Hi Ben,

Thank you! I believe those combine with the previous commits to produce
this redline, which looks good to me:
https://github.com/cabforum/servercert/compare/41f01640748fa612386f8b1a3031cd1bff3d4f35...682488a832db5b6b4fcdd4cd7cbd86ae9541453e

Aaron


On Tue, Apr 23, 2024 at 4:25 AM Ben Wilson <bwil...@mozilla.com> wrote:

> Dimitris, Aaron, Wayne, and Others,
> We are working on improving the language of the ballot.
> Here are a couple of versions for you to review and provide feedback on.
> https://github.com/cabforum/servercert/commit/d0d962e04bd81a71ebf71a7c45a015cbc75ac979
>
>
> https://github.com/cabforum/servercert/commit/682488a832db5b6b4fcdd4cd7cbd86ae9541453e
> Thanks,
> Ben
>
>
> On Sun, Apr 21, 2024 at 8:29 PM Dustin Hollenback via Servercert-wg <
> servercert-wg@cabforum.org> wrote:
>
>> Thank you all for the great feedback! We’ll take this offline and re-work
>> it based on the input.
>>
>>
>>
>> *From:* Servercert-wg <servercert-wg-boun...@cabforum.org> *On Behalf Of
>> *Dimitris Zacharopoulos (HARICA) via Servercert-wg
>> *Sent:* Sunday, April 21, 2024 1:24 AM
>> *To:* Aaron Gable <aa...@letsencrypt.org>; CA/B Forum Server Certificate
>> WG Public Discussion List <servercert-wg@cabforum.org>
>> *Subject:* [EXTERNAL] Re: [Servercert-wg] Discussion Period Begins -
>> Ballot SC-071: Subscriber Agreement and Terms of Use Consolidation
>>
>>
>>
>>
>>
>> On 19/4/2024 9:54 μ.μ., Aaron Gable wrote:
>>
>> On Fri, Apr 19, 2024 at 11:07 AM Dimitris Zacharopoulos (HARICA) via
>> Servercert-wg <servercert-wg@cabforum.org> wrote:
>>
>> What happens if the SA/ToS document changes? I had the impression that
>> the ACME client would be able to see the new version and ask that the
>> updated version is accepted. How does this process work in practice?
>>
>>
>>
>> The ACME protocol itself only has one mechanism for updating the Terms of
>> Service: respond to all requests with HTTP 403 Forbidden, error type
>> "urn:ietf:params:acme:error:userActionRequired", and a link to a URL where
>> a human can take action to agree to the new terms. Breaking every single
>> ACME client until their operator takes manual action on a webpage is
>> unacceptable and unrealistic, so ACME server operators do not actually do
>> this.
>>
>>
>> The ACME protocol was designed to support popular use cases promoting
>> automation. The level of automation can be decided by the Applicant. For
>> example, if an Applicant chooses the dns-01 challenge and wants to manually
>> update their DNS server to include the challenge, so be it. That doesn't
>> mean that this breaks every single ACME client. It's supposed to be a
>> feature, not a bug :-)
>>
>> My point is that if an Applicant wants to automate the response to a new
>> Terms of Service, they can program the ACME client to connect to the return
>> URL with the new document, accept it and continue with the request.
>>
>>
>>
>>
>> However, this is preceded by one caveat: RFC 8555 Section 7.3.3 says "If
>> the server has changed its terms of service since a client
>> initially accepted, *and the server is unwilling to process a request
>> without explicit agreement to the new terms*, ...".
>>
>>
>>
>> So there's an easy path forward: include language in the Subscriber
>> Agreement to the effect of "this agreement may be updated", and always be
>> willing to process requests without explicit agreement to the new terms. At
>> a glance, Let's Encrypt, Google Trust Services, GoDaddy, and HARICA all
>> take this approach in their Subscriber Agreement documents.
>>
>>
>>
>> So I think there are two potential issues with the proposed language:
>>
>> 1) "The Certificate Warranties specifically include [that]... the
>> Subscriber has been provided with the most current version of the
>> Subscriber Agreement" -- I think this language is *probably* fine, as
>> long as "posted to the CA's policy document repository" counts as
>> "provided". But I'd prefer not to have to split hairs, and so would prefer
>> language which more clearly makes it obvious that the updated document does
>> not have to proactively be given to each Subscriber individually and that
>> simply posting it to the public repository is sufficient.
>>
>>
>> In some cases, CAs point to a URL that contains the latest version of the
>> Subscriber Agreement, so in one sense the Applicant agrees to that -latest-
>> version without the need to see a different URL. The only concern here is
>> what happens to implementations where the Applicant accepts the Subscriber
>> Agreement at account creation and not at Certificate Issuance/Retrieval. In
>> that scenario, the CA would not be able to claim that the Applicant has
>> accepted the updated version, right?
>>
>>
>> 2) "The Certificate Warranties specifically include [that]... the
>> applicable Subscriber Agreement is the Subscriber Agreement that was
>> accepted when the Certificate was issued" -- Again, this language is
>> probably technically fine, in that the Subscriber Agreement can include
>> language saying that Subscribers are assumed to have accepted future
>> updates to the document. But I'd still prefer not to split hairs, and so I
>> think that Wayne's suggestion of "...that was *in force* when the
>> Certificate was issued" is a good one.
>>
>>
>> I also prefer this language but would that address the concern mentioned
>> above?
>>
>>
>>
>>
>> Unrelated to the discussion above, our Counsel has suggested one other
>> simplification of the language in the ballot: "if the CA and Subscriber are
>> not Affiliated, the Subscriber and CA are parties to a legally valid and
>> enforceable Subscriber Agreement that satisfies these Requirements, or, if
>> the CA and Subscriber are the same entity or are Affiliated, the Applicant
>> Representative has accepted the Subscriber Agreement;" seems unnecessarily
>> wordy. Instead, they suggest just "the Subscriber and CA (even if they are
>> the same entity or are Affiliated) are parties to a legally valid and
>> enforceable Subscriber Agreement that satisfies these Requirements;".
>>
>>
>> Great improvement indeed!
>>
>> Thanks,
>> Dimitris.
>> _______________________________________________
>> Servercert-wg mailing list
>> Servercert-wg@cabforum.org
>> https://lists.cabforum.org/mailman/listinfo/servercert-wg
>>
>
_______________________________________________
Servercert-wg mailing list
Servercert-wg@cabforum.org
https://lists.cabforum.org/mailman/listinfo/servercert-wg

Reply via email to