I don't think that's terribly germane to the discussion here, but you can
see more details at
https://cabforum.org/pipermail/public/2018-January/012851.html

As it relates to *this* discussion, however, is an understanding that the
current set of CA/Browser Forum issues with respect to adhering to its
Bylaws has a negative affect on the policy objectives and understanding,
and thus bear consideration in the CA communications.

On Fri, Jan 26, 2018 at 4:00 PM, James Burton <[email protected]> wrote:

> You really should set up a emergency conference call with all members of
> the CAB Forums and talk about these issues with chair. If you and other
> members feel that the answers are not satisfactory then you can vote
> to remove the Chair for dereliction of duty and place the sub-Chair in
> charge of the forums until the end of current term or until you appoint new
> chair.
>
> James
>
> On Fri, Jan 26, 2018 at 1:58 PM, Ryan Sleevi via dev-security-policy <
> [email protected]> wrote:
>
>> On Fri, Jan 26, 2018 at 5:43 AM Gervase Markham <[email protected]> wrote:
>>
>> > On 24/01/18 13:56, Ryan Sleevi wrote:
>> > >> more frequently when requirements change. I propose that we require
>> CAs
>> > to
>> > >> update their CPS to comply with version 2.5 of the Mozilla root store
>> > >> policy no later than 15-April 2018.
>> >
>> > I think Ryan is right here; the deadline for complying with most of the
>> > new changes was "immediately" - in part, that was due to the nature of
>> > the changes, in that this was possible, and also we put out a call for
>> > "does anyone need an implementation period for any of these things", and
>> > the only response was from Globalsign, which led to the modification of
>> > the email intermediate compliance dates.
>> >
>> > I realise that updating one's CPS to match changes in practice can't be
>> > done overnight - there are change control procedures - but taking 15
>> > months is ridiculous. We should get back to Microsec and tell them that
>> > this is unacceptable. If we do set a "new" deadline for CPS updates, it
>> > should be closer than mid-April, and we should update our policy to make
>> > it clear how fast we expect CPSes to be updated in the wake of
>> > "immediate" new requirements - either from a new version of the policy,
>> > or from some emergency action we take.
>> >
>> > > 2 should be inconsequential, but 1 has a very real effect -
>> unless/until
>> > > the CA updates their CP/CPS to explicitly state what methods they are
>> > using
>> > > (implicitly disavowing the 'any other method'), then a CA can receive
>> a
>> > > fully compliant audit, despite actively issuing certificates using
>> 'any
>> > > other method', in contravention of Mozilla Policy.
>> >
>> > Ryan: I thought you had previously made the case that all CAs actually
>> > had to abide by the latest version of the BRs? If that is so, then
>> > surely your point above is incorrect?
>>
>>
>> The CA/Browser Forum chair - an employee of Entrust - has been
>> irresponsibly derelict in his duties as Chair. He has failed to exercise
>> the Bylaws as required of him, has failed to inform the Forum about the IP
>> notices received (if any) or to update the Public Mail List and Public Web
>> Site, and as a result, created a situation where it is defensibly
>> ambiguous
>> as to whether only the “10 Blessed Methods” are used.
>>
>> It is unclear whether this is due to incompetence or malice, but the
>> consequence is such that a CA, such as Entrust, could attempt to argue
>> that
>> the CA/Browser Forum did not declare a version of the BRs post-Ballot 190
>> as Final, and thus avoid triggering that clause.
>>
>> The above remarks I highlighted would have allowed for a defense in depth
>> from the CA/Browser Forum chair failing or abusing their position, by
>> ensuring clear and unambiguous statements by CAs for security critical
>> matters.
>> _______________________________________________
>> dev-security-policy mailing list
>> [email protected]
>> https://lists.mozilla.org/listinfo/dev-security-policy
>>
>
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to