[cabfpub] Ballot 179 - Amend Section 6.1.7 of Baseline Requirements

Dimitris Zacharopoulos jimmy at it.auth.gr
Fri Sep 30 07:26:23 UTC 2016


Following the discussion around timestamping certificates and Root key 
usage, I prepared the following ballot. Looking for two endorsers.

Thank you,
Dimitris.

*Background*:

Section 6.1.7 of the Baseline Requirements states that the Root CA 
Private Keys MUST NOT be used to sign end-entity certificates, with some 
exceptions. It is unclear if this exception list includes end-entity 
certificates with EKU id-kp-timeStamping. This ballot attempts to 
clarify two things:

 1. that it affects Root Keys in a hierarchy that issues SSL
    Certificates and
 2. that it does not include time stamping certificates in the exception
    list.

It also clears the exception language for 1024-bit RSA Subscriber 
Certificates and testing products with Certificates issued by a Root.

*-- MOTION BEGINS --*

/Current section 6.1.7/

Root CA Private Keys MUST NOT be used to sign Certificates except in the 
following cases:

 1. Self-signed Certificates to represent the Root CA itself;
 2. Certificates for Subordinate CAs and Cross Certificates;
 3. Certificates for infrastructure purposes (e.g. administrative role
    certificates, internal CA operational device certificates, and OCSP
    Response verification Certificates);
 4. Certificates issued solely for the purpose of testing products with
    Certificates issued by a Root CA; and
 5. Subscriber Certificates, provided that:
     1. The Root CA uses a 1024-bit RSA signing key that was created
        prior to the Effective Date;
     2. The Applicant’s application was deployed prior to the Effective
        Date;
     3. The Applicant’s application is in active use by the Applicant or
        the CA uses a documented process to establish that the
        Certificate’s use is required by a substantial number of Relying
        Parties;
     4. The CA follows a documented process to determine that the
        Applicant’s application poses no known security risks to Relying
        Parties;
     5. The CA documents that the Applicant’s application cannot be
        patched or replaced without substantial economic outlay.
     6. The CA signs the Subscriber Certificate on or before June 30,
        2016; and
     7. The notBefore field in the Subscriber Certificate has a date on
        or before June 30, 2016

/Proposed section 6.1.7/

Private Keys corresponding to Root Certificates that participate in a 
hierarchy that issues Certificates with an extKeyUsage extension that 
includes the value id-kp-serverAuth [RFC5280] MUST NOT be used to sign 
Certificates except in the following cases:

 1. Self-signed Certificates to represent the Root Certificate itself;
 2. Certificates for Subordinate CAs and Cross Certificates;
 3. Certificates for infrastructure purposes (administrative role
    certificates, internal CA operational device certificates)
 4. Certificates for OCSP Response verification;

/*Note:*/ After the Effective Date Feb 1st 2017, Certificates for Time 
Stamping Authorities SHALL NOT be directly issued from these Root 
Certificates.

*-- MOTION ENDS -- *

The review period for this ballot shall commence at 2200 UTC on Tuesday 
October XX 2016, and will close at 2200 UTC on Tuesday October XX 2016. 
Unless the motion is withdrawn during the review period, the voting 
period will start immediately thereafter and will close at 2200 UTC on 
Tuesday October XX 2016. Votes must be cast by posting an on-list reply 
to this thread.

A vote in favor of the motion must indicate a clear 'yes' in the 
response. A vote against must indicate a clear 'no' in the response. A 
vote to abstain must indicate a clear 'abstain' in the response. Unclear 
responses will not be counted. The latest vote received from any 
representative of a voting member before the close of the voting period 
will be counted. Voting members are listed here: 
https://cabforum.org/members/

In order for the motion to be adopted, two thirds or more of the votes 
cast by members in the CA category and greater than 50% of the votes 
cast by members in the browser category must be in favor. Quorum is 
currently nine (9) members– at least nine members must participate in 
the ballot, either by voting in favor, voting against, or abstaining.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/public/attachments/20160930/b9e0c8ad/attachment-0002.html>


More information about the Public mailing list