On Mon, 23 May 2016 22:34:01 -0700 (PDT)
Ryan Sleevi <
rsl...@chromium.org> wrote:
> As such, certificates that adopt a non-standard form of
> redaction, such as some have proposed [1], will not be recognized as
> conforming to the Chrome CT Policy, as they do not conform to RFC
> 6962's definition of PreCertificates. CAs that choose to log such
> certificates to the set of CT Logs trusted by Chrome will, in effect,
> be logging public commitments to issue certificates which violate RFC
> 5280 and violate the CA/Browser Forum's Baseline Requirements.
Hi Ryan,
This policy doesn't make sense to me, since anyone can submit
(pre-)certs to any log and logs do not track whether a (pre-)cert was
submitted by a CA or by someone else. It seems to me that the
signature ought to indicate the CA's commitment to issue the
certificate, as specified by Section 3.1 of RFC6962:
"The signature on the TBSCertificate indicates the
certificate authority's intent to issue a certificate.
This intent is considered binding (i.e., misissuance
of the Precertificate is considered equal to misissuance
of the final certificate)."
For instance, see this non-compliant pre-cert which has been logged to
two logs trusted by Chrome:
https://crt.sh/?id=20919705
Symantec will probably claim they didn't submit this pre-cert to these
logs. But how would one verify this claim? Even if Symantec didn't
submit this pre-cert themselves, was their choice to log implied by the
fact that the pre-cert chains to a trusted root, and thus *could* be
logged?
Regards,
Andrew