Join GitHub today
GitHub is home to over 50 million developers working together to host and review code, manage projects, and build software together.
Sign upDefine how quickly CAs must report revocation of intermediate cert #48
Comments
|
Another reference: |
|
This is in the draft CCADB policy: "If an intermediate certificate is revoked, the CCADB must be updated to mark it as revoked, giving the reason why, within 24 hours for a security incident, and within 7 days for any other reason." |
|
What if the intermediate certificate is revoked due to a security reason? Is it sufficiently clear that if the CA revokes an intermediate certificate for a security reason, then the CA must send email to security@mozilla.org within 24 hours? |
Yes - that part is in the Mozilla-specific CCADB policy.
I don't know; is there? :-) If there is, we may need to define a different process. |
|
I would note that OneCRL is a public collection: once it's published to Firefox, the cat is out of the bag. |
Sorry, I should have said: "Is it sufficiently clear in Mozilla's CA Certificate Policy..." |
|
@WilsonKathleen: All CAs in our program use the CCADB, right? So, once we start using the CCADB policy and Mozilla CCADB policy, those documents will be as much part of our root program policy as the current main policy document is. The need to email security@mozilla.org is not, in one sense, specific to the CCADB, but all of the other steps which they need to take when revoking an intermediate certificate are in the CCADB policy, so it makes some sense to put this step in there as well, IMO. |
|
I think this is all OK as it is. |

Formed in 2009, the Archive Team (not to be confused with the archive.org Archive-It Team) is a rogue archivist collective dedicated to saving copies of rapidly dying or deleted websites for the sake of history and digital heritage. The group is 100% composed of volunteers and interested parties, and has expanded into a large amount of related projects for saving online and digital history.

Now that CAs can provide their revoked intermediate cert data via the Common CA Database, we should add a requirement for them to provide this data within a certain amount of time after the revocation.
Reference:
https://wiki.mozilla.org/CA:SalesforceCommunity#Add_Revoked_Intermediate_Certificate_Data_to_Salesforce