Hi Robin

I noticed this and mentioned it at time of voting - see attachment.

I think we should change the reference points to 4.2.1.

Regards
Mads

From: public-boun...@cabforum.org<mailto:public-boun...@cabforum.org> 
[mailto:public-boun...@cabforum.org] On Behalf Of Robin Alden
Sent: 7. september 2016 15:37
To: CABFPub
Subject: [cabfpub] Ballot 169 problem report

Ballot 169 - “Revised Validation Requirements” introduced text into section 
3.2.2.4 which refers to section 3.3.1.

“3.2.2.4
…
Completed confirmations of Applicant authority may be valid for the issuance of 
multiple certificates over time. In all cases, the confirmation must have been 
initiated within the time period specified in the relevant requirement (such as 
Section 3.3.1 of this document) prior to certificate issuance. For purposes of 
domain validation, the term Applicant includes the Applicant's Parent Company, 
Subsidiary Company, or Affiliate.
…“

Section 3.3.1 of the BRs now consists only of the section heading, with no body 
text.
“3.3.1. Identification and Authentication for Routine Re‐key”

The text which was at 3.3.1 in the guidelines when we started working on what 
became ballot 169 read:
Section 6.3.2 limits the validity period of Subscriber Certificates. The CA MAY 
use the documents and data
provided in Section 3.2 to verify certificate information, provided that the CA 
obtained the data or document
from a source specified under Section 3.2 no more than thirty‐nine (39) months 
prior to issuing the
Certificate.
(taken from version 1.3.0 of the BRs)

That text now appears as the third paragraph of 4.2.1 (Performing 
Identification and Authentication Functions)

Should we move that text back into 3.3.1, or should we change 3.2.2.4 so that 
the reference points to 4.2.1 instead of pointing to 3.3.1?

Regards
Robin Alden
Comodo

--- Begin Message ---
Buypass votes YES.

All references to Section 3.1.1 should be changed to Section 4.2.1 (the content 
was moved in ballot 168).

Regards
Mads

From: public-boun...@cabforum.org [mailto:public-boun...@cabforum.org] On 
Behalf Of Ben Wilson
Sent: 28. juli 2016 20:10
To: CABFPub
Subject: Re: [cabfpub] Ballot 169 - Revised Validation Requirements

Here is the revised Ballot 169


Ballot 169 - Revised Validation Requirements

The following motion has been proposed by Jeremy Rowley of DigiCert and 
endorsed by Tim Hollebeek of Trustwave and Doug Beattie of GlobalSign:

Background:  The primary purpose of this change is to replace Domain Validation 
item 7 "Using any other method of confirmation which has at least the same 
level of assurance as those methods previously described" with a specific list 
of the approved domain validation methods (including new methods proposed by 
Members). This ballot also tightens up and clarifies the existing Domain 
Validation methods 1 through 6. This revised BR 3.2.2.4 describes the methods 
that CAs may use to confirm domain ownership or control. Other validation 
methods can be added in the future.

The Validation Working Group believes the domain validation rules should follow 
the current BR 3.2.2.4 structure as much as possible so the changes are easy to 
understand, be worded as simply and clearly as possible so as to be easily 
implemented by CAs worldwide, and should avoid unnecessary complications or 
additional requirements that don’t address a realistic security threat. If a 
Forum Member believes that any new requirements to these validation methods 
should be added, the Validation Working Group would prefer that the new 
requirements be proposed and discussed by separate ballot.

Attached is a redlined version of the Baseline Requirements and an explanatory 
table.
--Motion Begins--
Effective date: Prior to 1 March 2017,  CAs may use either the domain 
validation methods of BR 3.2.2.4 as they existed before this ballot was 
approved, or the domain validation methods as specified in this ballot (as they 
may subsequently be further amended), or both.  Effective 1 March 2017, CAs may 
use only the domain validation methods of BR 3.2.2.4 as specified in this 
ballot (or as such methods may subsequently be further amended).
Part A. In Section 1.6.1 of the Baseline Requirements INSERT the following 
definitions alphabetically:
Authorization Domain Name: The Domain Name used to obtain authorization for 
certificate issuance for a given FQDN. The CA may use the FQDN returned from a 
DNS CNAME lookup as the FQDN for the purposes of domain validation. If the FQDN 
contains a wildcard character, then the CA MUST remove all wildcard labels from 
the left most portion of requested FQDN. The CA may prune zero or more labels 
from left to right until encountering a Base Domain Name and may use any one of 
the intermediate values for the purpose of domain validation.
Authorized Port: One of the following ports: 80 (http), 443 (http), 115 (sftp), 
25 (smtp), 22 (ssh).
Base Domain Name: The portion of an applied-for FQDN that is the first domain 
name node left of a registry-controlled or public suffix plus the 
registry-controlled or public suffix (e.g. "example.co.uk" or "example.com").   
For FQDNs where the right-most domain name node is a gTLD having ICANN 
Specification 13 in its registry agreement, the gTLD itself may be used as the 
Base Domain Name.
Domain Contact: The Domain Name Registrant, technical contact, or 
administrative contract (or the equivalent under a ccTLD) as listed in the 
WHOIS record of the Base Domain Name or in a DNS SOA record.
Random Value: A value specified by a CA to the Applicant that exhibits at least 
112 bits of entropy.
Request Token: A value derived in a method specified by the CA which binds this 
demonstration of control to the certificate request.
The Request Token SHALL incorporate the key used in the certificate request.
A Request Token MAY include a timestamp to indicate when it was created.
A Request Token MAY include other information to ensure its uniqueness.
A Request Token that includes a timestamp SHALL remain valid for no more than 
30 days from the time of creation.
A Request Token that includes a timestamp SHALL be treated as invalid if its 
timestamp is in the future.
A Request Token that does not include a timestamp is valid for a single use and 
the CA SHALL NOT re-use it for a subsequent validation.
The binding SHALL use a digital signature algorithm or a cryptographic hash 
algorithm at least as strong as that to be used in signing the certificate 
request.
Required Website Content: Either a Random Value or a Request Token, together 
with additional information that uniquely identifies the Subscriber, as 
specified by the CA.
Test Certificate: A Certificate with a maximum validity period of 30 days and 
which: (i) includes a critical extension with the specified Test Certificate 
CABF OID, or (ii) is issued under a CA where there are no certificate 
paths/chains to a root certificate subject to these Requirements.
Part B. DELETE Section 3.2.2.4 of the Baseline Requirements in its entirety and 
INSERT the following:
3.2.2.4 Validation of Domain Authorization or Control
This section defines the permitted processes and procedures for validating the 
Applicant's ownership or control of the domain.
The CA SHALL confirm that, as of the date the Certificate issues, either the CA 
or a Delegated Third Party has validated each Fully-Qualified Domain Name 
(FQDN) listed in the Certificate using at least one of the methods listed below.
Completed confirmations of Applicant authority may be valid for the issuance of 
multiple certificates over time. In all cases, the confirmation must have been 
initiated within the time period specified in the relevant requirement (such as 
Section 3.3.1 of this document) prior to certificate issuance. For purposes of 
domain validation, the term Applicant includes the Applicant's Parent Company, 
Subsidiary Company, or Affiliate.
Note: FQDNs may be listed in Subscriber Certificates using dNSNames in the 
subjectAltName extension or in Subordinate CA Certificates via dNSNames in 
permittedSubtrees within the Name Constraints extension.
3.2.2.4.1 Validating the Applicant as a Domain Contact
Confirming the Applicant's control over the FQDN by validating the Applicant is 
the Domain Contact directly with the Domain Name Registrar. This method may 
only be used if:

  1.  The CA authenticates the Applicant's identity under BR Section 3.2.2.1 
and the authority of the Applicant Representative under BR Section 3.2.5, OR
  2.  The CA authenticates the Applicant's identity under EV Guidelines Section 
11.2 and the agency of the Certificate Approver under EV Guidelines Section 
11.8; OR
  3.  The CA is also the Domain Name Registrar, or an Affiliate of the 
Registrar, of the Base Domain Name.
3.2.2.4.2 Email, Fax, SMS, or Postal Mail to Domain Contact
Confirming the Applicant's control over the FQDN by sending a Random Value via 
email, fax, SMS, or postal mail and then receiving a confirming response 
utilizing the Random Value. The Random Value MUST be sent to an email address, 
fax/SMS number, or postal mail address identified as a Domain Contact.
Each email, fax, SMS, or postal mail MAY confirm control of multiple 
Authorization Domain Names.
The CA or Delegated Third Party MAY send the email, fax, SMS, or postal mail 
identified under this section to more than one recipient provided that every 
recipient is identified by the Domain Name Registrar as representing the Domain 
Name Registrant for every FQDN being verified using the email, fax, SMS, or 
postal mail.
The Random Value SHALL be unique in each email, fax, SMS, or postal mail.
The CA or Delegated Third Party MAY resend the email, fax, SMS, or postal mail 
in its entirety, including re-use of the Random Value, provided that the 
communication's entire contents and recipient(s) remain unchanged.
The Random Value SHALL remain valid for use in a confirming response for no 
more than 30 days from its creation. The CPS MAY specify a shorter validity 
period for Random Values, in which case the CA MUST follow its CPS.
3.2.2.4.3 Phone Contact with Domain Contact
Confirming the Applicant's control over the requested FQDN by calling the 
Domain Name Registrant's phone number and obtaining a response confirming the 
Applicant's request for validation of the FQDN. The CA or Delegated Third Party 
MUST place the call to a phone number identified by the Domain Name Registrar 
as the Domain Contact.
Each phone call SHALL be made to a single number and MAY confirm control of 
multiple FQDNs, provided that the phone number is identified by the Domain 
Registrar as a valid contact method for every Base Domain Name being verified 
using the phone call.
3.2.2.4.4 Constructed Email to Domain Contact
Confirming the Applicant's control over the requested FQDN by (i) sending an 
email to one or more addresses created by using 'admin', 'administrator', 
'webmaster', 'hostmaster', or 'postmaster' as the local part, followed by the 
at-sign ("@"), followed by an Authorization Domain Name, (ii) including a 
Random Value in the email, and (iii) receiving a confirming response utilizing 
the Random Value.
Each email MAY confirm control of multiple FQDNs, provided the Authorization 
Domain Name used in the email is an Authorization Domain Name for each FQDN 
being confirmed
The Random Value SHALL be unique in each email.
The email MAY be re-sent in its entirety, including the re-use of the Random 
Value, provided that its entire contents and recipient SHALL remain unchanged.
The Random Value SHALL remain valid for use in a confirming response for no 
more than 30 days from its creation. The CPS MAY specify a shorter validity 
period for Random Values, in which case the CA.
3.2.2.4.5 Domain Authorization Document
Confirming the Applicant's control over the requested FQDN by relying upon the 
attestation to the authority of the Applicant to request a Certificate 
contained in a Domain Authorization Document. The Domain Authorization Document 
MUST substantiate that the communication came from the Domain Contact. The CA 
MUST verify that the Domain Authorization Document was either (i) dated on or 
after the date of the domain validation request or (ii) that the WHOIS data has 
not materially changed since a previously provided Domain Authorization 
Document for the Domain Name Space.
3.2.2.4.6 Agreed-Upon Change to Website
Confirming the Applicant's control over the requested FQDN by confirming one of 
the following under the "/.well-known/pki-validation" directory, or another 
path registered with IANA for the purpose of Domain Validation, on the 
Authorization Domain Name that is accessible by the CA via HTTP/HTTPS over an 
Authorized Port:

