct, or any other matter related to Certificates. The CA SHALL publicly disclose the instructions through a readily accessible online means and in Section 1.5.2 of their CPS. | ||
| The CA SHALL maintain a continuous 24x7 ability to accept and respond to revocation requests. | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. As discussed at the Houston F2F, the 24x7 availability is used in a number of places, but it is not realistic for every CA to have 100% up-time. Should we shift to something like "The CA SHALL maintain a reliable option (>99.9%) to accept and respond to revocation requests." Enforcement would be challenging, but that would only be an issue in really egregious cases which can be addressed via the incident process. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I agree that "continuous 24x7" is an impossible standard. However, replacing it with a specific percentage still conflates system uptime with procedural response. I think we should first fix that structural issue by separating the two concepts, and I propose the following change: The separate and more complex topic of defining a specific uptime percentage deserves a full discussion in a self-contained ballot. I believe we should not let that larger debate hold up this important structural improvement. |
||
|
|
||
| ### 4.9.4 Revocation request grace period | ||
|
|
||
| No stipulation. | ||
|
|
||
| ### 4.9.5 Time within which CA must process the revocation request | ||
XolphinMartijn marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| Prior to 2026-05-15, for Section 4.9.5 of these Requirements, the CA SHALL adhere to these Requirements or Version 2.1.7 of the Baseline Requirements for TLS Server Certificates. Effective 2026-05-15, the CA SHALL adhere to these Requirements. | ||
XolphinMartijn marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
XolphinMartijn marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| Within 24 hours after receiving a Certificate Problem Report, the CA SHALL investigate the facts and circumstances related to a Certificate Problem Report and provide a preliminary report on its findings to both the Subscriber and the entity who filed the Certificate Problem Report. | ||
| After reviewing the facts and circumstances, the CA SHALL work with the Subscriber and any entity reporting the Certificate Problem Report or other revocation-related notice to establish whether or not the certificate will be revoked, and if so, a date which the CA will revoke the certificate. The period from receipt of the Certificate Problem Report or revocation-related notice to published revocation MUST NOT exceed the time frame set forth in [Section 4.9.1.1](#4911-reasons-for-revoking-a-subscriber-certificate). The date selected by the CA SHOULD consider the following criteria: | ||
| The period from the time from receipt of the revocation request to published revocation MUST NOT exceed the time frame set forth in [Section 4.9.1.1](#4911-reasons-for-revoking-a-subscriber-certificate). The date selected by the CA SHOULD consider the following criteria: | ||
XolphinMartijn marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| 1. The nature of the alleged problem (scope, context, severity, magnitude, risk of harm); | ||
| 2. The consequences of revocation (direct and collateral impacts to Subscribers and Relying Parties); | ||
| 3. The number of Certificate Problem Reports received about a particular Certificate or Subscriber; | ||
| 3. The number of revocation requests or Certificate Problem Reports received about a particular Certificate or Subscriber; | ||
XolphinMartijn marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
| 4. The entity making the complaint (for example, a complaint from a law enforcement official that a Web site is engaged in illegal activities should carry more weight than a complaint from a consumer alleging that they didn't receive the goods they ordered); and | ||
| 5. Relevant legislation. | ||
|
|
||
|
|
@@ -1575,10 +1604,9 @@ CAs issuing CA Certificates: | |
| 1. MUST update and publish a new CRL at least every twelve (12) months; | ||
| 2. MUST update and publish a new CRL within twenty-four (24) hours after recording a Certificate as revoked. | ||
|
|
||
| CAs MUST continue issuing CRLs until one of the following is true: | ||
| - all Subordinate CA Certificates containing the same Subject Public Key are expired or revoked; OR | ||
| - the corresponding Subordinate CA Private Key is destroyed. | ||
|
|
||
| CA Certificates MUST continue issuing CRLs until one of the following is true: | ||
XolphinMartijn marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
| - all certificates issued by the CA Certificate(s) are expired; or | ||
XolphinMartijn marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
| - all certificates issued by the CA Certificate(s) are expired or revoked and the corresponding CA Certificate(s) Private Key is destroyed. | ||
XolphinMartijn marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| ### 4.9.8 Maximum latency for CRLs (if applicable) | ||
|
|
||
|
|
@@ -1646,6 +1674,12 @@ Not applicable. | |
|
|
||
| Not applicable. | ||
|
|
||
| ### 4.9.17 Authoritative certificate status | ||
XolphinMartijn marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| Effective 2026-05-15, for a certificate to be considered revoked: | ||
| 1. If the CA publishes a CRL, the CRL containing the certificate serial number MUST have been published to the Repository and be available for consumption for Relying Parties; and | ||
| 2. If the certificate contains a HTTP URL of the Issuing CA's OCSP responder, at least one (1) OCSP response containing a `certStatus` value of `revoked` MUST have been published to the Repository and be available for consumption for Relying Parties. | ||
XolphinMartijn marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| ## 4.10 Certificate status services | ||
|
|
||
| ### 4.10.1 Operational characteristics | ||
|
|
||
Uh oh!
There was an error while loading. Please reload this page.