[Servercert-wg] Annual Update of CPS

Roman Fischer roman.fischer at swisssign.com
Wed Nov 16 11:40:32 UTC 2022


Dear all,

Regular review of documents is an important good practice to detect outdated, inconsistent or no-longer compliant stuff. IMHO such a review still requires human attention and can’t be fully automated. The more frequent such a review has to be done, the higher the risk of fatigue and oversight. More frequent reviews also increases cost.

On the other side, if a review has to be done simply to increase the version number, add a line to the history-table, sign and publish the document again, then it can be fully automated. Such an automation would of course defeat the original intention of a review but couldn’t be detected by an outsider unless she/he would do a manual review… 😉

There are public documents (e.g. CPs) that are oftne not affected by BR or root store policy changes. For such documents I fail to see a benefit of more frequent reviews.

It would be great if we can come up with (out-of-the-box) ideas about how to increase the overall document “quality” supporting the security of the ecosystem while at the same time not creating purely administrative overhead. 😊

Kind regards
Roman

From: Servercert-wg <servercert-wg-bounces at cabforum.org> On Behalf Of Ryan Dickson via Servercert-wg
Sent: Dienstag, 15. November 2022 19:25
To: Ben Wilson <bwilson at mozilla.com>; CA/B Forum Server Certificate WG Public Discussion List <servercert-wg at cabforum.org>
Subject: Re: [Servercert-wg] Annual Update of CPS


[Accidentally posted this in the MDSP<https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgroups.google.com%2Fa%2Fmozilla.org%2Fg%2Fdev-security-policy%2Fc%2FJoyItinU9iQ%2Fm%2F0QECoxA2CAAJ%3Futm_medium%3Demail%26utm_source%3Dfooter&data=05%7C01%7Croman.fischer%40swisssign.com%7C830d1133093a43ea7df608dac736aff9%7C21322582607f404c82d950ddb1eca5c9%7C1%7C0%7C638041334953818772%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=fLKxuqNvSECRbpi14bBmXrAfjqyfBkbwLELoBzRIfAU%3D&reserved=0> thread related to the same topic, sorry if you're seeing this twice!]



Hi all,


I commented on the GitHub issue<https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fcabforum%2Fservercert%2Fissues%2F370%23issuecomment-1315408729&data=05%7C01%7Croman.fischer%40swisssign.com%7C830d1133093a43ea7df608dac736aff9%7C21322582607f404c82d950ddb1eca5c9%7C1%7C0%7C638041334953818772%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=RTxhSULWRU2MTkxiDF%2B5yxIWX0Q2WCwASnN8ajCIfOA%3D&reserved=0>, but if we're looking at changing this requirement, I think we should do so from the perspective of making it better aligned with root program expectations.


Many root program policies include the expectation that a CA's policies conform with the latest version of the BRs. Over the past five years, we've seen, on average, eight ballots adopted to modify the BRs each year. While it's true that not all ballots necessitate a CA's policies are updated, I suspect if we studied it closer, we'd probably see CAs would need to update their CP a few times a year, on average, to satisfy root program policies that require policy “freshness.”


I'm not strongly proposing we change the yearly minimum requirement but instead expressing concern about increasing it beyond every 365 days.


Somewhat related, I think some simple improvements could be made regarding file naming conventions on policy documents to make it easier for CAs to demonstrate compliance with policy “freshness” requirements.


For example, assume we required the current version of a CP always to be located at [$ca_repository_base_url]/cp.pdf], or an otherwise static URL. As new versions of the CP are published, they would replace the document hosted at [$ca_repository_base_url]/cp.pdf] or the static URL. "Archived" versions would then be appended with the version # of the then superseded document (e.g., a superseded document would transition from [$ca_repository_base_url]/cp.pdf] to [$ca_repository_base_url]/cp-[$previousVersion].pdf]). Ultimately, this makes it very easy for interested parties to find the most current version of a given document.



The same format can apply to CPSs or TSPSs. To accommodate CAs that maintain multiple CPs, we’ll need to think about ways of differentiating URLs.


