[Servercert-wg] Final Minutes for Server Certificate Working Group Teleconference - October 17 2019
Dimitris Zacharopoulos (HARICA)
dzacharo at harica.gr
Thu Oct 31 08:51:47 MST 2019
These are the final Minutes of the Teleconference described in the
subject of this message.
Attendees (in alphabetical order)
Arno Fiedler (D-TRUST), Ben Wilson (Digicert), Bruce Morton (Entrust
Datacard), Chris Kemmerer (SSL.com), Curt Spann (Apple), Daniela Hood
(GoDaddy), Dimitris Zacharopoulos (HARICA), Doug Beattie (GlobalSign),
Enrico Entschew (D-TRUST), Gordon Bock (Microsoft), Inaba Atsushi
(GlobalSign), Jos Purvis (Cisco Systems), Kenneth Myers (US Federal PKI
Management Authority), Kirk Hall (Entrust Datacard), Li-Chun Chen
(Chunghwa Telecom), Mike Reilly (Microsoft), Niko Carpenter
(SecureTrust), Peter Miskovic (Disig), Rich Smith (Sectigo), Robin Alden
(Sectigo), Ryan Sleevi (Google), Scott Rea (Dark Matter), Shelley Brewer
(Digicert), Timo Schmitt (SwissSign), Tobias Josefowitz (Opera Software
AS), Trevoli Ponds-White (Amazon), Wayne Thayer (Mozilla), Wendy Brown
(US Federal PKI Management Authority).
Minutes
1. Roll Call
The Chair took attendance.
2. Read Antitrust Statement
The Antitrust Statement was read.
3. Review Agenda
No changes to the agenda.
4. Approval of minutes from previous teleconference
The minutes from the previous teleconference were approved and will be
circulated to the public list.
5. Validation Subcommittee Update
Doug gave the update. There was a long meeting discussing about LEI, the
pros and cons LEI and usefulness. Draft meeting minutes have been
circulated on the validation subcommittee list and Doug will need to
listen to conversations and send a final version of the minutes.
There is also a ballot in process for method 6.
Finally, the clean up ballot was discussed and has now been circulated
to the public list.
6. NetSec Subcommittee Update
Ben reported that there was a call 2 weeks ago. Some edits were made on
log retention and log continuous monitoring.
During the call on doc organization, some definitions like Zones were
discussed. The subcommittee thought it would be better to split out
secure zone definition "logical and physical security". More specific
wording will be in future revisions of the NSRs. They considered
defining "physical security" as a physical secure facility or secure
room. For "secure network" they discussed about secure segments to
incorporate the notion of VLANs. Ben asked if there are experts in this
area to assist with the definitions.
The subcommittee will send an email to the larger group for exceptions
related to offline keys (there are about 10 provisions that presume the
systems are online). Like continuous offline.
Kirk reminded the group that one of the mandate of the subcommittee was
to deal with certain portions of the Network Security Requirements for
which Members were dissatisfied and that were hard to implement or hard
to understand. Ben replied that the subcommittee is working on these
items. He also mentioned that these topics come up whenever they try to
"touch" sections of the NSRs. For example, when they discussed about
network security it was mentioned that this is not limited only to
physical segmented networks, it's also VLANs.
7. Ballot Status
No further discussion.
_Ballots in Discussion Period_
/SC23 Ballot: Precertificates and OCSP/ (Wayne)
Wayne explained that there are two outstanding issues for SC23 v2
1. There could be compliance concerns if this ballot doesn't have an
effective date. If the rest of the ballot language as is, it seems
reasonable to add an effective date.
2. different approach quite a bit more comprehensive and a little bit
more difficult to get right. Rob Stradling as one of the endorsers will
need to discuss more about the alternative approach. Wayne will send
another version in a week or so.
Mike mentioned that they are having some internal conversations in
Microsoft for the definition of precert vs cert and noted some
challenges from MS's end.
Wayne replied that there was a very nuanced discussion at the m.d.s.p
mailing list. The expectations from a Root Store Program's perspective
are that if a precert exists, then a certificate is assumed to exist and
a valid OCSP response must exist for that cert. The language in the BRs
at this point are contradictory. A pre-certificate is not a certificate.
The purpose for this statements was to avoid the RFC 5280 restrictions
for duplicate Certificate serial numbers. If this is combined with
language from 4.9.10, it says that a CA cannot issue good OCSP response
for a certificate that has not been issued.
Curt added that we might have similar language for "test certificates"
because the are not considered "Certificates" and asked if we could use
similar language for the precertificates. Ryan replied that the only
definition we have for "test certificates" was in relation with a Domain
Validation method which has been forbidden. He also mentioned that part
of the "cleanup" ballot is related to the definition of "test
certificates" and there is some confusion because we have a definition
of a "test certificate" without a corresponding validation method for
which it was created, and CAs think that they can issue these Test
Certificates outside this validation method. We actually don't have a
definition for "test certificates" and they are currently seen as
Certificates. Ryan explained the OCSP pre-certificate issue further and
that there is an attempt to remove the definition of "test certificate"
completely so that there is no confusion.
Kirk asked why can't we fix only the OCSP section to allow for CAs to
issue good responses for precertificates. Wayne explained that depending
on the perspective of the reader, there is one valid interpretation that
does not allow a CA to issue a "good" response for a precertificate if a
corresponding certificate has not been issued. The original ballot was
pretty simple, trying to make the minimum changes to the BRs to make it
clear that what is required by the Root programs and by RFC 6962 is
permitted by the BRs.
