Opened 7 years ago
Closed 7 years ago
#61 closed defect (fixed)
Precertificates are not proper nouns
Reported by: | benl@… | Owned by: | draft-ietf-trans-rfc6962-bis@… |
---|---|---|---|
Priority: | minor | Milestone: | review |
Component: | rfc6962-bis | Version: | |
Severity: | - | Keywords: | |
Cc: |
Description
We should spell it "precertificate" not "Precertificate".
Change History (3)
comment:1 Changed 7 years ago by benl@…
- Component changed from client-behavior to rfc6962-bis
comment:2 Changed 7 years ago by benl@…
- Milestone set to review
comment:3 Changed 7 years ago by melinda.shore@…
- Resolution set to fixed
- Status changed from new to closed
Note: See
TracTickets for help on using
tickets.
https://github.com/google/certificate-transparency-rfcs/commit/c4a35ea43bd42a789787e1b0863c413dc11f648a
@@ -312,7 +312,7 @@ it is expected that certificate owners or their CAs will usually submit them. A
+ When a valid certificate is submitted to a log, the log MUST return a Signed Certificate Timestamp (SCT). The SCT is the log's promise to incorporate the certificate in the Merkle Tree within a fixed amount of time known as the Maximum Merge Delay (MMD). If the log has previously seen the certificate, it MAY return the same SCT as it returned before (note that if a certificate was previously logged as a precertificate, then the precertificate's SCT would not be appropriate, instead a fresh SCT of type x509_entry should be generated). TLS servers MUST present an SCT from one or more logs to the TLS client together with the certificate. A certificate not accompanied by an SCT (either for the end-entity certificate or for a name-constrained intermediate the end-entity certificate chains to) MUST NOT be considered compliant by TLS clients.
-the SCT in the issued certificate. To do this, the CA submits a Precertificate
+the SCT in the issued certificate. To do this, the CA submits a precertificate
-certificate. A Precertificate is a CMS <xref target="RFC5652"/>
+certificate. A precertificate is a CMS <xref target="RFC5652"/>
-Precertificate is considered equivalent to misissuance of the certificate).
-As above, the Precertificate submission MUST be accompanied by all the
+precertificate is considered equivalent to misissuance of the certificate).
+As above, the precertificate submission MUST be accompanied by all the
+ Logs MUST verify that the submitted certificate or precertificate has
-certificates and Precertificates that have expired, are not yet valid, have been
+certificates and precertificates that have expired, are not yet valid, have been
-Precertificate itself and including the root certificate used to verify the
+precertificate itself and including the root certificate used to verify the
+ Each certificate or precertificate entry in a log MUST include the
+ <spanx style="verb">pre_certificate</spanx> is the precertificate submitted for auditing.
+ <spanx style="verb">precertificate_chain</spanx> is a chain of additional certificates required to verify the precertificate submission. The first certificate MUST certify the precertificate. Each following certificate MUST directly certify the one preceding it. The final certificate MUST be a root certificate accepted by the log.
+ When creating a precertificate, the CA MAY substitute one or more
-Precertificate could contain <spanx style="verb">?.?.example.com</spanx>
+precertificate could contain <spanx style="verb">?.?.example.com</spanx>
-Precertificate could contain
+precertificate could contain
+ When a precertificate contains one or more redacted labels, a
-Precertificate's first DNS-ID; the second INTEGER does the same for the
-Precertificate's second DNS-ID; etc. There MUST NOT be more INTEGERs than there
+precertificate's first DNS-ID; the second INTEGER does the same for the
+precertificate's second DNS-ID; etc. There MUST NOT be more INTEGERs than there
-to accurately reconstruct the TBSCertificate component of the Precertificate
+to accurately reconstruct the TBSCertificate component of the precertificate
+ When a precertificate contains that extension and contains a
+ An intermediate CA certificate or intermediate CA precertificate that contains the
-TBSCertificate component of the Precertificate. Note that it is also possible to
+TBSCertificate component of the precertificate. Note that it is also possible to
+ Similarly, a certification authority MAY submit a precertificate to more
+ The base64-encoded precertificate.
-the signer of the Precertificate; the second chains to the first and so on to
+the signer of the precertificate; the second chains to the first and so on to
+ Submitters submit certificates or precertificates to the log as described above. When a Submitter intends to use the returned SCT directly in a TLS handshake or to construct a certificate, they SHOULD validate the SCT as described in <xref target="tls_clients"/> if they understand its format.
+ TLS clients receive SCTs alongside or in certificates, either for the server certificate itself or for intermediate CA precertificates. In
+ A <xref target="tls_clients">TLS client</xref> can audit by verifying an SCT against any STH dated after the SCT timestamp + the Maximum Merge Delay by requesting a Merkle inclusion proof (<xref target="fetch_proof"/>). It can also verify that the SCT corresponds to the certificate it arrived with (i.e. the log entry is that certificate, is a precertificate for that certificate or is an appropriate name-constrained intermediate [see <xref target="name_constrained"/>]).
+ CAs SHOULD NOT redact domain name labels in precertificates such that the entirety of the domain space below the unredacted part of the domain name is not owned or controlled by a single entity
-MUST NOT reject any Precertificate that is overly redacted but which is
+MUST NOT reject any precertificate that is overly redacted but which is
-redacted Precertificates as potentially misissued. TLS clients MAY reject a
-certificate whose corresponding Precertificate would be overly redacted, perhaps using the same mechanism for determining whether a wildcard in a domain name of a certificate is too broad.
+redacted precertificates as potentially misissued. TLS clients MAY reject a
+certificate whose corresponding precertificate would be overly redacted, perhaps using the same mechanism for determining whether a wildcard in a domain name of a certificate is too broad.