[Cscwg-public] Final minutes of CSCWG May 5, 2022

Dean Coclin dean.coclin at digicert.com
Thu May 19 17:51:48 UTC 2022


Final CSCWG Meeting minutes

May 5, 2022

 

Attendees: Dean Coclin, Bruce Morton, Ben Wilson, Tim Crawford, Martijn
Katerbarg, Corey Bonnell, Atsushi Inaba, Michael Sykes, Ian McMillan, Joanna
Fox

Minute Taker: Dean. Corey will take them next time

 

Antitrust statement was read

 

Prior meeting minutes of April 21st, approved.

 

CSC-13 Subscriber Private Key Protection Ballot (Bruce)

No IPR review responses have been received and once period ends tomorrow, a
notice will go out to all.

 

CSC-14 Format changes (Corey)

No issues have been flagged with the ballot so the discussion period will be
kicked off next week. 

 

High Risk Ballot (Bruce)

Bruce had sent out the text for the ballot to the list. The group reviewed
it on the screen. The ballot attempts to clean up takeover attacks and use
of keys in software. 

Tim suggested the takeover attack language go away after the keys in
software are no longer allowed.

 

Signing Service Ballot (Bruce)

Bruce is waiting for the format change to be done and then will propose
changes to the signing service to help "clean it up". Trying to determine if
there are any issues about having the signing service done by a cloud
provider.  Tim said we need some clear language about what the cloud
provider can be used for. Bruce will try to have something available by the
time of the F2F meeting. 

 

Timestamp Update ballot (Bruce)

Thinking of stalling a bit because we have a number of items that we want to
close off. Tim had sent something to the list on the Microsoft policy issue
that we need to address. Ian said that issue is with the root program
people, not him. Tim said it's time critical and bad things will happen if
things don't move forward. Bruce asked if it was sent to the public list and
Corey said it was in github but will send to the list. Tim described the
issue: MSFT root policy currently would imply that every single time stamp
authority that chains to a public root would need to have the signing
service policy OID regardless of whether it's intended for code signing or
not. The downside of that is that it means it's not going to solve the
problem, the way they wanted it to be solved. We wanted CAs to put it in
certs intended to be used for MSFT code signing and leave it out of things
intended for non-MSFT stuff, like document signing or whatever. This would
help tell the difference between a MSFT authorized and compliant TSA and
just a general TSA that's trusted by the internet. Hence we need an update
to the MSFT policies. Bruce asked some clarifying questions. Tim said there
are a bunch of timestamp servers that are under these MSFT  routes and have
been for a long, long time but we're never intended for Microsoft code
signing and so there was this issue that it's impossible to tell whether
it's a timestamping server that's existed for a long time. And so about a
year ago, we discussed adding this policy OID timestamp servers that you can
tell the difference between a Microsoft timestamp server and just some
random trusted timestamp server that's existed for a long time and used for
lots of things. And we're going to try to get that clean separation. I would
like it to be very clear that policy OIDs correspond to requirements
documents like the BRs and if you stare at a certificate and look at its
policy OID it should be very easy to tell under what scope it's under.

 

Another item Bruce brought up was that we allow a timestamp certificate
validity period for 135 months and we don't need it to be that long. But to
cover Java issues, we can't go down to 1 year or 15 months (or something)
because that might create issues. But what is a reasonable number? We have a
maximum 39 month code signing certificate so we want a timestamp certificate
to cover at least that, but it would seem that if I to cover off 39 months,
and I can issue a certificate every 15 months, that the maximum period will
be 44 months. The Java issue is that the signature is not ok when the
timestamp cert expires.  Ian expressed concerned with the number of private
keys that would be around for 11 years that shouldn't be around that long.
Corey suggested mandating key destruction after 15 months. Bruce asked why
we have to re-key a TSA? Ian said the TSA end entity certs being used to
sign the timestamps are very highly used. A compromise of that cert has a
huge impact. The internal MSFT TSA certs are not hosted in the same security
world as the roots or issuing CA for the end entity TSA cert.

 

Do we want to destroy the old key when we re-key? Tim said we should think
about that. Does someone need proof of possession of that key? Since it's a
CA key, the answer is no. It's probably safe to allow deletion.

 

Bruce said it's implied that the timestamp CA is offline based on its CRL
requirements. Should it be clarified? Is there an issue with it being
online? Corey said there's not a lot of value in having it online and it
presents a risk. Bruce said if we want it offline, we should make that
statement in the requirements to be clear. Ian said that any issuing CA that
is online can only live online for <5 years validity period. Hence for TSAs
that are longer than 5 years, they should be offline.  Bruce will make
markups after discussion.

 

Other Business

For the F2F, our group will meet at 11am ET on Tuesday (5pm Poland). Let's
think about an agenda for that call. We will also need to make a short
presentation in the Forum meeting since February and what we will be working
on for the rest of the year. 

 

Ben asked about an issue some people were observing with Win7 installs of
Firefox, which might be related to the timestamp. Ian said it could be
something to do with SHA256 and certain patch levels of Win 7. Ian will send
out the KB article that relates to this. 

 

Meeting adjourned. 

 

 

 

Dean Coclin

 

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/cscwg-public/attachments/20220519/304dd39e/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4916 bytes
Desc: not available
URL: <http://lists.cabforum.org/pipermail/cscwg-public/attachments/20220519/304dd39e/attachment-0001.p7s>


More information about the Cscwg-public mailing list