[Servercert-wg] [EXTERNAL] Re: Reducing Domain/IP Address Validation Reuse to 398 Days
Ben Wilson
bwilson at mozilla.com
Thu Feb 25 18:55:26 UTC 2021
Hi Bruce,
See my responses inline below.
On Mon, Feb 22, 2021 at 2:17 PM Bruce Morton <Bruce.Morton at entrust.com>
wrote:
> Hi Ben,
>
>
>
> A couple of comments.
>
>
>
> The ballot does not address the “cliff” that CAs have stated will occur.
>
I do not see a "cliff" - it is more like a small hump.
> The thinking is that currently CAs are verifying domains, which can be
> reused for 825-days (~27 months).
>
Agreed - currently CAs can reuse domain verification for 825-days (~27
months). However, they should not be reusing FQDN and IP address
verification for such a long period, especially for one-year certificates.
There should only be a very small number of domains that are difficult to
verify, and if they've verified once before, then customers and CAs should
have procedures in place that can be re-performed.
The new requirement implies that the domain verification can only be reused
> for 398-days (~13 months).
>
The new requirement would apply to certificates issued on or after July 1,
2021. This proposal does not require all certificate validations to be
redone, and the most recent verifications are more likely to still be
accurate.
> This means that for CAs which reuse domain validation, there will be 14
> months of validation which will expire on the effective date of the ballot.
>
Correct, but the 14 months of validation would be for those old validations
that were performed nearly 3 years ago -- from approximately October 5,
2018 through December 6, 2109.
> In many cases this may create a lot of work on the Subscriber and the CA
> to revalidate these domains.
>
I disagree. As stated above, there should be fewer reuse of validations
performed. I don't know of any statistics supporting the amount of work
that would need to be performed. Shouldn't these processes be automated?
Do you have data for the type of validations that were originally performed
between October 5, 2018 and December 6, 2109, to indicate how many of those
will be problematic? Also, the July 1, 2021, date has been circulated by
Mozilla for quite some time, and CAs should have been preparing for it.
> Is it possible to have the ballot only address domains which are validated
> after the effective date? The domains which are currently validated can be
> reused per their current schedule.
>
We can discuss this more, but your request is just that new domains and IP
addresses be validated - which would already be required with or without an
amendment to policy. I think the currently proposed amendment is the best
approach.
>
>
> Would it also be possible to push out the effective date by a quarter, so
> October 1, 2021?
>
That might be a possibility, but doesn't that just move your "cliff". As I
say above, CAs and customers should already be moving toward more frequent
FQDN and IP Address verification.
> This will give the CAs more time to implement the change and to advise
> Subscribers of the impact. It will also give the Subscribers some time to
> address the volume of domains which will have to be re-validated.
>
What is the volume of domains that will need to be revalidated? Two-year
certificates were eliminated last year, but how many 2-year certificates
would be coming up for renewal, and of those, how many had problematic
domain validation procedures that would need to be re-performed or replaced
with the currently allowed methods?
Respectfully,
Ben
>
>
>
> Thanks, Bruce.
>
>
>
> *From:* Servercert-wg <servercert-wg-bounces at cabforum.org> *On Behalf Of *Ben
> Wilson via Servercert-wg
> *Sent:* Friday, February 19, 2021 2:14 PM
> *To:* CA/B Forum Server Certificate WG Public Discussion List <
> servercert-wg at cabforum.org>
> *Subject:* [EXTERNAL] Re: [Servercert-wg] Reducing Domain/IP Address
> Validation Reuse to 398 Days
>
>
>
> WARNING: This email originated outside of Entrust.
> DO NOT CLICK links or attachments unless you trust the sender and know the
> content is safe.
> ------------------------------
>
> Here is a preliminary, rough draft of Ballot SC42 for discussion and
> comment. Please let me know if you spot any deficiencies in required
> content or procedure.
>
> In other words, this email is not intended to and does not begin the
> discussion period on this ballot. A separate, official email will be sent
> out next week for that purpose.
>
> Name of Ballot: 398-Day Reuse
>
> Purpose of Ballot:
>
> This ballot changes validation reuse periods for FQDN and IP Address
> validation in the Baseline Requirements and for all purposes in the EV
> Guidelines. The ballot does not change the 825-day reuse period in section
> 4.2.1. of the Baseline Requirements for Organizational Validation (OV)
> information.
