[Cscwg-public] Final Codesigning Working Group minutes- 7-Sep-2023
Dean Coclin
dean.coclin at digicert.com
Thu Oct 5 22:13:52 UTC 2023
Minutes of Codesigning WG meet on Sep 7th, 2023
Attendees:
Atsushi Inaba - GlobalSign
Keshava N - eMudhra
Inigo Barreira - Sectigo
Dimitris Zacharopoulos - Harica
Martijn Katerbarg - Sectigo
Ian McMillan Microsoft
Brianca Martin - Amazon
Mohit Kumar - GlobalSign
Bruce Morton - Entrust
Scott Rea - eMudhra
Andrea Holland - VikingCloud
Corey Bonnell - DigiCert
Discussion Points:
Prior minutes approval - 24-Aug-2023 minutes approved with no objection
Ballot Status
Ballot 19 is completed and effective 5-Sep-23 and new Code Signing BR
version is published with updates from this ballot.
Signing Service Ballot - Updated draft based on previous ballots. Includes
lot of cleanups, simplifying the language and not change any scope. The
objective was to clear that Signing service is not supposed to do
validation. Validation is expected from Certificate Authority and Signing
service is expected to protect private keys on behalf of subscriber
Summary of Major updates for Signing Service:
* Made clear signing service is not delegated third party. It is not
an obligation for CA or CA doesn't have to do it or delegate. It is optional
for CA.
* Change in definition of Signing service to include generation of key
pair and its management as main job for signing service
* Added section to ensure that Signing service don't transfer keys to
subscriber
* Changed reference to Signing Key as Private Key where applicable
* Improved content to avoid the interpretation that Signing service
must do malware scans for all codes being signed
* Broke the audit requirements between CA, Signing service and
Timestamping
High Risk ballot - To be postponed for now and to be taken up later.
Discussion on need for charter update for TSA certificates
Dimitris brought to group attention that it was agreed at forum level that
Codesigning Working group can work on requirements for TSA related to Code
Signing and is in scope.
Martjin suggested that unless we have technical controls to figure out which
Timestamp certificates or authority is being used for Codesigning vs not
used for codesigning, it is difficult to differentiate.
It was highlighted that we have policy OIDs for Timestamp certificates to be
used for Codesigning. There was discussion if these are mandatory and if its
stated explicitly. It was called out that if policy OID is not being used in
Timestamping certificate, it technically still works for codesigning.
But there is still difference in opinions if timestamping requirements are
in scope or need the charter update, since it is not clear.
Action item was decided to review and update charter and consider timestamp
certificates/TSA requirements for Codesigning
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/cscwg-public/attachments/20231005/e9944303/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 5197 bytes
Desc: not available
URL: <http://lists.cabforum.org/pipermail/cscwg-public/attachments/20231005/e9944303/attachment-0001.p7s>
More information about the Cscwg-public
mailing list