On Mon, Apr 2, 2018 at 9:03 PM, Jakob Bohm via dev-security-policy <
[email protected]> wrote:

> On 03/04/2018 02:15, Wayne Thayer wrote:
>
>> On Mon, Apr 2, 2018 at 4:36 PM, Jakob Bohm via dev-security-policy <
>> [email protected]> wrote:
>>
>>
>>> While Entrust happens to do this, as a relying party, I dislike frequent
>>> updates to CP/CPS documents just for such formal changes.
>>>
>>> This creates a huge loophole. The CP/CPS is the master set of policies
>>> the
>>>
>> TSP agrees to be bound by and audited against. If a TSP doesn't include a
>> new subCA certificate in the scope of their CP/CPS, then from an audit
>> perspective  there is effectively no policy that applies to the subCA.
>> Similarly, if the TSP claims to implement a new policy but doesn't include
>> it in their CP/CPS, then the audit will not cover it (unless it's a BR
>> requirement that has made it into the BR audit criteria).
>>
>>
> If the CP/CPS states as an auditable requirements that all SubCAs are
> logged in the trusted hardware of the root CA HSM, listed in the
> dedicated public document and audited, there is no need for that list to
> be included verbatim in the CP/CPS any more than there is a need for
> most other routine activities to change the CP/CPS.
>

This is not true. A CP/CPS is not bound to the organization, it's bound to
specific operations, and as such, the creation of a subCA by an
organization has no implicit binding to a CP/CPS.


>
> This is because the CP/CPS is a lengthy legal document which relying
>>
>>> parties are "supposed to" read and understand.  Thus each such needless
>>> change generates a huge wave of millions of relying parties being
>>> supposed to obtain and read through that document, a complete waste of
>>> our time as relying parties.
>>>
>>> I think you're confusing the Relying Party Agreement with the CP/CPS.
>>> Even
>>>
>> so, you've pointed out that it is absurd to use this as an argument
>> against
>> regular CP/CPS updates.
>>
>>
> Relying party agreements (and subscriber agreements too) often
> incorporate the CP/CPS by reference.


Can you point out to where that's required by Mozilla policy or by the
Baseline Requirements?


> TSPs are now required to maintain change logs in their CP/CPS.  Would not a
>> quick glance at that meet your needs?
>>
>
> Only to the extent such logs are sufficient to determine how much of the
> document is literally (not just subjectively) unchanged.  And provided
> any conflict between the change log and the actual document shall be
> resolved to the benefit of all third parties.
>

What? No.


> It is much more reasonable, from a relying party perspective, for such
>>
>>> informational details to be in a parallel document and/or be postponed
>>> until a scheduled annual or rarer document update (Yes I am aware of the
>>> BR that such needless updates be done annually for no reason at all).
>>>
>>> How would you distinguish between details and material changes? I would
>>>
>> argue that a new subCA certificate is more than an informational detail.
>>
>>
> Details include such routine numerical changes as date of last review
> (where that review does not result in any other change), changing the
> list of CA certificates or changing the name brand of HSM hardware,
> exact locations of technical facilities (as opposed to changing the
> country and jurisdiction) etc.
>

These are all material and substantial changes.


> Substantial changes are things that could actually affect the
> willingness of parties to trust or request certificates, such as the
> used validation methods, the contracting entity, the jurisdiction
> capable of interfering with operations and issuance etc.
>
>
> The point of the BR requirement is to create some documentation indicating
>> that a TSP is regularly reviewing and updating their CP/CPS.
>>
>>
> However that could equally just be a management statement (copied in the
> audit report if necessary), that the CP/CPS was reviewed on YYYY/MM/DD
> and found to remain compliant to BRs version X.Y.Z. Mozilla policy
> version A.B, ETSI standard EEE EEE and that the actual practice remains
> within its limits.
>
> There could also be restricting legal addendums saying things like
> "Although our current CPS allows us to issue 5 year certificates based
> on a sworn statement from a notary public, we will not and have not done
> so since YYYY/MM/DD".  Such addendums would be to satisfy those who no
> longer accept that particular practice but would have no effect on the
> relationship with parties that accept the CPS including the option to do
> so.


These all sound like rather terrible ideas, and while having been adopted
by some CAs in the past, are shown to be regularly problematic as to
forming a meaningful opinion as to whether the CA is themselves
trustworthy, particularly such CAs that argue for 'hidden' addendums, as
has happened in the past.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to