Skip to content

Commit 0930e44

Browse files
authored
sc-073 alignment
1 parent 3e19d5c commit 0930e44

1 file changed

Lines changed: 8 additions & 3 deletions

File tree

docs/CSBR.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1377,7 +1377,7 @@ The CA SHALL revoke a Certificate within 24 hours if one or more of the followin
13771377
1. The Subscriber requests in writing that the CA revoke the Certificate;
13781378
2. The Subscriber notifies the CA that the original certificate request was not authorized and does not retroactively grant authorization;
13791379
3. The CA obtains evidence that the Subscriber's Private Key corresponding to the Public Key in the Certificate suffered a Key Compromise;
1380-
4. The CA is made aware of a demonstrated or proven method that can easily compute the Subscriber's Private Key based on the Public Key in the Certificate;
1380+
4. The CA is made aware of a demonstrated or proven method that can easily compute the Subscriber's Private Key based on the Public Key in the Certificate, including but not limited to those identified in [Section 6.1.1.3(5)](#6113-subscriber-key-pair-generation);
13811381
5. The CA is made aware of a demonstrated or proven method that exposes the Subscriber’s Private Key to compromise or if there is clear evidence that the specific method used to generate the Private Key was flawed; or
13821382
6. The CA has reasonable assurance that a Certificate was used to sign Suspect Code.
13831383

@@ -1879,8 +1879,13 @@ The CA SHALL reject a certificate request if one or more of the following condit
18791879
1. The Key Pair does not meet the requirements set forth in [Section 6.1.5](#615-key-sizes) and/or [Section 6.1.6](#616-public-key-parameters-generation-and-quality-checking);
18801880
2. There is clear evidence that the specific method used to generate the Private Key was flawed;
18811881
3. The CA is aware of a demonstrated or proven method that exposes the Applicant's Private Key to compromise;
1882-
4. The CA has previously been made aware that the Applicant's Private Key has suffered a Key Compromise, such as through the provisions of [Section 4.9.1.1](#4911-reasons-for-revoking-a-subscriber-certificate);
1883-
5. The CA is aware of a demonstrated or proven method to easily compute the Applicant's Private Key based on the Public Key (such as a Debian weak key, see <https://wiki.debian.org/SSLkeys>).
1882+
4. The CA has previously been notified that the Applicant's Private Key has suffered a Key Compromise using the CA's procedure for revocation request as described in [Section 4.9.3](#493-procedure-for-revocation-request) and [Section 4.9.12](#4912-special-requirements-re-key-compromise);
1883+
5. The Public Key corresponds to an industry-demonstrated weak Private Key. For requests submitted on or after June 15 2025, at least the following precautions SHALL be implemented:
1884+
1. In the case of Debian weak keys vulnerability (https://wiki.debian.org/SSLkeys), the CA SHALL reject all keys found at https://github.com/cabforum/Debian-weak-keys/ for each key type (e.g. RSA, ECDSA) and size listed in the repository. For all other keys meeting the requirements of [Section 6.1.5](#615-key-sizes), with the exception of RSA key sizes greater than 8192 bits, the CA SHALL reject Debian weak keys.
1885+
2. In the case of ROCA vulnerability, the CA SHALL reject keys identified by the tools available at https://github.com/crocs-muni/roca or equivalent.
1886+
3. In the case of Close Primes vulnerability (https://fermatattack.secvuln.info/), the CA SHALL reject weak keys which can be factored within 100 rounds using Fermat’s factorization method.
1887+
1888+
Suggested tools for checking for weak keys can be found here: https://cabforum.org/resources/tools/
18841889

18851890
### 6.1.2 Private key delivery to subscriber
18861891

0 commit comments

Comments
 (0)