-
Notifications
You must be signed in to change notification settings - Fork 36
Open
Description
Current specification lacks clear guidance on how subordinate entities should handle key rotations and certificate updates from their superior entities (TA or Intermediates).
Key rotation is mentioned in Entity Onboarding and X.509 Certificate Management Operations Sections, but doesn't specify:
- How often subordinates should fetch their own Entity Configuration from superiors
- How to detect superior key rotations
- How to handle certificate updates in the
x5cfield - Priority rules when both Subordinate Statement and EC contain the same public key
Proposed Approach
Add a requirement that subordinates MUST fetch their own Entity Configuration from their immediate superior every 24 hours to:
- Detect superior key rotations
- Check for offboarding status
- Update X.509 certificates in their EC's
x5cfields
Use Case 1: Superior Key Rotation
- TA/Intermediate issues CRL to revoke old key
- TA/Intermediate adds new key to its EC, signs with new key, publishes updated EC
- TA/Intermediate re-issues all subordinate certificates with new key, makes them available via fetch endpoint
- Subordinate fetches its own EC periodically, detects certificate change
- Subordinate updates
x5cin its EC with new certificate
Note: When Subordinate Statement and subordinate's EC both contain the same public key certified by the superior, which certificate in x5c has priority? --> Subordinate Statement takes priority.
Use Case 2: Subordinate Key Rotation
- Subordinate submits CSR (PKCS#10) to superior
- Superior issues new certificate, publishes via fetch endpoint (new key added alongside existing)
- Subordinate fetches its trust chain, retrieves new certificate
- Subordinate adds new JWK with new certificate in EC's
x5cfield
Metadata
Metadata
Assignees
Labels
Type
Projects
Status
In Progress