>
> Specifically:
>
> * It inserts in BR section 3.2.2.4 “For Certificates issued on or after
> July 1, 2021, the CA SHALL verify that each FQDN is confirmed as permitted
> by this section at intervals of 398 days or less.” It also requires that
> the validation be completed within the 398 days preceding certificate
> issuance and removes cross-references to BR section 4.2.1.
>
> * It modifies BR sections 3.2.2.4.3 and 3.2.2.4.6 to eliminate reuse of
> FQDN validation performed under those sunsetted provisions.
>
> * It modifies BR section 3.2.2.4.7 to replace subsections i. and ii. with
> a 30-day limit on reuse of the Random Value.
>
> * It inserts in BR section 3.2.2.5 “For Certificates issued on or after
> July 1, 2021, the CA SHALL validate each IP address as permitted by this
> section at intervals of 398 days or less.” It also requires that the
> validation be completed within the 398 days preceding certificate issuance
> and removes cross-references to BR section 4.2.1.
>
> * It clarifies BR section 4.2.1 by stating, “This 825-day period does not
> apply to the validation of domain authorization or control performed under
> [Section 3.2.2.4](#3224-validation-of-domain-authorization-or-control) or
> the authentication of an IP address performed under [Section
> 3.2.2.5](#3225-authentication-for-an-ip-address), which have a 398-day
> reuse period.”
>
> * It replaces eight instances of “thirteen months/thirteen-month” in EVG
> 11.14.3 with 398 days.
>
> The following motion has been proposed by Ben Wilson of Mozilla and
> endorsed by Dimitris Zacharopoulos of HARICA and Chema Lopez of
> Firmaprofesional.
>
> – MOTION BEGINS –
>
> This ballot modifies the “Baseline Requirements for the Issuance and
> Management of Publicly-Trusted Certificates” (“Baseline Requirements”),
> based on Version 1.7.3:
>
> MODIFY the Baseline Requirements as defined in the following redline:
> https://github.com/sleevi/cabforum-docs/compare/2020-11-30_Pandocification...BenWilson-Mozilla:398-day-FQDN-validation
> <https://urldefense.com/v3/__https:/github.com/sleevi/cabforum-docs/compare/2020-11-30_Pandocification...BenWilson-Mozilla:398-day-FQDN-validation__;!!FJ-Y8qCqXTj2!Pw5FPlsjcApvD6B-RB2ue9k4OrfoZk-pK2UyHBEE5gpaRDKbgxwu90dLVaBfS1OrxQc$>
> (GITHUB URL TO BE UPDATED)
>
> This ballot modifies the “Guidelines for the Issuance and Management of
> Extended Validation Certificates” (“EV Guidelines”) as follows, based on
> Version 1.7.4:
>
> MODIFY the EV Guidelines as defined in the following redline:
> https://github.com/sleevi/cabforum-docs/compare/2020-11-30_Pandocification...BenWilson-Mozilla:398-day-FQDN-validation
> <https://urldefense.com/v3/__https:/github.com/sleevi/cabforum-docs/compare/2020-11-30_Pandocification...BenWilson-Mozilla:398-day-FQDN-validation__;!!FJ-Y8qCqXTj2!Pw5FPlsjcApvD6B-RB2ue9k4OrfoZk-pK2UyHBEE5gpaRDKbgxwu90dLVaBfS1OrxQc$>
> (GITHUB URL TO BE UPDATED)
>
> – MOTION ENDS –
>
> This ballot proposes two Final Maintenance Guidelines.
>
> The procedure for approval of this ballot is as follows:
>
> Discussion (7+ days)
>
> Start Time: TBD
>
> End Time: TBD
>
> Vote for approval (7 days)
>
> Start Time: TBD
>
> End Time: TBD
>
>
>
> On Mon, Feb 15, 2021 at 11:50 AM Ben Wilson via Servercert-wg <
> servercert-wg at cabforum.org> wrote:
>
> See
> https://github.com/BenWilson-Mozilla/servercert/commit/26bd5a9f9f8bd2a251153a4cceb6226b859a3464
> <https://urldefense.com/v3/__https:/github.com/BenWilson-Mozilla/servercert/commit/26bd5a9f9f8bd2a251153a4cceb6226b859a3464__;!!FJ-Y8qCqXTj2!Pw5FPlsjcApvD6B-RB2ue9k4OrfoZk-pK2UyHBEE5gpaRDKbgxwu90dLVaBfndkviR8$>
>
>
>
> On Mon, Feb 15, 2021 at 11:44 AM Ben Wilson <bwilson at mozilla.com> wrote:
>
> I have created a GitHub branch to make changes in for this ballot.
>
>
> https://github.com/BenWilson-Mozilla/servercert/tree/398-day-FQDN-validation/docs
> <https://urldefense.com/v3/__https:/github.com/BenWilson-Mozilla/servercert/tree/398-day-FQDN-validation/docs__;!!FJ-Y8qCqXTj2!Pw5FPlsjcApvD6B-RB2ue9k4OrfoZk-pK2UyHBEE5gpaRDKbgxwu90dLVaBfI2S_Sds$>
>
> I intend to replace "thirteen months" in section 11.14.3 of the EV
> Guidelines with "398 days".
>
>
>
> On Tue, Feb 9, 2021 at 5:03 PM Ben Wilson via Servercert-wg <
> servercert-wg at cabforum.org> wrote:
>
> All,
>
>
>
>
>
> Amend BR section 3.2.2.5.1 and possibly make the Random Value valid for
> only 30 days or 60 days because what is meant by "if the Applicant
> submitted the certificate request"? Otherwise, just editing out some of
> the existing language it would read something like, "If a Random Value is
> used, the CA SHALL provide a Random Value unique to the certificate request
> and SHALL not use the Random Value after the longer of (i) 30 days or (ii)
> if the Applicant submitted the certificate request, 398 days," but someone
> should explain how that makes any sense.
>
>
>
> I seem to recall that harmonizing the Random Value (which, I agree, is
> also a good change) touches a few other sections. In particular, we
> identified previously that the (ii) is an anti-pattern; that is, that the
> Random Value should be valid 30 days or less, and it's the cached
> validation that is reused after that, rather than the Random Value itself.
> We updated several of the places, but not all. That is, 3.2.2.4.7 also
> needs to be cleaned up
>
>
>
> Can someone propose alternative language that says what was intended (i.e.
> "cached validation" as indicated by Ryan)? Otherwise, in BR section
> 3.2.2.4.7 (DNS Change) and BR section 3.2.2.5.1 (Agreed Upon Change to
> Website), as part of this proposed ballot, I intend to limit use of the
> Random Value to 30 days and delete the phrase "ii. if the Applicant
> submitted the Certificate request, the timeframe permitted for reuse of
> validated information relevant to the Certificate (such as in Section 4.2.1
> of these Guidelines or Section 11.14.3 of the EV Guidelines)" because it
> makes no sense as currently worded. In any event, even the structure is bad
> because it combines two unrelated conditions into one concept. In other
> words, it wouldn't make sense to say the longer of (i) 30 days or (ii) 398
> days for cached validations. As proposed by the ballot, the 398-day limit
> will apply to all methods of validation.
>
>
>
> I am still a little unclear on the intent of the language in (ii). Would
> the intent have been better served if that second part had been placed in a
> separate sentence? E.g., "The same Random Value may also be used for
> submitting subsequent certificate requests for the same domain for the
> timeframe permitted for reuse ...."
>
>
>
> Thanks,
>
>
>
> Ben
>
> _______________________________________________
> Servercert-wg mailing list
> Servercert-wg at cabforum.org
> https://lists.cabforum.org/mailman/listinfo/servercert-wg
> <https://urldefense.com/v3/__https:/lists.cabforum.org/mailman/listinfo/servercert-wg__;!!FJ-Y8qCqXTj2!Pw5FPlsjcApvD6B-RB2ue9k4OrfoZk-pK2UyHBEE5gpaRDKbgxwu90dLVaBfywc1So8$>
>
> _______________________________________________
> Servercert-wg mailing list
> Servercert-wg at cabforum.org
> https://lists.cabforum.org/mailman/listinfo/servercert-wg
> <https://urldefense.com/v3/__https:/lists.cabforum.org/mailman/listinfo/servercert-wg__;!!FJ-Y8qCqXTj2!Pw5FPlsjcApvD6B-RB2ue9k4OrfoZk-pK2UyHBEE5gpaRDKbgxwu90dLVaBfywc1So8$>
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/servercert-wg/attachments/20210225/feb6fcdf/attachment-0001.html>
More information about the Servercert-wg
mailing list