Hi Rob,
That's correct. I'll mention that to the CCADB Steering Committee.
Thanks,
Ben

On Thu, Jan 9, 2025 at 2:05 AM Rob Stradling <[email protected]> wrote:

> > Currently, the CCADB has a field for each of type of certificate (IV,
> DV, OV, EV) to track the test websites
>
> Hi Ben.  Are you referring to these 4 fields that are currently in the
> "Google Chrome Fields" section of each *Root Certificate* record?
>
> Field: DV Automation Test Certificate Website
> Description: If DV certificates are issued under this hierarchy, add the
> URL of the test website that includes a valid DV (2.23.140.1.2.1)
> certificate issued by ACME or other automated solution.
>
> Field: OV Automation Test Certificate Website
> Description: If OV certificates are issued under this hierarchy, add the
> URL of the test website that includes a valid OV (2.23.140.1.2.2)
> certificate issued by ACME or other automated solution.
>
> Field: EV Automation Test Certificate Website
> Description: If EV certificates are issued under this hierarchy, add the
> URL of the test website that includes a valid EV (2.23.140.1.1) certificate
> issued by ACME or other automated solution.
>
> Field: IV Automation Test Certificate Website
> Description: If IV certificates are issued under this hierarchy, add the
> URL of the test website that includes a valid IV (2.23.140.1.2.3)
> certificate issued by ACME or other automated solution.
>
> If Mozilla intends to make use of these fields, then may I suggest moving
> them out of the Chrome-specific section?
>
> ------------------------------
> *From:* 'Ben Wilson' via [email protected] <
> [email protected]>
> *Sent:* 09 January 2025 03:58
> *To:* Dustin Hollenback <[email protected]>
> *Cc:* [email protected] <[email protected]>
> *Subject:* Re: [EXTERNAL] MRSP 3.0: Issue #283: Automation of certificate
> issuance and renewal
>
> This Message Is From an External Sender
> This message came from outside your organization.
> Report Suspicious
> <https://us-phishalarm-ewt.proofpoint.com/EWT/v1/J5K_pWsD!B8YZvmQVdwhyZrhvctKdwG8AegzIbtgZ4xvNRlqpP9snrPgjeCyig5pTH5H9Y5qvBIzOrF6w-uGIxnzT3YBwfFBiDk3iQy1eiB5cCeLZWqnn3Ch_yX_tOSUO$>
>
> Thanks, Dustin, that's correct.
> I'll edit the language and remove the reference to the automation endpoint
> URL. Currently, the CCADB has a field for each of type of certificate (IV,
> DV, OV, EV) to track the test websites, which we can enable for Mozilla's
> inclusion requests when this change is made to the MRSP.  For example,
> there is a CCADB field identified as "EV Automation Test Certificate
> Website", the instructions for that field state, "If EV certificates are
> issued under this hierarchy, add the URL of the test website that includes
> a valid EV (2.23.140.1.1) certificate issued by ACME or other automated
> solution."  That's the intent - to start collecting and monitoring these
> automated capabilities for new root inclusion requests.
> Thanks again for your review and clarification.
> Ben
>
> On Wed, Jan 8, 2025 at 2:51 PM Dustin Hollenback <
> [email protected]> wrote:
>
> Hi Ben,
>
>
>
> I fully support the goal of encouraging automation, but I'm a bit confused
> on this statement: "CA operators MUST disclose the URL for each such
> automation endpoint in the CCADB ..." I may be misinterpreting this to mean
> that the URL for an automation API is required to be published. In that
> case, I am hoping that the API details would not be required to be
> published, but instead only focus on the test websites.
>
>
>
> I understand providing a URL for where test certificates will be published
> to prove that they are updated every 30 days, but not sure why there'd be a
> requirement for an "automation endpoint" URL to be published. In our case,
> while we use non-ACME automation for DCV and issuance/renewals, the
> endpoints are not publicly accessible and restricted only to our
> Subscribers. For this proposal, would it be enough to provide a URL to the
> test certificates that are renewed every 30 days or less?
>
>
>
> Existing draft language:
> *CA operators MUST disclose the URL for each such automation endpoint in
> the CCADB and renew test certificates using such capability at least every
> 30 days to demonstrate compliance with these automation requirements.*
>
> Proposed draft language:
> *CA operators MUST renew test certificates using such capability at least
> every 30 days to demonstrate compliance with these automation requirements
> and disclose the URL for each test site in the CCADB.*
>
>
>
> Thank you,
>
>
>
>
>
> Dustin
>
>
> *From:* 'Ben Wilson' via [email protected] <
> [email protected]>
> *Sent:* Wednesday, January 8, 2025 1:17 PM
> *To:* [email protected] <[email protected]>
> *Subject:* [EXTERNAL] MRSP 3.0: Issue #283: Automation of certificate
> issuance and renewal
>
>
>
> All,
>
>
>
> This email starts a discussion related to GitHub Issue #283
> <https://urldefense.com/v3/__https://github.com/mozilla/pkipolicy/issues/283__;!!J5K_pWsD!2_nFjg7irJvIMkPTvi9m3wb4RjrekSmwUXZ8SdbgkUOqY9TC8N1L_WzAqCyRraMIPz6N9UQlo-_-Kysh9cyKk2dltg$>
>  and
> Section 7.1 of the Mozilla Root Store Policy (MRSP), which deals with new
> root inclusions.
>
>
>
> The purpose of this proposal is to encourage automation. Currently, the
> proposed amendment to section 7.1 of the MRSP, as drafted in GitHub
> <https://urldefense.com/v3/__https://github.com/BenWilson-Mozilla/pkipolicy/commit/9f933ac3f1829418554da8aa24ea2a20174852df__;!!J5K_pWsD!2_nFjg7irJvIMkPTvi9m3wb4RjrekSmwUXZ8SdbgkUOqY9TC8N1L_WzAqCyRraMIPz6N9UQlo-_-Kysh9czdt5E1VA$>,
> states,
>
>
>
> "Additionally, CA operators applying for inclusion of new TLS-issuing root
> certificates MUST demonstrate support for at least one automated method of
> certificate issuance for each type of TLS certificate (EV, OV, DV, IV) that
> the CA issues. This means (1) automated domain control validation, as
> defined in the TLS Baseline Requirements; and (2) automated certificate
> issuance and retrieval processes. Such automated methods MUST minimize
> hands-on human input during routine certificate issuance and renewal
> processes and comply with the TLS Baseline Requirements, and EV Guidelines,
> if applicable. Acceptable "hands-on" input includes initial software setup,
> configuration, updates, and identity verification where required. CA
> operators MUST disclose the URL for each such automation endpoint in the
> CCADB and renew test certificates using such capability at least every 30
> days to demonstrate compliance with these automation requirements."
>
>
>
> This language needs some wordsmithing.  Also, I have not yet added any
> language to address automated renewal. Suggested language is welcome.
>
>
>
> In the interest of brevity, additional guidance and/or specifics of
> implementation would be included in a wiki page, and it is a goal for these
> to be similar to those in the Chrome Root Program Policy, so that the
> impact on CA operators would be minimal.
>
>
>
> Thanks,
>
>
>
> Ben
>
> --
> You received this message because you are subscribed to the Google Groups "
> [email protected]" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> To view this discussion visit
> https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaZSvQWjAjBseFN1A1TNGk5LD6_07xOm9LuL8T_8sLupmg%40mail.gmail.com
> <https://urldefense.com/v3/__https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA*2B1gtaZSvQWjAjBseFN1A1TNGk5LD6_07xOm9LuL8T_8sLupmg*40mail.gmail.com?utm_medium=email&utm_source=footer__;JSU!!J5K_pWsD!2_nFjg7irJvIMkPTvi9m3wb4RjrekSmwUXZ8SdbgkUOqY9TC8N1L_WzAqCyRraMIPz6N9UQlo-_-Kysh9cx8yGuiog$>
> .
>
> --
> You received this message because you are subscribed to the Google Groups "
> [email protected]" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> To view this discussion visit
> https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaZsNmb03GfvaNWJdcD3sWFwms%2BsroAd7bhaR1nUruPyyQ%40mail.gmail.com
> <https://urldefense.com/v3/__https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA*2B1gtaZsNmb03GfvaNWJdcD3sWFwms*2BsroAd7bhaR1nUruPyyQ*40mail.gmail.com?utm_medium=email&utm_source=footer__;JSUl!!J5K_pWsD!2_nFjg7irJvIMkPTvi9m3wb4RjrekSmwUXZ8SdbgkUOqY9TC8N1L_WzAqCyRraMIPz6N9UQlo-_-Kysh9czwb5VoHQ$>
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaYitfXYnAgyJMVsboTynE4NOqTEFPByeAwOON4Cj05fNQ%40mail.gmail.com.

Reply via email to