<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=utf-8"><meta name=Generator content="Microsoft Word 15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:Cambria;
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Consolas;
panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
pre
{mso-style-priority:99;
mso-style-link:"HTML Preformatted Char";
margin:0in;
margin-bottom:.0001pt;
font-size:10.0pt;
font-family:"Courier New";}
p.msonormal0, li.msonormal0, div.msonormal0
{mso-style-name:msonormal;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
span.m-6812640887099963709gmail-
{mso-style-name:m_-6812640887099963709gmail-;}
span.HTMLPreformattedChar
{mso-style-name:"HTML Preformatted Char";
mso-style-priority:99;
mso-style-link:"HTML Preformatted";
font-family:Consolas;}
span.EmailStyle22
{mso-style-type:personal-reply;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Calibri",sans-serif;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-US link=blue vlink=purple><div class=WordSection1><p class=MsoNormal>Some organizations, including Mozilla, think domain validation is also a valid email validation use case. This is especially important for enterprises.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>But I agree with the rest.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>-Tim<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><div style='border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in 4.0pt'><div><div style='border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in 0in 0in'><p class=MsoNormal><b>From:</b> Ryan Sleevi [mailto:sleevi@google.com] <br><b>Sent:</b> Thursday, May 24, 2018 10:18 AM<br><b>To:</b> Tim Hollebeek <tim.hollebeek@digicert.com><br><b>Cc:</b> Dimitris Zacharopoulos <jimmy@it.auth.gr>; CA/Browser Forum Public Discussion List <public@cabforum.org>; Moudrick M. Dadashov <md@ssc.lt>; Brown, Wendy (10421) <wendy.brown@protiviti.com><br><b>Subject:</b> Re: [cabfpub] For Discussion: S/MIME Working Group Charter<o:p></o:p></p></div></div><p class=MsoNormal><o:p> </o:p></p><div><p class=MsoNormal>Right, to be clear, I'm opposed to treating clientAuth with S/MIME.<o:p></o:p></p><div><p class=MsoNormal><o:p> </o:p></p></div><div><p class=MsoNormal>I understand that, in some spaces, S/MIME identity is tied to legal identity. But S/MIME also has the potential of great value being tied to simply e-mail identity - or to organizational identity. If you will, this is the distinction between DV, IV, OV, and EV.<o:p></o:p></p></div><div><p class=MsoNormal><o:p> </o:p></p></div><div><p class=MsoNormal>My view is that just like DV is the basis for all other forms of serverAuth certificates, e-mail validation is the core to S/MIME. Getting that correct prevents any future improvements - that is, you cannot build a legal identity of S/MIME without first establishing and validating the e-mail.<o:p></o:p></p></div><div><p class=MsoNormal><o:p> </o:p></p></div><div><p class=MsoNormal>Thus, a good charter should start solely with S/MIME, and solely with e-mail validation.<o:p></o:p></p></div><div><p class=MsoNormal><o:p> </o:p></p></div><div><p class=MsoNormal>If that is successful, as a Baseline, then folks can and should be free to safely explore building on that foundation for other forms - for example, if organizational validation is appropriate, or in the case of eIDAS, if individual validation.<o:p></o:p></p></div><div><p class=MsoNormal><o:p> </o:p></p></div><div><p class=MsoNormal>clientAuth is orthogonal in this, in that it can have many different forms of asserted identities (such as a SAN of a dNSName or a SAN of an rfc822Name) or no technical identity. Its usage, like code-signing, is going to vary on the consumer - and thus general rules are NOT applicable, but instead is going to need to be evaluated for each and every application context. While eIDAS considers that notion, it's doing so on flawed technical grounds (an entirely separate issue), but I highlight it because the eIDAS notion of clientAuth is vastly different than, say, the XMPP notion of clientAuth, even though they use the same key policy.<o:p></o:p></p></div><div><p class=MsoNormal><o:p> </o:p></p></div><div><p class=MsoNormal>The solution to all of these challenges is not to try to solve them all at once, it's to start and make sure there is a common base certificate profile, and a core understanding of the validation of the primary identifier appropriate for S/MIME (the email address), and then build more expressive, additive systems on top of that, if and as there is demonstrated need and consumption. Just because something "could" be done doesn't necessarily mean it should, and just because some PKIs (like eIDAS) introduce some ideas doesn't mean they're good - but without a firm footing, and without a charter to explicitly focus on solely that topic, not much progress can or will be made.<o:p></o:p></p></div></div><div><p class=MsoNormal><o:p> </o:p></p><div><p class=MsoNormal>On Thu, May 24, 2018 at 8:57 AM, Tim Hollebeek <<a href="mailto:tim.hollebeek@digicert.com" target="_blank">tim.hollebeek@digicert.com</a>> wrote:<o:p></o:p></p><blockquote style='border:none;border-left:solid #CCCCCC 1.0pt;padding:0in 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in'><div><div><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>Yeah, I want something focused. There are lots of different clientAuth use cases, not just individual identity. clientAuth only looks like emailProtection if you’re limiting yourself to the use cases where there’s strong overlap. Which makes the argument that they are similar essentially a tautology. Remember, clientAuth can also be mutual authentication for web services. That looks nothing like emailProtection.<o:p></o:p></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'> <o:p></o:p></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>So let’s get email on a firm footing first, and if the section of the clientAuth BRs for individuals is heavily based on the emailProtection BRs, that just saves us work in the future.<o:p></o:p></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'> <o:p></o:p></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>-Tim<o:p></o:p></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'> <o:p></o:p></p><div style='border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in 4.0pt'><div><div style='border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in 0in 0in'><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><b>From:</b> Public [mailto:<a href="mailto:public-bounces@cabforum.org" target="_blank">public-bounces@cabforum.org</a>] <b>On Behalf Of </b>Dimitris Zacharopoulos via Public<br><b>Sent:</b> Thursday, May 24, 2018 1:05 AM<br><b>To:</b> Moudrick M. Dadashov <<a href="mailto:md@ssc.lt" target="_blank">md@ssc.lt</a>>; Brown, Wendy (10421) <<a href="mailto:wendy.brown@protiviti.com" target="_blank">wendy.brown@protiviti.com</a>>; CA/Browser Forum Public Discussion List <<a href="mailto:public@cabforum.org" target="_blank">public@cabforum.org</a>>; Ryan Sleevi <<a href="mailto:sleevi@google.com" target="_blank">sleevi@google.com</a>><o:p></o:p></p><div><div><p class=MsoNormal><br><b>Subject:</b> Re: [cabfpub] For Discussion: S/MIME Working Group Charter<o:p></o:p></p></div></div></div></div><div><div><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'> <o:p></o:p></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:12.0pt'><br>Moudrick, I don't think we are describing just use scenarios. This is about subject validation and as you are very well familiar, eIDAS is also setting requirements for how you validate natural persons and legal entities. Then, you can use this validated information for different trust services (authenticate, sign, encrypt, etc).<br><br>We already have identity validation requirements for the server certificate Working Group, described in DV/OV/EV Policies for certificates with id-kp-serverAuth EKU. Why shouldn't we include identity validation requirements for this new Working Group for certificates with id-kp-clientAuth and id-kp-emailProtection EKU? The overlap in subject validation requirements between these two cases is pretty obvious.<br><br>Even though I'd like the clientAuth to be included in the WG's initial charter, I understand Ryan's argument for gradually building a standard with minimum expectations at the beginning (thus limiting the scope for S/MIME only) and expand the scope later. <br><br>So, until then, the clientAuth Certificates will remain kind-of "unregulated" by lacking a policy standard. I suppose we will have to live with that :)<br><br><br><br>Dimitris.<o:p></o:p></p><div><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>On 24/5/2018 2:34 πμ, Moudrick M. Dadashov wrote:<o:p></o:p></p></div><blockquote style='margin-top:5.0pt;margin-bottom:5.0pt'><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:12.0pt'><span style='font-family:"Cambria",serif'>All three (clentAuth and S/MIME) use scenarios are essentially different.<br><br>Validation requirements for issuing signing/encryption certificates are mostly similar, clientAuth (as we understand it under eIDAS*) is different.<br><br>Thanks,<br>M.D. <br><br>* Article 3<br>(5) ‘<b><i>authentication</i></b><i>’ means an electronic process that enables the electronic identification of a natural or legal person, or the origin and integrity of data in electronic form to be confirmed</i>.<br><br>(1) ‘<b><i>electronic identification</i></b><i>’ means the process of using person identification data in electronic form uniquely representing either a natural or legal person, or a natural person representing a legal person</i>.<br><br>(2) ‘<b><i>electronic identification means</i></b><i>’ means a material and/or immaterial unit containing person identification data and which is used for authentication for an online service</i>.<br><br> </span><o:p></o:p></p><div><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>On 5/24/2018 12:16 AM, Brown, Wendy (10421) via Public wrote:<o:p></o:p></p></div><blockquote style='margin-top:5.0pt;margin-bottom:5.0pt'><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span style='color:#1F497D'>I second the opinion that clientAuth and S/Mime are likely to have a great overlap in validation requirements at least when issuing to persons and PKIs may want to issue both types of certs from the same CA if they are for the same validated individual..</span><o:p></o:p></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span style='color:#1F497D'> </span><o:p></o:p></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><b>From:</b> Public [<a href="mailto:public-bounces@cabforum.org" target="_blank">mailto:public-bounces@cabforum.org</a>] <b>On Behalf Of </b>Ryan Sleevi via Public<br><b>Sent:</b> Friday, May 18, 2018 9:18 AM<br><b>To:</b> Dimitris Zacharopoulos <a href="mailto:jimmy@it.auth.gr" target="_blank"><jimmy@it.auth.gr></a>; CA/Browser Forum Public Discussion List <a href="mailto:public@cabforum.org" target="_blank"><public@cabforum.org></a><br><b>Subject:</b> Re: [cabfpub] For Discussion: S/MIME Working Group Charter<o:p></o:p></p><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'> <o:p></o:p></p><div><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'> <o:p></o:p></p><div><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'> <o:p></o:p></p><div><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>On Fri, May 18, 2018 at 12:57 AM, Dimitris Zacharopoulos via Public <<a href="mailto:public@cabforum.org" target="_blank">public@cabforum.org</a>> wrote:<o:p></o:p></p><blockquote style='border:none;border-left:solid #CCCCCC 1.0pt;padding:0in 0in 0in 6.0pt;margin-left:4.8pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'><div><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:12.0pt'><span class=m-6812640887099963709gmail-> </span><o:p></o:p></p><div><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>On 18/5/2018 2:51 πμ, Ryan Sleevi via Public wrote:<o:p></o:p></p></div><blockquote style='margin-top:5.0pt;margin-bottom:5.0pt'><div><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>I don't think it's a cross-EKU situation, though, but I'm glad we're in agreement. <o:p></o:p></p><div><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'> <o:p></o:p></p></div><div><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>An email server certificate is an id-kp-serverAuth EKU. That's already covered by another WG<o:p></o:p></p></div></div></blockquote><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><br>I sincerely hope that id-kp-clientAuth EKU will also be covered by this WG since there will be common validation requirements for Subject information, as with S/MIME. It seems too much overhead to spawn an entirely different WG to deal just with clientAuth.<br><br>If people agree, how about using the name "Client and S/MIME Certificate WG" which seems aligned with the "Server Certificate WG"?<o:p></o:p></p></div></blockquote><div><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'> <o:p></o:p></p></div><div><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>As I've mentioned several times, it would be good to actually focus on a constrained, defined problem, before you proverbially try to boil the ocean.<o:p></o:p></p></div><div><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'> <o:p></o:p></p></div><div><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>It is not obvious that there will be common validation requirements, because the id-kp-clientAuth situation has a vast dimension of possible uses and spectrum. It's not actually reflective of the deployed reality that the validation requirements are the same. It also is based on an entirely separate notion of identity.