On Monday, March 20, 2017 at 9:50:38 AM UTC-7, Gervase Markham wrote:
> On 17/03/17 15:30, Gervase Markham wrote:
> > The URL for the draft of the next CA Communication is here:
> > https://mozilla-mozillacaprogram.cs54.force.com/Communications/CACommunicationSurveySample?CACommunicationId=a050S000000G3K2
> 
> * Action 1 should say that if in future additional specific methods are
> defined by the CAB Forum, then they will be permitted also.

added

> 
> * Clarifying: "so the subsections of version 3.2.2.4 that are marked
> "Reserved" in version 1.4.2 of the BRs are still BR-compliant" -> "so
> the subsections of section 3.2.2.4 in 1.4.1 that are marked "Reserved"
> in version 1.4.2 of the BRs are still BR-compliant under 1.4.2".

done

> 
> * Action 1: Kathleen, I believe you said that 1/1/2016 is the earliest
> date the widget will do, but the text asks for 1/1/2015 (if you don't
> have the Websites trust bit)?

Turns out that the date widget in the survey tool allows for 1/1/2015. 

(I had previously tested the date widget within Salesforce records)

> 
> * Action 2: as the two choices are mutually exclusive, I would expect
> radio buttons rather than a checkbox.

done

> 
> * Action 3: "in github" -> "on Github".

done

> 
> * Action 5: policy 2.4 has some of these requirements but not all. I've
> filed an issue to add any extra ones.
> https://github.com/mozilla/pkipolicy/issues/66

Thanks.

> 
> * Action 7: some of the BR Compliance bugs relate to CAs which are no
> longer trusted, like StartCom. If StartCom does become a trusted CA
> again, it will be with new systems which most likely do not have the
> same bugs. Should we close the StartCom compliance bugs?

Yes, I think that makes sense.


> 
> * Action 7: I have updated these bugs to have a convention of putting
> the CA name at the start of the bug summary. This allows sorting "by CA"
> if you sort by Summary.

Good idea. Added to
https://wiki.mozilla.org/CA_Bug_Triage#CA_Certificate_Issuance_Problems_and_Incidents

I will be updating all of the open CA Incident and BR Compliance bugs to move 
them into a new component: 
mozilla.org :: CA Certificates Mis-Issuance

(Currently these bugs may be found in NSS :: CA Certificates and mozilla.org :: 
CA Certificates.)

While I'm at it, I'll update the bug summary as you suggested, and I'll update 
the whiteboard:
[ca-investigation] -- Concern has been raised about certificates that a CA has 
issued. Investigation and/or discussion in progress.
[ca-incident-response] -- The concern about a CA's certificates has been 
confirmed, and the CA has follow-up action items
[ca-compliance] -- The concern about a CA's certificates is in regards to 
failure to comply with Mozilla policy and/or the CA/Browser Forum's Baseline 
Requirements, and is determined to not be an imminent security concern. 

Then I'll update https://wiki.mozilla.org/CA/ca-bugs to use the new whiteboard 
tags.


> 
> * Action 8: Can we provide more structure here, by perhaps putting some
> boilerplate text in the answer box or something like that? Or at least
> list the sections and actions we expect to have been done?

Changed to checkboxes and a follow-up text field. Please review.

> 
> I would also like to add the following questions/actions:
> 
> A) Does your CA have an RA program, whereby non-Affiliates of your
> company perform aspects of certificate validation on your behalf under
> contract? If so, please tell us about the program, including:
> 
> * How many companies are involved
> * Which of those companies do their own domain ownership validation
> * What measures you have in place to ensure this work is done to an
> appropriate standard
> 
> If you do not have an RA program, write "Not Applicable".
> 
> <Free text box>

added

> 
> B) Your attention is drawn to the cablint and x509lint tools, which you
> may wish to incorporate into your certificate issuance pipeline to get
> early warning of circumstances when you are issuing certificates which
> do not meet the Baseline Requirements (cablint) or X509 standards
> (x509lint).
> 
> https://github.com/kroeckx/x509lint
> XXX What's the URL for cablint?
> 
> [ ] I am now aware of these tools


Added


> 
> C) CAA
> 
> The CAB Forum recently passed ballot 187, which updated the Baseline
> Requirements to make CAA (RFC 6844) checking mandatory at time of
> certificate issuance in almost all circumstances. Please provide a list
> of the domain names which your CA plans to recognise in a CAA record's
> issue and issuewild property tags as permitting it to issue. If certain
> identifiers only permit under certain circumstances, please explain.
> 
> <Free text box>
> 
> Mozilla plans to make a central list of these identifiers.


Added, but please carefully review -- not sure I got it correct. 


> 
> D) Problem Reporting Mechanism
> 
> Please explain how your CA meets the following requirement from the BRs
> section 4.9.3:
> 
> “The CA SHALL provide Subscribers, Relying Parties, Application Software
> Suppliers, and other third parties with clear instructions for reporting
> suspected Private Key Compromise, Certificate misuse, or other types of
> fraud, compromise, misuse, inappropriate conduct, or any other matter
> related to Certificates. The CA SHALL publicly disclose the instructions
> through a readily accessible online means.”
> 
> Please detail both the mechanism and the location(s) where you publicly
> disclose it. Mozilla plans to make a central list of these mechanisms.
> You are encouraged to make an email address at least one of your
> provided options.
> 
> <Free text box>


added


> 
> E) SHA-1 and S/MIME
> 
> Does your CA issue SHA-1 S/MIME certificates? If so, please explain your
> plans for ceasing to do so, and any self-imposed or external deadlines
> you are planning to meet. Mozilla plans to make policy in this area in
> the future, so please explain any facts or constraints which you think
> might be relevant to our considerations.
> 
> If none of your roots have the Email trust bit set, write "Not Applicable".
> 
> <Free text box>
> 

added

Thanks,
Kathleen
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to