Root programs interested in doing so (or CCADB) could then monitor the "current" policy document URLs and more easily verify the update requirement has been met (i.e., regularly curl and hash $ca_repository_base_url]/cp.pdf, and report when a policy is about to or has recently become stale). Thinking beyond the immediate capabilities of CCADB, perhaps someday it could automatically track version changes to policy documents as they are identified by changes to the hashed value of $ca_repository_base_url]/cp.pdf - reducing workload required by CAs to make sure CCADB records are accurate and updated in a timely manner.


And, while we’re thinking outside the box - would requiring policy documents be maintained in a common format that easily supports diffs and tracked changes (i.e., Markdown, as we maintain the BRs) - improve our collective policy management and conformance efforts?


Thanks,

Ryan


On Tue, Nov 15, 2022 at 11:01 AM Ben Wilson via Servercert-wg <servercert-wg at cabforum.org<mailto:servercert-wg at cabforum.org>> wrote:
Hi Clint,
On second thought, maybe my mind has changed about this. I invite others to chime in.
Ben

On Tue, Nov 15, 2022 at 7:16 AM Clint Wilson <clintw at apple.com<mailto:clintw at apple.com>> wrote:
Hi Ben,

Can you share more of your reasoning for picking 398 days and in general for decreasing the frequency of CP/CPS update requirements?

Thanks!
-Clint


On Nov 14, 2022, at 4:38 PM, Ben Wilson via Servercert-wg <servercert-wg at cabforum.org<mailto:servercert-wg at cabforum.org>> wrote:

All,
Section 2.3 of the Baseline Requirements currently says, "The CA SHALL develop, implement, enforce, and annually update a Certificate Policy
and/or Certification Practice Statement that describes in detail how the CA implements the latest version of these Requirements."  I am considering a proposal to revise that language to specify a 398-day period.  See https://github.com/cabforum/servercert/issues/370#issuecomment-1113441809
<https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fcabforum%2Fservercert%2Fissues%2F370%23issuecomment-1113441809&data=05%7C01%7Croman.fischer%40swisssign.com%7C830d1133093a43ea7df608dac736aff9%7C21322582607f404c82d950ddb1eca5c9%7C1%7C0%7C638041334953818772%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=bSkArOdQpVNvWi%2F%2BVQzDK7ZoScNt8Dhsp7as2ClRkag%3D&reserved=0>
Possible language would be:
"The CA SHALL develop, implement, enforce, and annually update a Certificate Policy and/or Certification Practice Statement that describes in detail how the CA implements the latest version of these Requirements. The CA SHALL indicate conformance with this requirement by incrementing the version number and adding a dated changelog entry at least every 398 days, even if no other changes are made to the document."
Thanks,
Ben

_______________________________________________
Servercert-wg mailing list
Servercert-wg at cabforum.org<mailto:Servercert-wg at cabforum.org>
https://lists.cabforum.org/mailman/listinfo/servercert-wg<https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Flists.cabforum.org%2Fmailman%2Flistinfo%2Fservercert-wg&data=05%7C01%7Croman.fischer%40swisssign.com%7C830d1133093a43ea7df608dac736aff9%7C21322582607f404c82d950ddb1eca5c9%7C1%7C0%7C638041334953818772%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=qVVdJl679az9ikfZEbpTQqmhEFjxfQPgdQvoWn4faFU%3D&reserved=0>

_______________________________________________
Servercert-wg mailing list
Servercert-wg at cabforum.org<mailto:Servercert-wg at cabforum.org>
https://lists.cabforum.org/mailman/listinfo/servercert-wg<https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Flists.cabforum.org%2Fmailman%2Flistinfo%2Fservercert-wg&data=05%7C01%7Croman.fischer%40swisssign.com%7C830d1133093a43ea7df608dac736aff9%7C21322582607f404c82d950ddb1eca5c9%7C1%7C0%7C638041334953818772%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=qVVdJl679az9ikfZEbpTQqmhEFjxfQPgdQvoWn4faFU%3D&reserved=0>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/servercert-wg/attachments/20221116/f23538a3/attachment-0001.html>


More information about the Servercert-wg mailing list