Confirmed users, Administrators
5,526
edits
m (Clarification about PEM data) |
(Updated to match current process) |
||
Line 233: | Line 233: | ||
Mozilla has implemented a revocation list push mechanism in Firefox called [https://blog.mozilla.org/security/2015/03/03/revoking-intermediate-certificates-introducing-onecrl/ OneCRL], which pushes a [[CA:ImprovingRevocation#Preload_Revocations_of_Intermediate_CA_Certificates|revocation list of intermediate certificates]] to Firefox browsers on a regular basis, asynchronously and independently of any SSL site visit. This improves security by ensuring the browser has a comprehensive list of revocations in a manner that is not likely to be blocked by a network attacker. | Mozilla has implemented a revocation list push mechanism in Firefox called [https://blog.mozilla.org/security/2015/03/03/revoking-intermediate-certificates-introducing-onecrl/ OneCRL], which pushes a [[CA:ImprovingRevocation#Preload_Revocations_of_Intermediate_CA_Certificates|revocation list of intermediate certificates]] to Firefox browsers on a regular basis, asynchronously and independently of any SSL site visit. This improves security by ensuring the browser has a comprehensive list of revocations in a manner that is not likely to be blocked by a network attacker. | ||
If the revocation of an intermediate certificate is due to a security concern, send email to security@mozilla.org. Otherwise, | If the revocation of an intermediate certificate is due to a security concern, send email to security@mozilla.org. Otherwise, enter the revoked intermediate certificate information into the CCADB as described below. Then a Mozilla representative will verify the revoked intermediate certificate data, and update the 'OneCRL Status' to "Ready to Add". Then a Mozilla process will cause the revoked intermediate certificate data to be added to OneCRL. The Mozilla representative will follow up to ensure the data has been added to OneCRL, and then will update the record in the CCADB to change the 'OneCRL Status' to "Added to OneCRL". | ||
The best way to add revoked intermediate certificate data to the CCADB is to first add the [[CA:SalesforceCommunity#Add_Intermediate_Certificate_Data_to_Salesforce|intermediate certificate record]], and then mark the record as Revoked. This is the way all intermediate certificate revocations must be entered unless the certificate was [[CA:CertificatePolicyV2.1#Technical_Constraints_or_Auditing.2FDisclosure_of_Intermediate_Certificates|Technically Constrained]] via Extended Key Usage and Name Constraint settings. | |||
The best way to add revoked intermediate certificate data to | |||
To add a revoked intermediate certificate, or to mark an intermediate certificate in an existing record as revoked: | To add a revoked intermediate certificate, or to mark an intermediate certificate in an existing record as revoked: | ||
Line 250: | Line 248: | ||
# Click on "Edit" | # Click on "Edit" | ||
# Click on the "Revocation Status" field and select "Revoked". | # Click on the "Revocation Status" field and select "Revoked". | ||
# Enter the "Date of Revocation" | # Enter the "Date of Revocation" | ||
# Click on the "RFC 5280 Revocation Reason Code" field and select the corresponding revocation reason. | # Click on the "RFC 5280 Revocation Reason Code" field and select the corresponding revocation reason. | ||
# Click on "Save" button | # Click on "Save" button | ||
If the revoked intermediate certificate was [[CA:CertificatePolicyV2.1#Technical_Constraints_or_Auditing.2FDisclosure_of_Intermediate_Certificates|Technically Constrained]] via Extended Key Usage and Name Constraint settings, but you would still like to add it to OneCRL and you are unable to provide the PEM data for the certificate, then | If the revoked intermediate certificate was [[CA:CertificatePolicyV2.1#Technical_Constraints_or_Auditing.2FDisclosure_of_Intermediate_Certificates|Technically Constrained]] via Extended Key Usage and Name Constraint settings, but you would still like to add it to OneCRL and you are unable to provide the PEM data for the certificate, then send email to Kathleen with the following information: | ||
* Certificate Issuer Field | |||
* Certificate Subject Field | |||
* Certificate Serial Number | |||
* OCSP URL linking to the OCSP response for that serial number | |||
* CRL URL linking to the CRL that contains that serial number | |||
* Valid To (GMT) -- notAfter date of the revoked certificate | |||
= Required Annual Updates = | = Required Annual Updates = |