Hi Bruce,

Going for the full clarification: 

The PR show that: 
”Prior to issuing a Code Signing Certificate, each CA SHOULD check at least one 
database containing information about known or suspected producers, publishers, 
or distributors of Suspect Code, as identified or indicated by an Anti-Malware 
Organization and any database of deceptive names maintained by an Application 
Software Provider. The CA MUST determine whether the entity is identified as 
requesting a Code Signing Certificate from a High Risk Region of Concern. The 
CA MUST also maintain and check an internal database listing Certificates 
revoked due to Code Signatures on Suspect Code and previous certificate 
requests rejected by the CA. ” 

Is being replaced with: 

”Prior to issuing a Code Signing Certificate, each CA SHOULD check at least one 
database containing information about known or suspected producers, publishers, 
or distributors of Suspect Code, as identified or indicated by an Anti-Malware 
Organization and any database of deceptive names maintained by an Application 
Software Provider. The CA MUST also maintain and check an internal database 
listing Certificates revoked due to Code Signatures on Suspect Code and 
previous certificate requests rejected by the CA. ” 

That makes sense. Then the PR goes on to additionally remove:
“A CA identifying a high risk application under this section MUST follow the 
additional procedures defined in [Section 
4.2.2](#422-approval-or-rejection-of-certificate-applications) of this document 
to ensure that the applicant will protect its Private Keys and not sign Suspect 
Code.” 

That’s the part I think should remain. 

So yes, I think we’re on the same page with that one 😊

Regards,

Martijn 





From: Bruce Morton <[email protected]>
Date: Wednesday, 22 November 2023 at 14:34
To: Martijn Katerbarg <[email protected]>, 
[email protected] <[email protected]>, Tim Hollebeek 
([email protected]) <[email protected]>
Subject: RE: Ballot CSC-??: High Risk Requirements Update 

Hi Martijn, 

For clarification, for the following two paragraphs which have been deleted, 
you would like the first deleted and the second to remain: 

Prior to issuing a Code Signing Certificate, each CA SHOULD check at least one 
database containing information about known or suspected producers, publishers, 
or distributors of Suspect Code, as identified or indicated by an Anti-Malware 
Organization and any database of deceptive names maintained by an Application 
Software Provider. The CA MUST determine whether the entity is identified as 
requesting a Code Signing Certificate from a High Risk Region of Concern. The 
CA MUST also maintain and check an internal database listing Certificates 
revoked due to Code Signatures on Suspect Code and previous certificate 
requests rejected by the CA. 

A CA identifying a high risk application under this section MUST follow the 
additional procedures defined in [Section 
4.2.2](#422-approval-or-rejection-of-certificate-applications) of this document 
to ensure that the applicant will protect its Private Keys and not sign Suspect 
Code. 

If so, I agree to this change. Please confirm. 

@Tim Hollebeek ([email protected]) <mailto:[email protected]> 
does this work for you? 


Thanks, Bruce. 

From: Martijn Katerbarg <[email protected]> 
Sent: Wednesday, November 22, 2023 3:32 AM
To: Bruce Morton <[email protected]>; [email protected]
Subject: [EXTERNAL] Re: Ballot CSC-??: High Risk Requirements Update 



Bruce, I’ve added a single comment on the PR, as I think we’ve removed one 
paragraph too much. Other than that, I’m also happy to endorse. 

Regards,

Martijn 

From: Cscwg-public <[email protected] 
<mailto:[email protected]>> on behalf of Bruce Morton via 
Cscwg-public <[email protected] <mailto:[email protected]>>
Date: Tuesday, 21 November 2023 at 20:25
To: [email protected] <mailto:[email protected]> 
<[email protected] <mailto:[email protected]>>
Subject: [Cscwg-public] Ballot CSC-??: High Risk Requirements Update 

CAUTION: This email originated from outside of the organization. Do not click 
links or open attachments unless you recognize the sender and know the content 
is safe. 


Here is a draft of the High Risk Requirements update ballot. Looking for 
comments and 2 endorsers. There is no future effectivity date proposed, since 
the ballot does not add new requirements. 

Thanks, Bruce. 


Purpose of the Ballot 
This ballot updates the “Baseline Requirements for the Issuance and Management 
of Publicly‐Trusted Code Signing Certificates“ version 3.4 in order to clarify 
language regarding Signing Service and signing requests. The main goals of this 
ballot are to: 

1. Remove references to High Risk Certificate Request, since the CSBRs do not 
provide any actions for a high risk application. 
2. Remove references to High Risk Region of Concern, since the CSBR appendix 
has never been populated. 
3. Remove rules for a Takeover Attack to require the Subscriber to generate 
keys in a crypto device, since crypto device key generation is now a baseline 
requirement for all code signing certificates. 
4. Remove option to transfer private key which has been generated in software. 
5. Cleanup to remove Subscriber key generation option which expired effective 1 
June 2023. 
6. Cleanup to remove “any other method” to verify the Subscriber key was 
generated in a crypto device, since this option expired 1 June 2023. 
The following motion has been proposed by Bruce Morton of Entrust and endorsed 
by ?? and ??. 

MOTION BEGINS 

This ballot updates the “Baseline Requirements for the Issuance and Management 
of Publicly‐Trusted Code Signing Certificates” ("Code Signing Baseline 
Requirements") based on version 3.4. MODIFY the Code Signing Baseline 
Requirements as specified in the following redline: 
https://github.com/cabforum/code-signing/pull/31/files 
<https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fcabforum%2Fcode-signing%2Fpull%2F31%2Ffiles&amp;data=05%7C01%7Cmartijn.katerbarg%40sectigo.com%7C63edc95120b549fc269e08dbeac79efe%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C638361915320392388%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=gmqwV1FC70fTRYbrDtp%2B%2FJ8jzwupr0TaN5vmSa2%2BdoU%3D&amp;reserved=0>
 

MOTION ENDS 
The procedure for this ballot is as follows: Discussion (7 days) 

1. Start Time: TBD 
2. End Time: TBD 

Vote for approval (7 days) 

3. Start Time: TBD 
4. End Time: TBD 

Any email and files/attachments transmitted with it are intended solely for the 
use of the individual or entity to whom they are addressed. If this message has 
been sent to you in error, you must not copy, distribute or disclose of the 
information it contains. Please notify Entrust immediately and delete the 
message from your system. 






Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
Cscwg-public mailing list
[email protected]
https://lists.cabforum.org/mailman/listinfo/cscwg-public

Reply via email to