I've gone ahead and made this change in the 2.7 branch: https://github.com/mozilla/pkipolicy/commit/3a70cf31cf81f5e00b62f958fe8a3b59c7cb0f34
I'll consider this issue resolved unless further comments are received. - Wayne On Mon, May 13, 2019 at 11:41 PM Pedro Fuentes via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > Hi Wayne, > I agree with this approach, it's quite explicit but flexible at the same > time. > Thanks, > Pedro > > El martes, 14 de mayo de 2019, 0:49:40 (UTC+2), Wayne Thayer escribió: > > On Mon, May 13, 2019 at 7:06 AM Pedro Fuentes via dev-security-policy < > > dev-security-policy@lists.mozilla.org> wrote: > > > > > Hi Wayne, > > > inserting my comments below. > > > Best, > > > Pedro > > > > > > El viernes, 10 de mayo de 2019, 23:54:40 (UTC+2), Wayne Thayer > escribió: > > > > I have drafted the change as proposed, moving the exact "Required > > > Practice" > > > > language into section 3.3 of the policy: > > > > > > > > https://github.com/mozilla/pkipolicy/commit/803ec1a1414318a69491854a867dc69889442b7b > > > > > > > > On Sat, Apr 27, 2019 at 11:36 AM Pedro Fuentes via > dev-security-policy < > > > > dev-security-policy@lists.mozilla.org> wrote: > > > > > > > > > Hello, > > > > > > > > > > I totally agree about the (...) be disclosed in the CPS. > > > > > > > > > > > > > > Pedro: I agree with you if there is only one CP. However when there > are > > > > multiple CPs, there needs to be some way to determine which one > applies > > > to > > > > each CA certificate. Does the language I proposed give you enough > > > > flexibility to meet the requirement without forcing the listing of > every > > > > intermediate in your CPs? > > > > > > My point about the wording is that you propose to disclose this > > > information in both the CP and the CPS, and I propose that this is made > > > mandatory in the CPS only, as it can happen that the CA is adopting a > CP > > > defined by another entity. > > > So I'd prefer a wording that says: "CPSes must clearly indicate which > root > > > and intermediate certificates the practices and processes described in > CPs > > > and CPSes documents apply to. " > > > > > > > My rational is that (...) a leaf certificate with a CP > > > > > > > > > > > > > Can we determine which CP applies to a given intermediate based on > OIDs? > > > > > > > > > > Right now is only mandatory to use the OIDs in SSL certificates, but we > > > embraced this as a general practice for the new CAs we are deploying, > so > > > all new certificates include a policy OID, as stipulated in the > related CP > > > document, independently if are SSL or Personal certificates. > > > > > > > * its own CPS, that (...) a particular kind, but this > > > > > information must be disclosed in the CA's CPS. > > > > > > > > > > > > > > I think it is okay if a CP isn't aware of a particular CA > certificate, as > > > > long as there is some clear way to determine which CP applies to that > > > > intermediate. How does the CPS identify which CP applies to each > > > > intermediate? > > > > > > Actually we updated recently our WISeKey CPS to accommodate this > change. > > > Previously we were relying on publishing the current version of the > list of > > > Issuing CAs in the website, but I added this explicitly in the WISeKey > CPS. > > > If you check our new CPS (you can get it at > > > https://filevault.wisekey.com/f/7bc86620ea/?dl=1) you'll find the > method > > > we use to disclose this: > > > - In section 1.3.1 we disclose the Roots and Intermediates and in > > > particular in section 1.3.1.3 we clarify about the Issuing CAs and we > make > > > a reference to the Annex B (using an Annex because of the different > page > > > format so it's easer to read and maintain) > > > - In Annex B (page 63 at the end of the doc) we add the list of the > active > > > intermediate and issuing CAs, mapping it to the allowed CP they issue > > > > > > I think the only place where we can disclose this is in the WISeKey > CPS, > > > as the CP documents published by the OISTE Foundation set the rules to > be > > > implemented by the CAs operating in the trust model, but aren't > necessarily > > > aware of the particular Issuing CAs allowed to issue the CP. > > > > > > > > > > > Our particular approach (...) > > > > > > > > Thank you Pedro, this helps to clarify your concern. I think your > approach > > is good, but I am concerned that limiting the scope of the requirement to > > only the CPS does not address my concern when CAs have multiple CPs. Here > > is an alternate proposal: > > > > CAs must provide a way to clearly determine which CP and CPS applies to > > each root and intermediate certificate. > > > > I think that this would allow you to continue with the approach you > > described above. Do you agree? > > _______________________________________________ > dev-security-policy mailing list > dev-security-policy@lists.mozilla.org > https://lists.mozilla.org/listinfo/dev-security-policy > _______________________________________________ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy