Re: Policy 2.4 Proposal: Require open licensing of CPs and CPSes

2016-12-08 Thread Jonathan Rudenberg
> On Dec 8, 2016, at 12:48, Gervase Markham wrote: > > Require CAs to publish their CPs and CPSes under one of the following > Creative Commons licenses: CC-BY, CC-BY-SA or CC-BY-ND. I think this is reasonable. Does it make sense to add CC0 to the list as well? This would provide an even more

Re: Policy 2.4 Proposal: Require open licensing of CPs and CPSes

2016-12-08 Thread David E. Ross
On 12/8/2016 1:41 PM, Jakob Bohm wrote [in part]: > It is in particular noted that these things are a lot less than what > any of the regular CC licenses permit. For example, Mozilla has no > reason to require that other CA operators be permitted to reuse the > documents as their own, even though

Re: Taiwan GRCA Root Renewal Request

2016-12-08 Thread Brian Smith
Gervase Markham wrote: > Just to help me be clear: the request is for the inclusion of a root > with the same DN as a previous root, which will still be included after > the addition? Or the problem with duplicate DNs occurs further down the > hierarchy? Some people claimed some software may be u

Re: Policy 2.4 Proposal: Use language of capability throughout

2016-12-08 Thread Brian Smith
Gervase Markham wrote: > We want to change the policy to make it clear that whether a cert is > covered by our policy or not is dependent on whether it is technically > capable of issuing server certs, not whether it is intended by the CA > for issuing server certs. NIT: The issue isn't whether i

Re: Policy 2.4 Proposal: Require all OCSP responses to have a nextUpdate field

2016-12-08 Thread Brian Smith
Gervase Markham wrote: > Add a requirement that every OCSP response must have a nextUpdate field. > This is required to ensure that OCSP stapling works reliably with all > (at least most) server and client products. > > Proposal: update the second bullet in point 3 of the Maintenance section > so

Re: Can we require id-kp-serverAuth now?

2016-12-08 Thread Brian Smith
Gervase Markham wrote: > On 05/12/16 12:43, Brian Smith wrote: >> However, I do think that if a CA certificate is name constrained to not >> allow any dNSName or iPAddress names, and/or it EKU that doesn't contain >> id-kp-serverAuth, then it shouldn't be in scope of the proposal. Either >> condit

Re: Can we require id-kp-serverAuth now?

2016-12-08 Thread Gervase Markham
On 05/12/16 12:43, Brian Smith wrote: > However, I do think that if a CA certificate is name constrained to not > allow any dNSName or iPAddress names, and/or it EKU that doesn't contain > id-kp-serverAuth, then it shouldn't be in scope of the proposal. Either > condition is sufficient. Can we get

Re: Can we require id-kp-serverAuth now?

2016-12-08 Thread Brian Smith
Gervase Markham wrote: > On 07/12/16 12:44, Brian Smith wrote: >> Notice in the BRs that the KeyUsage extension (not to be confused with the >> ExtendedKeyUsage extension we're talking about here) is optional. Why is it >> OK to be optional? Because the default implementation allows all usages, >>

Re: Policy 2.4 Proposal: Require open licensing of CPs and CPSes

2016-12-08 Thread David E. Ross
On 12/8/2016 12:48 PM, Gervase Markham wrote: > Require CAs to publish their CPs and CPSes under one of the following > Creative Commons licenses: CC-BY, CC-BY-SA or CC-BY-ND. > > This is so that there is no legal impediment to their proper storage, > scrutiny etc. by relying parties. > > Proposa

Re: Can we require id-kp-serverAuth now?

2016-12-08 Thread Brian Smith
Gervase Markham wrote: > On 05/12/16 12:43, Brian Smith wrote: >> Let's consider the cases: >> >> A root CA: It is in scope if it has the SSL trust bit. >> >> An intermediate CA: It is in scope unless all the trusted certificates >> issued for it have an EKU that excludes id-kp-serverAuth. > > No;

Re: Policy 2.4 Proposal: Require open licensing of CPs and CPSes

2016-12-08 Thread Jakob Bohm
On 08/12/2016 21:48, Gervase Markham wrote: Require CAs to publish their CPs and CPSes under one of the following Creative Commons licenses: CC-BY, CC-BY-SA or CC-BY-ND. This is so that there is no legal impediment to their proper storage, scrutiny etc. by relying parties. Proposal: add an addi

Policy 2.4 Proposal: Require open licensing of CPs and CPSes

2016-12-08 Thread Gervase Markham
Require CAs to publish their CPs and CPSes under one of the following Creative Commons licenses: CC-BY, CC-BY-SA or CC-BY-ND. This is so that there is no legal impediment to their proper storage, scrutiny etc. by relying parties. Proposal: add an additional paragraph to point 17 of the Inclusion

Policy 2.4 Proposal: Require all OCSP responses to have a nextUpdate field

2016-12-08 Thread Gervase Markham
Add a requirement that every OCSP response must have a nextUpdate field. This is required to ensure that OCSP stapling works reliably with all (at least most) server and client products. Proposal: update the second bullet in point 3 of the Maintenance section so that the last sentence reads: OCSP

Re: Can we require id-kp-serverAuth now?

2016-12-08 Thread Gervase Markham
On 07/12/16 12:44, Brian Smith wrote: > Notice in the BRs that the KeyUsage extension (not to be confused with the > ExtendedKeyUsage extension we're talking about here) is optional. Why is it > OK to be optional? Because the default implementation allows all usages, > including in particular the u

Policy 2.4 Proposal: Use language of capability throughout

2016-12-08 Thread Gervase Markham
We want to change the policy to make it clear that whether a cert is covered by our policy or not is dependent on whether it is technically capable of issuing server certs, not whether it is intended by the CA for issuing server certs. Until we change Firefox to require id-kp-serverAuth, the polic

Re: Taiwan GRCA Root Renewal Request

2016-12-08 Thread Gervase Markham
On 05/12/16 21:10, Wen-Cheng Wang wrote: > I mean BR Audit is specifically for CAs that provide SSL > certificates. Therefore, it is not possible to conduct on those > subordinate CAs that do not provide SSL certificates, AIUI, that's not actually true. As we found out recently when discussing an

Re: In September 29, 2016, WoSign stop issuing free certificate, but I still successfully get it.

2016-12-08 Thread Gervase Markham
On 05/12/16 13:41, Richard Wang wrote: > We checked our system, this order is from one of the reseller. We > have many resellers that used the API, we noticed all resellers to > close the free SSL, but they need some time to update the system. More than two months? Has this reseller given a time

Re: Policy 2.4 Proposal: Replace all occurrences of 'CA' with "Certification Authority' when that is the intended meaning

2016-12-08 Thread Gervase Markham
On 30/11/16 11:33, Gervase Markham wrote: > We should update those to "additional CA certificates" and "CA > certificate hierarchy" respectively. I think that then the policy will > be internally consistent. > > This is: https://github.com/mozilla/pkipolicy/issues/40 Result: resolved as proposed.

Re: Policy 2.4 Proposal: Make clear that duplicate serial numbers are OK when supporting CT

2016-12-08 Thread Gervase Markham
On 30/11/16 11:31, Gervase Markham wrote: > We should make it clear that this is OK in the CT case. I propose the > following change: Result: resolved as specified. Gerv ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://

Re: Policy 2.4 Proposal: Add CC-0 license to policy

2016-12-08 Thread Gervase Markham
On 30/11/16 11:34, Gervase Markham wrote: > CAs may want to copy bits of our policy into their working documents and > other things; the best way to make that easy is to use CC-0. > > This would involve adding a footer: > > Any copyright in this document is dedicated to the Public Domain. >

Re: Can we require id-kp-serverAuth now?

2016-12-08 Thread Gervase Markham
On 05/12/16 12:43, Brian Smith wrote: > Let's consider the cases: > > A root CA: It is in scope if it has the SSL trust bit. > > An intermediate CA: It is in scope unless all the trusted certificates > issued for it have an EKU that excludes id-kp-serverAuth. No; it's in scope unless it has cons