I'm willing to endorse. On Thu, Feb 8, 2024 at 10:52 AM Inigo Barreira via Servercert-wg < servercert-wg@cabforum.org> wrote:
> Hi, > > > > As mentioned in the past SCWG call, I´m looking for 2 endorsers for this > ballot. > > > > Regards > > > > *De:* Servercert-wg <servercert-wg-boun...@cabforum.org> *En nombre de *Inigo > Barreira via Servercert-wg > *Enviado el:* viernes, 19 de enero de 2024 13:28 > *Para:* CA/B Forum Server Certificate WG Public Discussion List < > servercert-wg@cabforum.org>; Dimitris Zacharopoulos (HARICA) < > dzach...@harica.gr>; Bruce Morton <bruce.mor...@entrust.com>; Tim > Hollebeek <tim.holleb...@digicert.com> > *Asunto:* Re: [Servercert-wg] SC-065: Convert EVGs into RFC 3647 format > pre-ballot > > > > CAUTION: This email originated from outside of the organization. Do not > click links or open attachments unless you recognize the sender and know > the content is safe. > > > > Hi all, > > > > As per yesterday´s SCWG call, I´ve also updated the BRs with the new > section numbers of the EVG. Only 2 sections have been affected and > therefore updated. > > Section 3.2.2.4.7 > > EVG 11.14.3 à 3.2.2.14.3 > > > > Section 7.1.2.7.5 > > EVG 9.2 à 7.1.4.2 > > > > You can find all the information in the PR 440, EVGs based on RFC3647 by > barrini · Pull Request #440 · cabforum/servercert (github.com) > <https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fcabforum%2Fservercert%2Fpull%2F440%2Fcommits&data=05%7C02%7Cinigo.barreira%40sectigo.com%7Ce95ecbc067c243eda3a008dc18ea0876%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C638412640743467686%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=HdTqG7oNDVDzJW8NzNbPoh5mrTVqdWcP08%2FGy7bmr30%3D&reserved=0> > > First, I had to update the current version of the BRs I was working with > (2.0.0) to the current one (2.0.2) and then make the changes to the newest > one. > > > > Regards > > > > *De:* Inigo Barreira <inigo.barre...@sectigo.com> > *Enviado el:* viernes, 15 de diciembre de 2023 12:42 > *Para:* Inigo Barreira <inigo.barre...@sectigo.com>; CA/B Forum Server > Certificate WG Public Discussion List <servercert-wg@cabforum.org>; > Dimitris Zacharopoulos (HARICA) <dzach...@harica.gr>; Bruce Morton < > bruce.mor...@entrust.com>; Tim Hollebeek <tim.holleb...@digicert.com> > *Asunto:* RE: [Servercert-wg] SC-065: Convert EVGs into RFC 3647 format > pre-ballot > > > > Hi everyone > > > > As per last week discussion during the SCWG, we agreed to follow section 6 > of the RFC 3647 for the new EVG format. > > With that in mind, I´ve updated the correspondent PR (#440) to reflect it > that way, so: > > - Changed section 1.1 name from scope to overview > - Created a new section 3.2.1 for possession of the private key > - Moved all the other stuff of the old section 11 to a “new” section > 3.2.2 for organization identity. > - Also created the remaining ones, 3.2.3, 3.2.4, etc. > - Update section 8 removing section 8.1 and renumbering the others and > putting the self audits under 8.1 and leaving section 8.7 for readiness > audits because don´t know where it can fit better (this section does not > exist in RFC 3647 section 6) > - Checked all links > > > > In any case, see the comparison here: Comparing > 90a98dc7c1131eaab01af411968aa7330d315b9b...238ff99fbe04f2aa24f2c58910d8133f2283f11e > · cabforum/servercert (github.com) > <https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fcabforum%2Fservercert%2Fcompare%2F90a98dc7c1131eaab01af411968aa7330d315b9b...238ff99fbe04f2aa24f2c58910d8133f2283f11e&data=05%7C02%7Cinigo.barreira%40sectigo.com%7Ce95ecbc067c243eda3a008dc18ea0876%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C638412640743477514%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=DfuivpL6hUVdFhvr3T8r%2FYdniz%2Bvdh5zkXiRTAXds00%3D&reserved=0> > > > > If you´re ok with this change, we can move forward a propose the ballot > for which I´ll need 2 endorsers. > > > > Regards > > > > *De:* Servercert-wg <servercert-wg-boun...@cabforum.org> *En nombre de *Inigo > Barreira via Servercert-wg > *Enviado el:* jueves, 7 de diciembre de 2023 13:08 > *Para:* Dimitris Zacharopoulos (HARICA) <dzach...@harica.gr>; Bruce > Morton <bruce.mor...@entrust.com>; CA/B Forum Server Certificate WG > Public Discussion List <servercert-wg@cabforum.org>; Tim Hollebeek < > tim.holleb...@digicert.com> > *Asunto:* Re: [Servercert-wg] SC-065: Convert EVGs into RFC 3647 format > pre-ballot > > > > CAUTION: This email originated from outside of the organization. Do not > click links or open attachments unless you recognize the sender and know > the content is safe. > > > > Hi there, > > > > See the comparing one. > > Comparing > 90a98dc7c1131eaab01af411968aa7330d315b9b...13b4f85a494fefa52510512a2fb3c4d7c77a7a36 > · cabforum/servercert (github.com) > <https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fcabforum%2Fservercert%2Fcompare%2F90a98dc7c1131eaab01af411968aa7330d315b9b...13b4f85a494fefa52510512a2fb3c4d7c77a7a36&data=05%7C02%7Cinigo.barreira%40sectigo.com%7Ce95ecbc067c243eda3a008dc18ea0876%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C638412640743484475%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=15xO0GZKZBJbW3egMxmzA4aQLO%2FVD5pm4PXI5J6pEEc%3D&reserved=0> > > > > Regards > > > > *De:* Dimitris Zacharopoulos (HARICA) <dzach...@harica.gr> > *Enviado el:* lunes, 4 de diciembre de 2023 22:18 > *Para:* Bruce Morton <bruce.mor...@entrust.com>; Inigo Barreira < > inigo.barre...@sectigo.com>; CA/B Forum Server Certificate WG Public > Discussion List <servercert-wg@cabforum.org>; Tim Hollebeek < > tim.holleb...@digicert.com> > *Asunto:* Re: [Servercert-wg] SC-065: Convert EVGs into RFC 3647 format > pre-ballot > > > > CAUTION: This email originated from outside of the organization. Do not > click links or open attachments unless you recognize the sender and know > the content is safe. > > > > > > On 4/12/2023 9:22 μ.μ., Bruce Morton wrote: > > I thought an intriguing promise of doing documents in Github and in the > same format is that we would see the requirements in the same section, > which would allow for better management. Also, the proposal Paul brought > forward for the BR of BRs would work much better if we use the same > sections. I guess I am encouraging the move of EV from a non-standard > format to a sort of standard RFC 3647 format would be to help provide > document alignment. > > > > +1 to Dimitris original suggestion. > > > > - https://github.com/cabforum/code-signing/compare/main...importEVG > > <https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fcabforum%2Fcode-signing%2Fcompare%2Fmain...importEVG&data=05%7C02%7Cinigo.barreira%40sectigo.com%7Ce95ecbc067c243eda3a008dc18ea0876%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C638412640743490220%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=jobRHX%2Fhq5%2Bnbg%2BtN3SB47BWx6%2FW9ie6G5sMdBI14X8%3D&reserved=0> > > This is currently WIP, maintaining the numbering of RFC 3647 section 6, > and moving the EV Guidelines sections referenced by the CSBRs into new > sections. We've done these conversions in the past and they worked pretty > well, leading to consistently structured policy documents across the > ecosystem. > > It's not perfect but it tries to move requirements to where RFC 3647 and > the BRs expect them to be. For example, section 11.14 of the EV Guidelines > talks about re-use of existing documentation which fits into section 4.2.1 > of the BRs. > > > Thanks, > Dimitris. > > > > > > Thanks, Bruce. > > > > *From:* Servercert-wg <servercert-wg-boun...@cabforum.org> > <servercert-wg-boun...@cabforum.org> *On Behalf Of *Inigo Barreira via > Servercert-wg > *Sent:* Monday, December 4, 2023 2:15 PM > *To:* Dimitris Zacharopoulos (HARICA) <dzach...@harica.gr> > <dzach...@harica.gr>; Tim Hollebeek <tim.holleb...@digicert.com> > <tim.holleb...@digicert.com> > *Cc:* CA/B Forum Server Certificate WG Public Discussion List > <servercert-wg@cabforum.org> <servercert-wg@cabforum.org> > *Subject:* [EXTERNAL] Re: [Servercert-wg] SC-065: Convert EVGs into RFC > 3647 format pre-ballot > > > > Dimitris, I think that we should focus on the EVG not on the CP/CPS. The > CA´s CP/CPS will have that 3. 2. 1 section because it´s in the TLS BRs but > that does not mean that the EVG must have also that section 3. 2. 1 (BTW, > the section exist in the > > Dimitris, > > > > I think that we should focus on the EVG not on the CP/CPS. The CA´s CP/CPS > will have that 3.2.1 section because it´s in the TLS BRs but that does not > mean that the EVG must have also that section 3.2.1 (BTW, the section exist > in the TLS BRs but with no content). At the end of the day, every CA > issuing TLS certs will have to follow the TLS BRs and EVGs and then > accommodate their CP/CPSes according to both documents. > > I understand your point to be stricter in the implementation of that > specific point but for every CA to change/update their current CP/CPS with > the new EVG in the RFC 3647 format, would find it easier to where to make > those changes/adjustments in their own CP/CPS if we can convert easily the > current section 11 into 3.2 and not to start looking into different numbers > to make that change. > > > > Regards > > > > *De:* Dimitris Zacharopoulos (HARICA) <dzach...@harica.gr> > *Enviado el:* lunes, 4 de diciembre de 2023 20:02 > *Para:* Tim Hollebeek <tim.holleb...@digicert.com>; Inigo Barreira < > inigo.barre...@sectigo.com> > *CC:* CA/B Forum Server Certificate WG Public Discussion List < > servercert-wg@cabforum.org> > *Asunto:* Re: [Servercert-wg] SC-065: Convert EVGs into RFC 3647 format > pre-ballot > > > > CAUTION: This email originated from outside of the organization. Do not > click links or open attachments unless you recognize the sender and know > the content is safe. > > > > FWIW, there are informational RFCs that include SHOULD requirements (I > didn't check for other informational RFCs that might contain SHALL > requirements). Take a look at RFC 8894 > <https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Frfc8894__%3B!!FJ-Y8qCqXTj2!cDhQeVwolbnJ6hdDSRwEKs2w1lDqgYkiUHc4ApuZ3kUIV3BDxbQ0XAAIsJDbSWbqRevehayXBz_oc-H9s1zZDBI0YJAc7w%24&data=05%7C02%7Cinigo.barreira%40sectigo.com%7Ce95ecbc067c243eda3a008dc18ea0876%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C638412640743495910%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=mSFsB1K2scWMfovSBvYiWchCL7qq7rLc8eZPrCQPm1M%3D&reserved=0> > . > > I agree that there seems to be some ambiguity in the REQUIRED CP/CPS > structure but the entire reasoning behind using the "RFC 3647 format" was > to align CP and CPS documents so that comparisons can be made across > different CAs. If one CA reads that they must follow a 2-level structure > based on section 4, and another CA reads that they must follow the > structure of section 6 of the RFC, we're not meeting the goal for alignment > and easy comparisons. > > Digicert's CPS seems to follow the structure of section 6 of RFC 3647. Has > anyone spotted a CPS claiming compliance with the TLS BRs that is not > following the section 6 structure of 3647? > > If all existing public CAs follow the structure of section 6 of 3647 in > their CP/CPS documents, we can just clarify that the expectation is what > Ben mentioned in > https://github.com/BenWilson-Mozilla/pkipolicy/commit/1a94642cb95017cf382e4e93811db16a2342a806 > <https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Fgithub.com%2FBenWilson-Mozilla%2Fpkipolicy%2Fcommit%2F1a94642cb95017cf382e4e93811db16a2342a806__%3B!!FJ-Y8qCqXTj2!cDhQeVwolbnJ6hdDSRwEKs2w1lDqgYkiUHc4ApuZ3kUIV3BDxbQ0XAAIsJDbSWbqRevehayXBz_oc-H9s1zZDBIIavReJg%24&data=05%7C02%7Cinigo.barreira%40sectigo.com%7Ce95ecbc067c243eda3a008dc18ea0876%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C638412640743502037%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=prWDv%2Ffbsj1Hh53PTh46rU6R9bOLZx77HmNd2ePaZi0%3D&reserved=0>, > so that we address this ambiguity. We probably don't even need an effective > date if it causes no issue on existing CAs. > > My point is that if we leave this open to interpretation, we can't compare > CP/CPS sections across multiple CAs efficiently, and this defeats the whole > purpose of the requirement to structure CP/CPS documents according to RFC > 3647. We might as well abandon the idea of converting the EV Guidelines > into that format. > > I believe that the intent has always been to enforce a "stricter" > alignment. But if indeed there are deviations, I'd support some stricter > language to align CP/CPS documents according to section 6 of RFC 3647 even > with a future effective date :) > > > Dimitris. > > On 4/12/2023 7:27 μ.μ., Tim Hollebeek wrote: > > Yeah, the fact that the section 6 outline goes deeper than the actual > described format in section 4 is annoying, and you’re right, it’s probably > the source of these disagreements. I always look at section 4, because it > has the actual guidance about what sort of information should be considered > for inclusion. > > > > This is what happens when people try to turn informational documents into > normative requirements. You have to try to interpret what phrases like > “are strongly advised to adhere”, which isn’t even a RFC 2119 SHOULD. And > it can’t even be a SHOULD, because as an informational RFC, it is > prohibited from having requirements, even SHOULDs! That’s why it’s written > that way. Also, informational RFCs are not examined as closely for > inconsistencies (because there are no requirements!) which is how > divergences like section 4 vs 6 happen. It wasn’t intended to be used as a > compliance document. > > > > I still think what Inigo did is perfectly fine, although there are lots of > other perfectly fine solutions, too. What we need to be discussing is > what’s best for us, not RFC 3647 requires, because RFC 3647 has infinite > leeway. As Aaron and I have been pointing out, you’ll find lots of > divergences at level three, and there’s even lots of additional content in > level two, just because a lot of newer content doesn’t really have a good > fit in RFC 3647. > > > > Now, that said, we might want to be more strict in the future, and if we > choose to do so, we can be. I just don’t want people overstating what the > rules actually are, because a lot of people’s time has been wasted > enforcing RFC 3647 in a way that is far stricter than was ever intended > (one of the reasons I’m so vocal on this issue is because I got this point > of view from one of the original authors). > > > > -Tim > > > > *From:* Dimitris Zacharopoulos (HARICA) <dzach...@harica.gr> > <dzach...@harica.gr> > *Sent:* Saturday, December 2, 2023 5:26 AM > *To:* Tim Hollebeek <tim.holleb...@digicert.com> > <tim.holleb...@digicert.com>; Inigo Barreira <inigo.barre...@sectigo.com> > <inigo.barre...@sectigo.com> > *Cc:* CA/B Forum Server Certificate WG Public Discussion List > <servercert-wg@cabforum.org> <servercert-wg@cabforum.org> > *Subject:* Re: [Servercert-wg] SC-065: Convert EVGs into RFC 3647 format > pre-ballot > > > > We still have a disagreement so please allow me one more attempt to > clarify my position because it seems you didn't check the links included in > my previous post. I will copy some of that text here for convenience. > > On 1/12/2023 11:31 μ.μ., Tim Hollebeek wrote: > > No. > > > > IETF has both Normative and Informative RFCs. While it is true that > compliance with a Normative RFC is voluntary, if you do choose to comply, > the RFC has requirements stated in RFC 2119 standards language that make it > clear what the compliance rules are. Informative RFCs like 3647 do not > have any normative requirements at all. They merely contain information. > > > > “all sections of the RFC 3647 framework” is fine, this covers the sections > enumerated in RFC 3647 section 4, which includes the TOP TWO levels of an > outline in numbered form, e.g. the requirements for section 3.2 are > described in RFC 3647 section 4.3.2. There is no RFC 3647 section 4.3.2.1, > which proves my point. RFC 3647 only has a two level outline structure. > > > I think I might have a hint on our disconnect. RFC 3647 has an indicative > Table of Contents in Chapter 6 ( > https://datatracker.ietf.org/doc/html/rfc3647#section-6 > <https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Frfc3647*section-6__%3BIw!!FJ-Y8qCqXTj2!cDhQeVwolbnJ6hdDSRwEKs2w1lDqgYkiUHc4ApuZ3kUIV3BDxbQ0XAAIsJDbSWbqRevehayXBz_oc-H9s1zZDBKp_QdGmg%24&data=05%7C02%7Cinigo.barreira%40sectigo.com%7Ce95ecbc067c243eda3a008dc18ea0876%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C638412640743508234%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=8rd8z6a28d9hEDfFSMfjNXw5I%2BtCcsO0xH%2Bj8GQ%2BPtQ%3D&reserved=0>) > outlining the proposed CP/CPS sections and subsections using 3 levels. > > Here is the text of the opening paragraph of that section (emphasis added): > > This section contains a recommended outline for a set of provisions, > > intended to serve as a checklist or (with some further development) a > > standard template for use by CP or CPS writers. Such a common > > outline will facilitate: > > > > (a) Comparison of two certificate policies during cross- > > certification or other forms of interoperation (for the purpose > > of equivalency mapping). > > > > (b) Comparison of a CPS with a CP to ensure that the CPS faithfully > > implements the policy. > > > > (c) Comparison of two CPSs. > > > > * In order to comply with the RFC, the drafters of a compliant CP or* > > * CPS are strongly advised to adhere to this outline.* While use of an > > alternate outline is discouraged, it may be accepted if a proper > > justification is provided for the deviation and a mapping table is > > provided to readily discern where each of the items described in this > > outline is provided. > > > The reason the CA/B Forum BRs were structured according to this outline > was to assist with comparisons between CP/CPS documents of different CAs, > making the review of these documents easier. > > That's why you see sections like 1.5.4 "CPS approval procedures" in the > BRs as an empty section with "No Stipulation". There are many such sections > in the BRs, all coming from section 6 of RFC 3647. > > I hope this is clearer now. > > > > BR Section 2.2 needs to be re-written, as there are no materials required > by RFC 3647 (because RFC 3647 contains no requirements). It needs to say > something like “structured in accordance with RFC 3647 and MUST include all > sections of the outline described in section 4” or something like that. > What it says right now doesn’t capture the intent that you correctly > summarized. > > > During the last couple of years reviewing CP/CPS documents, I saw some > uniformity at least in Publicly Trusted CAs, and they all seem to follow > the BRs structure which comes from the outline of section 6 of RFC 3647. > However, it's not a bad idea to further clarify BR section 2.2 to better > meet the expectations. > > > > The MSRP language is better, I think I may have made all of these same > points when it was being drafted, which is why it says “section and > subsection” (two levels) and uses “structured according to” and not > “complies with the requirements of”. > > > > But anyway, this is all background that supports what I’ve been saying all > along: BR 3.2 is a RFC 3647 section. BR 3.2.1 **is not** a RFC 3647 > required section, nor is it even a section that is even mentioned in RFC > 3647. If you don’t believe me, please go to RFC 3647, Section 4.3.2.1 and > read what it says. OH, WAIT, IT DOESN’T EXIST! 😊 > > > To my point, BR 3.2.1 IS an RFC 3647 required section as it is explicitly > mentioned in the outline of section 6 of RFC 3647: > > 3.2.1 Method to prove possession of private key > > > Details about the contents of that section can be found in the first > bullet of section 4.3.2 of RFC 3647 > <https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Frfc3647*section-4.3.2__%3BIw!!FJ-Y8qCqXTj2!cDhQeVwolbnJ6hdDSRwEKs2w1lDqgYkiUHc4ApuZ3kUIV3BDxbQ0XAAIsJDbSWbqRevehayXBz_oc-H9s1zZDBIL19sP_w%24&data=05%7C02%7Cinigo.barreira%40sectigo.com%7Ce95ecbc067c243eda3a008dc18ea0876%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C638412640743514196%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=9d2e2bKWp0WgBz0fi0Q%2B7H37BraKcy9HDykgU2hg0NE%3D&reserved=0>. > > > Does that make more sense? > > Dimitris. > > > > -Tim > > > > *From:* Dimitris Zacharopoulos (HARICA) <dzach...@harica.gr> > <dzach...@harica.gr> > *Sent:* Friday, December 1, 2023 1:04 PM > *To:* Tim Hollebeek <tim.holleb...@digicert.com> > <tim.holleb...@digicert.com>; Inigo Barreira <inigo.barre...@sectigo.com> > <inigo.barre...@sectigo.com> > *Cc:* CA/B Forum Server Certificate WG Public Discussion List > <servercert-wg@cabforum.org> <servercert-wg@cabforum.org> > *Subject:* Re: [Servercert-wg] SC-065: Convert EVGs into RFC 3647 format > pre-ballot > > > > Hi Tim, > > None of the IETF standards set policy unless they are invited by some > policy authority :) The BRs set such policy and "import" some documents, > such as RFC 5280, 3647 and others. > > The BRs in section 1.1 state: > > These Requirements do not address all of the issues relevant to the > issuance and management of Publicly-Trusted Certificates. In accordance > with RFC 3647 and to facilitate a comparison of other certificate policies > and CPSs (e.g. for policy mapping), this document includes all sections of > the RFC 3647 framework. However, rather than beginning with a "no > stipulation" comment in all empty sections, the CA/Browser Forum is leaving > such sections initially blank until a decision of "no stipulation" is made > > > In addition, section 2.2 states (emphasis added): > > The Certificate Policy and/or Certification Practice Statement MUST be > structured in accordance with RFC 3647 and *MUST include all material > required by RFC 3647*. > > > If you go back to the discussions when the CA/B Forum decide to align with > the "RFC 3647 format", we agreed to include each and every section of the > outline as a minimum set. > > MRSP states in section 3.3 (5) (again, emphasis added): > > 5. all CPs, CPSes, and combined CP/CPSes MUST be structured according to > RFC 3647 and MUST: > > - include *at least every section and subsection defined in RFC 3647*; > - only use the words "No Stipulation" to mean that the particular > document imposes no requirements related to that section; and > - contain no sections that are blank and have no subsections; > > > So, with all that considered, when we visit section 6 of RFC 3647 > <https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Frfc3647*section-6__%3BIw!!FJ-Y8qCqXTj2!cDhQeVwolbnJ6hdDSRwEKs2w1lDqgYkiUHc4ApuZ3kUIV3BDxbQ0XAAIsJDbSWbqRevehayXBz_oc-H9s1zZDBKp_QdGmg%24&data=05%7C02%7Cinigo.barreira%40sectigo.com%7Ce95ecbc067c243eda3a008dc18ea0876%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C638412640743520165%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=L9VbZRk1zuxMaDwZDNKCJDf36lHA7InzOJMYZAjD%2FPw%3D&reserved=0> > ("the outline"), the expectation is to include each and every section and > subsection of the outline (up to three levels). > > CAs are free to add MORE sections and subsections as they desire, just > like the BRs have done, but we can't escape or "hijack" an existing RFC > 3647 section number. The outline contains a specific section labeled as > "3.2.1 Method to prove possession of private key". That means we cannot > re-use the number 3.2.1 for something else. > > I hope this sounds reasonable to people. > > Dimitris. > > On 1/12/2023 6:51 μ.μ., Tim Hollebeek wrote: > > This is unfortunately wrong. There are lots of misconceptions about RFC > 3647 “compliance”. > > > > The first point is that RFC 3647 is an INFORMATIONAL RFC. You can see > this right at the top, where it says “Category: Informational”. This means > that it contains no requirements and it’s impossible to be out of > compliance with it. This is why I put quotes around “compliance”. Any > requirements around it need to come from elsewhere, for example, a root > program requirement that requires a particular document to be in RFC 3647 > format. But that’s vague and informal, because 3647 doesn’t have > requirements, it just has an outline and suggested contents. It’s not 100% > precise what “MUST be in RFC 3647 format” means, and we need to just > acknowledge that (specifying it precisely would be a colossal waste of > time). > > > > So what does “RFC 3647 format” mean? RFC 3647’s outline only covers the > first two levels. So “Section 3.2: Initial Identity Validation” is a RFC > 3647 section header, and most reasonable interpretations of “RFC 3647 > format” would require it to exist with that or a substantially similar name > and contents. > > > > Section 3.2.1, on the other hand, is not an RFC 3647 section. It’s common > to have a third level of headers that mirror the “bullet points” in the > suggested content for the section, but those are just unordered bullet > lists in RFC 3647. Claiming that section 3.2.1 of a document in RFC 3647 > must describe private key protection goes beyond what RFC 3647 says. > Section 3.2 just “contains the following elements”, so private key > protection is just one of several topics that one might discuss in section > 3.2. It could be section 3.2.1, but it could be elsewhere in 3.2, and it’s > perfectly fine for 3.2.1 to not exist, have different content, etc. > > > > Figuring out where section 11.1 goes is not trivial, but at first glance, > section 3.2 is not an unreasonable choice, and I can understand why Inigo > made it. And there isn’t a compliance reason why it can’t be section > 3.2.1, if that’s what we want. > > > > Of course, we could convert the recommended bulleted sections to a > numbered list of subsections (we often do elsewhere), in which case section > 3.2.1 could be “Private Key Protection” with contents “No Stipulation”. If > we do that, I suggest we follow the rest of the bullets as well. > > > > Either way works. > > > > -Tim > > > > *From:* Dimitris Zacharopoulos <dzach...@harica.gr> <dzach...@harica.gr> > *Sent:* Friday, December 1, 2023 10:48 AM > *To:* Inigo Barreira <inigo.barre...@sectigo.com> > <inigo.barre...@sectigo.com> > *Cc:* Tim Hollebeek <tim.holleb...@digicert.com> > <tim.holleb...@digicert.com>; CA/B Forum Server Certificate WG Public > Discussion List <servercert-wg@cabforum.org> <servercert-wg@cabforum.org> > *Subject:* Re: [Servercert-wg] SC-065: Convert EVGs into RFC 3647 format > pre-ballot > > > > We MUST comply with RFC 3647 which means that we must include sections > that are listed in the outline of 3647, and if we have nothing to say, we > leave it empty. We can't "hijack" the numbering just because we have no > requirements to describe. > > That's my interpretation of the RFC 3647 compliance. Perhaps others can > chime in and state their opinion. > > > Thanks, > > DZ. > > Dec 1, 2023 14:50:23 Inigo Barreira <inigo.barre...@sectigo.com>: > > Thanks Dimitris. > > I think that strictly speaking, in RFC 3647 this section is the 4.3.2 > Initial Identity Validation and the first bullet is about proving the > possession of the private key, but there´s no specific section other than > the general approach that we´ve implemented. > > That said, the current EVG does not include anything about the possession > of the private key because that´s covered in the TLS BRs so that section > does not exist in the EVGs and therefore I didn´t know how to > avoid/implement it. > > I decided to continue with the normal numbering for an easy checking, so > all 11 section is moved into section 3.2 and the rest of the sub-numbers do > not change (so 11.1 would be 3.2.1, 11.1.1 would be 3.2.1.1, etc.) > > I understand your point but I think we can´t create a section 3.2.1 for > private key possession because there´s no such a text in the EVGs (and > don´t think we should add anything new, even a NA for that) and don´t know > which other sections we can create under 3.2 that can break the current > equivalence, which again was done for an easy comparison. > > So, what would you suggest to “comply” with that? I don´t have a clear > idea. > > Regards > > *De:* Dimitris Zacharopoulos (HARICA) <dzach...@harica.gr> > *Enviado el:* jueves, 30 de noviembre de 2023 13:16 > *Para:* Inigo Barreira <inigo.barre...@sectigo.com>; Tim Hollebeek < > tim.holleb...@digicert.com>; CA/B Forum Server Certificate WG Public > Discussion List <servercert-wg@cabforum.org> > *Asunto:* Re: [Servercert-wg] SC-065: Convert EVGs into RFC 3647 format > pre-ballot > > CAUTION: This email originated from outside of the organization. Do not > click links or open attachments unless you recognize the sender and know > the content is safe. > > Inigo, > > As I am working to migrate the EV Guidelines into the EV Code Signing > Baseline Requirements I took a look at the mapping you provided for the EV > Guidelines and noticed that you are proposing migration of EVG section 11.1 > into section 3.2.1. This particular section is labeled "Method to prove > possession of private key" in RFC 3647 so I don't think it is appropriate. > I think it's best to create new subsections under 3.2. > > Thanks, > Dimitris. > > On 8/9/2023 7:54 μ.μ., Inigo Barreira wrote: > > Hi all, > > > > Attached you´ll find the EVG v1.8.0 with comments in all sections > indicating where those sections, and the content, have been moved into the > new EVG RFC3647 format. So, with this document, plus the redlined version, > I hope you can have now a clearer view of the changes done. > > Let me know if you need anything else to clarify the new version. > > > > Regards > > > > *De:* Inigo Barreira <inigo.barre...@sectigo.com> > <inigo.barre...@sectigo.com> > *Enviado el:* martes, 29 de agosto de 2023 17:06 > *Para:* Tim Hollebeek <tim.holleb...@digicert.com> > <tim.holleb...@digicert.com>; Dimitris Zacharopoulos (HARICA) > <dzach...@harica.gr> <dzach...@harica.gr>; CA/B Forum Server Certificate > WG Public Discussion List <servercert-wg@cabforum.org> > <servercert-wg@cabforum.org> > *Asunto:* RE: [Servercert-wg] SC-065: Convert EVGs into RFC 3647 format > pre-ballot > > > > Thanks Dimitris and Tim. > > I did something of that internally but didn´t reflect on the document, so > will try to reproduce to have it clearer. > > > > OTOH, and as indicated in the PR, the whole section 11 has been placed in > section 3.2 keeping the rest of the numbering. So, for example: > > > > EVG EVG3647 > > 11.1 3.2.1 > > 11.1.1 3.2.1.1 > > 11.1.2 3.2.1.2 > > 11.1.3 3.2.1.3 > > 11.2 3.2.2 > > 11.2.1 3.2.2.1 > > ….. …. > > 11.13 3.2.13 > > 11.14 3.2.14 > > 11.14.1 3.2.14.1 > > 11.14.2 3.2.14.2 > > 11.14.3 3.2.14.3 > > > > Hope this can clarify the main difficult that I found in the document, > where to place it and how. > > > > Regards > > > > *De:* Tim Hollebeek <tim.holleb...@digicert.com> > *Enviado el:* martes, 29 de agosto de 2023 16:59 > *Para:* Dimitris Zacharopoulos (HARICA) <dzach...@harica.gr>; Inigo > Barreira <inigo.barre...@sectigo.com>; CA/B Forum Server Certificate WG > Public Discussion List <servercert-wg@cabforum.org> > *Asunto:* RE: [Servercert-wg] SC-065: Convert EVGs into RFC 3647 format > pre-ballot > > > > CAUTION: This email originated from outside of the organization. Do not > click links or open attachments unless you recognize the sender and know > the content is safe. > > > > Yes, exactly. I would like to see a list that shows that EVG-classic > section 1.4 is now in EVG-3647 section 4.1. Then I can look at where the > new text landed, see how the conversion was handled, we can all verify that > nothing was lost or left out, etc. > > > > Without that, anyone attempting to review the document is forced to > recreate the mapping just to figure out where everything went and that > nothing was missed or put in the wrong place. Redlines are not sufficient > when large amounts of text are moving around to different places. > > > > I’m saying this because from my spot-checking, the conversion appears to > be pretty good, and I’d like to be able to do a final verification that > it’s mostly correct so I can endorse. > > > > -Tim > > > > *From:* Dimitris Zacharopoulos (HARICA) <dzach...@harica.gr> > *Sent:* Tuesday, August 29, 2023 7:58 AM > *To:* Inigo Barreira <inigo.barre...@sectigo.com>; CA/B Forum Server > Certificate WG Public Discussion List <servercert-wg@cabforum.org>; Tim > Hollebeek <tim.holleb...@digicert.com> > *Subject:* Re: [Servercert-wg] SC-065: Convert EVGs into RFC 3647 format > pre-ballot > > > > Hi Inigo, > > You can take some guidance from previous successful efforts to convert > existing documents into RFC 3647 format. The latest attempt was in the Code > Signing BRs conversion in May 2022. Check out the mapping document and the > comments in the ballot discussion period > <https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Flists.cabforum.org%2Fpipermail%2Fcscwg-public%2F2022-May%2F000795.html__%3B!!FJ-Y8qCqXTj2!cDhQeVwolbnJ6hdDSRwEKs2w1lDqgYkiUHc4ApuZ3kUIV3BDxbQ0XAAIsJDbSWbqRevehayXBz_oc-H9s1zZDBLzwUxa3A%24&data=05%7C02%7Cinigo.barreira%40sectigo.com%7Ce95ecbc067c243eda3a008dc18ea0876%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C638412640743526088%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=E%2BLAEuFHaNu26dqWFjor1uKzUv3aqQb%2F0WTae4u6vVU%3D&reserved=0> > . > > For each existing section/paragraph, it would be nice to have a comment > describing where that existing language will land in the converted document > (destination). This will allow all existing text to be accounted for. > > During this process, you might encounter duplicate or redundant text which > needs to be flagged accordingly. You might also get into some uncertainty > as to which RFC3647 section is a best fit for existing text that might > require additional discussion. > > I hope this helps. > > > Dimitris. > > On 29/8/2023 12:42 μ.μ., Inigo Barreira via Servercert-wg wrote: > > Hi Tim, > > > > See attached redlined and current versions. I just used what Martijn > suggested yesterday but let me know if this is what you were looking for. > > > > Regards > > > > *De:* Tim Hollebeek <tim.holleb...@digicert.com> > <tim.holleb...@digicert.com> > *Enviado el:* lunes, 28 de agosto de 2023 19:49 > *Para:* Inigo Barreira <inigo.barre...@sectigo.com> > <inigo.barre...@sectigo.com>; CA/B Forum Server Certificate WG Public > Discussion List <servercert-wg@cabforum.org> <servercert-wg@cabforum.org> > *Asunto:* RE: SC-065: Convert EVGs into RFC 3647 format pre-ballot > > > > CAUTION: This email originated from outside of the organization. Do not > click links or open attachments unless you recognize the sender and know > the content is safe. > > > > Thanks for doing this Inigo … I know re-organizations like this are a lot > of work and fall very much in the category of “important but not fun”. So > thanks for taking an initial stab at this. > > > > Is there a mapping that shows where all the original text ended up? I > think that’s going to be essential for people to be able to review this. I > did some spot checking, and your conversion looks pretty good, but I wasn’t > able to do a more detailed review without a mapping. > > > > -Tim > > > > *From:* Servercert-wg <servercert-wg-boun...@cabforum.org> *On Behalf Of > *Inigo > Barreira via Servercert-wg > *Sent:* Monday, August 28, 2023 5:20 AM > *To:* CA/B Forum Server Certificate WG Public Discussion List < > servercert-wg@cabforum.org> > *Subject:* [Servercert-wg] SC-065: Convert EVGs into RFC 3647 format > pre-ballot > > > > Hello, > > The current Extended Validation Guidelines (EVGs) are written in a > non-standardized format. For many years it has been discussed to convert > this document into the RFC 3647 format and follow the standardized model > for this type of documents. > > > > Given that this has been known for several years, I have prepared the > following ballot text, which converts the EVGs into the RFC 3647 format: > > EVGs based on RFC3647 by barrini · Pull Request #440 · cabforum/servercert > (github.com) > <https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Furl.avanan.click%2Fv2%2F___https%3A%2Fgithub.com%2Fcabforum%2Fservercert%2Fpull%2F440___.YXAzOmRpZ2ljZXJ0OmE6bzoyOGIxNWVhZGVmZDlkZTM0NjQzZTA3YTlmYTA2MzM5YTo2OmExZWM6NGZmMGEzM2U0ZWZjOTU4MTM1NWRkNjU3ZDE5YjU3Y2YxNzg1NWU0ZTVjYzkzY2NjM2M0MWU5MzEyYzJmZTQ0NzpoOkY__%3B!!FJ-Y8qCqXTj2!cDhQeVwolbnJ6hdDSRwEKs2w1lDqgYkiUHc4ApuZ3kUIV3BDxbQ0XAAIsJDbSWbqRevehayXBz_oc-H9s1zZDBKpiKVP6w%24&data=05%7C02%7Cinigo.barreira%40sectigo.com%7Ce95ecbc067c243eda3a008dc18ea0876%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C638412640743532259%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=MPp0hhMFncU1F3DR2A20h8zmChrAX9HiOi4IUJvn1Sk%3D&reserved=0> > > > > I am currently seeking two endorsers as well as any feedback on the ballot > content itself (wording, effective dates, etc.). > > > > Thanks, > > > > > > _______________________________________________ > > Servercert-wg mailing list > > Servercert-wg@cabforum.org > > https://lists.cabforum.org/mailman/listinfo/servercert-wg > <https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Flists.cabforum.org%2Fmailman%2Flistinfo%2Fservercert-wg__%3B!!FJ-Y8qCqXTj2!cDhQeVwolbnJ6hdDSRwEKs2w1lDqgYkiUHc4ApuZ3kUIV3BDxbQ0XAAIsJDbSWbqRevehayXBz_oc-H9s1zZDBI3Tfxaxw%24&data=05%7C02%7Cinigo.barreira%40sectigo.com%7Ce95ecbc067c243eda3a008dc18ea0876%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C638412640743539011%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=4iNv5o3e0pVrs0aBpI8HdC8NrweEBsMLmnePwnWj7tQ%3D&reserved=0> > > > > > > > > > > *Any email and files/attachments transmitted with it are intended solely > for the use of the individual or entity to whom they are addressed. If this > message has been sent to you in error, you must not copy, distribute or > disclose of the information it contains. Please notify Entrust immediately > and delete the message from your system.* > > > _______________________________________________ > Servercert-wg mailing list > Servercert-wg@cabforum.org > https://lists.cabforum.org/mailman/listinfo/servercert-wg >
_______________________________________________ Servercert-wg mailing list Servercert-wg@cabforum.org https://lists.cabforum.org/mailman/listinfo/servercert-wg