Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

BRs: Clarify OCSP Profile and organize as appropriate #306

Open
BenWilson-Mozilla opened this issue Aug 30, 2021 · 4 comments
Open

BRs: Clarify OCSP Profile and organize as appropriate #306

BenWilson-Mozilla opened this issue Aug 30, 2021 · 4 comments
Assignees
Labels
backlog baseline-requirements Server Certificate CWG - Baseline Requirements enhancement

Comments

@BenWilson-Mozilla
Copy link
Contributor

The content in BR § 4.9.10 belongs in BR § 4.9.9, and BR § 4.9.10 should say “No stipulation.”

According to my reading of RFC 3647, section 4.9.9 (along with section 4.10) should indicate whether OCSP is a component of the PKI and the availability, uptime, etc. of online status information. Section 4.9.10, on the other hand, is for stating the obligations of relying parties to check that online status information (similar to section 4.9.6). Here is the relevant excerpt, that supports my position that the list under section 4.4.9 of RFC 3647 translates to the information lower down in the table in Section 6):

  • On-line revocation/status checking availability, for instance, OCSP and a web site to which status inquiries can be submitted;

  • Requirements on relying parties to perform on-line revocation/status checks;

@BenWilson-Mozilla BenWilson-Mozilla added baseline-requirements Server Certificate CWG - Baseline Requirements clean-up Items for future clean-up ballot labels Aug 30, 2021
@sleevi sleevi added enhancement and removed clean-up Items for future clean-up ballot labels Aug 30, 2021
@sleevi sleevi changed the title Baseline Requirements: Move text from § 4.9.10 to § 4.9.9 BRs: Clarify OCSP Profile and organize as appropriate Aug 30, 2021
@sleevi
Copy link
Contributor

sleevi commented Aug 30, 2021

Thanks for filing this @BenWilson-Mozilla . It's actually a bit more complex than you've outlined. I've retitled to reflect this.

The situation as it stands is that 4.9.9 contains profile requirements on an OCSP responder certificate (this belongs in Section 7.1, for certificate profiles) and OCSP response profiles (this belongs in 7.3). Similarly, 4.9.10 also contains elements of OCSP response profiles, which also belongs in Section 7.3.

The requirement of the OCSP responder uptime and capabilities (such as the GET method) does indeed belong in 4.9.9.

I've moved this from "clean-up" to "enhancement", since this is broadly the OCSP and CRL profiling work previously discussed, and which is currently pending the completion of the Certificate Profile work.

@barrini
Copy link
Contributor

barrini commented May 29, 2024

Ben to continue working on this

@BenWilson-Mozilla BenWilson-Mozilla self-assigned this May 29, 2024
@BenWilson-Mozilla
Copy link
Contributor Author

According to RFC 3647 section 6:
4.9.9 On-line revocation/status checking availability
4.9.10 On-line revocation checking requirements

@clintwilson
Copy link
Member

I think for the current TBRs (version 2.0.4), the main change that should be considered is moving some of 4.9.9 and 4.9.10 to 7.3, e.g. the following text seems to better fit in 7.3... I think

4.9.9

OCSP responses MUST conform to RFC6960 and/or RFC5019. OCSP responses MUST either:

Be signed by the CA that issued the Certificates whose revocation status is being checked, or
Be signed by an OCSP Responder whose Certificate is signed by the CA that issued the Certificate whose revocation status is being checked.

In the latter case, the OCSP signing Certificate MUST contain an extension of type id-pkix-ocsp-nocheck, as defined by RFC6960.

4.9.10

The validity interval of an OCSP response is the difference in time between the thisUpdate and nextUpdate field, inclusive. For purposes of computing differences, a difference of 3,600 seconds shall be equal to one hour, and a difference of 86,400 seconds shall be equal to one day, ignoring leap-seconds.

For the status of Subscriber Certificates:

OCSP responses MUST have a validity interval greater than or equal to eight hours;
OCSP responses MUST have a validity interval less than or equal to ten days;
For OCSP responses with validity intervals less than sixteen hours, then the CA SHALL update the information provided via an Online Certificate Status Protocol prior to one-half of the validity period before the nextUpdate.
For OCSP responses with validity intervals greater than or equal to sixteen hours, then the CA SHALL update the information provided via an Online Certificate Status Protocol at least eight hours prior to the nextUpdate, and no later than four days after the thisUpdate.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backlog baseline-requirements Server Certificate CWG - Baseline Requirements enhancement
Projects
None yet
Development

No branches or pull requests

4 participants