|
|
Line 93: |
Line 93: |
|
| |
|
| The following changes have been discussed in a Mozilla discussion forum, and are in the implementation phase. | | The following changes have been discussed in a Mozilla discussion forum, and are in the implementation phase. |
|
| |
| === Preload Revocations of Intermediate CA Certificates ===
| |
| Push revocation information of revoked intermediate CA certificates to clients.
| |
|
| |
| Mozilla has implemented a revocation list push mechanism in Firefox called [https://blog.mozilla.org/security/2015/03/03/revoking-intermediate-certificates-introducing-onecrl/ OneCRL], which pushes a revocation list of intermediate certificates to Firefox browsers on a regular basis, asynchronously and independently of any SSL site visit. This improves security by ensuring the browser has a comprehensive list of revocations in a manner that is not likely to be blocked by a network attacker.
| |
|
| |
| Further information about revoked intermediate certificates: [[CA:RevokedSubCAcerts|https://wiki.mozilla.org/CA:RevokedSubCAcerts]]
| |
|
| |
| * Discussion: [https://groups.google.com/d/msg/mozilla.dev.security.policy/cNd16FZz6S8/t3GwjaFXx-kJ mozilla.dev.security.policy]
| |
|
| |
| * Code Change: {{Bug|1024809}}
| |
|
| |
| * Policy Change:
| |
| ** https://wiki.mozilla.org/CA:SalesforceCommunity#Add_Revoked_Intermediate_Certificate_Data_to_Salesforce
| |
| ** https://github.com/mozilla/pkipolicy/issues/48
| |
|
| |
| ==== When To Notify Mozilla ====
| |
| CAs must notify Mozilla of all revoked non-technically-constrained intermediate certificates chaining to a root certificate included in [[CA:IncludedCAs|Mozilla's root store]] that are revoked before the certificate has expired.
| |
|
| |
| When a CA revokes an intermediate certificate chaining to a root certificate included in [[CA:IncludedCAs|Mozilla's root store]], the CA '''must''' notify Mozilla if the certificate was revoked for one or more of the following reasons. '''Time Frame''' for such notification: within 24 hours of revocation of the intermediate certificate
| |
| * Technical Issue - There is a problem with the intermediate certificate such that the certificate may be inappropriately used. This includes, but is not limited to, wrong key usage, incorrect name constraints, etc.
| |
| * Cessation of business operation - An externally-operated subordinate CA certificate has been revoked or replaced (for any reason) before it has expired.
| |
| * According to [http://csrc.nist.gov/publications/drafts/nistir-7924/draft_nistir_7924.pdf NIST IR 7924] a Trust Anchor Manager (TAM) is an Authority who manages a repository of trusted Root CA Certificates. As specified in Section 5.7, the TAM will require the CA to provide notification when:
| |
| ** Root CA compromise -- Compromise of CA private signing key (Notification shall be made in an authenticated and trusted manner... earliest feasible time and shall not exceed <24> hours beyond determination of compromise or loss unless otherwise required by law enforcement)
| |
| **Intermediate or Subordinate CA key compromise (revocation information shall be published immediately in the most expedient, authenticated, and trusted manner but within <18> hours)
| |
| ** Compromise of Certificate Status Server (CSS) key, an example of a CSS is an OCSP server. (If the CSS is self-signed and the CSS certificate expiration is more than <7> days away, the vendor shall immediately notify the trust anchor managers)
| |
| ** RA key compromised (the revocation information shall be published within <24> hours in the most expedient, authenticated, and trusted manner)
| |
| ** Suspected or detected compromise of any CA system or subsystem
| |
| ** Physical or electronic penetration of any CA system or subsystem
| |
| ** Successful denial of service attacks on any CA system or subsystem
| |
| ** When computing resources, software, and/or data are corrupted
| |
| ** Any incident preventing a CA from issuing and publishing a CRL or OCSP prior to the time indicated in the nextUpdate field in the currently published CRL or OCSP suspected or detected compromise of a certificate status server (CSS) if
| |
| *** the CSS certificate has a lifetime of more than <72> hours; and
| |
| *** the CSS certificate cannot be revoked (e.g., an OCSP responder certificate with the id-pkix-ocsp-nocheck extension)
| |
|
| |
| '''Time Frame''' for Notification: within 24 hours of revocation of an intermediate certificate
| |
|
| |
| '''How to''' notify Mozilla of a revocation
| |
| * If the revocation is due to a security concern or of revocation of a website certificate whose revocation was not prompted by the certificate owner, send email to security@mozilla.org.
| |
| * Otherwise, enter the data about the revoked intermediate certificate into the [[CA:SalesforceCommunity#Add_Revoked_Intermediate_Certificate_Data_to_Salesforce|Common CA Database]].
| |
|
| |
|
| === OCSP GET === | | === OCSP GET === |