[cabf_validation] Draft profiles work
Ryan Sleevi
sleevi at google.com
Tue Mar 23 23:04:22 UTC 2021
While I'll be unable to make Thursday's call, I did want to share what I
believe is a "mostly done" attempt to synthesize our profiles work into the
BRs.
You can access the diff at https://github.com/sleevi/cabforum-docs/pull/36
(which shows the diff against SC41), and I've attached a rendered PDF
version, which you can also access from the PR.
There's obviously a lot of polish that can be done, and there are still
areas that have outstanding questions to the list or need to be filled in,
but I *think* enough of the thorny issues are sorted to give folks a chance
to share their impressions.
A random assortment of known issues/open questions:
- For fields which are SEQUENCEs of multiple structures (e.g. AIA, CRL
DP, certificatePolicies), what's the best way to communicate requirements?
I tried to find a good balance here, but curious folks takes. See Section
7.1.2.6.9 as an example of this.
- Lots of polish issues - feel free to add your own pet issue
- Still need to fix the page margins so that the page footer doesn't
run off the page (this also affects how the tables are laid out
whether on
a new page or not)
- Should we left-align the tables or keep them centered?
- Should we add labels to every table?
- How to express informative text, like in 7.1.2.6.11 - is there a
better way to provide context?
- Still removing various bits of vestigial text (like 7.1.2.4 All
Certificates)
- How to express a good MUST/MAY requirement (e.g. see 7.1.6.3 around
locality/stateOrProvince)
- Does having the footnote repeated on every page it's used help or
hurt, for common fields like non-critical nameConstraints.
- Weird table caption wrapping (see 7.1.2.2.3)
- The font size for the monospaced font appears to be slightly larger
than for our default font
- Various other weird bits
- e.g. for Subscriber certs, we allow the emailProtection EKU, but
the RFC 822 name SAN is prohibited, so are we effectively saying folks
should use the deprecated emailAddress subject attribute? Or
should we just
make it clear that emailProtection+TLS == security disaster
- Separately discussed with DigiCert and Sectigo the handling for
'XX' certs, since they're the only ones using them. This approach may not
be final.
- Whether the certificate hierarchy makes sense, and if there are other
use cases missing
- For CAs, we have variance based on (Cross-cert vs not) x
(Affiliated with issuing CA vs not) x (TLS capable vs not) x (Technically
Constrained vs not)
- For Subscriber/Server certs, we have variance based on (level of
validation) x (country/state/locality information)
- I need to take another pass documenting all of the bits about the MUST
NOT / SHOULD NOT, which were derived from various intersections of our
existing requirements
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/validation/attachments/20210323/a7f096f9/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: BR.pdf
Type: application/pdf
Size: 330048 bytes
Desc: not available
URL: <http://lists.cabforum.org/pipermail/validation/attachments/20210323/a7f096f9/attachment-0001.pdf>
More information about the Validation
mailing list