There was more discussion describing the issues related to the two
proposals (allow for "good" OCSP responses for precertificates, or treat
precertificates as certificates). Ryan suggested that we try to solve
both but they can be treated separately. He suggested we try to solve
the first problem (allow for "good" OCSP responses for precertificates)
and defer the other (treat pre-certificates as certificates). He
recommended working on 4.9.10 to fix the first issue without "touching"
7.1.2.5 and work on the "holistic" issue later. He will work on some
draft language to send to the list. Mike seconded that this approach
would be useful. Wayne was indifferent but mentioned that the discussion
about what a precertificate is would take longer. Ryan said he would
send a more "targeted" change to the OCSP issue and Wayne said he would
need to discuss with the other endorsers as this is a different approach
than the original one.
_*Ballots in Voting Period*_
None
_*Ballots in Review Period*_
/SC21: NSR section 3 (Log Integrity Controls)(Review until Nov 3, 2019)/
_Draft Ballots under Consideration_
/Improvements for Method 6, website control/ (Tim H.)
No additional comments
/
SC20 Ballot (NSR 2): System Configuration Management/
Tobi reported discussing this topic in SC and subgroup meetings and the
motivation as described on the mailing list is not enough for what they
are trying to do. The subgroup has an important question to ask which is
addressed to Ryan. They would like his interpretation of what the
"vision" actually is. You could interpret this as actual configuration
changes intentionally made at the CA that needs to be reviewed, in order
to have something like 4-eyes principle, or say that the change was as
good as it seemed when it was made? Or does it mean to review every week
every configuration on your system and check if nobody (including the
admins) has changed it.
Ryan was a bit unclear about the question. He mentioned sending an email
on Oct 3rd to the list to describe what he was trying to understand. He
repeated that it would be helpful to follow:
- What the CAs want
- Why it's not permitted
- Why it should be permitted
- How the proposed change tries to address this issue.
He mentioned an example about the requirement to use an antivirus where
a CA was running their software on a read-only media. So, in that case
running an antivirus weekly made no sense to run on a read-only media.
There should be a way to allow a CA to not having to run an antivirus on
a read-only media. That was the process.
That description is missing from SC20. We may need to avoid a silly
requirement or prevent a smart requirement, and here is what we're
trying to do to fix that.
The group re-iterated the examples of good ballots. Knowing upfront what
we are trying to solve will avoid unexpected ambiguities.
/LEI Ballot/ (Tim H.)
No additional comments.
/Cleanups /(Ryan)/
/Ryan has everything on GitHub, all changes are in the rationale of the
ballot so he is looking for someone to run the ballot process. Wayne
volunteered to do that so we should expect a cleanup ballot to be on the
public list soon.
/Aligning the BRs with existing Browser Requirements /(Ryan)
Ryan went through the Root Programs of Microsoft and Mozilla and
identified some differences. This is not a topic that is ready for
extensive discussion, at least on this call, as Microsoft is currently
working on some updates to their Root Program requirements. At this
time, there is a GitHub branch that lists the differences that have been
identified from the Mozilla and Microsoft root policies and try to map
to BR related changes. He is not pushing to make a ballot with these
changes but he encourages members to at least review the proposed
changes to see if they match people's understanding. Worse case it will
be useful for folks that have not been paying so much attention to Root
program requirements and understand the issues. It is very possible that
not everything on this list is correct so Ryan encourages the review and
feedback. It is a list of things that have either resulted in a list of
non-compliance or normative requirements where the baseline requirements
have otherwise been more permissible. Mike also encouraged members to
look at the draft language regardless of their internal work at Microsoft.
Dimitris asked if Ryan thought of adding some cases where the BRs were
misunderstood or misinterpreted, and highlight them so we could
hopefully make them more clear.
Ryan agreed that we should do that but that was not part of this
attempt. We need to find opportunities to provide more clear language.
He debated about how much of the RFC 5280 language are we going to
replicate in the BRs, one example being the subjectKeyIdentifier and
authorityKeyIdentifier. In any case, this attempt is about adding some
hard and unambiguous requirements that already exist today. He would use
separate and targeted ballots for clarifications and interpretations of
ambiguous requirements.
For the previous discussion about OCSP and precerts, one of the ballots
should add expectations about precerts. The same about "Test
Certificates", improving validation methods that have resulted in
different interpretations. This long list of such issues will be tackled
in the future.
Ryan also brought up the non-critical Name Constraints issue which is
currently allowed in the BRs as an exception to RFC 5280. He cares about
removing that ambiguity, so there is a discussion on the public list
about making this extension critical. Some feedback from Apple is
expected about the implications.
Finally, Ryan mentioned about another discussion on the mailing list
regarding the "Default-deny", "default-allow" on how to read the BRs.
How should that be read in the requirements. Ryan wants to get feedback
from members so he can see a different perspective about how some of the
requirements in the BRs are read so to establish the "default state". He
would also like some feedback about the critical/non-critical Name
Constraints issue.
8. F2F 48 Agenda
The draft agenda is up on the wiki. Dimitris already announced the guest
speakers. Any changes should be communicated by the next meeting so we
can approve the agenda. There was no further feedback from participants.
9. Any Other Business
None.
10. Next call
October 31, 2019 at 11:00 am Eastern Time.
Adjourned
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cabforum.org/pipermail/servercert-wg/attachments/20191031/d35f8198/attachment-0001.html>
More information about the Servercert-wg
mailing list