n Tue, Aug 9, 2022 at 4:08 PM Benjamin Kaduk <bka...@akamai.com> wrote:
> On Tue, Aug 09, 2022 at 03:59:01PM -0700, Eric Rescorla wrote:
> >
> > Be that as it may, the browsers generally require conformance to the BRs
> > (see, for
> > instance
> >
> https://urldefense.com/v3/__https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/__;!!GjvTz_vk!UPmxyrKmaL10wJG8moM9lRB_dy37NNBtZYo3xVxxNx1_6JSsjXC25--ngicIeypX3KAVLzA$
>
> > S 2.3,
> >
> https://urldefense.com/v3/__https://www.chromium.org/Home/chromium-security/root-ca-policy/__;!!GjvTz_vk!UPmxyrKmaL10wJG8moM9lRB_dy37NNBtZYo3xVxxNx1_6JSsjXC25--ngicIeypXz_sK-Pc$
>  S 1)
> > so what the BRs say is relevant in this discussion.
>
> While it seems almost inevitable that the Web PKI will be used for some
> deployments of NTS, it also seems that NTS as a protocol is quite
> untethered to
> browser behavior or the Web PKI.  So while I agree that the CABF BRs are
> relevant, they probably ought not be treated as the sole authority.
>

Fair enough. I would make several points:

1. Peter's message was not qualified to NTS. He wrote
"For commercial CAs, the expiry time is a billing mechanism, not a security
mechanism. "

So I was attempting to respond to the bigger picture.

2. It seems quite likely that many of the NTS certificates will be from
WebPKI CAs,
just because that's what's easy to get, and so you can't count on them
providing
revocation after expiry.

3. Are you aware of some other set of rules for certificate issuance that
require
revocation after the certificate has expired?

-Ekr
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to