On Thu, Dec 19, 2019 at 3:12 PM Ryan Sleevi <r...@sleevi.com> wrote:

>
> On Thu, Dec 19, 2019 at 12:10 PM Wayne Thayer via dev-security-policy <
> dev-security-policy@lists.mozilla.org> wrote:
>
>> All,
>>
>> I've drafted a new email and survey that I plan to send to all CAs in the
>> Mozilla program in early January. it focuses on compliance with the new
>> (2.7) version of our Root Store Policy. I will appreciate your review and
>> feedback on the draft:
>>
>> https://ccadb-public.secure.force.com/mozillacommunications/CACommunicationSurveySample?CACommunicationId=a051J00003waNOW
>
>
> ## ACTION 1 ##
> One thing that I think came up from the past CA communications is that CAs
> assert this, but then end up failing to actually implement.
>
> Perhaps it may be worthwhile to be more explicit here about the
> expectations:
>
> """
> Read version 2.7 of Mozilla's Root Store Policy.
>
> CAs are expected to review and abide by Version 2.7 of Mozilla's Root
> Store Policy. This includes a number of changes from previous versions. CAs
> MUST review this policy and ensure compliance, and CAs SHOULD carefully
> review the differences from previous versions of Mozilla's Policy. These
> changes have been discussed on mozilla.dev.security.policy and on GitHub.
> CAs that did not participate in these discussions or that have not yet
> reviewed these conversations should also review the discussions regarding
> these changes, to reduce the chance of confusion or misinterpretation.
>
> CAs are encouraged to raise any questions that they do not feel addressed
> in the Policy, or which the discussions and reasoning for the changes was
> not clear.
> """
>
> There's probably a better way to word all of this, but where I'm trying to
> emphasize
> - The policy is the policy, and the ideal goal is that the policy stands
> by itself
> - That said, CAs understandably can misinterpret new policies when they
> use the logic of past policies or interpretations, while someone reading
> the policy fresh or which participated in the discussions about the policy
> would not be confused by
> - Even though CAs are required to follow m.d.s.p., the length of time for
> Policy 2.7 may mean they have had turnover or knowledge drain or simply
> forgot, so it's good to remind them that they can find information about
> each and every change discussed here or on GitHub, and they're expected to
> be familiar with it
>
> I'm trying to flag the "We didn't follow the discussion and continued to
> use our old interpretation" scenario, and see if there's something that can
> be done to remind folks to pay attention.
>
>
I've incorporated these suggestions.

## ACTION 3 ##
> Would it make sense to add a third option, "All end-entity certificates
> that we issue or have issued after [date] and are within..." and let folks
> specify a date?
>
> I largely mention this because it's an existing Microsoft requirement as I
> understand it, and is somewhat enforced by Apple (at least for TLS) since
> July, so it may be that CAs are already compliant for new certificates, but
> also have unexpired old certificates that are not compliant. It may be that
> the answer is supposed to be "#1", but that wasn't immediately obvious to
> me when I first read.
>
> Alternatively, it might be clearer to reword that "Beginning on 1 July,
> 2020, *new* end-entity ...", to emphasize that it's not that
> Firefox/Mozilla will begin enforcing on 2020-07-01, but that certificates
> issued on/after that date will be required to be compliant (presumably,
> measured by notBefore)
>
>
I made both of these changes as well.

## ACTION 5 ##
> I'm not sure if Salesforce forms allow it, but is it possible to have
> Action 5 include both a date selector and a comment field? It might make it
> easier to have consistency for options 3 & 4. Like "ACTION 5 Date" and
> "ACTION 5 Comments"
>
> Of course, if it doesn't, no worries.
>

I added an optional date entry field to this question.

All of these changes are now published at link I shared.
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to