On Mon, Jan 16, 2017 at 3:30 AM, Gervase Markham <[email protected]> wrote:
> On 13/01/17 01:56, Ryan Sleevi wrote:
>> Notably, 1.3.7 also has IP encumbrances - and uncertainty - the same
>> as 1.4.1, so presumably, Mozilla is OK with having encumbered methods
>> included. Considering some of these exclusions have existed since the
>> BR's adoption, that doesn't seem an unreasonable conclusion.
>
> This is a fair point, to a degree. IP issues with the documented methods
> are not avoided just because they are documented in a document which
> existed before the disclosures were finally properly filed.
>
>> So what's the difference between 1.3.7 and 1.4.1?
>> - A few methods were introduced which may or may not be encumbered
>> - The ability for the CA to select anything they want to argue is
>> equivalent is removed
>>
>> I would presume that your contention with 139 is not because new
>> methods were (potentially) encumbered, but on the basis that it
>> removes the any other method.
>
> Yes, I think that's more it. I was nervous about removing that "escape
> hatch" for CAs before the IPR questions were more fully settled.
>
>> Given that there are other methods
>> available (as reaffirmed by Ballot 181) that have no encumbrances by
>> CA/B Forum members, and given that potentially *any or all* of the
>> methods used may be encumbered by non-Forum members (who have no
>> obligation to disclose), it does not seem that it creates any new
>> meaningful risk for Mozilla to impose 1.4.1 upon CAs.
>
> It's true that the passing of 181, which had not happened when I
> prepared my original thoughts for this Github issue, does clarify
> matters. And it includes at least one 'unencumbered' automatable method.
>
>> Given that you can always revisit it if a CA can provide demonstrable
>> evidence of concern and proposed alternatives, without waiting on the
>> CA/Browser Forum, I'd like to encourage you that 1.4.1 is no worse
>> than 1.3.7, either technically or from an IP encumbrance perspective,
>> but is significantly and substantially better.
>
> The GoDaddy incident is relevant, I agree.
>
> OK, sold. Many recent changes to the BRs have been
> additionally-permissive, and so don't require a lead time for CAs to
> adopt. The most recent change which is not so is ballot 174, which
> changed the requirements about what CAs must put in their CPs and CPSes
> when their issuance practices conflict with the BRs due to local law.
> That passed on 29th August 2016, 4.5 months ago, and led to version
> 1.3.9. By the time we ship policy 2.4, I expect it'll be nearly 6 months.
>
> So we could move to 1.3.7, 1.4.1, or 1.4.2. So the real policy question
> here is:
>
> "Does Mozilla want to leave the 'any other method' option open to CAs
> and, if so, for how long?"
>
> If the answer is no, we should adopt 1.4.1 and require strict compliance
> (i.e. you can't actually use 1.4.2 or later) for section 3.2.2.4,
> although we might allow any later version for all other sections.
>
> If the answer is yes, we should adopt 1.4.2, and permit compliance to
> later versions. When we decide to stop permitting "any other method", we
> either update the version number to a later version of the BRs if it has
> that option removed by then, or we simply state that we don't allow it
> any more.
>
> Google's policy, AIUI, is that they are requiring strict 10-method
> compliance by the original effective date of ballot 169, which is 1st
> March 2017. I suspect we won't ship CA Policy 2.4 before that, although
> I'd like to ship soon after. Because of Google's requirement, I expect
> most CAs will be working towards that date anyway. So we could probably
> piggy-back on that.
>
> Comments?

It depends on what your view is with respect to the 'minimum' version
that is required under the existing Mozilla Policy.

BRs 1.3.0 ( https://cabforum.org/wp-content/uploads/CAB-Forum-BR-1.3.0.pdf
) already include the clause (in Section 2.2) that:
"The CA SHALL publicly give effect to these Requirements and represent
that it will adhere to the latest published version."

So despite Mozilla Policy requiring 1.3.0, up until the passage of
Ballots 180/181, CAs were already on the hook and expected to comply
with the BRs 1.4.1 - meaning implementing the methods of Ballot 169 by
1 March 2017.

Up until the questions by Apple in the Forum, there had not been any
debate or disagreement about what the 'latest published version' was,
either within the Forum or within mozilla.dev.security.policy. It's
unclear whether Mozilla shares Apple's interpretation about the
legitimacy of all versions of the BRs prior to 1.4.2, but based on
your replies, it does not seem you agree on substance. That is, BRs
1.3.0 were/are a valid version of the BRs, at least within the spirit
and intent of the Mozilla policy, and so too by that logic are
versions 1.3.7, 1.4.1, and 1.4.2, which were passed in the same
manner.

I mention all of this to highlight that, up until the passage of
Ballots 180/181, and the adoption of 1.4.2, Mozilla Policy was already
requiring that CAs comply with 169 by 1 March 2017, by virtue of
Section 2.2. If Mozilla agrees that Ballot 169 is still valuable, then
it seems something that can be simply be done as a CA communication
prior to/independent of the adoption of Mozilla Policy 2.4, and it
seems that the reference to a specific version in Policy 2.4 is
perhaps superflous, so long as the Section 2.2 remains in force in the
BRs.

Nothing in Ballot 169 would inherently contradict the text in Ballots
180/181. However, a CA conforming only to the BRs 1.4.2 would not be
sufficient, as Mozilla would simply communicate the above-and-beyond
expectation (using a CA communication), and then include it in the set
of updates for Policy 2.4 if the Forum hasn't already resolved the
issue(s) by then. But if your concern is that CAs haven't had time or
a clear communication about what's expected of them, hopefully Section
2.2 shows that they have (up until Jan 7 of this year).
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to