[Servercert-wg] SC-59 Weak Key Guidance
Dimitris Zacharopoulos (HARICA)
dzacharo at harica.gr
Fri May 26 15:30:10 UTC 2023
Tom,
Considering that most CAs already /should /be checking for Debian weak
keys, September 15 2023 might not be such a big challenge but I will
also wait for other Members to comment on the proposed March 15, 2024
effective date.
Thanks,
Dimitris.
On 26/5/2023 5:37 μ.μ., Tom Zermeno wrote:
>
> Hello Dimitris,
>
> Thank you for the input. We feel that September 15^th does not
> provide enough time for CAs to implement these changes, but we are not
> against the March 15, ^2024 effective date, if there is consensus from
> the Community.
>
> Thank you,
>
> Tom
>
> SSL.com
>
> *From:*Servercert-wg <servercert-wg-bounces at cabforum.org> *On Behalf
> Of *Dimitris Zacharopoulos (HARICA) via Servercert-wg
> *Sent:* Friday, May 26, 2023 1:54 AM
> *To:* servercert-wg at cabforum.org
> *Subject:* Re: [Servercert-wg] SC-59 Weak Key Guidance
>
>
> Hi Tom,
>
> Historically, the SCWG has been trying to avoid effective dates during
> January or December. I recommend using September 15, 2023 or March 15,
> 2024 as possible effective dates. These two dates seem to be more
> favorable
> <https://docs.google.com/presentation/d/1oTGVYqggQpQMR4Lktbu_L6DhuBVJzeuiFGd9EAU1zsE>
> than others.
>
>
> Thanks,
> Dimitris.
>
> On 25/5/2023 10:51 μ.μ., Tom Zermeno via Servercert-wg wrote:
>
> Purpose of Ballot SC-059 V3
>
> Several events within the community have led to concerns that the
> Baseline Requirements for the Issuance and Management of
> Publicly-Trusted Certificates (BRs) lacked a specificity required
> to properly guide CAs on matters dealing with the identification
> and processing of digital certificates based on private keys
> considered weak, or easy to ascertain. In the hopes that
> elaboration and clarity on the subject would be beneficial to the
> community, we are presenting updates to §4.9.1.1(“Reasons for
> Revoking a Subscriber Certificate) and §6.1.1.3 (Subscriber Key
> Pair Generation) of the BRs.
>
> The first update is to §4.9.1.1 and is made to expand the scope of
> easily computable Private Keys from “Debian weak keys” to “those
> listed in section 6.1.1.3(5)”. While the initial language in the
> BRs did not exclude other concerns, the use of a single example
> could be interpreted to mean that other easily computable Private
> Keys are few and far between. The next update was to §6.1.1.3(5),
> wherein we added specific actions to be taken for ROCA
> vulnerability, Debian weak keys - both RSA and ECDSA – and Close
> Primes vulnerability. We also added a link to suggested tools to
> be used for checking weak keys. Finally, an implementation date of
> December 1, 2023 was added to allow CAs time to update processes
> to meet the requirements.
>
> The following motion has been proposed by Thomas Zermeno of
> SSL.com and endorsed by Ben Wilson of Mozilla and Martijn
> Katerbarg of Sectigo.
>
> --Motion Begins—
>
> This ballot is intended to clarify CA responsibilities regarding
> weak key vulnerabilities, including specific guidance for Debian
> weak key, ROCA and Close Primes attack vulnerabilities, and
> modifies the “Baseline Requirements for the Issuance and
> Management of Publicly-Trusted Certificates” as follows, based on
> Version 2.0.0.
>
> Notes: Upon beginning discussion for SC-59, the then-current
> version of the BRs was 1.8.4; since that time several ballots have
> been approved, leading to the increment of the version to 1.8.7
> and eventually 2.0.0, which is the latest approved version of the
> BRs. The changes introduced in SC-59 do not conflict with any of
> the recent ballots. As observed with other ballots in the past,
> minor administrative updates must be made to the proposed ballot
> text before publication such that the appropriate Version # and
> Change History are accurately represented (e.g., to indicate these
> changes will be represented in Version 2.0.1).
>
> MODIFY the Baseline Requirements as specified in the following
> Redline:
> https://github.com/cabforum/servercert/compare/a0360b61e73476959220dc328e3b68d0224fa0b3...SSLcom:servercert:3b0c6de32595d02fbd96762cda98cdc88addef00
> <https://github.com/cabforum/servercert/compare/a0360b61e73476959220dc328e3b68d0224fa0b3...SSLcom:servercert:3b0c6de32595d02fbd96762cda98cdc88addef00>
>
> --Motion Ends—
>
> This ballot proposes a Final Maintenance Guideline. The procedure
> for approval of this ballot is as follows:
>
> Discussion (11+ days) • Start time: 2023-05-25 19:00:00 UTC • End
> time: 2023-06-08 18:59:00 UTC
> Vote for approval (7 days) • Start time: TBD • End time: TBD
>
>
>
> _______________________________________________
>
> Servercert-wg mailing list
>
> Servercert-wg at cabforum.org
>
> https://lists.cabforum.org/mailman/listinfo/servercert-wg
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/servercert-wg/attachments/20230526/42529ecb/attachment.html>
More information about the Servercert-wg
mailing list