Podcast
Root Causes 377: Is CPS/Issuance Misalignment a Revocation Event?


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
April 11, 2024
If you issue public certificates that are fully compliant except that they do not reflect what your CPS says, are they misissued? Do they require revocation? This is a question with real stakes as we see multiple current instances of a CA denying revocation for that reason. In this episode we explore this issue.
Podcast Transcript
Lightly edited for flow and brevity.
So, a little bit of background, your CPS, your Certificate Practices Statement is a statement that every public CA must have that is publicly available that explains what you do as a public CA and there are a variety of aspects that you cover, and you talk about how you do validation and how you do DCV and how you run your infrastructure and how you, etc. and you've got all of these things in there. And that's your Certificate Practices Statement. That's you saying what your practices are around certificates and it's a public facing document so that any member of the public, such as an academic or a watchdog or a journalist or a concerned citizen, can go look at what you're doing and scrutinize the public CA’s behavior and the reason this is important is because the CA's of course, are stewards of the public trust, and as such, they are expected to meet certain standards and requirements. Now, your behavior against the CPS is audited in your Webtrust audit. So an accredited Webtrust auditing firm looks at your practices and determines whether or not they match your CPS and a mismatch between your CPS and your actual practices is a problem, does show up as a problem in your Webtrust audit, and could conceivably get you a qualified opinion on your audit. So, you know, that's there and that's a mechanism and then the last part to probably clarify about the CPS mechanism is public CAs also maintain a historical record of their CPSs.
So I can go back to any point in time. If I want to go back to 2017, you know, April 12, 2017, I can see what the CPS was on April 12, 2017. So I can match practices back to the time period in which a certificate was issued. And this is very important because practices evolve over time. They change either because the rules change, or they change because CAs figure out they're doing something wrong and make it right. Or they change just because CAs find ways to get better or just find ways to change their practices that are still in alignment with requirements but are working better for them or their subscribers or their relying parties. And so all of that is the reason we have a CPS infrastructure, and it goes all the way back to the 1990s and as part of the core of the concept of the web PKI and public trust. Does that make sense?
So I think that that is fundamentally a very a poor argument. I think it's an unsustainable argument, that if you're being intellectually honest, you can't look at and contend. And the reason for that real simply is because if you have a certificate, and it is issued outside my CPS, and I update my CPS, and I revoke your old certificate and I give you a new certificate, those two certificates are not identical. They absolutely are not. They are unidentical in several ways. They have different serial numbers, for example, but the way that is probably most important that they're not identical, is they have different not before dates. The not before date is when the certificate is first considered valid by a piece of software that's looking at it. If I take my operating system, and I move it back in time to before a certificate was issued, and I go to a website and I try to attack that certificate, I'm gonna get an error, right? Because it's not before. And that is important, because as I said in the beginning, the not before date, tells me which CPS was in effect when the certificate was issued.
So the second point - - the first point was, you know, should these certificates - - is this a good rule that says that you can't just update your CPS? And the answer - - I'm 100% confident is yes, that is a good rule. Right? The good rule is that if you're misaligned with your CPS, those certificates are bad. They're misissued, and they should be revoked. But even if you felt that it was a bad rule to say that they were misissued, even then, they still need to be revoked for the simple reason that we need black and white rules. We need rules that anybody can look at and objectively agree on and the basic contention that's going on here is that someone as a public CA is going to say, oh well, these certificates are harmless. These are okay. This is a problem that doesn't really matter so I'm going to unilaterally judge that I don't have to follow that rule. And this is another point we'll return to in that episode that you and I are going to make because I think it directly leads into that conversation and my response to that is no. We have rules. And I've said this a lot in the CA/Browser Forum meetings, and I'm kind of a little bit famous for saying this, which is we have to follow the rules we set for ourselves. And if the rules we set for ourselves are bad, then shame on us. We have the power to change them. But if we just start ignoring the rules that we set for ourselves when we personally don't like them, then why do we have rules at all? And that's the other problem.
The rules are black and white, They're clear. It is misissuance. Misissued certs need to be revoked. Depending on the nature of the misissuance, leave certs need to be revoked either within 24 hours or within 120 hours. That's all clear. None of that is subject to debate. It's all written in the rules. And if individual CAs just start declaring, well you know what, I'm not going to revoke these certs because I don't think it's a big deal. Or I'm not going to revoke these certs because I can't get around to it. That's a problem. And so, first of all, let's lock down the list, right? Is CPS an actual practices alignment an example of misissuance? Yes. Is it an example of an incident that needs to be codified in Bugzilla? Yes. Is it an example of certificates that need to be revoked? Yes. If you fail to revoke them within the timeframe is that a separate incident? Yes. And it's yes all the way down, and CAs who are contending otherwise, are just wrong. Just plain wrong.

