15
edits
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
This page will document Mozilla's future plans for revocation checking of SSL certificates. | This page will document Mozilla's future plans for revocation checking of SSL certificates. | ||
Line 61: | Line 59: | ||
The idea for OneCRL is to follow a similar approach to the [https://www.imperialviolet.org/2012/02/05/crlsets.html CRLset concept] used in Google Chrome (also discussed earlier on a [https://wiki.mozilla.org/CA:ImprovingRevocation#Preload_Revocations_of_Certain_End-Entity_Certificates mozilla wiki page]). Gather revocation information centrally, then push it out to browsers. The main questions are thus: (1) What information should we gather?, and (2) How should it be pushed to browsers? (3) How should it be used by the browser? | The idea for OneCRL is to follow a similar approach to the [https://www.imperialviolet.org/2012/02/05/crlsets.html CRLset concept] used in Google Chrome (also discussed earlier on a [https://wiki.mozilla.org/CA:ImprovingRevocation#Preload_Revocations_of_Certain_End-Entity_Certificates mozilla wiki page]). Gather revocation information centrally, then push it out to browsers. The main questions are thus: (1) What information should we gather?, and (2) How should it be pushed to browsers? (3) How should it be used by the browser? | ||
'''What to include in OneCRL:''' The main focus of OneCRL is to cover intermediate CA certificates | '''What to include in OneCRL:''' The main focus of OneCRL is to cover intermediate CA certificates. So we will need to collect URLs for sources of revocation information for all intermediate CAs. In the future, we may look into covering EE certificates with OneCRL, possibly focusing initially on specific classes (e.g., EV certificates). | ||
'''Distribution and Security of OneCRL:''' Logically, OneCRL updates will be distributed to browsers | '''Distribution and Security of OneCRL:''' Logically, OneCRL updates will be distributed to browsers regularly (roughly daily). In order to ensure that browsers have timely revocation information, we need to ensure that it is difficult for an adversary to block the channel by which these updates are sent out. | ||
'''Format and Usage of OneCRL:''' For CA certificates, we will include revocation information by explicitly representing revoked certs (directly or with a fingerprint | '''Format and Usage of OneCRL:''' For CA certificates, we will include revocation information by explicitly representing revoked certs (directly or with a fingerprint). Thus, for CA certificates, OneCRL will be dispositive -- a certificate will be rejected if it is in OneCRL and accepted if not. (If OneCRL is updated in the future to cover EE certificates, it will likely require the use of a probabilistic, compressed representation, such as a Bloom filter. In this case, OneCRL will be dispositive only in the positive direction: If the certificate is covered by OneCRL and the certificate is not listed as revoked, then we know it is not revoked. But if the certificate is in OneCRL, then we still check OCSP (stapled or live) to for false positives). | ||
==== Next Steps ==== | ==== Next Steps ==== | ||
Line 87: | Line 69: | ||
* Complete implementation of block list based OneCRL | * Complete implementation of block list based OneCRL | ||
* Add support for CRL polling as an input, as well as manual input | * Add support for CRL polling as an input, as well as manual input | ||
* Collect URLs for revocation information covering all intermediate CAs | * Collect URLs for revocation information covering all intermediate CAs | ||
* | * Investigate whether there are some EE certificates that should be covered by OneCRL | ||
=== OCSP must-staple === | === OCSP must-staple === |
edits