Deploying Digital Certificate Linting

Deploying Digital Certificate Linting

In a previous blog we introduced Digital Certificate Linting. It is interesting how certification authorities (CAs) have deployed certificate linting of public trust certificates without policy requirements from the browsers or the CA/Browser Forum. Linting does not need to be mandated as it naturally helps CAs to be compliant by limiting certificate miss-issuance. This also increases customer service as certificates do not need to be revoked and reissued.

Over a number of years, Entrust has slowly deployed linting. Our first goal was to ensure the linters were not developed by the same team which developed our products. The thought was to minimize the duplication of errors in the policy software and the linting software. We focused on using third party linters for TLS certificates such as cablint and zlint.

Entrust first ran linting against all of our active TLS certificates to find issues and remove errors. We ran post-issuance linting to detect errors, which do not interfere with certificate issuance. When we were happy with the results, we implemented pre-issuance linting.

With pre-issuance linting, if there is a linting error detected a certificate should not be issued. When a pre-certificate is issued for certificate transparency (CT) logging, then the pre-certificate with a linting error will be revoked. The goal of pre-issuance linting is to not miss-issue certificates and provide the details of the error to the team in order to correct the issue.

Although the public certificate linters were designed for TLS certificates, we expanded post-issuance linting to all certificate types. This was done first by only using the non-TLS components of the linters, plus adding other specific components. For each issuing CA, we created a certificate profile, which the CA could issue. This would separate each CA to its certificate type and would narrow down the CA scope to its key usage, extended key usage, permitted key size, hash algorithm, certificate policy, CRL link, etc. We also added in weak key checking, CT logging requirements, and ensured the subject name met the requirements which were validated.

Certificate linting can support the three per cent self-audit requirement from the CA/Browser Forum baseline requirement documents. In fact, since linting is done in an automated fashion, it can be extended to 100 per cent of the certificates. The result is the most extensive and non-subjective self-audit methodology, which may be the primary source of detecting certificate miss-issuance. In the case where a CA miss-issues a certificate which is not detected by linting, the CA may consider updating the linting software to better detect the error in the future. In addition, the linting results and actions can also be provided to the compliance auditor, which shows extensive monitoring and actions when an error is detected.

All CAs issuing publicly trusted certificates should consider certificate linting. Also, CAs which perform linting, but have miss-issued certificates should consider whether linting can be updated to detect the error in the future. Updates to shared linting software will reduce the risk to browser users and the inconvenience to secure server operators.


The post?Deploying Digital Certificate Linting?appeared first on?Entrust Blog.

Timothy Hollebeek

VP, Industry Standards at DigiCert, Inc.

1 年

Great summary. We've been fans of linting for a long time as well. You noted that many linters are SSL specific, and we did too. In fact, one of the design goals for pkilint was to produce a flexible linter that could handle all certificate types equally well, instead of being hardcoded to enforce the SSL BR profiles. There are a wide variety of both compliance regimes (CABF, ETSI, Mozilla, Root programs, various governments, etc) and cert profiles (RFC 5280, CABF TLS, CABF CodeSigning, CABF Email, Qualified signing, QWACS, TSPs, etc) that share a lot of common features, but also have important unique differences. CAs and TSPs that provide services at scale need tools that are modern and agile enough to automatically enforce compliance across all these products and ecosystems. We're very excited to see widespread adoption of linting in all of these ecosystems, and would strongly encourage the adoption of whatever tool or tools work for your use case or company. They all have their own strengths and weaknesses. And we'd like to work with everyone on anything we can do to make these tools better. They help all of us.

回复

要查看或添加评论,请登录

Bruce Morton的更多文章

  • CA/Browser Forum Updates Code Signing Service Requirements

    CA/Browser Forum Updates Code Signing Service Requirements

    The CA/Browser Form Code Signing Working Group has recently updated the Signing Service Requirements in the Code…

  • SSL Review: February 2024

    SSL Review: February 2024

    The Entrust monthly digital certificates review covers a range of topics including news, trends, and opinions. Entrust…

  • SSL Review: January 2024

    SSL Review: January 2024

    The Entrust monthly digital certificates review covers a range of topics including news, trends, and opinions. Entrust…

    1 条评论
  • Public Trust Certificates: A 2023 Recap and Projections for 2024

    Public Trust Certificates: A 2023 Recap and Projections for 2024

    Looking Back at 2023 2023 was a year of change for Public Trust Certificates – discussions on reduced validity periods,…

    1 条评论
  • SSL Review: December 2023

    SSL Review: December 2023

    The Entrust monthly digital certificates review covers a range of topics including news, trends, and opinions…

  • SSL Review: November 2023

    SSL Review: November 2023

    The Entrust monthly digital certificates review covers a range of topics including news, trends, and opinions. Entrust…

  • CAA For S/MIME Email Certificates

    CAA For S/MIME Email Certificates

    Use of Certification Authority Authorization (CAA) was mandated for TLS certificates in September 2017. The primary…

  • SSL Review: October 2023

    SSL Review: October 2023

    The Entrust monthly digital certificates review covers a range of topics including — news, trends, and opinions…

  • SSL Review: September 2023

    SSL Review: September 2023

    The Entrust monthly digital certificates review covers a range of topics including news, trends, and opinions. Entrust…

  • SSL Review: August 2023

    SSL Review: August 2023

    The Entrust monthly digital certificates review covers a range of topics including news, trends, and opinions. Entrust…

社区洞察

其他会员也浏览了