<o:p></o:p></p></div><div><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'> <o:p></o:p></p></div><div><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>So no, I don't agree, because they really are substantially different in deployed reality - and an S/MIME WG is, in itself, a sizable undertaking just to get S/MIME BRs, due to the broad spectrum of client capabilities and CA past-practices - and the lifetime of extant certificates that presents unique challenges to defining a sensible and realistic profile.<o:p></o:p></p></div><div><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'> <o:p></o:p></p></div><div><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>A good charter - one that leads to productive engagement from a broad set of participants while actually delivering meaningful improvements - is one that keeps itself narrowly focused on the task at hand, produces results, and then looks to recharter based on the things you knew were out there, but agreed not to discuss until you actually completed the work. That allows you to keep momentum, focus, and participation. Just look at the challenges each of our (legacy) WG has faced with a broad remit, in that the set of topics has made it difficult both to engage participation of the broader Forum and to actually make forward progress, because it's constantly having to deal with 'all these things' or trying to do 'all these things'.<o:p></o:p></p></div><div><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'> <o:p></o:p></p></div><div><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>When we see narrowly focused ballots and efforts that try to solve a specific set of problems, then we make progress. The validation WG's effort at 3.2.2.4 is a prime example of that - a prolonged effort that directly benefited from being focused on that problem, and ruling some things (like 3.2.2.5) out of scope of the discussion in order to make progress on the narrow set.<o:p></o:p></p></div><div><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'> <o:p></o:p></p></div><div><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>The same too is in the charter. Let's not try to encompass pet marketing projects (EV for S/MIME), "things we might need but we don't know why" (network security), or "things that are kinda related, but only in some domains" (id-kp-clientAuth). Let's focus on the problem at hand - S/MIME authentication - keeping the WG scoped narrowly and on task, and deliver something that can help users have faith in the Web PKI to deliver tangible benefits in that space, rather than the reality we have today.<o:p></o:p></p></div></div></div></div><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:12.0pt'>NOTICE: Protiviti is a global consulting and internal audit firm composed of experts specializing in risk and advisory services. Protiviti is not licensed or registered as a public accounting firm and does not issue opinions on financial statements or offer attestation services. This electronic mail message is intended exclusively for the individual or entity to which it is addressed. This message, together with any attachment, may contain confidential and privileged information. Any views, opinions or conclusions expressed in this message are those of the individual sender and do not necessarily reflect the views of Protiviti Inc. or its affiliates. Any unauthorized review, use, printing, copying, retention, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email message to the sender and delete all copies of this message. Thank you. <br><br><o:p></o:p></p><pre>_______________________________________________<o:p></o:p></pre><pre>Public mailing list<o:p></o:p></pre><pre><a href="mailto:Public@cabforum.org" target="_blank">Public@cabforum.org</a><o:p></o:p></pre><pre><a href="https://clicktime.symantec.com/a/1/58b5lg-6qgJoiyMkuFyyjihEGUHAEye9DPRKzbfObTU=?d=8mgvcIa__SMpMRdOdO1qWcxXiKx9B8jzWMVa2uIlIWMvKWPFJg5PqissoC0faEZm0JLNJpuB-XiKhkLZe65-75a2W5qQuwsBma30V8Dulu3KXzTcES_XiIVyNkQ-597msxngSDFqzttf9473QFBumD6nABAjOqHoHWbWeUSIz4rbJXzFhZDAZnDowXjy-62yv1T_uV7QXGviotaVkpSrQZPBHWmuvzxTnR53mjKetqi-x8Rr4TrixNmJl2Ihc2z0r3SfgqRRNcFDSMka5DYYJsw66ZeDSlDw5NuqD6JuKw-nQvSWeSm29eQp5pieOFFY7aA3klzX5nFyNzj1S9QAfyv6XVu7FPyH01BPbVFcWEH5MT-swmz8niSggeq5hB-Xv1hb_NSb_VJeKXRmwx0FO15BtFlTvPx_w21FCIOf&u=https%3A%2F%2Fcabforum.org%2Fmailman%2Flistinfo%2Fpublic" target="_blank">https://cabforum.org/mailman/listinfo/public</a><o:p></o:p></pre></blockquote><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'> <o:p></o:p></p></blockquote><p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'> <o:p></o:p></p></div></div></div></div></div></blockquote></div><p class=MsoNormal><o:p> </o:p></p></div></div></div></body></html>