Re: New intermediate certs and Audit Statements

2021-03-24 Thread Kathleen Wilson via dev-security-policy

On 3/24/21 5:32 AM, Rob Stradling wrote:

On 9th July 2019, Kathleen wrote:

I propose that to handle this situation, the CA may enter the

subordinate CA's current audit statements and use the Public Comment
field to indicate that the new certificate will be included in the next
audit statements.

Hi Kathleen.  CCADB now automatically shows the following message (when 
relevant) in red text at the top of each intermediate certificate page:

 "This certificate was created after the audit period of the current audit 
statement, so please make sure to include it in the CA's next periodic audit 
statement."

Do you still expect CAs to "use the Public Comment field to indicate that the new 
certificate will be included in the next audit statements"?
Or may we stop doing that now?

Thanks.



Rob, Thanks for bringing this up. I agree that it is not necessary to 
use the Public Comment field to indicate that the new certificate will 
be included in the next audit statements. CAs may stop doing that.


Thanks,
Kathleen
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New intermediate certs and Audit Statements

2021-03-24 Thread Rob Stradling via dev-security-policy
On 9th July 2019, Kathleen wrote:
> I propose that to handle this situation, the CA may enter the
subordinate CA's current audit statements and use the Public Comment
field to indicate that the new certificate will be included in the next
audit statements.

Hi Kathleen.  CCADB now automatically shows the following message (when 
relevant) in red text at the top of each intermediate certificate page:

"This certificate was created after the audit period of the current audit 
statement, so please make sure to include it in the CA's next periodic audit 
statement."

Do you still expect CAs to "use the Public Comment field to indicate that the 
new certificate will be included in the next audit statements"?
Or may we stop doing that now?

Thanks.


From: dev-security-policy  on 
behalf of Kathleen Wilson via dev-security-policy 

Sent: 09 July 2019 22:50
To: mozilla-dev-security-pol...@lists.mozilla.org 

Subject: New intermediate certs and Audit Statements

All,

There is some confusion about disclosure of new intermediate certs that
are issued to subordinate CAs with currently valid audit statements.

Section 5.3.2 of Mozilla's Root Store Policy says: "If the CA has a
currently valid audit report at the time of creation of the certificate,
then the new certificate MUST appear on the CA's next periodic audit
reports."

I think it is reasonable to assume that the same policy applies to
subordinate CAs, such that if the subordinate CA has a currently valid
audit report at the time of creation of a new intermediate certificate,
then the new certificate MUST appear on the subordinate CA's next
periodic audit reports.

The confusion is about how to disclose such a new intermediate
certificate in the CCADB.

I propose that to handle this situation, the CA may enter the
subordinate CA's current audit statements and use the Public Comment
field to indicate that the new certificate will be included in the next
audit statements. (Also, a quick comparison of the cert's Valid-From
date and the audit period dates will indicate this situation.)

Please let me know if you foresee any problems with this approach.

Thanks,
Kathleen
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New intermediate certs and Audit Statements

2019-07-10 Thread Kathleen Wilson via dev-security-policy

On 7/9/19 3:17 PM, Ryan Sleevi wrote:
On Tue, Jul 9, 2019 at 5:50 PM Kathleen Wilson via dev-security-policy 

I propose that to handle this situation, the CA may enter the
subordinate CA's current audit statements and use the Public Comment
field to indicate that the new certificate will be included in the next
audit statements. 



To support this, we have added the "Comments" column to these two reports:
https://ccadb-public.secure.force.com/mozilla/IntermediateCertsSeparateAudits
https://ccadb-public.secure.force.com/mozilla/IntermediateCertsSeparateAuditsCSV



Note that if the same policies do not apply to the new sub-CA, it has
seemed uncontroversial that some form of new audit is required. Is that
consistent with your understanding as well?



That is consistent with my understanding as well. I'll make a note to 
look into this in regards to enforcement in the CCADB, and the above 
listed reports should probably also be updated to show the CP/CPS data.


Thanks,
Kathleen
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New intermediate certs and Audit Statements

2019-07-09 Thread Ryan Sleevi via dev-security-policy
On Tue, Jul 9, 2019 at 5:50 PM Kathleen Wilson via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> All,
>
> There is some confusion about disclosure of new intermediate certs that
> are issued to subordinate CAs with currently valid audit statements.
>
> Section 5.3.2 of Mozilla's Root Store Policy says: "If the CA has a
> currently valid audit report at the time of creation of the certificate,
> then the new certificate MUST appear on the CA's next periodic audit
> reports."
>
> I think it is reasonable to assume that the same policy applies to
> subordinate CAs, such that if the subordinate CA has a currently valid
> audit report at the time of creation of a new intermediate certificate,
> then the new certificate MUST appear on the subordinate CA's next
> periodic audit reports.
>
> The confusion is about how to disclose such a new intermediate
> certificate in the CCADB.
>
> I propose that to handle this situation, the CA may enter the
> subordinate CA's current audit statements and use the Public Comment
> field to indicate that the new certificate will be included in the next
> audit statements. (Also, a quick comparison of the cert's Valid-From
> date and the audit period dates will indicate this situation.)
>
> Please let me know if you foresee any problems with this approach.
>

That aligns with past discussions [1][2], which resulted in similar
uncontroversial proposals [3]. Wayne previously discussed the lifecycle of
certificates during past CA/Browser Forum F2Fs [4][5]. With respect to [5],
Wayne proposed the uncontroversial "Change #3" for the alignment of audit
reports, and this would similarly align the disclosure.

This is particularly important to be harmonized, given reports like [6],
which provide an important signal to the community about the entities
involved with issuance.

Note that if the same policies do not apply to the new sub-CA, it has
seemed uncontroversial that some form of new audit is required. Is that
consistent with your understanding as well?

[1]
https://groups.google.com/d/msg/mozilla.dev.security.policy/CAaC2a2HMiQ/IKimeW4NBgAJ
[2]
https://groups.google.com/d/msg/mozilla.dev.security.policy/v8-V2D957tU/BtogJ3rECQAJ
[3] https://blog.mozilla.org/security/2018/07/02/root-store-policy-updated/
[4]
https://cabforum.org/2018/10/18/minutes-for-ca-browser-forum-f2f-meeting-45-shanghai-17-18-october-2018/#28-Audit-requirements-over-the-lifecycle-of-a-root
[5]
https://cabforum.org/2019/05/03/minutes-for-ca-browser-forum-f2f-meeting-46-cupertino-12-14-march-2019/#Audit-requirements-over-the-lifecycle-of-a-Root-CA
[6]
https://groups.google.com/d/msg/mozilla.dev.security.policy/7bLbgXTf5Ng/l8nmVfzEAwAJ
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy