[Servercert-wg] [EXTERNAL] Re: Annual Update of CPS
Paul van Brouwershaven
Paul.vanBrouwershaven at entrust.com
Thu Nov 17 11:23:57 UTC 2022
The proposal from Tim is a great improvement, but I'm not sure if minor updates in November and January are really helpful, if they are just administrative, they can probably wait until the next update.
July falls within the summer holiday, this is not a great time to release system changes.
If we fix the updates to the 15th of March and 15th of September, we will always have 6 months between the updates where the holidays would fall nicely in the middle.
We could use the 15th day on the remaining odd months as backup for updates that really can't wait on these two dates.
Paul
________________________________
From: Servercert-wg <servercert-wg-bounces at cabforum.org> on behalf of Ponds-White, Trevoli via Servercert-wg <servercert-wg at cabforum.org>
Sent: Thursday, November 17, 2022 01:01
To: Pedro FUENTES <pfuentes at WISEKEY.COM>; CA/B Forum Server Certificate WG Public Discussion List <servercert-wg at cabforum.org>; Tim Hollebeek <tim.hollebeek at digicert.com>
Subject: [EXTERNAL] Re: [Servercert-wg] Annual Update of CPS
WARNING: This email originated outside of Entrust.
DO NOT CLICK links or attachments unless you trust the sender and know the content is safe.
________________________________
Another good thing about this proposal is that it would eliminate a lot of the discussion about what date to pick for effective dates from the ballot discussions. We could spend more time on the contents and merit.
Also the point about not having to formalize in the bylaws is a good one. We could informally adopt this. Try it for a year and then discuss at the Fall 2023 Face to Face if we think it’s a good idea or not.
From: Servercert-wg <servercert-wg-bounces at cabforum.org> On Behalf Of Pedro FUENTES via Servercert-wg
Sent: Wednesday, November 16, 2022 10:55
To: Tim Hollebeek <tim.hollebeek at digicert.com>; CA/B Forum Server Certificate WG Public Discussion List <servercert-wg at cabforum.org>
Subject: RE: [EXTERNAL][Servercert-wg] [EXTERNAL] Re: Annual Update of CPS
CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you can confirm the sender and know the content is safe.
I see this more than reasonable
Le 16 nov. 2022 à 19:49, Tim Hollebeek via Servercert-wg <servercert-wg at cabforum.org<mailto:servercert-wg at cabforum.org>> a écrit :
So the proposal I’ve been suggesting is standardizing on the 15th of odd months for effective dates. This misses most major holidays, which tend to be near the start / end of months. It also always guarantees that there’s a possible date within 30 days of any desired date you want. And it’s relatively easy to remember.
I’ve actually been making proposals like this since Bilbao back in like 2015 or so, when discussed the importance of not constantly selecting January 1st as the effective date for every large change 😊 I don’t care horribly about the details, but reducing the number of effective dates we’re tracking and bundling things does make them easier to manage and communicate.
January 15th – I’d only do minor stuff here, but it’s a good date for administrative stuff that wants to align with the calendar year without falling right on January 1st, which can be tricky because of office closures and holidays.
March 15th – on or near Spring F2F
May 15th- before Summer F2F
July 15th – after Summer F2F
September 15th – before Fall F2F
November 15th – again, only minor stuff as this one is flirting with the winter holidays, but is a good last date for anything that needs to be done before the end of the year
This also happens to give us a good effective date near each of the F2F meetings. We could even pick two of them to be “Major” updates, and two of them to be “Minor” updates, if we wanted. Then you’d have two high priority impact dates (which is reasonable / manageable), and a couple of lower priority dates that prevent having too long delays for time sensitive stuff. Whatever date you want, there’s a date on the list within 30ish days of your desired date.
If anyone else has feedback I’m all ears, I’ve just been slowly evangelizing these ideas over the years in the hope that people find the idea attractive.
Note that there’s no requirement that this has to be standardized in the Bylaws or anything … if ballot authors and root programs want to start organically coalescing around these or another set of dates, I’m all for it.
-Tim
From: Bruce Morton <Bruce.Morton at entrust.com<mailto:Bruce.Morton at entrust.com>>
Sent: Tuesday, November 15, 2022 3:57 PM
To: Ryan Dickson <ryandickson at google.com<mailto:ryandickson at google.com>>; CA/B Forum Server Certificate WG Public Discussion List <servercert-wg at cabforum.org<mailto:servercert-wg at cabforum.org>>; Ben Wilson <bwilson at mozilla.com<mailto:bwilson at mozilla.com>>
Cc: Tim Hollebeek <tim.hollebeek at digicert.com<mailto:tim.hollebeek at digicert.com>>
Subject: RE: [EXTERNAL] Re: [Servercert-wg] Annual Update of CPS
Maybe another issue is the 8 ballots per year all have different effectivity dates. I think this was Tim’s idea, but if we are thinking out of the box, why not limit the number of effectivity dates, say 2 per year. This would allow the CAs to take the opportunity to update CP/CPS, based on changes from BR/EVG, once or twice per year depending on the impact.
Bruce.
From: Servercert-wg <servercert-wg-bounces at cabforum.org<mailto:servercert-wg-bounces at cabforum.org>> On Behalf Of Ryan Dickson via Servercert-wg
Sent: Tuesday, November 15, 2022 1:25 PM
To: Ben Wilson <bwilson at mozilla.com<mailto:bwilson at mozilla.com>>; CA/B Forum Server Certificate WG Public Discussion List <servercert-wg at cabforum.org<mailto:servercert-wg at cabforum.org>>
Subject: [EXTERNAL] Re: [Servercert-wg] Annual Update of CPS
WARNING: This email originated outside of Entrust.
DO NOT CLICK links or attachments unless you trust the sender and know the content is safe.
________________________________
[Accidentally posted this in the MDSP<https://urldefense.proofpoint.com/v2/url?u=https-3A__urldefense.com_v3_-5F-5Fhttps-3A_groups.google.com_a_mozilla.org_g_dev-2Dsecurity-2Dpolicy_c_JoyItinU9iQ_m_0QECoxA2CAAJ-3Futm-5Fmedium-3Demail-26utm-5Fsource-3Dfooter-5F-5F-3B-21-21FJ-2DY8qCqXTj2-21dsuTApwH3ST7ASghiebViD-2DvEA8KpCLoeRtFWmmICfgK-2DfiEhvhCL-2DggPnW-5FHcmYEpSdLv7TrlqplEa3i2nvTZHwu-2DuGeA-24&d=DwMGaQ&c=euGZstcaTDllvimEN8b7jXrwqOf-v5A_CdpgnVfiiMM&r=-bX5hBm1IdRDykQ-dBR8tsFRCM4v1VXUyG7RZa2WqPY&m=GM-aG4L4bcOH4-d4J2Fqks8U1pxNdx25wta5Xx28HYI&s=5tw7gdh9Q2USZMmHpE-PFHFbg9RGldixRaxcO95TcuI&e=> thread related to the same topic, sorry if you're seeing this twice!]
Hi all,
I commented on the GitHub issue<https://urldefense.proofpoint.com/v2/url?u=https-3A__urldefense.com_v3_-5F-5Fhttps-3A_github.com_cabforum_servercert_issues_370-2Aissuecomment-2D1315408729-5F-5F-3BIw-21-21FJ-2DY8qCqXTj2-21dsuTApwH3ST7ASghiebViD-2DvEA8KpCLoeRtFWmmICfgK-2DfiEhvhCL-2DggPnW-5FHcmYEpSdLv7TrlqplEa3i2nvTZFVOwoVjw-24&d=DwMGaQ&c=euGZstcaTDllvimEN8b7jXrwqOf-v5A_CdpgnVfiiMM&r=-bX5hBm1IdRDykQ-dBR8tsFRCM4v1VXUyG7RZa2WqPY&m=GM-aG4L4bcOH4-d4J2Fqks8U1pxNdx25wta5Xx28HYI&s=kK3NrnfqG1pKtOnsHrFeD2pOapiseypt8T3hhR-pDrw&e=>, but if we're looking at changing this requirement, I think we should do so from the perspective of making it better aligned with root program expectations.
