The proposed language includes the requirement for compliance with both the
BRs and Mozilla policy, so it's a better fit for the section of our policy
titled "Inclusions" than the section titled "Baseline Requirements
Conformance". To close out this discussion, I added the proposed language
to section 7.1:

https://github.com/mozilla/pkipolicy/commit/55929f58da98a7af08fbf4bc2eb4537991de481b

On Wed, Apr 11, 2018 at 11:02 PM, m.wiedenhorst--- via dev-security-policy <
[email protected]> wrote:

> Hi again,
>
> >Thank you for responding Matthias.
> >
> >On Wed, Apr 11, 2018 at 10:52 AM, m.wiedenhorst---
> >via dev-security-policy <[email protected]> wrote:
> >
> >>
> >> Hi Wayne
> >>
> >>> Can anyone say if an equivalent public-facing
> >>> report exists for ETSI audits? If so, I think we should require CAs to
> >>> provide these reports with their root inclusion requests.
> >>
> >> ETSI does require reports on key ceremonies (ETSI EN 319 411-1, 6.5.1
> g).
> >> But ETSI does NOT require these reports to be public.
> >>
> > Does ETSI ALLOW these reports to be public?
> > In other words, could Mozilla require CAs to publish them?
>
> Well, on the one hand ETSI does not mandate anything about these reports
> being public or non-public. Hence it is not required to make them public,
> but it would not be forbidden either.
>
> However, on the other hand in practical almost all key ceremony reports
> that I have either inspected during audits or even co-signed as the
> independent key ceremony auditor contained very detailed, internal
> information about the different steps of the performed ceremony and hence
> would never ever qualify for publication.
>
> Based on this feedback, I have decided not to push for a requirement that
CAs provide key generation ceremony audit reports at this time.

- Wayne
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to