Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Backdating revocations #214

Open
srdavidson opened this issue Sep 26, 2023 · 0 comments
Open

Backdating revocations #214

srdavidson opened this issue Sep 26, 2023 · 0 comments
Labels

Comments

@srdavidson
Copy link
Contributor

srdavidson commented Sep 26, 2023

See https://lists.cabforum.org/pipermail/smcwg-public/2023-September/000773.html from Martijn

Code Signing certificates, CAs are required to keep the time encoded in the InvalidityDate extension and revocationDate field the same. Additionally, if a CA deems that a historic date should be set, for example due to a key compromise having occurred a while ago, CAs are required to backdate the value.

For TLS Certificates, CAs should set the revocationDate value for the date and time when revocation occurred, however, CAs are allowed to backdate if deemed appropriate.

Both of these documents state that this is a deviation/exception to best practices described in RFC5280.

However when we look at the SBRs, we could not find any such language that would clarify if and when backdating is allowed. I’m wondering if there’s been any discussion in the past around this, if this was left out on purpose, or if we missed this?

Likewise, I’m wondering how other issuers and consumers look at this, and if we want to add some clarifying language in the SBRs. I’m inclined to say that backdating revocation is something we should be supporting.

@XolphinMartijn XolphinMartijn changed the title Backdating Backdating revocations Oct 3, 2023
@XolphinMartijn XolphinMartijn linked a pull request Oct 4, 2023 that will close this issue
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant