-
Notifications
You must be signed in to change notification settings - Fork 64
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Certificate Transparency Log Certificate Acceptance Proposal #6
Comments
Backlink to the ct-policy mailing list topic: https://groups.google.com/a/chromium.org/d/topic/ct-policy/bArUq2nU41E/discussion |
eccopark
added a commit
to eccopark/certificate-transparency-go
that referenced
this issue
Feb 6, 2020
According to GoogleChrome/CertificateTransparency#6, a NotAfter validity field of a X509 Certificate should be used. The policy is as follows. For a certificate to be accepted by the Log that has a time range specified. The certificate’s ‘Not After’ validity field value must: Be at or after ‘Start’ and Be before ‘End’
Merged
2 tasks
Mercurrent
pushed a commit
to google/certificate-transparency-go
that referenced
this issue
Feb 6, 2020
According to GoogleChrome/CertificateTransparency#6, a NotAfter validity field of a X509 Certificate should be used. The policy is as follows. For a certificate to be accepted by the Log that has a time range specified. The certificate’s ‘Not After’ validity field value must: Be at or after ‘Start’ and Be before ‘End’
zorawar87
pushed a commit
to n-ct/certificate-transparency-go
that referenced
this issue
Feb 15, 2020
According to GoogleChrome/CertificateTransparency#6, a NotAfter validity field of a X509 Certificate should be used. The policy is as follows. For a certificate to be accepted by the Log that has a time range specified. The certificate’s ‘Not After’ validity field value must: Be at or after ‘Start’ and Be before ‘End’
zorawar87
pushed a commit
to n-ct/certificate-transparency-go
that referenced
this issue
Feb 26, 2020
According to GoogleChrome/CertificateTransparency#6, a NotAfter validity field of a X509 Certificate should be used. The policy is as follows. For a certificate to be accepted by the Log that has a time range specified. The certificate’s ‘Not After’ validity field value must: Be at or after ‘Start’ and Be before ‘End’
zorawar87
pushed a commit
to n-ct/certificate-transparency-go
that referenced
this issue
Mar 1, 2020
According to GoogleChrome/CertificateTransparency#6, a NotAfter validity field of a X509 Certificate should be used. The policy is as follows. For a certificate to be accepted by the Log that has a time range specified. The certificate’s ‘Not After’ validity field value must: Be at or after ‘Start’ and Be before ‘End’
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Problems:
Idea:
When a log operator brings up a new Log, they specify:
For a certificate to be accepted by the Log:
How could Log Operators use this:
Suppose the longest lived cert that a CA can/will ever issue is 3 years (I'm not sure what it actually is, so this example would need to be adjusted to accommodate whatever it really is).
Using this new idea, a log operator could then create 4 logs (to cover a rolling 3 year period), each with the same set of accepted roots, but with (Start, End) values of:
(initial, initial+1yr)
(initial+1yr, initial+2yrs)
(initial+2yrs, initial+3yrs)
(initial+3yrs, initial+4yrs)
where initial = ~when the logs are created
New certificates issued with short lifetimes (for example Let’s Encrypt certs) would initially end up in the (initial, initial+1yr) log, whereas new certificates with longer lifetimes would end up in the logs with later acceptance ranges. Existing certificates that have not yet expired would fit into whichever log accepts their ‘Not After’ value, and expired certificates would be submitted to already existing archival logs (e.g. Google Daedalus).
As now progressed, and neared initial+1yr, another log would be spun up with (Start, End) = (initial+4yrs, initial+5yrs), to continue to cover any new certificates created with a 3 year lifetime. New short lived certificates would start being logged in the (initial+1yr, initial+2yrs) Log.
Once now passed initial+1yr, the log with (Start, End) = (initial, initial+1yr) would become archival, and not require the same level of maintenance, as all of the certificates within it would be expired.
Pros:
Cons:
The text was updated successfully, but these errors were encountered: