<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Wed, Jan 13, 2016 at 6:14 AM, Eneli Kirme <span dir="ltr"><<a href="mailto:Eneli.Kirme@sk.ee" target="_blank">Eneli.Kirme@sk.ee</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex"><br>
There’s also been discussion that malformed certificates are in scope. The problem with these is that not all technical errors have an impact on security and some of them can go unnoticed for quite some time and involve large amounts of certificates.<br></blockquote><div><br></div><div>Not all malformations of x.509 certificates are violations of the BRs.</div><div><br></div><div>If a CA is systematically issuing large tranches of certificates in violation of the BRs, that points to a significant potential security gap in the CA's code and/or audits, regardless of whether the particular discovered technical error poses an immediate security threat to users at that moment.</div><div> </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">
Putting all of them onto the Internet without unified means for automated querying would lower the value of such reporting.<br></blockquote><div><br></div><div>I don't think that's true. Bulk data for expert users to sort out, and to potentially design their own search interface for themselves or the public to use, is of high value.</div><div><br></div><div>-- Eric</div><div><br></div><div> </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex"><div class=""><div class="h5">
> On 05 Jan 2016, at 17:19, Sigbjørn Vik <<a href="mailto:sigbjorn@opera.com">sigbjorn@opera.com</a>> wrote:<br>
><br>
> How about the following:<br>
><br>
> <a href="mailto:public@cabforum.org">public@cabforum.org</a> SHALL be informed about the report. If the CA cannot<br>
> post directly, it SHALL inform <a href="mailto:questions@cabforum.org">questions@cabforum.org</a>, and the CA/B<br>
> Forum chair SHALL forward to the list.<br>
><br>
> On 05-Jan-16 16:10, Dean Coclin wrote:<br>
>> Commenting on this part:<br>
>><br>
>> "<a href="mailto:public@cabforum.org">public@cabforum.org</a> SHALL be informed about the report, if the CA cannot<br>
>> post directly, it SHALL inform the CA/B Forum chair who SHALL inform the<br>
>> list."<br>
>><br>
>> If a CA is not a member of the forum, they won't have public list posting<br>
>> privileges and may not know the email address of the Chair/Vice Chair (they<br>
>> are not posted on our website). Hence I would suggest they email the<br>
>> "questions" list<br>
>><br>
>> Dean<br>
>><br>
>> -----Original Message-----<br>
>> From: <a href="mailto:public-bounces@cabforum.org">public-bounces@cabforum.org</a> [mailto:<a href="mailto:public-bounces@cabforum.org">public-bounces@cabforum.org</a>] On<br>
>> Behalf Of Sigbjørn Vik<br>
>> Sent: Friday, December 18, 2015 9:08 AM<br>
>> To: <a href="mailto:public@cabforum.org">public@cabforum.org</a><br>
>> Subject: Re: [cabfpub] Misissuance of certificates<br>
>><br>
>> Hi,<br>
>><br>
>> The discussion on this topic seems to have died down, I hope that means we<br>
>> can proceed to a ballot. Anyone willing to endorse?<br>
>><br>
>> The suggested exception for constrained intermediates did not seem to solve<br>
>> the problem it was intended to solve, and nobody spoke up for it, so I have<br>
>> removed it. The text would then be:<br>
>><br>
>><br>
>> 2.2.1 Information of incorrect issuance<br>
>><br>
>> In the event that a CA issues a certificate in violation of these<br>
>> requirements, the CA SHALL publicly disclose a report within one week of<br>
>> becoming aware of the violation.<br>
>><br>
>> <a href="mailto:public@cabforum.org">public@cabforum.org</a> SHALL be informed about the report, if the CA cannot<br>
>> post directly, it SHALL inform the CA/B Forum chair who SHALL inform the<br>
>> list.<br>
>><br>
>> The report SHALL publicize details about what the error was, what caused the<br>
>> error, time of issuance and discovery, and public certificates for all<br>
>> issuer certificates in the trust chain.<br>
>><br>
>> The report SHALL publicize the full public certificate, with the following<br>
>> exception: For certificates issued prior to 01-Mar-16 the report MAY leave<br>
>> out Subject Distinguished Name fields and subjectAltName extension values.<br>
>><br>
>> The report SHALL be made available to the CAs Qualified Auditor for the next<br>
>> Audit Report.<br>
>><br>
>> --<br>
>> Sigbjørn Vik<br>
>> Opera Software<br>
>> _______________________________________________<br>
>> Public mailing list<br>
>> <a href="mailto:Public@cabforum.org">Public@cabforum.org</a><br>
>> <a href="https://cabforum.org/mailman/listinfo/public" rel="noreferrer" target="_blank">https://cabforum.org/mailman/listinfo/public</a><br>
>><br>
><br>
><br>
> --<br>
> Sigbjørn Vik<br>
> Opera Software<br>
> _______________________________________________<br>
> Public mailing list<br>
> <a href="mailto:Public@cabforum.org">Public@cabforum.org</a><br>
> <a href="https://cabforum.org/mailman/listinfo/public" rel="noreferrer" target="_blank">https://cabforum.org/mailman/listinfo/public</a><br>
<br>
_______________________________________________<br>
Public mailing list<br>
<a href="mailto:Public@cabforum.org">Public@cabforum.org</a><br>
<a href="https://cabforum.org/mailman/listinfo/public" rel="noreferrer" target="_blank">https://cabforum.org/mailman/listinfo/public</a><br>
</div></div></blockquote></div><br><br clear="all"><div><br></div>-- <br><div class="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><a href="https://konklone.com" target="_blank">konklone.com</a> | <a href="https://twitter.com/konklone" target="_blank">@konklone</a><br></div></div></div></div></div></div></div>
</div></div>