I previously pointed out that “The Age of Certificate Data” section was 
“inadvertently” moved to be under  “3.3.1 Identification and Authentication for 
Routine Re-key” when we reformatted the document.  This seems inaccurate.

Ryan recommended moving it to section 4.2.1, between the paragraphs "Applicant 
information MUST" and "The CA SHALL develop", which looks to be the right 
place.  I doubt this would be controversial and is just the movement of one 
paragraph from one section to another.  Maybe you can consider this change in 
the next clean-up ballot?

Doug


From: [email protected] [mailto:[email protected]] On 
Behalf Of Stephen Davidson
Sent: Thursday, March 17, 2016 11:42 AM
To: [email protected]; Dean Coclin <[email protected]>; CABFPub 
<[email protected]>
Subject: Re: [cabfpub] Pre-ballot on membership requirement update

The wildcard clarification is one; and I don’t think it’s controversial.


From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of 
[email protected]<mailto:[email protected]>
Sent: Thursday, March 17, 2016 12:38 PM
To: Dean Coclin <[email protected]<mailto:[email protected]>>; 
CABFPub <[email protected]<mailto:[email protected]>>
Subject: Re: [cabfpub] Pre-ballot on membership requirement update

Dean, Trend Micro will endorse.  But can we combine with some of the other 
non-controversial BR changes that have been circulating (I can’t remember what 
they are) in a “miscellaneous” ballot?

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Dean Coclin
Sent: Thursday, March 17, 2016 8:29 AM
To: CABFPub
Subject: [cabfpub] Pre-ballot on membership requirement update

I am looking for 2 endorsers for the following:

Background:
Section 2.1 (a)(1) says that Issuing CAs “actively issue certificates to Web 
servers…”

Section 2.1(b) of the bylaws lists the items needed in a membership application 
by CAs.
But that section does not ask the CA applicant to provide a 3rd party website 
where the CA/B Forum can validate that they are actively issuing certs to web 
servers.  We do however ask the applicant this question, after they have 
submitted their application. It would be helpful to have this in the bylaws so 
we don’t have to go back and ask every time.

Specific change:

Add under 2.1(b)
(7) The URL of at least one third party website that is using a certificate 
from the applicant’s CA which can be examined by Forum members

Thanks,
Dean




TREND MICRO EMAIL NOTICE

The information contained in this email and any attachments is confidential

and may be subject to copyright or other intellectual property protection.

If you are not the intended recipient, you are not authorized to use or

disclose this information, and we request that you notify us by reply mail or

telephone and delete the original message from your mail system.



--- Begin Message ---
Based on https://tools.ietf.org/html/rfc3647#section-4.4.2 , it would seem like 
Section 4.2.1 might be more appropriate.

If I'm understanding correctly, the goal of Section 3.3 is to describe how data 
is initially validated/processed. I don't think adding a Section 3.5 is 
consistent with our goals of a 3647 framework.


For example, perhaps moving it to section 4.2.1, between "Applicant information 
MUST" and "The CA SHALL develop"

The CA MUST ensure that that all data and documents validated according to 
Section 3.2 was provided to the CA no more than thirty-nine (39) months prior 
to issuing the Certificate.


I'm not sure whether we want to "provided to the CA" or "obtained by the CA", 
and if CAs feel there's a distinction worth making.
This would also, hopefully, encompass the activities of the RA with respect to 
the final paragraph of Section 4.2.1 - that is, if documents were provided (and 
validated) by an RA, then they are "fulfilling [any of] the CA's obligation 
under this section", and thus the 39-month period applies to the RA, not when 
the RA submitted the validated docs to the CA. I believe that's consistent both 
with the original 11.3 and with the intent, but I'd be curious if others 
disagree.


On Thu, Dec 3, 2015 at 4:35 AM, Doug Beattie 
<[email protected]<mailto:[email protected]>> wrote:


   I might have mentioned this before but ran across it again today.  Prior to 
RFC 3647 format conversion we had this:



   11.3  Age of Certificate Data

   Section 9.4 limits the validity period of Subscriber Certificates.   The CA 
MAY use the documents and data provided in Section 11 to verify certificate 
information, provide that the CA obtained the data or document from a source 
specified under Section 11 no more than thirty-nine (39) months prior to 
issuing the Certificate.



   But now we have this:



   3.3  Identification and authentication for re-key requests

   3.3.1 Identification and Authentication for Routine Re-key

   Section 6.3.2 limits the validity period of Subscriber Certificates.   The 
CA MAY use the documents and data provided in Section 3.2 to verify certificate 
information, provided that the CA obtained the data or document from a source 
specified under Section 3.2 no more than thirty-nine (39) months prior to 
issuing the Certificate.



   The re-use of certificate data seems to be limited to routine Re-key 
requests when before it could be used for any purpose.  Can we find a new 
heading section for this so it’s clear we can use it for purposes other than 
rekey?  Maybe a new section, 3.5, for this purpose?




   _______________________________________________
   Public mailing list
   [email protected]<mailto:[email protected]>
   https://cabforum.org/mailman/listinfo/public





--- End Message ---
_______________________________________________
Public mailing list
[email protected]
https://cabforum.org/mailman/listinfo/public

Reply via email to