Skip to content

SC-XXX: Availability of URI in Certificates#650

Draft
srdavidson wants to merge 3 commits intocabforum:mainfrom
srdavidson:Functioning_URI
Draft

SC-XXX: Availability of URI in Certificates#650
srdavidson wants to merge 3 commits intocabforum:mainfrom
srdavidson:Functioning_URI

Conversation

@srdavidson
Copy link

Recent Bugzilla incident reports as well as MDSP discussions have identified issues with non-functioning URI included in certificates ranging from CRLDP to Repository URLs to caIssuers AIA. The existing Baseline Requirements specify where such URI may be used in the certificate profiles but, apart from CRLDP, do not address availability. This ballot seeks to assure the availability of these URI.

@srdavidson srdavidson requested a review from a team as a code owner January 29, 2026 19:24
@srdavidson srdavidson marked this pull request as draft January 29, 2026 19:24
@ryancdickson
Copy link
Contributor

Thanks for putting this together @srdavidson!

Have you considered how the BRs might also address the challenges described here?

I'd say it relates to the proposed text "The CA MAY limit access to its Repository in accordance with its Risk Assessment."

@XolphinMartijn
Copy link
Member

I'd say it relates to the proposed text "The CA MAY limit access to its Repository in accordance with its Risk Assessment."

While I believe the current proposal is too broad, I would be in favour of something akin to this.
As an example, and related to the quoted post, I do not believe blocking specific user-agents should be allowed, any real attacker can already spoof user-agents, so it doesn't increase security at all.

However the other side here are DDoS attacks. It would seem reasonable to allow CAs to block specific IP addresses, be it termporarily, for such cases.

@romanf
Copy link

romanf commented Jan 30, 2026

(I posted this today on the google group, sorry for the cross-posting but I feel it's relevant to mention)

8:02 AM (2 hours ago)
to dev-secur...@mozilla.org, Hanno Böck
One thing to consider here is that some CAs may use commercial CDN providers to serve some of the information mentioned. These CDNs often also provide DDoS protection. However, the decision when some access is considered an attack and what requests will then be blocked or let through is typically done by the CDN/DDoS service provider. Putting requirements with regards to e.g. not blocking based on user-agent might be difficult to impossible to implement in this kind of setup.

Regards
Roman

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants