Hi all,

I commented on the GitHub issue
<https://github.com/cabforum/servercert/issues/370#issuecomment-1315408729>,
but if we're looking at changing this requirement, I think we should do so
from the perspective of making it better aligned with root program
expectations.

Many root program policies include the expectation that a CA's policies
conform with the latest version of the BRs. Over the past five years, we've
seen, on average, eight ballots adopted to modify the BRs each year. While
it's true that not all ballots necessitate a CA's policies are updated, I
suspect if we studied it closer, we'd probably see CAs would need to update
their CP a few times a year, on average, to satisfy root program policies
that require policy “freshness.”

I'm not strongly proposing we change the yearly minimum requirement but
instead expressing concern about increasing it beyond every 365 days.

Somewhat related, I think some simple improvements could be made regarding
file naming conventions on policy documents to make it easier for CAs to
demonstrate compliance with policy “freshness” requirements.

For example, assume we required the current version of a CP always to be
located at [$ca_repository_base_url]/cp.pdf], or an otherwise static URL.
As new versions of the CP are published, they would replace the document
hosted at [$ca_repository_base_url]/cp.pdf] or the static URL. "Archived"
versions would then be appended with the version # of the then superseded
document (e.g., a superseded document would transition from
[$ca_repository_base_url]/cp.pdf] to
[$ca_repository_base_url]/cp-[$previousVersion].pdf]). Ultimately, this
makes it very easy for interested parties to find the most current version
of a given document.


The same format can apply to CPSs or TSPSs. To accommodate CAs that
maintain multiple CPs, we’ll need to think about ways of differentiating
URLs.

Root programs interested in doing so (or CCADB) could then monitor the
"current" policy document URLs and more easily verify the update
requirement has been met (i.e., regularly curl and hash
$ca_repository_base_url]/cp.pdf, and report when a policy is about to or
has recently become stale). Thinking beyond the immediate capabilities of
CCADB, perhaps someday it could automatically track version changes to
policy documents as they are identified by changes to the hashed value of
$ca_repository_base_url]/cp.pdf - reducing workload required by CAs to make
sure CCADB records are accurate and updated in a timely manner.

And, while we’re thinking outside the box - would requiring policy
documents be maintained in a common format that easily supports diffs and
tracked changes (i.e., Markdown, as we maintain the BRs) - improve our
collective policy management and conformance efforts?

Thanks,

Ryan


On Tue, Nov 15, 2022 at 12:32 PM Ryan Hurst <[email protected]> wrote:

> That all seems reasonable to me.
>
> Ryan Hurst
>
> On Tue, Nov 15, 2022 at 9:25 AM 'Aaron Gable' via
> [email protected] <[email protected]> wrote:
>
>> Thoughts, in no particular order:
>> - I am in favor of changing the requirement from "annually" to "every X
>> days"; we've made similar changes to other requirements in the BRs and
>> consistency even across requirement-sets is good.
>> - Again from a consistency perspective, it's understood that "398 days"
>> means "a year, with some wiggle room", so I think that changing from
>> "annually" to "every 398 days" would be as close to a no-op as is
>> reasonable.
>> - I'm not a big fan of relaxing the requirement, even just by a month,
>> but I think that the consistency arguments above are sufficient to convince
>> me it's appropriate in this case.
>>
>> Aaron
>>
>> On Tue, Nov 15, 2022 at 8:32 AM Ben Wilson <[email protected]> wrote:
>>
>>> All,
>>>
>>> The purpose of this thread is to discuss changing the period of time
>>> required for updating CPs and CPSes (in item 4 of Section 3.3 of the
>>> Mozilla Root Store Policy
>>> <https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/#33-cps-and-cpses>).
>>> This is in relation to GitHub Mozilla PKI Issue #243
>>> <https://github.com/mozilla/pkipolicy/issues/243>. It has been
>>> suggested that the time period for updating a CP/CPS should be shorter than
>>> 365 days, at least for CPs and CPSes describing issuance of TLS server
>>> certificates, because the Baseline Requirements are updated much more
>>> frequently.
>>>
>>> I am not sure whether the same CP/CPS revision timeframe should apply to
>>> a CA that only has the email trust bit enabled.
>>>
>>> I like the phrasing that would be taken from the CA/Browser Forum's
>>> Baseline Requirements section 2.3.  As a start, it could be revised to read
>>> as follows:
>>>
>>> "The CA *operator *SHALL develop, implement, enforce, *review,* and
>>> annually update a Certificate Policy, and/or Certification Practice
>>> Statement*, or combined CP/CPS,* that describes in detail how the CA 
>>> *operator
>>> *implements the latest version of *this Policy and the* these *Baseline*
>>> Requirements. The CA SHALL indicate conformance with this requirement by
>>> incrementing the version number and adding a dated changelog entry *at
>>> least every X days*, even if no other changes are made to the
>>> document."
>>>
>>> Thanks,
>>>
>>> Ben
>>>
>>> --
>>> You received this message because you are subscribed to the Google
>>> Groups "[email protected]" group.
>>> To unsubscribe from this group and stop receiving emails from it, send
>>> an email to [email protected].
>>> To view this discussion on the web visit
>>> https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtab0Nme4EyHyXHGs6Lb%3DaCTG5T22tnc8V4%3DcV1uEnXuyOw%40mail.gmail.com
>>> <https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtab0Nme4EyHyXHGs6Lb%3DaCTG5T22tnc8V4%3DcV1uEnXuyOw%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>> .
>>>
>> --
>> You received this message because you are subscribed to the Google Groups
>> "[email protected]" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to [email protected].
>> To view this discussion on the web visit
>> https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CAEmnErcQZkJ8G2i68MknTe7noaFVmzNRmxJFSjjD_Pj6we%2B18g%40mail.gmail.com
>> <https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CAEmnErcQZkJ8G2i68MknTe7noaFVmzNRmxJFSjjD_Pj6we%2B18g%40mail.gmail.com?utm_medium=email&utm_source=footer>
>> .
>>
> --
> You received this message because you are subscribed to the Google Groups "
> [email protected]" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> To view this discussion on the web visit
> https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CALVZKwY9TnZ6Qf7pOwC1jsCf5yOdJBKcHb-F-CUvoPAQm6Y%2BPQ%40mail.gmail.com
> <https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CALVZKwY9TnZ6Qf7pOwC1jsCf5yOdJBKcHb-F-CUvoPAQm6Y%2BPQ%40mail.gmail.com?utm_medium=email&utm_source=footer>
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CADEW5O8M%3DH3hKhHxXikQba4eTGGzf8XOuWRhUOjHb0n4tfKBeg%40mail.gmail.com.

Reply via email to