All,
The purpose of this email is to start discussion of Mozilla GitHub Issue #276 ("Address Delayed Revocation"). We would like to collect comments and feedback on a proposal to address delayed certificate revocation from a Mozilla perspective. It builds on prior discussions and feedback regarding delayed revocation, and the proposal is meant to replace guidance currently provided on the Mozilla CA wiki.
Here is the comparison link for a proposed new section 6.1.3 in the MRSP:
Summary
Here are the highlights of the proposal:
Background
Earlier this year, on this list, I proposed an Interim Policy to Address Delayed Revocation. While the proposed interim policy provided clarity, it faced criticism regarding implementation complexity, burden on subscribers and CAs, and the feasibility of associated measures, such as transitioning delayed revocation domains to 90-day certificates. Also, there were subsequent proposals aimed at reducing certificate lifetimes and encouraging automation. See e.g. https://github.com/cabforum/servercert/pull/553.
This new proposal drops proposed measures such as domain-specific tracking and subscriber attestations and instead focuses on subscriber education, mass revocation preparedness, and robust incident reporting as the primary mechanisms for improving agility and transparency regarding delayed revocation.
If adopted, the proposed MRSP § 6.1.3 would replace the current guidance on delayed revocation in Mozilla’s wiki and ensure consistency with the CCADB's Incident Reporting Guidelines.
I welcome your feedback on this draft proposal. Please share your thoughts, questions, or concerns to help us refine and improve it further.
Thanks,
Ben Wilson
Mozilla Root Store
All,
As part of the discussions on this proposal, namely that CAs “maintain and test mass revocation plans annually, including the revocation of 30 randomly chosen certificates within a 5-day period,” I’ve received a few comments via private channels, and to ensure transparency and foster discussion, I am sharing them here anonymously:
1. “Mozilla does not grant exceptions…” -- this is the most important signal that Mozilla can provide.
2. If certificate consumers want to prohibit delayed revocation, then they need to make it clear to CAs that they won't accept it and that they will kick them out of the root stores if they still do it. Don't try to solve this issue with indirect measures like random revocations. Just be straight about it and make it clear that there will be consequences for the very first delayed revocation and onward.
3. We will face big problems in revoking productive customer certificates just to test our mass-revocation plan and procedures. Our current customer contracts do not foresee this. While we can revoke at any time for security or compliance reasons, this authorization should not be used just to test mass-revocation. This will also require us to push out contract changes to our complete TLS customer base, which will take a considerable amount of time and effort.
4. This part of the proposal should occur within the CA/Browser Forum
through amendments to the TLS Baseline Requirements, and not via Mozilla
Root Store Policy.
5. Why was the number 30 chosen as a sample? Some CA operators issue very few certificates, while some CAs issue millions of certificates.
I welcome your feedback on these points, the random sampling proposal, and any others.
Thanks,
Ben
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/71b07640-d425-4f2f-8da4-d97a9475b9f6n%40mozilla.org.
As part of the discussions on this proposal, namely that CAs “maintain and test mass revocation plans annually, including the revocation of 30 randomly chosen certificates within a 5-day period,” I’ve received a few comments via private channels, and to ensure transparency and foster discussion, I am sharing them here anonymously:
Dear Rich,
Thank you for your question.
I think it would be advisable for a CA operator’s mass-revocation testing plan to include an immediate notice to all customers whose certificates were randomly selected because we would want to minimize disruption to server operations while testing the CA’s ability to revoke and replace certificates promptly.
That said, CAs should consider performing occasional tests that go beyond providing pre-generated replacement certificates, in which subscribers
generate and submit new public keys. That would address the risks from a
widespread incident, like Heartbleed, where the potential compromise of private keys
necessitated key pair replacement. Preparing for such scenarios ensures that subscribers will be able to quickly perform the tasks of key pair generation, public
key submission, and certificate installation.
Much to discuss.
Thanks again,
Ben
Dear everybody,
>Point 3 is unusual as revocation for compliance reasons is explicitly outlined, and that's all that this is? There isn't any new changes to the legal language required that I can see.
I checked with our legal department and they clearly stated that we will have to amend the contracts if we want to be sure that we can't be sued for damages inflicted by random revocation. Current language (at least in our contracts) allows us to revoke in case of security incidents, non-compliance and some other cases. But a preventative revocation would currently not be covered.
Also, I'm not convinced that it will motivate many customers towards automation. Most will probably just gamble and bet on not being in the unlucky 30, especially if they get their certs from a large CA... 😉
>Point 4 has been covered, being above the baseline requirements is barely noteworthy but encouraging these practices in more programs is good advice.
Regarding a comment made in another mail, I think it's fair to say that most public trust CAs -need- to conform to all major root store policies to be of any value for their customers. The more fragmented these root store policies are, the more complex (and error prone!) complying to them becomes. For this reason, we would really encourage the root store operators to converge on requirements set forward.
Kind regards
Roman
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
dev-security-po...@mozilla.org.
To view this discussion visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/c2290409-2ef1-4295-8f5d-13369f2dbbe1n%40mozilla.org.
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
Dear everybody,
>Point 3 is unusual as revocation for compliance reasons is explicitly outlined, and that's all that this is? There isn't any new changes to the legal language required that I can see.
I checked with our legal department and they clearly stated that we will have to amend the contracts if we want to be sure that we can't be sued for damages inflicted by random revocation. Current language (at least in our contracts) allows us to revoke in case of security incidents, non-compliance and some other cases. But a preventative revocation would currently not be covered.
Also, I'm not convinced that it will motivate many customers towards automation. Most will probably just gamble and bet on not being in the unlucky 30, especially if they get their certs from a large CA...
Regarding a comment made in another mail, I think it's fair to say that most public trust CAs -need- to conform to all major root store policies to be of any value for their customers. The more fragmented these root store policies are, the more complex (and error prone!) complying to them becomes. For this reason, we would really encourage the root store operators to converge on requirements set forward.
I think it would be advisable for a CA operator’s mass-revocation testing plan to include an immediate notice to all customers whose certificates were randomly selected because we would want to minimize disruption to server operations while testing the CA’s ability to revoke and replace certificates promptly.
Oh, I don't know... ransomware has been far more effective at improving
DR practices than several decades of education was.
DZ.
Dec 19, 2024 22:24:31 Rich Salz <rich...@gmail.com>:
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
DZ.
Dec 23, 2024 13:30:45 Rich Salz <rich...@gmail.com>:
To view this discussion visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/4072d67e-6e30-4c01-a18b-993b94102a41%40it.auth.gr.
I think the problem of delayed revocation is automatically solved once the proposed clarification by Mozilla (and other root store operators) clearly states that delayed revocation will unconditionally to removal from the trust store. Why invent a whole new mechanism when the same goal can be achieved much easier?
Kind regards & welcome to 2025
Roman
I think the problem of delayed revocation is automatically solved once the proposed clarification by Mozilla (and other root store operators) clearly states that delayed revocation will unconditionally to removal from the trust store. Why invent a whole new mechanism when the same goal can be achieved much easier?
I think we can't have both (be able to revoke any certificate within 24h/5d *and* be considerate about possible negative effects).
As far as the discussion here seems to go: Revocation within 5 days seems to be more important. I *personally* don't agree but if that's the way things are going to be, then I'm in favor of strict and clear rules.
Cheers
Roman
To view this discussion visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/5fe1e9c2-3598-4001-9447-2f6ec646770f%40it.auth.gr.
As far as the discussion here seems to go: Revocation within 5 days seems to be more important. I *personally* don't agree but if that's the way things are going to be, then I'm in favor of strict and clear rules.
Hi Ben,
> Maintain and test mass revocation plans annually, including the revocation of 30 randomly chosen certificates within a 5-day period.
We believe this part of the proposal will not have the intended effect, and would rather cause annoyance with Subscribers. Let me explain why:
Over the years, Sectigo has done several mass revocations. We have procedures in place for handling these in a compliant fashion, and these procedures have worked. For a total of 30 certificates, we would not use our mass revocation
procedures; rather, for 30 certificates it’s far more effective to pick a handful of employees to perform manual outreach to customers. Contacting customers directly and personally ensures that they are taking steps to replace each certificate before it is
revoked, and it’s do-able for 30 certificates. It’s not do-able for 30,000 certificates.
Question: What is this requirement hoping to accomplish? Is it (1) to confirm that CAs have a revocation plan available and tested; or (2) to make sure Subscribers have such a plan in order and are ready for it at any time?
If the answer is number 2, we’re very skeptical that it would be successful. Going by https://crt.sh/cert-populations, we’re counting around 1 billion unexpired pre-certificates. Let’s take that as a ballpark number. Based on CCADB records, there’s about 55 distinct CA Owners included in the Mozilla Root Store. 55 times 30 certificates become 1650 revocations per year. That means, as a Subscriber, (ignoring math around which CA Owner I’d use) each of my unexpired certificates would have a 0.000165% chance of being randomly selected for revocation out of all unexpired certificates out there. That chance would further decline if I’d use one of the top 10 CAs based on number of issued certificates. I’m not sure how much that would spur Subscribers to change tactics.
Additionally, we feel that several CAs have already shown that they are able to perform mass-revocations throughout the year, in full compliance with the BR mandated revocation deadlines. Wouldn’t it be fairer to only impose this random revocation requirement on those CAs that have actually had delayed revocation incidents?
i.e., If a CA hasn’t had a delayed revocation incident in the last 12 months, then they MAY perform any random revocations; whereas if a CA has had a delayed revocation incident in the last 12 months, then they MUST.
Regards,
Martijn Katerbarg
Sectigo
From:
dev-secur...@mozilla.org <dev-secur...@mozilla.org> on behalf of Rich Salz <rich...@gmail.com>
Date: Friday, 3 January 2025 at 19:22
To: Roman Fischer <roman....@swisssign.com>
Cc: dev-secur...@mozilla.org <dev-secur...@mozilla.org>
Subject: Re: MRSP 3.0: Issue #276: Delayed Revocation
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
dev-security-po...@mozilla.org.
All,
As part of the discussions on this proposal, namely that CAs “maintain and test mass revocation plans annually, including the revocation of 30 randomly chosen certificates within a 5-day period,” I’ve received a few comments via private channels, and to ensure transparency and foster discussion, I am sharing them here anonymously:
1. “Mozilla does not grant exceptions…” -- this is the most important signal that Mozilla can provide.
2. If certificate consumers want to prohibit delayed revocation, then they need to make it clear to CAs that they won't accept it and that they will kick them out of the root stores if they still do it. Don't try to solve this issue with indirect measures like random revocations. Just be straight about it and make it clear that there will be consequences for the very first delayed revocation and onward.
3. We will face big problems in revoking productive customer certificates just to test our mass-revocation plan and procedures. Our current customer contracts do not foresee this. While we can revoke at any time for security or compliance reasons, this authorization should not be used just to test mass-revocation. This will also require us to push out contract changes to our complete TLS customer base, which will take a considerable amount of time and effort.
4. This part of the proposal should occur within the CA/Browser Forum through amendments to the TLS Baseline Requirements, and not via Mozilla Root Store Policy.
5. Why was the number 30 chosen as a sample? Some CA operators issue very few certificates, while some CAs issue millions of certificates.
I welcome your feedback on these points, the random sampling proposal, and any others.
Thanks,
Ben
Hi Ben,About " annual plan testing by revoking 30 randomly chosen certificates within a 5-day timeframe; and"...We understand that this mean that a CA will need to randomly revoke 30 certificates that most likely don't have other reason for being revoked than being randomly chosen and customers will just need to "happily" accept the situation... Harsh, but doable...
About "audit report submitted under section 3.1 SHALL include an attestation that the CA operator has met these mass revocation planning requirements", it must be considered that the attestation letters of Webtrust audit reports have a fixed format, so such addition would be added most likely as a "Other matters" section, that audits can take each differently.
My question here would be if you think it's there any chance that these requirements become part of the TLS BRs instead of the Mozilla Policy, I see several benefits here:- Checking the mass-revocation plan would be integral part of the audit scope, so auditors don't need to figure out how to include it in the reports... it just needs to be added to the audit criteria.- The "inverse-lottery" thing could be added in the revocation timelines of the BR, so there's an entry in the 5-day deadline adding a new category "The certificate has been randomly chosen for revocation during an internal audit". This should facilitate the contractual language to add in the subscriber agreement.
El domingo, 15 de diciembre de 2024 a las 21:51:43 UTC+1, Ben Wilson escribió:All,
The purpose of this email is to start discussion of Mozilla GitHub Issue #276 ("Address Delayed Revocation"). We would like to collect comments and feedback on a proposal to address delayed certificate revocation from a Mozilla perspective. It builds on prior discussions and feedback regarding delayed revocation, and the proposal is meant to replace guidance currently provided on the Mozilla CA wiki.
Here is the comparison link for a proposed new section 6.1.3 in the MRSP:
Summary
Here are the highlights of the proposal:
- Revocation must occur promptly in compliance with the timelines set in section 4.9.1 of the TLS Baseline Requirements (TLS BRs). Mozilla does not grant exceptions to these timelines.
- New CA Obligations:
- Educate subscribers on revocation timelines and discourage reliance on certificates in systems that cannot tolerate timely revocation.
- Include contractual language requiring subscriber cooperation with revocation timelines.
- Maintain and test mass revocation plans annually, including the revocation of 30 randomly chosen certificates within a 5-day period.
- Beginning April 15, 2026, CA audit reports must attest to compliance with the mass revocation planning requirements.
- Delayed revocation incidents must be reported per version 2.1 of the CCADB's Incident Reporting Guidelines (as currently proposed)
- Repeated delayed revocation incidents will result in heightened scrutiny or sanctions, which may include root removal.
Background
Earlier this year, on this list, I proposed an Interim Policy to Address Delayed Revocation. While the proposed interim policy provided clarity, it faced criticism regarding implementation complexity, burden on subscribers and CAs, and the feasibility of associated measures, such as transitioning delayed revocation domains to 90-day certificates. Also, there were subsequent proposals aimed at reducing certificate lifetimes and encouraging automation. See e.g. https://github.com/cabforum/servercert/pull/553.
This new proposal drops proposed measures such as domain-specific tracking and subscriber attestations and instead focuses on subscriber education, mass revocation preparedness, and robust incident reporting as the primary mechanisms for improving agility and transparency regarding delayed revocation.
If adopted, the proposed MRSP § 6.1.3 would replace the current guidance on delayed revocation in Mozilla’s wiki and ensure consistency with the CCADB's Incident Reporting Guidelines.
I welcome your feedback on this draft proposal. Please share your thoughts, questions, or concerns to help us refine and improve it further.
Thanks,
Ben Wilson
Mozilla Root Store
All,
Thanks for your responses thus far.
We agree about the need to ensure that our messaging around timely revocation remains clear and unambiguous.
In response to your comments, we might want to develop and adopt a graduated list of proportionate penalties that CA operators will face in response to delayed revocation (rather than imposing across-the-board requirements on all CAs). This approach will not only be more effective, but also will provide CA operators with clear expectations about the consequences of delayed revocation. A structured list of enforcement measures would create a strong incentive for CAs to adhere to revocation timelines. A "menu of measures" could graduate from minor, first-time incidents to more stringent measures for repeated or egregious violations.
I invite the community to revisit and review all previously suggested measures, suggest new ones, and advise us about this idea of adopting a structured, ordered list of sanctions for CAs that delay revocation.
I look forward to your additional comments and suggestions.
Thanks again,
Ben
[Posting in a personal capacity, per https://wiki.mozilla.org/CA/Policy_Participants]Ben wrote:
> 1. “Mozilla does not grant exceptions…” -- this is the most important signal that Mozilla can provide.I feel compelled to express the view that Mozilla should not provide any guidance beyond this “Mozilla does not grant exceptions” statement. In other words, I think that the non-policy language at https://wiki.mozilla.org/CA/Responding_To_An_Incident#Revocation should be completely removed. Not updated, not improved, and certainly not incorporated into the MRSP in some way. Completely Removed.I have formed this opinion somewhat reluctantly and primarily because I've observed one CA, despite their error being pointed out multiple times by multiple community members, continually misrepresent the non-policy language at https://wiki.mozilla.org/CA/Responding_To_An_Incident#Revocation as "Mozilla policy". In one comment, that CA made the bogus claim that "the current Mozilla policy has language that allows for delayed revocation". Despite now recognizing that delayed revocation "violates the Mozilla policy based on the fact that Mozilla states that CAs are expected to comply with the BRs", that CA seems to want to bury that uncomfortable truth of the "most important signal" beneath Issue #276, writing "We continue to appreciate Ben's efforts to lead a productive discussion on potential policy changes in this area, and would prefer that people spend their efforts on moving such discussions forward".Furthermore, by my count there were 30 "leaf-revocation-delay" bugs opened against 20 CA Owners during 2024. My recollection is that most of these revocations were delayed by choice rather than by accident. I wonder how many of these CAs have misinterpreted https://wiki.mozilla.org/CA/Responding_To_An_Incident#Revocation as a "get out of jail free card", despite the already clear assertion on that wiki page that "Mozilla does not grant exceptions to the BR revocation requirements"?Based on events so far, my conclusion is this: however well intentioned it might be, the mere existence of any language that attempts to regulate CA responses to delayed revocation incidents drowns out that "most important signal" and consequently risks doing more harm than good. IMHO, that risk can only be mitigated if that language is Completely Removed.> New CA Obligations:
> - Maintain and test mass revocation plans annually, including the revocation of 30 randomly chosen certificates within a 5-day period.Please note that there are CAs that do correctly understand that "Mozilla does not grant exceptions" and that do always strive to adhere to the mandatory BR revocation deadlines. Why should these rule-abiding CAs and their subscribers be burdened with this proposed random revocation requirement? This seems unfair, in my view.Martijn asked if it would be "fairer to only impose this random revocation requirement on those CAs that have actually had delayed revocation incidents". I think that this would not only be fairer but might also act as a deterrent against CAs delaying revocations in the first place!
From: 'Ben Wilson' via dev-security-policy@mozilla.org <dev-security-policy@mozilla.org>
Sent: 18 December 2024 17:17
--
You received this message because you are subscribed to the Google Groups "dev-security-policy@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-policy+unsub...@mozilla.org.
I agree with Rob’s point: Mozilla’s clear stance—"Mozilla does not grant exceptions"—is critical. The non-policy guidance on Responding to an Incident has been repeatedly misused by some CAs to justify delayed revocations, despite corrections. Removing this language entirely is the best way to reinforce Mozilla’s expectations and prevent further misuse.
Ryan Hurst
URL: https://wiki.mozilla.org/CA/Responding_To_An_Incident#Revocation
Goals: Mozilla’s goals are: to ensure that revocation occurs as swiftly as possible while maintaining the overall security and stability of the web; to reduce delayed revocation incidents to the greatest extent possible; to improve delayed revocation incident reports; and to gather better information on those cases where delayed revocation occurs.
Date to Go Live: January 17, 2025
Revocation
Mozilla’s Expectations on Revocation
CA operators MUST revoke misissued or otherwise problematic TLS server certificates within 24 hours or 5 days, depending on the circumstances set forth in section 4.9.1 of the CA/Browser Forum’s TLS Baseline Requirements (TLS BRs). Mozilla does not grant exceptions to the revocation requirements of the TLS BRs.
To ensure compliance with the TLS BRs, Mozilla requires that CA operators:
engage in proactive communication and advise subscribers well in advance about the revocation timelines and explicitly warn them against using publicly-trusted TLS server certificates on systems that cannot tolerate timely revocation;
include appropriate language in customer agreements requiring subscribers’ timely cooperation in meeting revocation timelines and acknowledging the CA’s obligations to adhere to applicable policies and standards;
prepare and maintain credible plans to address mass revocation events, including detailed procedures for handling mass revocations effectively, including rapid communication with affected parties and conducting annual plan testing; and
engage a third party assessor to evaluate whether the CA Operator has:
credible plans to handle mass revocation events;
tested the operational effectiveness of the plans, including the accuracy and adequacy of documentation of plan testing, including timelines, results, and remediation steps; and
incorporated feedback from such exercises to improve future readiness.
Incident Reporting
The CCADB incident reporting process ensures the Web PKI community is informed and that issues are tracked and resolved effectively. Clear and timely communication fosters trust and accountability, mitigating risks to the ecosystem.
If a CA operator determines that it might delay revocation of certificates beyond the time period required by the TLS BRs, it MUST file a preliminary incident report with a Summary section immediately in Bugzilla, even if the delay has not yet occurred.
Such delayed revocation incident reports SHOULD be updated at least every 3 days and MUST be updated no less frequently than every 7 days to describe a summary of:
the number of certificates that have been revoked;
the number of certificates that have not yet been revoked;
the number of certificates planned for revocation that have expired; and
an estimate for when all remaining revocations will be completed.
Consistent with CCADB incident reporting requirements, in the “Analysis” section, the CA operator SHALL explain in the Analysis section of the incident report those factors and rationales behind the decision to delay revocation (including detailed and substantiated explanations of how extensive harm would result to third parties–such as essential public services or widely relied-upon systems–and why the situation is exceptionally rare and unavoidable).
Also, the Timeline section should include the time(s) at which the CA Operator actually completed revocation of affected certificates, and the Action Items list MUST include steps reasonably calculated to prevent or reduce future revocation delays.
Consequences of Delayed Revocations
Failing to meet the standards of timely revocation erodes trust in the Web PKI and poses risks to global internet security. Delayed revocation is a measure of last resort and MUST not be used routinely. Repeated incidents of delayed revocation without sufficient justification will result in heightened scrutiny and sanctions, including removal of the CA from the Mozilla Root Store. CA operators must also adhere to the policies and revocation requirements of other Root Store Programs that include their CA certificates. Additionally, all delayed revocation incidents MUST be listed as findings in the CA operator’s next TLS BR audit statement.
> Delayed revocation is a measure of last resort and MUST not be used routinely.
Hi Ben. One nit: That "not" should be capitalized.
Sent: 13 January 2025 17:00
--
You received this message because you are subscribed to the Google Groups "dev-security-policy@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-policy+unsub...@mozilla.org.
All,I have posted a replacement wiki page and created a GitHub commit to address this issue.Please let me know of any comments or suggestions.Thanks,Ben
On Monday, January 13, 2025 at 11:31:36 AM UTC-7 r...@sectigo.com wrote:
> Delayed revocation is a measure of last resort and MUST not be used routinely.
Hi Ben. One nit: That "not" should be capitalized.
Sent: 13 January 2025 17:00
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-policy+unsubscribe...@mozilla.org.