I would summarize this discussion as follows: - we'll add the Compliance Date to the policy document [1]. - the existing norm of setting the Compliance Date equal to the Publication Date will remain. - during final review of new versions of the policy, we will discuss any changes that need to be made to the Compliance Date for the entire version or individual changes.
- Wayne [1] https://github.com/mozilla/pkipolicy/commit/60e340635e31651208ea1c92f4e37295e6285950#diff-b7447c83436e3b067c828eb47cb80282 ) On Wed, Mar 21, 2018 at 10:09 AM, Jakob Bohm via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > On 21/03/2018 10:43, Ryan Sleevi wrote: > >> On Tue, Mar 20, 2018 at 8:27 PM, Wayne Thayer via dev-security-policy < >> dev-security-policy@lists.mozilla.org> wrote: >> >>> >>> I think it's reasonable - especially in light of the discussion being had >>>> regarding 2.6 and 3.2.2.4/3.2.2.5 - that when there are restrictions on >>>> the technical actions a CA must take or can use, that there be a phase >>>> in >>>> time, and what you say makes sense. But I think that's probably going to >>>> >>> be >>> >>>> the exception, and so it may be better to set the Compliance Date == >>>> Publication Date by default, and then use the information gathering and >>>> discussion phase (which Mozilla policy requires all CAs to monitor) to >>>> identify if there are any surprises regarding phasing in changes. >>>> >>>> I am specifically thinking of CP/CPS updates, which were a major part of >>>> >>> the problem with version 2.5 compliance. There are a few proposals in the >>> 2.6 queue that also require CP/CPS updates. Would you expect those to >>> trigger an exception as described above? >>> >>> >> Yup, I think it totally makes sense to phase those in, since they first >> need to be finalized (via Publication) before CAs can fully update to be >> conformant. >> >> >> As a concrete example, consider the policy changes requiring CAs to follow >>> >>>> m.d.s.p. That seems like something perfectly reasonable to expect >>>> >>> immediate >>> >>>> compliance to, and indeed, highly desirable (for any incidents that >>>> >>> emerge >>> >>>> within those two months until Compliance Date). Naively, it doesn't seem >>>> like it should take two months for a CA to be able to monitor m.d.s.p., >>>> >>> or >>> >>>> if it did, that may signal more problematic practices at play. >>>> >>>> >>> Again, the problem with this is that there is effectively no deadline >>> when >>> policies are assumed to begin immediately upon publication. The same CAs >>> who take two months to begin monitoring m.d.s.p. when given a future >>> deadline are just as likely to begin monitoring it whenever they get >>> around >>> to implementing the new policy during their next audit cycle if the >>> compliance deadline has already passed by the time they see that the >>> policy >>> has been published. >>> >>> >> I'm not sure I understand this point. The deadline is immediate. I was >> trying to highlight that with an immediate deadline, there's no excuse for >> taking two months to monitor m.d.s.p. - but that's ok, because it doesn't >> seem reasonable to take two months to begin with. Any CA out of compliance >> is in an egregious breach of confidence at that point - especially if they >> wait until their next audit cycle. >> >> >> I think we both agree that compliance with 2.5 was a problem that we'd >>> like to address. I've put forth the argument that having Compliance Date >>> > >>> Publication Date could help to improve that. Do you disagree with my >>> assertion, or simply feel that on balance it is better to have new >>> policies >>> enacted sooner but with less compliance? Maybe a better solution would be >>> to ask CAs to attest to their compliance via a survey each time we >>> publish >>> a new policy version? >>> >> >> >> I don't think having Compliance Date > Publication Date will, in general, >> help for situations of CAs being non-compliant. I think it will help with >> some things - if their non-compliance was due to, for example, updating >> systems or CP/CPSes - but I think it will harm other things - e.g. CAs >> monitoring m.d.s.p. or disclosing certain things. >> >> Regarding CAs attesting to compliance, I think that will help, but not >> because of the Compliance Date or Publication Date. Rather, it will help >> because no matter what we do or say, there are a subset of CAs who simply >> will not and do not spend time following m.d.s.p. and only reply to emails >> and only after several emails have gone by and only after being shamed at >> the risk of distrust. >> >> > I would say that a implementation deadline of 0 will be instantly > violated by anyone not already in compliance (by chance). > > Something like "follow m.d.s.p" (which includes subscribing to the mail > version if applicable, but also assigning one or more employees to the > task), could be done in a week or so, maybe a m > <https://maps.google.com/?q=could+be+done+in+a+week+or+so,+maybe+a+m&entry=gmail&source=g>onth > if the deciding > boss is on holiday on the publication date. > > > Enjoy > > Jakob > -- > Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com > Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 > This public discussion message is non-binding and may contain errors. > WiseMo - Remote Service Management for PCs, Phones and Embedded > _______________________________________________ > dev-security-policy mailing list > dev-security-policy@lists.mozilla.org > https://lists.mozilla.org/listinfo/dev-security-policy > _______________________________________________ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy