Internet DRAFT - draft-hallambaker-pkixstatus

draft-hallambaker-pkixstatus



Internet Engineering Task Force (IETF)             Phillip Hallam-Baker 
Internet-Draft                                         Comodo Group Inc.
Intended Status: Standards Track                        October 20, 2013
Expires: April 23, 2014


               Web PKI Operations: Revocation and Status
                    draft-hallambaker-pkixstatus-01

Abstract

   This document describes the certificate status mechanisms supported 
   in the Web PKI 

Status of This Memo

   This Internet-Draft is submitted in full conformance with the 
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF).  Note that other groups may also distribute 
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any 
   time.  It is inappropriate to use Internet-Drafts as reference 
   material or to cite them other than as "work in progress."

Copyright Notice

   Copyright (c) 2013 IETF Trust and the persons identified as the 
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal 
   Provisions Relating to IETF Documents 
   (http://trustee.ietf.org/license-info) in effect on the date of 
   publication of this document. Please review these documents 
   carefully, as they describe your rights and restrictions with respect
   to this document. Code Components extracted from this document must 
   include Simplified BSD License text as described in Section 4.e of 
   the Trust Legal Provisions and are provided without warranty as 
   described in the Simplified BSD License.













                             April 23, 2014                     [Page 1]

Internet-Draft Web PKI Operations: Revocation and Status    October 2013

Table of Contents

   1.  Certificate Status . . . . . . . . . . . . . . . . . . . . . .  4
      1.1.  Operational Certificate Lifecycle Model . . . . . . . . .  4
         1.1.1.  Direct and Indirect Status Assertions  . . . . . . .  4
         1.1.2.  Trust Path Processing  . . . . . . . . . . . . . . .  5
         1.1.3.  Revocation Reasons . . . . . . . . . . . . . . . . .  5
         1.1.4.  Operational Certificate States . . . . . . . . . . .  7
      1.2.  Client Behavior . . . . . . . . . . . . . . . . . . . . .  7
   2.  Status Assertion Mechanisms  . . . . . . . . . . . . . . . . .  8
      2.1.  CRLs  . . . . . . . . . . . . . . . . . . . . . . . . . .  8
         2.1.1.  Status Model"  . . . . . . . . . . . . . . . . . . .  8
         2.1.2.  Revocation Reasons . . . . . . . . . . . . . . . . .  9
      2.2.  OCSP  . . . . . . . . . . . . . . . . . . . . . . . . . .  9
         2.2.1.  CRL Responder  . . . . . . . . . . . . . . . . . . . 10
         2.2.2.  Lightweight Distribution . . . . . . . . . . . . . . 10
         2.2.3.  OCSP Stapling  . . . . . . . . . . . . . . . . . . . 10
      2.3.  Other . . . . . . . . . . . . . . . . . . . . . . . . . . 11
         2.3.1.  Hardcoded/Indirect Revocation List . . . . . . . . . 11
         2.3.2.  DANE . . . . . . . . . . . . . . . . . . . . . . . . 11
         2.3.3.  Certificate Transparency . . . . . . . . . . . . . . 11
   3.  Status Acquisition Mechanisms  . . . . . . . . . . . . . . . . 11
      3.1.  Google's Status Mechanism . . . . . . . . . . . . . . . . 11
      3.2.  SCVP  . . . . . . . . . . . . . . . . . . . . . . . . . . 11
      3.3.  XKMS  . . . . . . . . . . . . . . . . . . . . . . . . . . 11
   4.  Cryptography Platforms . . . . . . . . . . . . . . . . . . . . 12
      4.1.  Checklist . . . . . . . . . . . . . . . . . . . . . . . . 12
      4.2.  cryptlib  . . . . . . . . . . . . . . . . . . . . . . . . 12
      4.3.  Microsoft Windows . . . . . . . . . . . . . . . . . . . . 12
      4.4.  Network Security Services . . . . . . . . . . . . . . . . 12
      4.5.  OpenSSL . . . . . . . . . . . . . . . . . . . . . . . . . 12
   5.  Web Server Status  . . . . . . . . . . . . . . . . . . . . . . 12
      5.1.  Checklist . . . . . . . . . . . . . . . . . . . . . . . . 12
      5.2.  Apache  . . . . . . . . . . . . . . . . . . . . . . . . . 12
      5.3.  IIS . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
      5.4.  LiteSpeed   . . . . . . . . . . . . . . . . . . . . . . . 12
      5.5.  nginx . . . . . . . . . . . . . . . . . . . . . . . . . . 12
   6.  Web Client Status  . . . . . . . . . . . . . . . . . . . . . . 13
      6.1.  Checklist . . . . . . . . . . . . . . . . . . . . . . . . 13
      6.2.  Chrome  . . . . . . . . . . . . . . . . . . . . . . . . . 13
      6.3.  Firefox . . . . . . . . . . . . . . . . . . . . . . . . . 13
      6.4.  Internet Explorer . . . . . . . . . . . . . . . . . . . . 14
      6.5.  Opera . . . . . . . . . . . . . . . . . . . . . . . . . . 14
      6.6.  Safari  . . . . . . . . . . . . . . . . . . . . . . . . . 14
   7.  CA Status  . . . . . . . . . . . . . . . . . . . . . . . . . . 15
      7.1.  Checklist . . . . . . . . . . . . . . . . . . . . . . . . 15
      7.2.  CA-Browser Forum Requirements . . . . . . . . . . . . . . 15
   8.  Security Considerations  . . . . . . . . . . . . . . . . . . . 15
   9.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 15
   10.  References  . . . . . . . . . . . . . . . . . . . . . . . . . 15
      10.1.  Normative References . . . . . . . . . . . . . . . . . . 15



                             April 23, 2014                     [Page 2]

Internet-Draft Web PKI Operations: Revocation and Status    October 2013

   Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 16





















































                             April 23, 2014                     [Page 3]

Internet-Draft Web PKI Operations: Revocation and Status    October 2013

1. Certificate Status

   A certificate is issued with a predetermined validity interval. It is
   common practice to specify a validity interval that starts a few 
   hours or days before the instant of issue so as to avoid rejection by
   machines with clocks running behind the current time or otherwise 
   mis-set. In normal operation the certificate will remain valid until 
   it expires. 

   The CA that issued a certificate has primary responsibility for 
   maintaining the certificate life cycle and reporting changes to 
   certificate status. But other parties can and in some cases do report
   status for third party certificates. In particular client and 
   platform providers have revoked certificates known to have been mis-
   issued or in a case of a CA breach. 

1.1. Operational Certificate Lifecycle Model

   PKIX does not describe a certificate lifecyle model. Instead the 
   certificate lifecycle model is a consequence of the issue of PKIX 
   Certificates and CRLs. While this is sufficient for describing PKIX 
   it is not satisfactory as a reference model for describing 
   operations. Not least because modern PKIX operations are frequently 
   based on the use of OCSP rather than CRLs and differences in the 
   semantics of CRLs and OCSP are one of the features we would want to 
   measure. The distinction between an operational model and PKIX 
   semantics is illustrated by considering the difference between the 
   operational concept of direct/indirect status assertions and the PKIX
   semantics of direct/indirect CRLs. 

1.1.1. Direct and Indirect Status Assertions

   PKIX CRLs may be marked as direct or indirect to indicate that they 
   are issued by the same CA that issued the original certificate (a 
   direct CRL) or by a third party (an indirect CRL). 

   In the corresponding operational model we define a direct status 
   assertion as being by the same CA that issued the original 
   certificate and an indirect status assertion as being any status 
   assertion that is not direct. 

   The difference between the operational and PKIX models has imporant 
   practical consequences. The CA that originally issued an assertion 
   naturally holds a privileged position when it comes to revoking it. A
   direct CRL thus has a privileged position when considering the 
   question of certificate validity. A direct status assertion thus has 
   a privileged position when considering revocation status. A direct 
   CRL carries an implicit claim that it is a direct status assertion 
   but this is merely a claim unless the client validating the CRL takes
   steps to verify it. For example by verifying that the CRL signature 
   has valid trust chain to the same trust anchor as the certificate. 



                             April 23, 2014                     [Page 4]

Internet-Draft Web PKI Operations: Revocation and Status    October 2013


   CRLs introduce a further complication as a CRL contains a list of 
   explicit statements declaring that a certificate is invalid. In the 
   case of a direct CRL there is an implicit assertion that any issued, 
   unexpired certificate not listed was valid at the time the CRL was 
   issued. The processing rules specified in [RFC5280] appear to limit 
   this implicit assertion to direct CRLs but this is does not appear to
   be called out in the text. 

   One of the main use cases that might motivate the issue of an 
   indirect status assertion is the case where a third party notices 
   that a certificate is being used for malicious purposes and intends 
   to advise relying parties that they should not rely on that 
   certificate. There is thus a case for granting third parties the 
   ability to revoke certificates but does granting this ability also 
   confer the ability to (implicitly) declare certificates valid? 

   [Operational question: Do clients interpret indirect CRLs as 
   substitutes for the direct CRL or as adjuncts providing additional 
   information.] 

1.1.2. Trust Path Processing

   One of the operational questions we would like to understand is the 
   extent to which it is possible to revoke EE certificates by revoking 
   one or more of the CSCs in the certification path. 

   Self Signed certificates used to transport Trust Anchors are not 
   actually PKIX certificates and are not governed by the PKIX model. 
   One important consequence of this is that relying parties do not use 
   PKIX mechanisms to check the validity of Trust Anchors. 

   CSCs signed by the trust anchor are potentially subject to 
   revocation. Do the status checking mechanisms employed in browsers 
   support this in practice? 

   [OCSP and CRLs raise separate issues here. In the case of an OCSP 
   responder should we require signed OCSP tokens for each cert in the 
   path? Is it possible to use a mix of CSCs and OCSP in stapled 
   tokens?] 

1.1.3. Revocation Reasons

   A status declarer may declare a certificate invalid (i.e. revoke the 
   certificate) before its scheduled expiry for a variety of reason that
   include: 

      Subject requested revocation
         The certificate subject requested revocation. 





                             April 23, 2014                     [Page 5]

Internet-Draft Web PKI Operations: Revocation and Status    October 2013

      Subject requested correction 
         The certificate subject requested information in a certificate 
         be corrected. Such corrections are typically made by revoking 
         the original certificate and issuing a replacement. 

      Payment declined 
         A CA may issue a certificate before payment has cleared. If the
         payment is subsequently declined, the certificate is revoked. 

      Declined extension 
         The certificate was originally issued on condition that use 
         beyond an initial period would require an additional fee which 
         the subject did not pay. 

      Terms of Use 
         The subject was determined to have breached the terms of use 

      Fraudulent Request 
         The application was determined to be fraudulent after issue 

      CA compromise 
         The certificate can no longer be trusted because the operations
         of the CA were compromised. 

   The ability to provide a reason for revocation is defined without 
   explaining the reason a CA should provide this information or how 
   relying parties should behave differently according to the revocation
   reason given. Revoked certificates are to be considered invalid 
   regardless of the reason for revocation. 

   PKIX does not define an order of severity. In cases where multiple 
   reasons apply, the CA may pick any. There is no obligation to report 
   a reason at all let alone report severity. 

   Once a certificate is revoked the certificate lifecycle is complete 
   as far as the CA is concerned and there is no obligation on the CA to
   update the revocation reason after the fact to reflect the discovery 
   of a more serious cause. 

   In the case of a subject request the CA only has reliable knowledge 
   of the fact of the request and not the reason(s) the request was 
   made. A certificate subject might have requested the certificate be 
   revoked because they no further use for it or because they know the 
   associated private key has been compromised. Even if the CA asks for 
   the revocation reason there is no reason to expect the subject to 
   answer. The subject may not wish to report that a private key has 
   been compromised. 

   The net effect of these limitations is that revocation reasons only 
   provide a lower bound on the severity of the cause for which a 
   certificate was revoked. 



                             April 23, 2014                     [Page 6]

Internet-Draft Web PKI Operations: Revocation and Status    October 2013


1.1.4. Operational Certificate States

   From an operational point of view, the lifecycle of a PKIX 
   certificate has five potential states: 

      Valid
         The certificate was issued and is valid. 

      Invalid
         No certificate was issued or the certificate issued is no 
         longer valid. Nonexistent"> The certificate does not exist. 
         This may be because the certificate has not yet been issued or 
         it will never be issued. Hold The certificate exists but has 
         been suspended with the possibility of reinstatement. Revoked 
         The certificate exists but has been declared to be invalid with
         permanent effect. Expired The certificate existed in the past 
         but the expiry date specified at issue has passed. 

   The Hold state has been found to be of little or no practical value 
   since issuing a new certificate is simpler and more effective than 
   attempting to cancel a previous instruction to put the certificate on
   hold. 

   CRLs and certain OCSP configurations do not permit a client to 
   distinguish between the states Valid and Invalid/Nonexistent. The CRL
   mechanism was designed to allow a relying party to check the validity
   of a known certificate. It was thus unnecessary to distinguish the 
   states Valid and Nonexistent as that would be verified by checking 
   the signature. Accordingly a CRL contains only a list of invalid 
   certificates. 

   In the case of a CA Breach, key compromise or cryptanalytic attack, a
   certificate may be created that has a valid signature but was not 
   issued by the CA. Such a certificate is 'Nonexistent' as far as the 
   CA is concerned. Requiring a CA to distinguish these states in 
   reporting certificate status provides a limited degree of 
   transparency in CA operations. A CA that reports 'Nonexistent' in 
   response to a status request for an unexpired certificate that has a 
   valid signature has a defective or breached issue process. A CA that 
   reports valid in response to a status request for a non-existent 
   certificate has a defective or breached revocation mechanism. 

1.2. Client Behavior

   WebPKI clients are advised but not required to check certificate 
   status before relying on the assertions they contain. Waiting to 
   obtain status information from an external source before relying on a
   certificate may cause delay or even rejection of a valid certificate.





                             April 23, 2014                     [Page 7]

Internet-Draft Web PKI Operations: Revocation and Status    October 2013

   Excluding the possibility that a client requests revocation status 
   then ignores the result, the options available to a Web PKI client 
   are therefore: 

      Ignore 
         The client does not process revocation status from any source 

      Local 
         The client only process revocation status that is available 
         from local sources. For example hardcoded 'do not trust' lists.

      Soft-Fail 
         The client attempts to obtain revocation status from external 
         sources and will reject certificates reported as revoked but 
         will accept a certificate as valid if the external source does 
         not reply. 

      Hard-Fail 
         The client attempts to obtain revocation status from external 
         sources and will reject certificates unless an affirmative 
         assertion of validity is obtained. 

2. Status Assertion Mechanisms

2.1. CRLs

   The PKIX CRL mechanism for asserting certificate status is described 
   in [RFC5280] 

2.1.1. Status Model"

   A CRL only provides a list of certificates that have been revoked. An
   issued, unexpired certificate is presumed to be valid if it does not 
   appear in the CRL. The certificate states supported by the CRL 
   mechanism are thus: 

      UNREVOKED 
         Corresponds to operational states Valid, Nonexistent and 
         Expired. 

      UNDETERMINED 
         Occurs when no CRL with a corresponding scope is available. 

      REVOKED" 
         Corresponds to operational state Revoked. 

      HOLD 
         Corresponds to operational state Hold. 






                             April 23, 2014                     [Page 8]

Internet-Draft Web PKI Operations: Revocation and Status    October 2013

   The CRL result 'UNREVOKED' thus corresponds to three states in the 
   Operational model of which one is Valid and the other two are Invalid
   states. A client that does not have a source of trusted time 
   available may use the issue time of the CRL as the basis for checking
   expiry. The CRL mechanism does not provide a means of determining 
   that a certificate was legitimately issued 

2.1.2. Revocation Reasons

   [RFC5280] requires that a CRL entry specify a reason code but not the
   circumstances in which a code should be raised. [[This is however 
   specified in X.509v3] The following reason codes are defined: 

      *  unspecified

      *  keyCompromise

      *  cACompromise

      *  affiliationChanged

      *  superseded

      *  cessationOfOperation

      *  privilegeWithdrawn

      *  aACompromise

2.2. OCSP

   OCSP is defined in [RFC6960]. [RFC5019] (lightweight) and TLS 
   Stapling [RFC6066] Section 8. 

   An OCSP service MAY return the following results. 

      Success [[+ CRL Status Code] 
         The OCSP status request succeeded and the service returned one 
         of the CRL status codes described above. 

      Refused 
         The OCSP responder refused to answer the request. 

      Unknown 
         The certificate for which status was requested was not found or
         the status is not determined. 

      Invalid
         The OCSP server returned an answer that was not understood. 





                             April 23, 2014                     [Page 9]

Internet-Draft Web PKI Operations: Revocation and Status    October 2013

      Fail 
         The service failed to answer the request or the client was 
         unable to contact the OCSP service. 

   Note that [RFC6960] does not differentiate the results Success/Valid 
   and Unknown. CAs are however required to differentiate these 
   responses under the CABForum Basic Requirements [TBS]. 

   The OCSP protocol permits responses to be signed in advance [static] 
   or provide a proof of freshness by returning a nonce presented by the
   client. 

   The protocol only permits static responses to report the status of 
   individual certificates. There is no feature analagous to the NSEC3 
   feature of DNSSEC which permits the non-existence of an entry in a 
   particular range to be asserted. 

2.2.1. CRL Responder

   An OCSP responder may generate responses from CRLs. Such a responder 
   can generate most but not all the responses required in advance by 
   generating revoked responses for all the certificates listed in the 
   CRL and valid responses for all the certificate serial numbers 
   presented in previous requests. 

   Such a responder cannot distinguish between Valid and nonexistent 
   states unless provided with additional information not in the CRL. 

2.2.2. Lightweight Distribution

   In the lightweight distribution mode of operation specified in 
   [RFC5019], the CA generates OCSP responses for all unexpired 
   certificates that it has issued. The signed tokens are then passed to
   a separate network for distribution. For example, a Content Delivery 
   Network with a large number of delivery points. 

   One of the main strengths of this model is that all the signing of 
   OCSP tokens is done offline and no signing key is ever exposed to an 
   external network. One consequence of this model is that responses for
   nonexistent certificates cannot be signed. 

2.2.3. OCSP Stapling

   One of the principle limitations of the traditional OCSP model is 
   that each TLS transaction becomes a three party communication. To 
   complete the TLS connection the client must communicate with the 
   server being contacted and the OCSP service. This approach introduces
   unnecessary delay and an additional potential point of failure and is
   therefore unsatisfactory. 





                             April 23, 2014                    [Page 10]

Internet-Draft Web PKI Operations: Revocation and Status    October 2013

   OCSP stapling permits a TLS server to provide a client that supports 
   the stapling extension to provide the OCSP token together with the 
   certificate it corresponds to. This permits a client to establish a 
   TLS communication without the need for a three party communication in
   the case that the client and server both support stapling. 

   The chief drawback to stapling is that support for stapling is 
   optional. thus a client that does not receive a stapled token must 
   attempt to obtain it from the OCSP service and is therefore subject 
   to the same Softfail/hardfail dilemma described above. 

2.3. Other

2.3.1. Hardcoded/Indirect Revocation List

   Most browsers employ a 'blacklist' to block certificates known to be 
   mis-issued. The number of entries supported in such lists is 
   typically small. In some cases the list is hardcoded in the browser 
   or platform code and is only updated with the browser or platform. In
   other cases the blacklist is updatable separately. 

   Q: Which Web browsers support update of the list without updating the
   browser. 

2.3.2. DANE

   DANE assertions [RFC6698] may be used to cancel a certificate. 
   [describe] 

2.3.3. Certificate Transparency

   CT [RFC6962] provides a means of auditing the operation of a CA using
   only information that is available to the public. Moreover a client 
   can determine that a certificate has been issued transparently or 
   not. [describe] 

   [Allows another way to distinguish Valid and nonexistent and thus CA 
   breach.] 

3. Status Acquisition Mechanisms

3.1. Google's Status Mechanism

   (Only supported in the Chrome Browser)

3.2. SCVP

   Not supported in any Web PKI application or service.






                             April 23, 2014                    [Page 11]

Internet-Draft Web PKI Operations: Revocation and Status    October 2013

3.3. XKMS

   Not supported in any Web PKI application or service.

4. Cryptography Platforms

   [Should expand this noting that while support for a feature in the 
   platfor is often a necessary for support in applications, it is not 
   necessarily sufficient.] 

4.1. Checklist

4.2. cryptlib 

4.3. Microsoft Windows

4.4. Network Security Services

   Used in Firefox and Chrome

4.5. OpenSSL

5. Web Server Status

   Web Server support for revocation is fairly straightforward since the
   Web Server is only involved in revocation in the case of stapled OCSP
   tokens and this is supported in the latest versions of all the 
   servers surveyed. 

5.1. Checklist

      Support for OCSP Stapling?

5.2. Apache

      Support for OCSP Stapling?
         Since version 2.3.

5.3. IIS

      Support for OCSP Stapling?
         Yes

5.4. LiteSpeed 

      Support for OCSP Stapling?
         Since version 4.2.4.







                             April 23, 2014                    [Page 12]

Internet-Draft Web PKI Operations: Revocation and Status    October 2013

5.5. nginx

      Support for OCSP Stapling?
         Since version 1.3.7.

6. Web Client Status

   [Need to consider further dimensions here. In particular Chrome 
   behaves differently depending on the platform it is on and several 
   browsers have different revocation checking for EV vs other 
   certificate policies.]

6.1. Checklist

      Supported Revocation Checking Mechanisms
         To Do: Some browsers do not support CRL DP. Others give 
         preference to OCSP, but fall back to CRL DP if the necessary 
         AIA is missing. Some browsers give priority to OCSP, but switch
         to CRL DP when a particular issuer's revocation information is 
         retrieved frequently.

      User Experience for Certificate Status Invalid

      User Experience for Certificate Status Unknown

      What sources are permitted to sign CRLs or OCSP responses for a 
         certificate, can any trusted CA sign or only the CA that issued
         the certificate?

6.2. Chrome

   The Chrome browser automatically updates itself to the latest version
   unless this feature is explicitly disabled by the user. 

      Supported Revocation Checking Mechanisms
         OCSP (at present).

      User Experience for Certificate Status Invalid

      User Experience for OCSP Fail
         Soft fail

6.3. Firefox

      Supported Revocation Checking Mechanisms
         OCSP checked by default since Firefox 3. OCSP Stapling has been
         added to nightly builds but is not yet in production releases.







                             April 23, 2014                    [Page 13]

Internet-Draft Web PKI Operations: Revocation and Status    October 2013

      User Experience for Certificate Status Invalid

      User Experience for Certificate Status Unknown
         Soft fail

6.4. Internet Explorer

      Supported Revocation Checking Mechanisms
         CRLs and OCSP.

      User Experience for Certificate Status Invalid
         IE5: If the certificate has a valid trust path, the user is 
         presented with a dialog box that says "The Security certificate
         for this site has been revoked. This site should not be 
         trusted" 

         If however, a valid trust path cannot be found, the user 
         receives the error message for the invalid trust path instead: 
         "The user is presented with a dialogue box that tells them that
         'Information you exchange with this site cannot be viewed or 
         changed by others. However there is a problem with the site's 
         security certificate."

         IE??: Warning Page "There is a problem with this website's 
         security certificate" 

   CVE-2011-0199 : Chris Hawk and Wan-Teh Chang of Google MS ? ?the 
   revocation date is determined by comparing the current date with the 
   RevocationDate field in the CRL or the OCSP response? For Windows 
   Vista with Service Pack 1 and Windows Server 2008, the OCSP signing 
   certificate may chain up to any trusted root CA as long as the 
   certificate chain includes the OCSP Signing EKU extension. CryptoAPI 
   first determines whether a time valid version of the revocation 
   object exists in the CryptoAPI disk cache. 

6.5. Opera

      Supported Revocation Checking Mechanisms
         OCSP checked by default since Opera version 8

      User Experience for Certificate Status Invalid

      User Experience for Certificate Status Unknown
         Hard fail

6.6. Safari

      Supported Revocation Checking Mechanisms
         CRL: all, OCSP checking is enabled by default as of Mac OSX 
         10.7 (Lion). Prior to that it had to be enabled in the Keychain
         preferences.



                             April 23, 2014                    [Page 14]

Internet-Draft Web PKI Operations: Revocation and Status    October 2013


      User Experience for Certificate Status Invalid
         Dialog Box: Offers Continue/Cancel/Show Certificate

      User Experience for Certificate Status Unknown

      User Experience for OCSP-FAIL

   For Apple?s OS X, OCSP and CRL checking can be configured via 
   Keychain Access -> Preferences ?> Certificates. A dialog box opens 
   with three rows: OCSP, CRL, and Priority. Under OCSP and CRL, the 
   three allowed options (a grayed-out one said something like ?always?)
   were: ?Off?, ?Best Attempt?, and ?Required if certificate indicates?.
   ?Best Attempt? was the default. Under Priority, the options were 
   ?OCSP? ?CRL? and ?Require both?. ?OCSP? was the default.

   IE5: Popup dialog box: "Revocation information for the security 
   certificate for this site is not available. Do you want to proceed?" 

7. CA Status

   Historical behavior is only of interest to the extent that it affects
   current operations. 

   Every PKIX certificate has a built in expiry date. Thus we are only 
   interested in CA operations from the date at which their oldest 
   unexpired certificate is still valid. 

7.1. Checklist

      Are CRLs or OCSP supported

      Is the CDP extension filled?

      Is the AIA extension filled?

7.2. CA-Browser Forum Requirements

8. Security Considerations

   Put something here? 

9. IANA Considerations

   None 









                             April 23, 2014                    [Page 15]

Internet-Draft Web PKI Operations: Revocation and Status    October 2013

10. References

10.1. Normative References

   [RFC6066]  Eastlake, D., "Transport Layer Security (TLS) Extensions: 
              Extension Definitions", RFC 6066, January 2011.

   [RFC6698]  Hoffman, P.,Schlyter, J., "The DNS_Based Authentication of
              Named Entities (DANE) Transport Layer Security (TLS) 
              Protocol: TLSA", RFC 6698, August 2012.

   [RFC6962]  Laurie, B.,Langley, A.,Kasper, E., "Certificate 
              Transparency", RFC 6962, June 2013.

   [RFC5280]  Cooper, D.,Santesson, S.,Farrell, S.,Boeyen, S.,Housley, 
              R.,Polk, W., "Internet X.509 Public Key Infrastructure 
              Certificate and Certificate Revocation List (CRL) 
              Profile", RFC 5280, May 2008.

   [RFC6960]  Santesson, S.,Myers, M.,Ankney, R.,Malpani, A.,Galperin, 
              S.,Adams, C., "X.509 Internet Public Key Infrastructure 
              Online Certificate Status Protocol - OCSP", RFC 6960, June
              2013.

   [RFC5019]  Deacon, A.,Hurst, R., "The Lightweight Online Certificate 
              Status Protocol (OCSP) Profile for High-Volume 
              Environments", RFC 5019, September 2007.

Author's Address

   Phillip Hallam-Baker 
   Comodo Group Inc.

   philliph@comodo.com




















                             April 23, 2014                    [Page 16]