Ben, to better understand the rationale of the proposed requirement:
how does publishing a website whose TLS certificate is renewed every 30 days demonstrate that the CA actually performs such renewal in an automatic fashion?
TIA AdrianoIl 09/01/2025 04:58, 'Ben Wilson' via [email protected] ha scritto:
NOTICE: Pay attention - external email - Sender is dev-security-policy+bncbdipvhfqvuprbw4s7w5qmgqexhph...@mozilla.orgThanks, Dustin, that's correct.I'll edit the language and remove the reference to the automation endpoint URL. Currently, the CCADB has a field for each of type of certificate (IV, DV, OV, EV) to track the test websites, which we can enable for Mozilla's inclusion requests when this change is made to the MRSP. For example, there is a CCADB field identified as "EV Automation Test Certificate Website", the instructions for that field state, "If EV certificates are issued under this hierarchy, add the URL of the test website that includes a valid EV (2.23.140.1.1) certificate issued by ACME or other automated solution." That's the intent - to start collecting and monitoring these automated capabilities for new root inclusion requests.Thanks again for your review and clarification. BenOn Wed, Jan 8, 2025 at 2:51 PM Dustin Hollenback <[email protected]> wrote:Hi Ben, I fully support the goal of encouraging automation, but I'm a bit confused on this statement: "CA operators MUST disclose the URL for each such automation endpoint in the CCADB ..." I may be misinterpreting this to mean that the URL for an automation API is required to be published. In that case, I am hoping that the API details would not be required to be published, but instead only focus on the test websites. I understand providing a URL for where test certificates will be published to prove that they are updated every 30 days, but not sure why there'd be a requirement for an "automation endpoint" URL to be published. In our case, while we use non-ACME automation for DCV and issuance/renewals, the endpoints are not publicly accessible and restricted only to our Subscribers. For this proposal, would it be enough to provide a URL to the test certificates that are renewed every 30 days or less? Existing draft language: /CA operators MUST disclose the URL for each such automation endpoint in the CCADB and renew test certificates using such capability at least every 30 days to demonstrate compliance with these automation requirements./ Proposed draft language: /CA operators MUST renew test certificates using such capability at least every 30 days to demonstrate compliance with these automation requirements and disclose the URL for each test site in the CCADB./ Thank you, Dustin *From:* 'Ben Wilson' via [email protected] <[email protected]> *Sent:* Wednesday, January 8, 2025 1:17 PM *To:* [email protected] <[email protected]> *Subject:* [EXTERNAL] MRSP 3.0: Issue #283: Automation of certificate issuance and renewal All, This email starts a discussion related to GitHub Issue #283 <https://github.com/mozilla/pkipolicy/issues/283> and Section 7.1 of the Mozilla Root Store Policy (MRSP), which deals with new root inclusions. The purpose of this proposal is to encourage automation. Currently, the proposed amendment to section 7.1 of the MRSP, as drafted in GitHub <https://github.com/BenWilson-Mozilla/pkipolicy/commit/9f933ac3f1829418554da8aa24ea2a20174852df>, states, "Additionally, CA operators applying for inclusion of new TLS-issuing root certificates MUST demonstrate support for at least one automated method of certificate issuance for each type of TLS certificate (EV, OV, DV, IV) that the CA issues. This means (1) automated domain control validation, as defined in the TLS Baseline Requirements; and (2) automated certificate issuance and retrieval processes. Such automated methods MUST minimize hands-on human input during routine certificate issuance and renewal processes and comply with the TLS Baseline Requirements, and EV Guidelines, if applicable. Acceptable "hands-on" input includes initial software setup, configuration, updates, and identity verification where required. CA operators MUST disclose the URL for each such automation endpoint in the CCADB and renew test certificates using such capability at least every 30 days to demonstrate compliance with these automation requirements." This language needs some wordsmithing. Also, I have not yet added any language to address automated renewal. Suggested language is welcome. In the interest of brevity, additional guidance and/or specifics of implementation would be included in a wiki page, and it is a goal for these to be similar to those in the Chrome Root Program Policy, so that the impact on CA operators would be minimal. Thanks, Ben -- You received this message because you are subscribed to the Google Groups "[email protected]" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaZSvQWjAjBseFN1A1TNGk5LD6_07xOm9LuL8T_8sLupmg%40mail.gmail.com <https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaZSvQWjAjBseFN1A1TNGk5LD6_07xOm9LuL8T_8sLupmg%40mail.gmail.com?utm_medium=email&utm_source=footer>. --You received this message because you are subscribed to the Google Groups "[email protected]" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected] . To view this discussion visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaZsNmb03GfvaNWJdcD3sWFwms%2BsroAd7bhaR1nUruPyyQ%40mail.gmail.com <https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaZsNmb03GfvaNWJdcD3sWFwms%2BsroAd7bhaR1nUruPyyQ%40mail.gmail.com?utm_medium=email&utm_source=footer> .
-- You received this message because you are subscribed to the Google Groups "[email protected]" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/101e36dc-9b0c-4cd5-8536-b7c1c50feeac%40staff.aruba.it.
smime.p7s
Description: Firma crittografica S/MIME
