All,
The updated CCADB Policy and Incident Reporting Guidelines have been published with an effective date of July 15, 2025. This date is in line with the expectation that CA Owners will have updated their in-use TLS server authentication certificate validation methods for publicly-trusted hierarchies, following the recent CCADB enhancement.
CA Owners are strongly encouraged to align their CCADB disclosures with the expectations that become effective on July 15, 2025, as soon as reasonably possible.
Please note, to comply with the updated CRL disclosure requirements described in Section 6.2, it is expected some CAs will need to update existing certificate records (e.g., modifying CRL disclosures to exactly match those included in certificates).
Thank you
-Chris, on behalf of the CCADB Steering Committee
--
You received this message because you are subscribed to the Google Groups "CCADB Public" group.
To unsubscribe from this group and stop receiving emails from it, send an email to public+un...@ccadb.org.
To view this discussion visit https://groups.google.com/a/ccadb.org/d/msgid/public/CAAbw9mApWKw1J2ZJ2-1ft7LgJK7CDiYvHKLFjtNEiH1EH%3DmYtQ%40mail.gmail.com.
To view this discussion visit https://groups.google.com/a/ccadb.org/d/msgid/public/48947bbc-ca5d-4922-a9fd-9bb74fd82bf9n%40ccadb.org.
To view this discussion visit https://groups.google.com/a/ccadb.org/d/msgid/public/CA%2B1gtaZh0hjfGtc_6aKeF2vJtQqRh3SLpkTeSdiipDzePVgkOg%40mail.gmail.com.
Hi Rob,
Thank you for the explanation; I understand now how my previous wording and response at F2F 65 could have been more precise.
The expectation that the “Validation Methods” field in the CCADB is populated is based upon technical enforcement within the system.
Introduced in September 2022 during a major CCADB release, the Validation Methods field became a mandatory entry. Subsequently, whenever a root certificate was added to an "Add/Update Root Request" Case (minimally, for annual document disclosure requirements), the CCADB system enforced that this field be populated before a CA Owner could successfully select 'Submit to Root Store'. Attempting to submit without providing a value for this field results in an error.
Similarly, CA Owners attempting to include a root certificate in a "Root Inclusion Request" Case have to populate the Validation Methods field (and several other root record fields in the CCADB) before being able to successfully select 'Submit to Root Store'. Without this information, submission will again result in an error.
The expectation that the field be populated with accurate information comes from Section 1 of the CCADB Policy that states:
“Regardless of more specific provisions in these requirements, CA Owners have an overarching responsibility to keep the information in the CCADB about themselves, their operations and their certificates accurate, and to make updates in a timely fashion. Minimally, CA Owners with certificates included in a Root Store MUST ensure their information stored in the CCADB is kept up to date as changes occur.”
Members at F2F 65 wanted a clear deadline for updating their information in this field. We chose July 15, 2025, to align with the deprecation of methods 3.2.2.4.2 and 3.2.2.4.15 from the CA/Browser Forum TLS Baseline Requirements.
Hopefully, this context helps better explain the expectation for the Validation Methods field in the CCADB.
Thank you
-Chris
To view this discussion visit https://groups.google.com/a/ccadb.org/d/msgid/public/CA%2B1gtaZh0hjfGtc_6aKeF2vJtQqRh3SLpkTeSdiipDzePVgkOg%40mail.gmail.com.
Hi Dimitris,
It seems switching between full and partitioned CRLs is acceptable so long as at least one of the two corresponding fields in the CCADB is accurately populated at all times. If there are multiple full CRL URLs during a period of transition, at least one of those will need to be disclosed to the CCADB. With that said, is there a suggested wording change for the CCADB Policy?
Since a CA may change URLs arbitrarily, it is clear that this rule will fail because there will be a moment in time where an early-issued end-entity certificate will have "URL A", and a later-issued certificate will have "URL B". In that case, CCADB will have either "URL A" or "URL B" causing issues with the policy.
I suggest removing this sentence. If I recall correctly, the
purpose of this field was to offer an out-of-band CRL checking
mechanism that Certificate Consumers may use in addition to the
CRLDP URL in the actual certificates, or the lack of such an
extension.
If populating a full and complete CRL URL: the JSON Array of Partitioned CRL URLs field MUST be empty.
If populating a JSON Array of Partitioned CRL URLs: the full and complete CRL URL MUST be empty.
Hi Dimitris,
Comments inline.
I think the intent of this is to ensure that if a CRL URL is specified both in a certificate via the CRLDP and in CCADB, there’s no variation in casing, trailing slashes, etc. I don’t think it’s establishing a requirement for all certificates to include CRLDP. I agree that the language should be improved to make that clear.
Ø If populating a full and complete CRL URL:
Ø the JSON Array of Partitioned CRL URLs field MUST be empty.
Ø If populating a JSON Array of Partitioned CRL URLs:
Ø the full and complete CRL URL MUST be empty.
Can you expand on why it’s useful for both fields to be populated? I think this requirement to populate only one makes sense, because a full CRL’s scope will necessarily include all certificates issued by the CA. Thus, any partitioned CRL information is redundant and need not be specified if a full CRL is specified.
Thanks,
Corey
To view this discussion visit https://groups.google.com/a/ccadb.org/d/msgid/public/4572ee58-1af2-4c4a-90c8-e20bd6c8ea07%40harica.gr.
Hi Corey,
I think the intent of this is to ensure that if a CRL URL is specified both in a certificate via the CRLDP and in CCADB, there’s no variation in casing, trailing slashes, etc. I don’t think it’s establishing a requirement for all certificates to include CRLDP.
This is correct and ensures there is parity between what we see in certificates and what we see disclosed to the CCADB (except in the rare case of transitory periods).
In response to the CRL URL points originally raised by Dimitris and the separate updated information clarity raised by Rob, we’ve created this PR for a minor version increment of the CCADB Policy to 2.0.1. Continued comments are both welcome and appreciated.
Thank you
-Chris
Hi Ben,
RFC 5280, section 5.2.5 (which defines the syntax of the IDP CRL extension) says:
“The syntax and semantics for the distributionPoint field are the same as for the distributionPoint field in the cRLDistributionPoints extension (Section 4.2.1.13).”
Section 4.2.1.13 says:
“When the distributionPoint field is present, it contains either a
SEQUENCE of general names or a single value, nameRelativeToCRLIssuer.
If the DistributionPointName contains multiple values, each name
describes a different mechanism to obtain the same CRL.”
The issue that John describes requires a violation of the requirements above, as multiple IDP distributionPoint names/URLs within a given CRL must identify that same CRL. If the included names/URLs actually refer to CRLs that differ in scope/revoked entry content, then the “same CRL” rule is not being followed by the CA.
Perhaps it would be good to call this out in Mozilla policy, but I believe the CRL profile requirements in RFC 5280 address this concern.
Thanks,
Corey
To view this discussion visit https://groups.google.com/a/ccadb.org/d/msgid/public/CA%2B1gtaZ8TXSqnG_O697Qmc0ki7L-o20jBrZbiKq_LaMeo-e3Uw%40mail.gmail.com.