[Cscwg-public] Ballot CSC-??: High Risk Requirements Update

Bruce Morton Bruce.Morton at entrust.com
Wed Nov 22 16:21:52 UTC 2023


Excellent! Looks like we have text and 2 endorsers. Once we have the final update in Github, I will push out the ballot.

 

 

Thanks, Bruce.

PS – Happy Thanksgiving to our US comrades!!

 

From: Tim Hollebeek <tim.hollebeek at digicert.com> 
Sent: Wednesday, November 22, 2023 11:17 AM
To: Bruce Morton <Bruce.Morton at entrust.com>; Martijn Katerbarg <martijn.katerbarg at sectigo.com>; cscwg-public at cabforum.org
Subject: [EXTERNAL] RE: Ballot CSC-??: High Risk Requirements Update

 

Yes.

 

-Tim

 

From: Bruce Morton <Bruce.Morton at entrust.com <mailto:Bruce.Morton at entrust.com> > 
Sent: Wednesday, November 22, 2023 8:34 AM
To: Martijn Katerbarg <martijn.katerbarg at sectigo.com <mailto:martijn.katerbarg at sectigo.com> >; cscwg-public at cabforum.org <mailto:cscwg-public at cabforum.org> ; Tim Hollebeek <tim.hollebeek at digicert.com <mailto:tim.hollebeek at digicert.com> >
Subject: RE: Ballot CSC-??: High Risk Requirements Update

 

Hi Martijn,

 

For clarification, for the following two paragraphs which have been deleted, you would like the first deleted and the second to remain:

 

Prior to issuing a Code Signing Certificate, each CA SHOULD check at least one database containing information about known or suspected producers, publishers, or distributors of Suspect Code, as identified or indicated by an Anti-Malware Organization and any database of deceptive names maintained by an Application Software Provider. The CA MUST determine whether the entity is identified as requesting a Code Signing Certificate from a High Risk Region of Concern. The CA MUST also maintain and check an internal database listing Certificates revoked due to Code Signatures on Suspect Code and previous certificate requests rejected by the CA.

 

A CA identifying a high risk application under this section MUST follow the additional procedures defined in [Section 4.2.2](#422-approval-or-rejection-of-certificate-applications) of this document to ensure that the applicant will protect its Private Keys and not sign Suspect Code.

 

If so, I agree to this change. Please confirm.

 

 <mailto:tim.hollebeek at digicert.com> @Tim  Hollebeek (tim.hollebeek at digicert.com) does this work for you?

 

 

Thanks, Bruce.

 

From: Martijn Katerbarg <martijn.katerbarg at sectigo.com <mailto:martijn.katerbarg at sectigo.com> > 
Sent: Wednesday, November 22, 2023 3:32 AM
To: Bruce Morton <Bruce.Morton at entrust.com <mailto:Bruce.Morton at entrust.com> >; cscwg-public at cabforum.org <mailto:cscwg-public at cabforum.org> 
Subject: [EXTERNAL] Re: Ballot CSC-??: High Risk Requirements Update

 

Bruce, I’ve added a single comment on the PR, as I think we’ve removed one paragraph too much. Other than that, I’m also happy to endorse.


Regards,

Martijn

 

From: Cscwg-public <cscwg-public-bounces at cabforum.org <mailto:cscwg-public-bounces at cabforum.org> > on behalf of Bruce Morton via Cscwg-public <cscwg-public at cabforum.org <mailto:cscwg-public at cabforum.org> >
Date: Tuesday, 21 November 2023 at 20:25
To: cscwg-public at cabforum.org <mailto:cscwg-public at cabforum.org>  <cscwg-public at cabforum.org <mailto:cscwg-public at cabforum.org> >
Subject: [Cscwg-public] Ballot CSC-??: High Risk Requirements Update

CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you recognize the sender and know the content is safe.

 

Here is a draft of the High Risk Requirements update ballot. Looking for comments and 2 endorsers. There is no future effectivity date proposed, since the ballot does not add new requirements.

 

Thanks, Bruce.

 

 

Purpose of the Ballot

This ballot updates the “Baseline Requirements for the Issuance and Management of Publicly‐Trusted Code Signing Certificates“ version 3.4 in order to clarify language regarding Signing Service and signing requests. The main goals of this ballot are to:

1.	Remove references to High Risk Certificate Request, since the CSBRs do not provide any actions for a high risk application.
2.	Remove references to High Risk Region of Concern, since the CSBR appendix has never been populated.
3.	Remove rules for a Takeover Attack to require the Subscriber to generate keys in a crypto device, since crypto device key generation is now a baseline requirement for all code signing certificates.
4.	Remove option to transfer private key which has been generated in software.
5.	Cleanup to remove Subscriber key generation option which expired effective 1 June 2023.
6.	Cleanup to remove “any other method” to verify the Subscriber key was generated in a crypto device, since this option expired 1 June 2023.

The following motion has been proposed by Bruce Morton of Entrust and endorsed by ?? and ??.

 

MOTION BEGINS

 

This ballot updates the “Baseline Requirements for the Issuance and Management of Publicly‐Trusted Code Signing Certificates” ("Code Signing Baseline Requirements") based on version 3.4. MODIFY the Code Signing Baseline Requirements as specified in the following redline: https://github.com/cabforum/code-signing/pull/31/files <https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fcabforum%2Fcode-signing%2Fpull%2F31%2Ffiles&data=05%7C01%7Cmartijn.katerbarg%40sectigo.com%7C63edc95120b549fc269e08dbeac79efe%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C638361915320392388%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=gmqwV1FC70fTRYbrDtp%2B%2FJ8jzwupr0TaN5vmSa2%2BdoU%3D&reserved=0> 

 

MOTION ENDS

The procedure for this ballot is as follows: Discussion (7 days)

 

*                 Start Time: TBD

*                 End Time: TBD

 

Vote for approval (7 days)

 

*                 Start Time: TBD

*                 End Time: TBD

 

Any email and files/attachments transmitted with it are intended solely for the use of the individual or entity to whom they are addressed. If this message has been sent to you in error, you must not copy, distribute or disclose of the information it contains. Please notify Entrust immediately and delete the message from your system. 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/cscwg-public/attachments/20231122/bc015a01/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4933 bytes
Desc: not available
URL: <http://lists.cabforum.org/pipermail/cscwg-public/attachments/20231122/bc015a01/attachment-0001.p7s>


More information about the Cscwg-public mailing list