Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Require CAs to reject keys in certs which are revoked for keyCompromise #95

Open
gerv opened this issue Jul 20, 2017 · 5 comments
Open
Labels
smime Issues related to SMIME certificates

Comments

@gerv
Copy link
Contributor

gerv commented Jul 20, 2017

If a CA is asked to revoke a certificate due to key compromise, the CA should refuse a CSR containing the same key.

This came up in the discussion of Hanno Bock's discoveries of private keys sitting on webservers.

This could be a thing to add to the BRs via the CAB Forum or it could be something we could add; I'm filing this here to keep track of the issue.

@BenWilson-Mozilla
Copy link
Collaborator

Currently, CAs are only required under BR 4.9.1.1 to revoke an issued certificate with a compromised key. The MRSP or BRs could be amended to require pre-screening.

@BenWilson-Mozilla BenWilson-Mozilla added the 2.8 Mozilla Root Store Policy v. 2.8 label Dec 29, 2020
@CBonnell
Copy link
Contributor

CBonnell commented Apr 7, 2021

SC35 already handled this case for server authentication certificates: https://github.com/cabforum/servercert/pull/224/files#diff-e0ac1bd190515a4f2ec09139d395ef6a8c7e9e5b612957c1f5a2dea80c6a6cfeR1473.

Given this, this issue may be redundant, depending on whether or we want this handled for emailProtection certificates at the Mozilla Policy-level as opposed to handling in the upcoming SMIME BRs.

@timfromdigicert
Copy link

s/blacklist/reject/

@BenWilson-Mozilla BenWilson-Mozilla changed the title Require CAs to blacklist keys in certs which are revoked for keyCompromise Require CAs to reject keys in certs which are revoked for keyCompromise Oct 2, 2021
@BenWilson-Mozilla
Copy link
Collaborator

Resolution of this issue could be postponed until the CA/Browser Forum's S/MIME WG adopts this as a requirement. I cannot see a section in the MRSP where this requirement could be cleanly placed, except maybe in section 2.2 or section 5.2.

@BenWilson-Mozilla BenWilson-Mozilla added the smime Issues related to SMIME certificates label Jan 6, 2022
@BenWilson-Mozilla
Copy link
Collaborator

I'm removing the version 2.8 label on this because it will be adequately covered by item 4 in section 6.1.1.3 of the CABF SMIME WG's Baseline requirements. See https://github.com/cabforum/smime/blob/preSBR/SBR.md

@BenWilson-Mozilla BenWilson-Mozilla removed the 2.8 Mozilla Root Store Policy v. 2.8 label Jan 14, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
smime Issues related to SMIME certificates
Projects
None yet
Development

No branches or pull requests

4 participants