[cabf_validation] CABF: Minutes from the Validation Subcommittee meeting at 2020-12-03

Dimitris Zacharopoulos (HARICA) dzacharo at harica.gr
Fri Dec 18 06:59:09 UTC 2020


- Antitrust statement

The Antitrust Statement was read.


- Attendence


Amanda Mendieta (Apple), Aneta Wojtczak-Iwanicka (Microsoft), Ben Wilson 
(Mozilla), Bruce Morton (Entrust), Clint Wilson (Apple), Corey Bonnel 
(Digicert), Daniela Hood (GoDaddy), Dimitris Zacharopoulos (HARICA), 
Doug Beattie (GlobalSign), Janet Hines (SecureTrust), Johnny Reading 
(GoDaddy), Michelle Coon (OATI), Niko Carpenter (SecureTrust), Paul van 
Brouwershaven (Entrust), Rebecca Kelley (Apple), Rich Smith (Sectigo), 
Ryan Sleevi (Google), Shelley Brewer (Digicert), Stephen Davidson 
(Digicert), Tim Hollebeek (Digicert), Wayne Thayer (Mozilla).


- Agenda


Two items were added to the agenda:

1. Wildcard and ADN validation

2. Extensions based on BRs 7.1.2.4


- Wildcard and ADN validation


Ryan sent a message on the list about concerns raised in meeting #43 
around Domain Validation methods related to agreed-upon change to a website.


These methods practically demonstrate control for a particular Domain 
Name, the Domain Name of the website and not for the Domain Namespace.


Change agreed upon change to web sites should not validate ADNs and 
wildcard certificates.


DNS are ok for ADNs and wildcards.


Ryan would like to propose that it becomes effective immediately, around 
February 2021. If CAs anticipate problems with that timeline, they 
should send feedback with some useful data, since this is one of the 
automatable methods that doesn't really need human interaction. He is 
looking for initial reactions, challenges anticipated, any useful 
feedback would help during the preparation of the ballot.


Doug mentioned that Globalsign uses this method for Enterprise accounts 
so they can validate their Domain and then issue Certificates to 
sub-domains. It can be typically automated but not all systems on these 
Enterprises can use ACME. This would be something GS would like to push 
down the road, more than February 2021 so they can let their customers 
know this is coming. Doug also mentioned that it is important to know 
how we will handle validation re-use for sub-domains that were validated 
using these methods after this change is made. Will they immediately 
expire or have a transition?


Ryan said that this is where the email touches on, to trigger discussion 
on such challenges. For example, he expects not resolvable subdomain 
validations to be a challenge using these methods for these subdomain 
validations.


Ryan describes in his email what sort of data would be useful for CAs to 
collect and present. He is not opposed to pushing the date down the road 
but we should do this based on actual data. He proposed CAs to collect 
statistics and useful data for a concrete discussion. This would help 
set a better timeframe. CAs could also indicate their timeline to get 
this data, if they decide to do so. He agrees that examination of data 
takes time but CAs can mention how much time they need to collect this 
data. We certainly need to understand the impact before going forward.


Dimitris asked Ryan that in his email, the "www" label was mentioned 
separately when looking for statistics. It appeared as a "special case" 
and was curious if there were any plans for an exception.


Ryan replied that there was no intention of having an exception or 
"special treatment" for the "www" label. If the "www" is in the same 
server as the bare domain, it should be easy for the CA to use the same 
validation challenge for both domains. Two connections would be required 
to the two Domain Names but they could use one random value. For 
example, today the CA can validate example.com connect to example.com 
and get authorization to issue for www.example.com. After this update, 
the CA would need to connect to example.com and to www.example.com to 
get the same random value to issue for www.example.com and example.com.


Tim mentioned that the "www" label was used as a special case in the 
past because of how browsers treated this label, adding it automatically 
in some cases. He described a workaround for users that typed bare 
domain names in the address bar and browsers would historically do 
things like "let's see what happens if I add www to this". Ryan said 
this behavior has changed for the better and does not apply for almost a 
decade. Now you would need to do [CONTROL - ENTER] to "magically" add 
the www, and no one really knows about this behavior.


Ryan suggested to use the mailing list for first reactions, possible 
gotchas and in case CAs need time to gather data, they should just 
mention how much time they would need, it would be very useful.


Tim said that there should be some convergence and deadline on data 
feedback so this process doesn't go on forever.


Wayne added that there is a combination of factors (notifying customers, 
validation systems need to be modified, what has to happen with 
previously validated data) that make this proposed change clearly not 
happening overnight. He wasn't sure why the initial proposal was from 
the perspective of "let's make this effective immediately" and request 
data to push this forward, instead of taking the historically and 
typical approach proposing it to be effective 6 months after the ballot 
is effective. The 6 month effective time seems more realistic with this 
ballot and would help us move more quickly than trying to get data from 
people.


Ryan said that we set the standard to 3 months, not 6. The collection of 
data can help us tweak the effective dates. The goal is not to rush this 
through in February but get data to support informed decisions. We have 
a number of variables that need to be sorted out.


Tim echoed Wayne's point and also recalled that the default was 6 months 
de-facto used, and Tim had proposed more than 3 years ago that 3 years 
should be the default for complicated ballots.


Ryan replied that we said 90 days and he could dig up the archives. Tim 
said that he wouldn't be surprised if at different times, different 
people proposed different timelines but 6 months is the number he 
recalls as the agreed upon timeline.


Ryan said that the goal is not to produce a big impact in February but 
rather get some concrete data so we can find the right timelines. Also, 
if CAs ask for specific time to gather information, that would be very 
reasonable and helpful. He is concerned about some CAs using these 
validation methods to issue wildcard certificates which exposes users at 
a greater risk. Some CAs have been conscientious about the discussion in 
Virginia and taking the right steps for not using these methods for 
wildcard certificates.


- Extensions based on BRs 7.1.2.4


Dimitris asked why using the cabfOrganizationIdentifier extension with 
the validation rules described in the EV Guidelines would not be 
considered acceptable for the OV level.


Ryan replied that there is no blanket "yes/no" answer because it is the 
CA's burden to demonstrate how it meets 7.1.2.4 a and b. Tha CA can't 
make up their own rules. Even using the same extension OID that is 
specifically designed for EV Certificates in an OV Certificate might be 
considered to fail b (misleading). In the email there was an example to 
use orgId and there was extensive discussion in the context of LEIs and 
why there has not been any acceptable method proposed that can 
demonstrate both that the Applicant is entitled to assert that 
information and that this information has been appropriately verified. 
The current proposed methods to verify the organization identifier do 
not meet 7.1.2.4 a or b. Some private EKUs have also been included and 
CAs have demonstrated how 7.1.2.4 a and b apply. It would be best to 
start from a position that this is not permitted and work to demonstrate 
how 7.1.2.4 a and b are fulfilled.


Dimitris clarified that he had VAT in mind, because that's in the 
current EV Guidelines so it is used in the public Internet, with clear 
validation rules so why can't a CA use this in an OV Certificate.


Ryan said that the link between the VAT number and an organization 
relies on the strong organization validation that is described in the EV 
Guidelines. The same level of assurance for organization validation does 
not apply in OV Certificates. If a CA uses this information in an OV 
Certificate, they have to demonstrate that that validation is the same 
but in the example Dimitris gave this is tied to an EV Certificate. You 
can't just take EV extension data and move it to an OV Certificate.


Tim commented that what Ryan said means that using an EV validation 
method for an extension related to an OV certificate in an OV validated 
organization, the validation method used is "too good" for an OV 
Certificate.


Ryan clarified that the ability to validate a VAT number is tied to the 
stronger validation method done for the organization. The same problem 
was with the LEI. How do you match that the LEI number is actually 
issued to the organization asserted in the subject and this is where LEI 
is messy because you need to figure out how to do that mapping. VAT is 
roughly the same. You have an organization validated to some level, OV, 
that doesn't give as strong validation as EV that you are actually 
dealing with the specific organization referenced in that VAT number. So 
you can't just add the VAT number because in order to validate that it 
assumes you have strongly validated data to match against which is the 
output of the EV Validation process.


Tim disagreed. Validating an organization at the OV level means that the 
identity of that organization has been validated at that level. So we 
already have an organization there and we just need to validate the VAT 
number against that organization. The level of rigor is that of an OV level.


Dimitris added to Tim's point that once an organization is validated at 
the OV level, the mapping between the organization and the VAT number is 
easy.


Ryan responded that there are different levels of organization 
validation and the orgID and the corresponding extension relies on the 
higher assurance organization validation following the EV process. The 
specific example that Dimitris described is not allowed. In any case, he 
suggested that any CA should consider that something is not allowed and 
work on the 7.1.2.4 language to demonstrate that it meets the 
requirements. Fully copying an extension specifically designed for an EV 
Certificate described in the EV Guidelines and using it in the BRs does 
not automatically meet 7.1.2.4 requirements and Ryan believes it 
misleads Relying Parties about the information verified by the CA, 
because it’s an extension defined for EV certificates. The CA also needs 
to demonstrate that this extension is technically relevant in the 
context of the public Internet, which is not just “it’s useful”.


Alternatively, if it’s not technically relevant to TLS certificates, 
then you can include it as an extension OID that is specific to each 
Applicant, as discussed in 7.1.2.4(a)(i). However, you can’t just reuse 
existing extensions from other profiles, because of 7.1.2.4(b), and for 
something like VAT numbers, it doesn’t pass the sniff test for 
7.1.2.4(a)(ii)


- Certificate Profiles


No specific progress on the certificate profiles.


Ryan reported that automation landed in the servercert repository to 
automatically build docx, pdf versions. Ryan tested tables with "column 
span" and other formatting approaches trying to improve readability and 
preview how things look in the produced pdf, docx files. "Column span" 
is currently not supported as it does in the spreadsheet. Pandoc added 
support this past July/August but it's not yet integrated in the 
"pdf-writer" or "docx-writer".


Everyone that syncs/forks the servercert repository should be in a 
position to see how PDFs are produced and tweak the markdown for better 
table representation.


Tim asked Ryan how frequently do we use "Column span" on the produced 
docs. Ryan said the current documents don't support it but the Google 
spreadsheet uses it extensively. He is still working on these tables to 
find a good solution.


The Subcommittee decided to cancel the call on December 31st.


Next call is scheduled for the Dec 17th


Adjurned




-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/validation/attachments/20201218/24aa02ed/attachment-0001.html>


More information about the Validation mailing list