[cabf_validation] Topic for our next VWG call: LEI

Doug Beattie doug.beattie at globalsign.com
Wed Feb 6 12:54:18 MST 2019


I think this is why an agenda item for the call.

 

It's different because the data in the corporate registration database isn't
bound into the certificate and asserted as true by the CA.  If we included a
DUNS number I'd have the same question/concern.


Assume that we include just the DUNS number or LEI in a certificate, and the
CA validated the information at the time of issuance, then the data changed.
Without the CA verifying/approving these changes, we've lost control over
what was validated.  Rogue changes could be made to the repositories that
would normally be caught by the CA.

 

 

From: Richard Smith <rich at sectigo.com> 
Sent: Wednesday, February 6, 2019 2:26 PM
To: Doug Beattie <doug.beattie at globalsign.com>; CA/Browser Forum Validation
WG List <validation at cabforum.org>; Tim Hollebeek
(tim.hollebeek at digicert.com) <tim.hollebeek at digicert.com>
Subject: RE: Topic for our next VWG call: LEI

 

And again, how is that any different to data changing in the corporate
registration database after issuance?

 

Regards,

Rich

 

From: Doug Beattie <doug.beattie at globalsign.com> 
Sent: Wednesday, February 6, 2019 1:17 PM
To: Richard Smith <rich at sectigo.com>; CA/Browser Forum Validation WG List
<validation at cabforum.org>; Tim Hollebeek (tim.hollebeek at digicert.com)
<tim.hollebeek at digicert.com>
Subject: RE: Topic for our next VWG call: LEI

 

Maybe an example will help:

 

A CA issues a certificate to Stripe Inc, Kentucky.  The LEI matches what's
in the certificate and the CA asserts all is good at this point in time.

 

A week later, the LEI changes the location of Stripe Inc, to New Hampshire.
Relying parties now think the CA asserted/verified Stripe Inc, New Hampshire
because that is in the certificate and bound via digital signature in the OU
field (although, they are bit confused because the DN in the certificate
remains Kentucky).  It appears that the CA validated both identifies, but in
fact, the CA never validated Stripe Inc, New Hampshire.

 

How do we reconcile this?  I think it's important that everyone understands
what was validated, and with the ability of LEI data to change, I don't
understand how a CA can include that as validated information.

 

 

 

 

From: Richard Smith <rich at sectigo.com <mailto:rich at sectigo.com> > 
Sent: Wednesday, February 6, 2019 12:54 PM
To: Doug Beattie <doug.beattie at globalsign.com
<mailto:doug.beattie at globalsign.com> >; CA/Browser Forum Validation WG List
<validation at cabforum.org <mailto:validation at cabforum.org> >; Tim Hollebeek
(tim.hollebeek at digicert.com <mailto:tim.hollebeek at digicert.com> )
<tim.hollebeek at digicert.com <mailto:tim.hollebeek at digicert.com> >
Subject: RE: Topic for our next VWG call: LEI

 

I don't understand this concern at all.  Subject information and
verification thereof is and has always been point in time.  None of the data
sources we use for verification of subject information are static or use
Merkle trees or anything else.  The exact same thing you are saying about
LEI information applies to corporate registration information tied to the
registration number which we are REQUIRED to include in the subject of an EV
certificate.  The company name, registered address, registered agent,
directors/owners could all change the day after certificate issuance.

 

Regards,

Rich

 

From: Doug Beattie <doug.beattie at globalsign.com
<mailto:doug.beattie at globalsign.com> > 
Sent: Wednesday, February 6, 2019 11:37 AM
To: Richard Smith <rich at sectigo.com <mailto:rich at sectigo.com> >; CA/Browser
Forum Validation WG List <validation at cabforum.org
<mailto:validation at cabforum.org> >; Tim Hollebeek
(tim.hollebeek at digicert.com <mailto:tim.hollebeek at digicert.com> )
<tim.hollebeek at digicert.com <mailto:tim.hollebeek at digicert.com> >
Subject: RE: Topic for our next VWG call: LEI

 

Hi Rich,

 

Yes, we're getting inquires also.  I understand the requirements and those
statements from the BRs and EVGs for data contained in the certificate.  The
question I have is how should we handle a link to data that can change?  If,
at the time of issuance, the data in the certificate is validated, then we
have a good spec because the data is covered with a signature so we know it
can't be changed.  The issue with LEI is that the data can change post
issuance.  It's a bit like permitting a 3rd party to change the contents of
the certificate after issuance; we would certainly not permit that.  If
there was a hash of the LEI data in the certificate or if the LEI database
never changed (Merkle tree or something), then I have no issues, but it's
the fact the data can change post issuance and the CA never verified that,
yet it's asserting it's true by virtue of the link in the certificate. 

 

Doug

 

From: Richard Smith <rich at sectigo.com <mailto:rich at sectigo.com> > 
Sent: Wednesday, February 6, 2019 11:28 AM
To: Doug Beattie <doug.beattie at globalsign.com
<mailto:doug.beattie at globalsign.com> >; CA/Browser Forum Validation WG List
<validation at cabforum.org <mailto:validation at cabforum.org> >; Tim Hollebeek
(tim.hollebeek at digicert.com <mailto:tim.hollebeek at digicert.com> )
<tim.hollebeek at digicert.com <mailto:tim.hollebeek at digicert.com> >
Subject: RE: Topic for our next VWG call: LEI

 

We've been asked about using LEIs from some customers so I recently looked
into this as well.

 

Everything from BR and EVG related to the use of the OU field that I could
find is below.  IMO

nothing stated precludes the use of a verified LEI number in the OU field.

 

>From BR Section 7.1.4.2

i. Certificate Field: subject:organizationalUnitName Optional. The CA SHALL

implement a process that prevents an OU attribute from including a name,

DBA, tradename, trademark, address, location, or other text that refers to a

specific natural person or Legal Entity unless the CA has verified this

information in accordance with Section 3.2 and the Certificate also contains

subject:organizationName, subject:givenName, subject:surname,

subject:localityName, and subject:countryName attributes, also verified in

accordance with Section 3.2.2.1.

 

And from 9.6.1

3.            Accuracy of Information: That, at the time of issuance, the CA
(i)

implemented a procedure for verifying the accuracy of all of the information

contained in the Certificate (with the exception of the

subject:organizationalUnitName attribute); (ii) followed the procedure when

issuing the Certificate; and (iii) accurately described the procedure in the

CA's Certificate Policy and/or Certification Practice Statement;

4.            No Misleading Information: That, at the time of issuance, the
CA (i)

implemented a procedure for reducing the likelihood that the information

contained in the Certificate's subject:organizationalUnitName attribute

would be misleading; (ii) followed the procedure when issuing the

Certificate; and (iii) accurately described the procedure in the CA's

Certificate Policy and/or Certification Practice Statement;

 

EVG don't say anything specific about OU field. Section 9.2.8 states:

Other Subject Attributes

All other optional attributes, when present within the subject field, MUST

contain information that has been verified by the CA. CAs SHALL NOT include

Fully-Qualified Domain Names in Subject attributes except as specified in

Sections 9.2.1 and SHALL NOT include any Subject Organization Information

except as specified in Section 9.2. Optional subfields within the Subject

field MUST either contain information verified by the CA or MUST be left

empty. Metadata such as '.', '-', and ' ' characters, and/or any other

indication that the field is empty, absent or incomplete, MUST not be used.

 

Regards,

Rich

 

From: Validation <validation-bounces at cabforum.org
<mailto:validation-bounces at cabforum.org> > On Behalf Of Doug Beattie via
Validation
Sent: Tuesday, February 5, 2019 1:21 PM
To: Tim Hollebeek (tim.hollebeek at digicert.com
<mailto:tim.hollebeek at digicert.com> ) <tim.hollebeek at digicert.com
<mailto:tim.hollebeek at digicert.com> >
Cc: validation (validation at cabforum.org <mailto:validation at cabforum.org> )
<validation at cabforum.org <mailto:validation at cabforum.org> >
Subject: [cabf_validation] Topic for our next VWG call: LEI

 

Hi Tim,

 

I'd like to bring up the topic of LEIs at our VWG call next Thursday.  While
the topic was discussed last July
(https://cabforum.org/pipermail/public/2018-July/013659.html), I don't feel
like we reached an agreement.  

 

The OU fields seems like the most obvious place and the BRs say this about
the OU field:

*	The CA SHALL implement a process that prevents an OU attribute from
including a name, DBA, tradename, trademark, address, location, or other
text that refers to a specific natural person or Legal Entity unless the CA
has verified this information in accordance with Section 3.2 and the
Certificate also contains subject:organizationName, , subject:givenName,
subject:surname, subject:localityName, and subject:countryName attributes,
also verified in accordance with Section 3.2.2.1.

 

I'd like to discuss if the use of LEI identifiers in SSL certificates is
compliant with the BRs.  This is a pointer to the Legal Entity data at a
point in time (which a CA is obligated to verify at issuance per the
definition of OU above), however, LEIs can change over time:
https://leismart.com/blog/lei-data-is-not-static/  This means that while the
data will be verified by the CA when issued, there is no guarantee that the
data remains unchanged/vetted by the CA if it changes.

 

Is using LEIs in the subject name of SSL certificates permitted?

 

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cabforum.org/pipermail/validation/attachments/20190206/240d3bb5/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 5701 bytes
Desc: not available
URL: <http://cabforum.org/pipermail/validation/attachments/20190206/240d3bb5/attachment-0001.p7s>


More information about the Validation mailing list