Peter,

Are you advocating for option #2 (TSP self-attestation) because you think
that option #3 (audit) is unreasonable, or because you believe there is a
benefit to Mozilla's users in a self-attestation beyond what we get from
the existing requirement for CCADB disclosure?

On Fri, Mar 23, 2018 at 6:18 PM, Peter Bowen <pzbo...@gmail.com> wrote:

> On Fri, Mar 23, 2018 at 11:34 AM, Wayne Thayer via dev-security-policy
> <dev-security-policy@lists.mozilla.org> wrote:
> > Recently I've received a few questions about audit requirements for
> > subordinate CAs newly issued from roots in our program. Mozilla policy
> > section 5.3.2 requires these to be disclosed "within a week of
> certificate
> > creation, and before any such subCA is allowed to issue certificates.",
> but
> > says nothing about audits.
> >
> > The fundamental question is 'when must a new subCA be audited?' It is
> clear
> > that the TSP's [1] next period-of-time statement must cover all subCAs,
> > including any new ones. However, it is not clear if issuance from a new
> > subCA is permitted prior to being explicitly included in an audit.
> >
> > I believe that it is common practice for TSPs to begin issuing from new
> > subCAs prior to inclusion in an audit. This practice is arguably
> supported
> > by paragraph 3 of BR 8.1 which reads:
> >
> > If the CA has a currently valid Audit Report indicating compliance with
> an
> >> audit scheme listed in Section 8.1, then no pre-issuance readiness
> >> assessment is necessary.
> >>
> >
> > When disclosing a new subCA, the TSP can select "CP/CPS same as parent"
> and
> > "Audits same as parent" in CCADB to indicate that the same policies apply
> > to the new subordinate as to the root.
> >
> > This issue was raised at the CA/Browser Forum meeting in October 2016
> [2].
> >
> > Three options have been proposed to resolve this ambiguity:
> > 1. Permit a new subCA to be used for issuance prior to being listed on an
> > audit report.
> > 2. Require the TSP to attest that the new subCA complies with a set of
> > existing policies prior to issuance [3].
> > 3. Require an audit report (point-in-time or period-of-time) covering the
> > new subCA before any issuance (possibly with an exception for test
> > certificates or certificates required for audit purposes).
> >
> > Please consider these options in the context of a TSP with a current
> audit
> > for the parent root that has issued a new subCA, and for which the new
> > subCA is operating under existing policies and in an existing operational
> > environment. If this is not the case, I would propose that a new audit
> > covering the subCA be required.
>
> Unsurprisingly, I support option #2.  However I think is it important
> that there are three distinct things that need to be covered:
>
> 1) Key generation for the new CA
> 2) Assertion of controls for the new CA
> 3) Issuance of a CA certificate, by an existing trusted CA, that names
> the new CA as the subject
>
> I does make sense to allow a slight delay in disclosure such that a
> single ceremony can be used to generate the key and issue a CA
> certificate, but a week seems plenty generous.
>
> Thanks,
> Peter
>
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to