And, for section 3.3 (CPs and CPSes), I am thinking that the same change
should be made from 365 to 366 days, and that item 4 would read, "all CPs,
CPSes, and combined CP/CPSes MUST be reviewed and updated as necessary at
least once every 366 days."
Ben

On Wed, Jul 26, 2023 at 3:35 PM Ben Wilson <bwil...@mozilla.com> wrote:

> All,
> For submission of self-assessments, what do people think about "at least
> every 366 days" instead of the original proposal of 365 days?  That gives
> flexibility for leap years.
> Ben
>
> On Thu, Jun 29, 2023 at 9:48 PM Antti Backman <anttidan...@gmail.com>
> wrote:
>
>> I concur to Bruce's consern,
>>
>> Albeit not directly conserning this discussion, we already have this
>> issue in our hands:
>> https://www.chromium.org/Home/chromium-security/root-ca-policy/#6-annual-self-assessments
>>
>> But yes, this will be moving target, I would propose that this could be
>> tight together with the end of audit period, which anyhow is hardcoded
>> date. And maybe then similarly to posting audit reports having some fixed
>> amount of days after the end of audit period this should (at least and at
>> latest) be submitted.
>>
>> Antti Backman
>> Telia Company
>>
>> torstai 29. kesäkuuta 2023 klo 22.36.32 UTC+3 Bruce Morton kirjoitti:
>>
>>> The issue I have with "at least every 365 days" is that I like to put
>>> something on the schedule and do it the same month every year. We do this
>>> with our annual compliance audit. If we have to provide the self-assessment
>>> at least every 365 days, then each year it will be earlier to provide some
>>> insurance time to meet the requirement. Is there any way we can provide the
>>> requirement to stop this progression? Something like "on an annual basis,
>>> but not more longer than 398-days".
>>>
>>> On Friday, June 23, 2023 at 12:05:03 PM UTC-4 Ben Wilson wrote:
>>>
>>>> All,
>>>>
>>>> Historically, Mozilla has required that CAs perform an annual
>>>> Self-Assessment of their compliance with the CA/Browser Forum's TLS
>>>> Baseline Requirements and Mozilla's Root Store Policy (MRSP).  See
>>>> https://wiki.mozilla.org/CA/Compliance_Self-Assessment. While there
>>>> has not been any requirement that CAs submit their self-assessments to
>>>> Mozilla, several CAs have had it a practice to do so.
>>>>
>>>> We would like to propose that the operators of TLS CAs (those with the
>>>> websites trust bit enabled) be required to submit these self-assessments
>>>> annually by providing a link to them in the Common CA Database (CCADB).
>>>> Therefore, we are proposing a new section 3.4 in the MRSP to read as
>>>> follows:
>>>>
>>>> ---- Begin Draft for MRSP-----
>>>>
>>>> 3.4 Compliance Self-Assessments
>>>> Effective January 1, 2024, CA operators with CA certificates capable of
>>>> issuing working TLS server certificates MUST complete a [Compliance
>>>> Self-Assessment](https://www.ccadb.org/cas/self-assessment) at least
>>>> every 365 days and provide the Common CA Database with the location where
>>>> that Compliance Self-Assessment can be retrieved.
>>>>
>>>> ----- End Draft for MRSP -----
>>>>
>>>> The effective date of January 1, 2024, is not intended to result in a
>>>> huge batch of self-assessments being submitted that day. Rather, we would
>>>> hope that CAs begin providing the locations of their self-assessments as
>>>> soon as possible by completing the "Self-Assessment" section under the
>>>> "Root Information" tab of an Add/Update Root Case in the CCADB
>>>> <https://www.ccadb.org/cas/updates>. (The field for this information
>>>> already exists in the CCADB under the heading "Self-Assessment".)
>>>>
>>>> Please provide any comments or suggestions.
>>>>
>>>> Thanks,
>>>>
>>>> Ben and Kathleen
>>>>
>>>>

-- 
You received this message because you are subscribed to the Google Groups 
"dev-security-policy@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to dev-security-policy+unsubscr...@mozilla.org.
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaaxbRDcz6wPr1U-Q8bH1MqhYQbR99aKeRzm2u-L_Ht7VA%40mail.gmail.com.

Reply via email to