On Thu, Dec 19, 2019 at 12:10 PM Wayne Thayer via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote:
> All, > > I've drafted a new email and survey that I plan to send to all CAs in the > Mozilla program in early January. it focuses on compliance with the new > (2.7) version of our Root Store Policy. I will appreciate your review and > feedback on the draft: > > https://ccadb-public.secure.force.com/mozillacommunications/CACommunicationSurveySample?CACommunicationId=a051J00003waNOW ## ACTION 1 ## One thing that I think came up from the past CA communications is that CAs assert this, but then end up failing to actually implement. Perhaps it may be worthwhile to be more explicit here about the expectations: """ Read version 2.7 of Mozilla's Root Store Policy. CAs are expected to review and abide by Version 2.7 of Mozilla's Root Store Policy. This includes a number of changes from previous versions. CAs MUST review this policy and ensure compliance, and CAs SHOULD carefully review the differences from previous versions of Mozilla's Policy. These changes have been discussed on mozilla.dev.security.policy and on GitHub. CAs that did not participate in these discussions or that have not yet reviewed these conversations should also review the discussions regarding these changes, to reduce the chance of confusion or misinterpretation. CAs are encouraged to raise any questions that they do not feel addressed in the Policy, or which the discussions and reasoning for the changes was not clear. """ There's probably a better way to word all of this, but where I'm trying to emphasize - The policy is the policy, and the ideal goal is that the policy stands by itself - That said, CAs understandably can misinterpret new policies when they use the logic of past policies or interpretations, while someone reading the policy fresh or which participated in the discussions about the policy would not be confused by - Even though CAs are required to follow m.d.s.p., the length of time for Policy 2.7 may mean they have had turnover or knowledge drain or simply forgot, so it's good to remind them that they can find information about each and every change discussed here or on GitHub, and they're expected to be familiar with it I'm trying to flag the "We didn't follow the discussion and continued to use our old interpretation" scenario, and see if there's something that can be done to remind folks to pay attention. ## ACTION 3 ## Would it make sense to add a third option, "All end-entity certificates that we issue or have issued after [date] and are within..." and let folks specify a date? I largely mention this because it's an existing Microsoft requirement as I understand it, and is somewhat enforced by Apple (at least for TLS) since July, so it may be that CAs are already compliant for new certificates, but also have unexpired old certificates that are not compliant. It may be that the answer is supposed to be "#1", but that wasn't immediately obvious to me when I first read. Alternatively, it might be clearer to reword that "Beginning on 1 July, 2020, *new* end-entity ...", to emphasize that it's not that Firefox/Mozilla will begin enforcing on 2020-07-01, but that certificates issued on/after that date will be required to be compliant (presumably, measured by notBefore) ## ACTION 5 ## I'm not sure if Salesforce forms allow it, but is it possible to have Action 5 include both a date selector and a comment field? It might make it easier to have consistency for options 3 & 4. Like "ACTION 5 Date" and "ACTION 5 Comments" Of course, if it doesn't, no worries. _______________________________________________ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy