Thank you to all of you who responded to the May 2020 CA Communication/Survey.

Communication/Survey:
https://wiki.mozilla.org/CA/Communications#May_2020_CA_Communication

Blog Post:
https://blog.mozilla.org/security/2020/05/08/may-2020-ca-communication/

Responses:
https://wiki.mozilla.org/CA/Communications#May_2020_Responses

Summary of Results:

* Item 1 -- Impact of COVID-19 Restrictions
Everyone responded with: "We have reviewed https://wiki.mozilla.org/CA/Audit_Statements#Audit_Delay and understand the action to take if we need to report issues to Mozilla."

* Item 2 -- Mozilla Root Store Policy version 2.7 Requirements and Deadlines
Most CAs responded with: "Our responses to the January 2020 CA Communication have not changed, and we will meet these requirements according to the dates we previously specified." Some CAs indicated the work that they are still doing. I did not notice any alarming responses.

* Item 3 -- Reducing Maximum Validity Period for TLS Certificates

** Sub Item 3.1 -- Limit TLS Certificates to 398-day validity
(https://github.com/mozilla/pkipolicy/issues/204)
Most CAs who are issuing TLS certificates indicated their intent to limit TLS certificate validity period to 398 days or less for certificates issued after September 1, 2020. Some CAs are already issuing TLS certs with shorter validity periods, and others indicated that they would be able to implement shorter validity periods by the date Mozilla specifies in its policy. Many CAs voiced discontent with the way this requirement came about. To quote one CA: "Root programs should not place binding requirements on CAs via email messages without corresponding root policy updates, or at a minimum, a blog or announcement that can be referenced as a an authoritative trusted source."

** Sub Item 3.2 -- Limit re-use of domain name and IP address verification to 398 days
(https://github.com/mozilla/pkipolicy/issues/206)
19 CAs responded that they either do not re-use domain verification, or that their re-use of domain verification is already less than 398 days. 11 CAs indicated that they could implement the changes to their processes and documentation to limit the re-use of domain name verification to 398 days or less before 2020 Sep 30, 2020 9 CAs shared the sentiment that they would prefer that the re-use of verification information be regulated by the CA/Browser Forum Baseline Requirements. A few CAs indicated that this requirement would cause extra work for their customers, and requested a detailed security analysis of this change which they could convey to their customers. One CA noted: "If there is a change to reuse requirements, it should only apply to data verified on or after the effective date of the change. This change should not apply to data verified before the effective date of the change to avoid creating a verification cliff for the CAs and Subscribers. Note, if Mozilla requires that a domain name or IP address is re-verified each time a TLS certificate is issued, then this will reduce the effectivity of a number of verification methodologies that can be used and could impact many ecosystems which rely on TLS."

* Item 4 -- CA/Browser Forum Ballot for Browser Alignment

** Sub Item 4.1 -- CA/Browser Forum defined-policy OID in Subscriber Cert certificatePolicies
(https://github.com/mozilla/pkipolicy/issues/212)
With the exception of one CA, every CA that is issuing TLS certs responded that they either already do this, or can do this by September 30, 2020.

** Sub Item 4.2 -- Byte-for-byte Identical Issuer and Subject Distinguished Names
(https://github.com/mozilla/pkipolicy/issues/213)
Most CAs already do this, but a few CAs indicated that they would need some time for further analysis and making changes which appear do-able for future cert issuance. Note: I would not want this to cause lots of revocations of existing certs, so prefer a future effective date.

A couple CAs indicated that the second part of the requirement should be restricted to subCAs.
Note: This change is already under consideration per discussion in the CABF.

** Sub Item 4.3 -- Text-searchable PDF Audit Statements
(https://github.com/mozilla/pkipolicy/issues/210)
All CAs indicated that either they already do this, or that they can do this for their next audits.

** Sub Item 4.4 -- OCSP Requirements
(https://github.com/mozilla/pkipolicy/issues/211)
All CAs indicated that they either already do this, or can do this by September 2020. (Note that one CA said October 14, 2020)


Thanks,
Kathleen
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to