Many root program policies include the expectation that a CA's policies conform with the latest version of the BRs. Over the past five years, we've seen, on average, eight ballots adopted to modify the BRs each year. While it's true that not all ballots necessitate a CA's policies are updated, I suspect if we studied it closer, we'd probably see CAs would need to update their CP a few times a year, on average, to satisfy root program policies that require policy “freshness.”
I'm not strongly proposing we change the yearly minimum requirement but instead expressing concern about increasing it beyond every 365 days.
Somewhat related, I think some simple improvements could be made regarding file naming conventions on policy documents to make it easier for CAs to demonstrate compliance with policy “freshness” requirements.
For example, assume we required the current version of a CP always to be located at [$ca_repository_base_url]/cp.pdf], or an otherwise static URL. As new versions of the CP are published, they would replace the document hosted at [$ca_repository_base_url]/cp.pdf] or the static URL. "Archived" versions would then be appended with the version # of the then superseded document (e.g., a superseded document would transition from [$ca_repository_base_url]/cp.pdf] to [$ca_repository_base_url]/cp-[$previousVersion].pdf]). Ultimately, this makes it very easy for interested parties to find the most current version of a given document.
The same format can apply to CPSs or TSPSs. To accommodate CAs that maintain multiple CPs, we’ll need to think about ways of differentiating URLs.
Root programs interested in doing so (or CCADB) could then monitor the "current" policy document URLs and more easily verify the update requirement has been met (i.e., regularly curl and hash $ca_repository_base_url]/cp.pdf, and report when a policy is about to or has recently become stale). Thinking beyond the immediate capabilities of CCADB, perhaps someday it could automatically track version changes to policy documents as they are identified by changes to the hashed value of $ca_repository_base_url]/cp.pdf - reducing workload required by CAs to make sure CCADB records are accurate and updated in a timely manner.
And, while we’re thinking outside the box - would requiring policy documents be maintained in a common format that easily supports diffs and tracked changes (i.e., Markdown, as we maintain the BRs) - improve our collective policy management and conformance efforts?
Thanks,
Ryan
On Tue, Nov 15, 2022 at 11:01 AM Ben Wilson via Servercert-wg <servercert-wg at cabforum.org<mailto:servercert-wg at cabforum.org>> wrote:
Hi Clint,
On second thought, maybe my mind has changed about this. I invite others to chime in.
Ben
On Tue, Nov 15, 2022 at 7:16 AM Clint Wilson <clintw at apple.com<mailto:clintw at apple.com>> wrote:
Hi Ben,
Can you share more of your reasoning for picking 398 days and in general for decreasing the frequency of CP/CPS update requirements?
Thanks!
-Clint
On Nov 14, 2022, at 4:38 PM, Ben Wilson via Servercert-wg <servercert-wg at cabforum.org<mailto:servercert-wg at cabforum.org>> wrote:
All,
Section 2.3 of the Baseline Requirements currently says, "The CA SHALL develop, implement, enforce, and annually update a Certificate Policy
and/or Certification Practice Statement that describes in detail how the CA implements the latest version of these Requirements." I am considering a proposal to revise that language to specify a 398-day period. See https://github.com/cabforum/servercert/issues/370#issuecomment-1113441809
<https://urldefense.proofpoint.com/v2/url?u=https-3A__urldefense.com_v3_-5F-5Fhttps-3A_github.com_cabforum_servercert_issues_370-2Aissuecomment-2D1113441809-5F-5F-3BIw-21-21FJ-2DY8qCqXTj2-21dsuTApwH3ST7ASghiebViD-2DvEA8KpCLoeRtFWmmICfgK-2DfiEhvhCL-2DggPnW-5FHcmYEpSdLv7TrlqplEa3i2nvTZEi1VmwsA-24&d=DwMGaQ&c=euGZstcaTDllvimEN8b7jXrwqOf-v5A_CdpgnVfiiMM&r=-bX5hBm1IdRDykQ-dBR8tsFRCM4v1VXUyG7RZa2WqPY&m=GM-aG4L4bcOH4-d4J2Fqks8U1pxNdx25wta5Xx28HYI&s=yBGxlPJMIEVM0RjD0dGMz7WbwjUw_ypBN9tj4BBhHzQ&e=>
Possible language would be:
"The CA SHALL develop, implement, enforce, and annually update a Certificate Policy and/or Certification Practice Statement that describes in detail how the CA implements the latest version of these Requirements. The CA SHALL indicate conformance with this requirement by incrementing the version number and adding a dated changelog entry at least every 398 days, even if no other changes are made to the document."
Thanks,
Ben
_______________________________________________
Servercert-wg mailing list
Servercert-wg at cabforum.org<mailto:Servercert-wg at cabforum.org>
https://lists.cabforum.org/mailman/listinfo/servercert-wg<https://urldefense.proofpoint.com/v2/url?u=https-3A__urldefense.com_v3_-5F-5Fhttps-3A_lists.cabforum.org_mailman_listinfo_servercert-2Dwg-5F-5F-3B-21-21FJ-2DY8qCqXTj2-21dsuTApwH3ST7ASghiebViD-2DvEA8KpCLoeRtFWmmICfgK-2DfiEhvhCL-2DggPnW-5FHcmYEpSdLv7TrlqplEa3i2nvTZEG1NCn7g-24&d=DwMGaQ&c=euGZstcaTDllvimEN8b7jXrwqOf-v5A_CdpgnVfiiMM&r=-bX5hBm1IdRDykQ-dBR8tsFRCM4v1VXUyG7RZa2WqPY&m=GM-aG4L4bcOH4-d4J2Fqks8U1pxNdx25wta5Xx28HYI&s=tB5VFwEryn4xer9b6E_hGs5ecWOlmKrfqKD-253SarE&e=>
_______________________________________________
Servercert-wg mailing list
Servercert-wg at cabforum.org<mailto:Servercert-wg at cabforum.org>
https://lists.cabforum.org/mailman/listinfo/servercert-wg<https://urldefense.proofpoint.com/v2/url?u=https-3A__urldefense.com_v3_-5F-5Fhttps-3A_lists.cabforum.org_mailman_listinfo_servercert-2Dwg-5F-5F-3B-21-21FJ-2DY8qCqXTj2-21dsuTApwH3ST7ASghiebViD-2DvEA8KpCLoeRtFWmmICfgK-2DfiEhvhCL-2DggPnW-5FHcmYEpSdLv7TrlqplEa3i2nvTZEG1NCn7g-24&d=DwMGaQ&c=euGZstcaTDllvimEN8b7jXrwqOf-v5A_CdpgnVfiiMM&r=-bX5hBm1IdRDykQ-dBR8tsFRCM4v1VXUyG7RZa2WqPY&m=GM-aG4L4bcOH4-d4J2Fqks8U1pxNdx25wta5Xx28HYI&s=tB5VFwEryn4xer9b6E_hGs5ecWOlmKrfqKD-253SarE&e=>
Any email and files/attachments transmitted with it are confidential and are intended solely for the use of the individual or entity to whom they are addressed. If this message has been sent to you in error, you must not copy, distribute or disclose of the information it contains. Please notify Entrust immediately and delete the message from your system.
_______________________________________________
Servercert-wg mailing list
Servercert-wg at cabforum.org<mailto:Servercert-wg at cabforum.org>
https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.cabforum.org_mailman_listinfo_servercert-2Dwg&d=DwICAg&c=euGZstcaTDllvimEN8b7jXrwqOf-v5A_CdpgnVfiiMM&r=-bX5hBm1IdRDykQ-dBR8tsFRCM4v1VXUyG7RZa2WqPY&m=GM-aG4L4bcOH4-d4J2Fqks8U1pxNdx25wta5Xx28HYI&s=WJ-1nlRkNOpSNvOJFkGLEQxMd8-uiidX6SWdQ0B6Enw&e=
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/servercert-wg/attachments/20221117/675ffdeb/attachment-0001.html>
More information about the Servercert-wg
mailing list