[cabf_validation] CRL Validity Interval Ballot
Ryan Sleevi
sleevi at google.com
Wed Oct 13 15:08:10 UTC 2021
On Wed, Oct 13, 2021 at 10:57 AM Dimitris Zacharopoulos (HARICA) <
dzacharo at harica.gr> wrote:
>
>
> On 13/10/2021 5:17 μ.μ., Ryan Sleevi wrote:
>
>
>
> On Wed, Oct 13, 2021 at 10:05 AM Dimitris Zacharopoulos (HARICA) <
> dzacharo at harica.gr> wrote:
>
>> 4.9.7 and 4.9.10 have a nextUpdate requirement for Root CRLs and OCSP
>> responses, and this is set for 12 months. Do we want the same level of
>> "accuracy" as the CRL/OCSP responses of Subordinate CAs? If we do not, then
>> we can focus on language about just the CRLs/OCSP responses issued by
>> "online" CAs, as Wayne has already done at the proposed ballot and there is
>> no need to make further changes to the BRs.
>>
>> If I understand your position, you believe we should be specific (to the
>> second) only for specific requirements, such as those linked to RFC 5280
>> (validity of a certificate, validity period of a CRL/OCSP response) and not
>> the other cases (related to request tokens, audit reports, etc). Is that
>> accurate?
>>
>
> Got it. Definite misunderstanding :)
>
> To try to rephrase:
>
> - Defining a day to be 86,400 seconds (with caveats) is appropriate
> for Section 1.6.4 if the desire is to make this ballot a broader "date
> interval" cleanup rather than just the CRL cleanup
> - This convention cannot address the "inclusive" aspect; that will
> need to remain appropriate for ASN.1 types (certificates, CRLs, OCSP)
> - The term "validity period" refers to certificates, and comes from
> X.509/RFC 5280. The term "validity interval" is a term we introduced for
> OCSP, because CRLs and OCSP responses don't necessarily have 'validity
> periods' (intervals, freshness, etc are all concepts used to refer to them)
> - Taken together with the previous bullet: This means there still
> needs to be definitions specific to those, and within the specific sections
> (long-term, this would be the relevant profiles for certificates, CRLs, and
> OCSP, rather than the current distributed locations)
> - Procedural controls - request tokens, audit reports, etc - still
> make sense to define in days
> - However, the choice of period - 90 days vs 93 days, 397 days vs
> 398 days, 31 days vs 32 days - were intentionally selected to
> *allow* CAs to have a fixed calendrical schedule, without risk of
> violation.
> - For example, if you have a 30 day period, then over a year, you
> will have shifted 5 to 6 days. You won't be able to, for example, "do
> something on the first of every month"
> - The "extra day" is to make sure that if you do it at 9am on the
> 1st of the month prior, you (hopefully unambiguously) have until midnight
> of the 1st of the current month, without running afoul
>
>
>
> Got it. Do you have any guidance or preference for the offline CA
> CRLs/OCSP responses? Should that continue to be described in months or move
> into something more specific?
>
Days was/is the suggestion. Months being 30 days or 31 days has the
calendrical drift issue. So 367 days = 1 year/12 months.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/validation/attachments/20211013/c85dc116/attachment-0001.html>
More information about the Validation
mailing list