  1.  The presence of Required Website Content contained in the content of a 
file or on a web page in the form of a meta tag. The entire Required Website 
Content MUST NOT appear in the request used to retrieve the file or web page, or
  2.  The presence of the Request Token or Request Value contained in the 
content of a file or on a webpage in the form of a meta tag where the Request 
Token or Random Value MUST NOT appear in the request.
If a Random Value is used, the CA or Delegated Third Party SHALL provide a 
Random Value unique to the certificate request and SHALL not use the Random 
Value after the longer of (i) 30 days or (ii) if the Applicant submitted the 
certificate request, the timeframe permitted for reuse of validated information 
relevant to the certificate (such as in Section 3.3.1 of these Guidelines or 
Section 11.14.3 of the EV Guidelines).
Note: Examples of Request Tokens include, but are not limited to: (i) a hash of 
the public key; (ii) a hash of the Subject Public Key Info [X.509]; and (iii) a 
hash of a PKCS#10 CSR. A Request Token may also be concatenated with a 
timestamp or other data. If a CA wanted to always use a hash of a PKCS#10 CSR 
as a Request Token and did not want to incorporate a timestamp and did want to 
allow certificate key re-use then the applicant might use the challenge 
password in the creation of a CSR with OpenSSL to ensure uniqueness even if the 
subject and key are identical between subsequent requests. This simplistic 
shell command produces a Request Token which has a timestamp and a hash of a 
CSR. E.g. echo date -u +%Y%m%d%H%M sha256sum <r2.csr | sed "s/[ -]//g" The 
script outputs: 
201602251811c9c863405fe7675a3988b97664ea6baf442019e4e52fa335f406f7c5f26cf14f 
The CA should define in its CPS (or in a document referenced from the CPS) the 
format of Request Tokens it accepts.
3.2.2.4.7 DNS Change
Confirming the Applicant's control over the requested FQDN by confirming the 
presence of a Random Value or Request Token in a DNS TXT or CAA record for an 
Authorization Domain Name or an Authorization Domain Name that is prefixed with 
a label that begins with an underscore character.
If a Random Value is used, the CA or Delegated Third Party SHALL provide a 
Random Value unique to the certificate request and SHALL not use the Random 
Value after (i) 30 days or (ii) if the Applicant submitted the certificate 
request, the timeframe permitted for reuse of validated information relevant to 
the certificate (such as in Section 3.3.1 of these Guidelines or Section 
11.14.3 of the EV Guidelines).
3.2.2.4.8 IP Address
Confirming the Applicant's control over the requested FQDN by confirming that 
the Applicant controls an IP address returned from a DNS lookup for A or AAAA 
records for the FQDN in accordance with section 3.2.2.5.
3.2.2.4.9 Test Certificate
Confirming the Applicant's control over the requested FQDN by confirming the 
presence of a non-expired Test Certificate issued by the CA on the 
Authorization Domain Name and which is accessible by the CA via TLS over an 
Authorized Port for the purpose of issuing a Certificate with the same Public 
Key as in the Test Certificate.
3.2.2.4.10. TLS Using a Random Number
Confirming the Applicant's control over the requested FQDN by confirming the 
presence of a Random Value within a Certificate on the Authorization Domain 
Name which is accessible by the CA via TLS over an Authorized Port.
--Motion Ends—
The review period for this ballot shall commence immediately and close at 2200 
UTC on Friday, 29 July 2016. Unless the motion is withdrawn during the review 
period, the voting period will start immediately thereafter and will close at 
2200 UTC on Friday, 5 August 2016. Votes must be cast by posting an on-list 
reply to this thread.
A vote in favor of the motion must indicate a clear 'yes' in the response. A 
vote against must indicate a clear 'no' in the response. A vote to abstain must 
indicate a clear 'abstain' in the response. Unclear responses will not be 
counted. The latest vote received from any representative of a voting member 
before the close of the voting period will be counted. Voting members are 
listed here: https://cabforum.org/members/
In order for the motion to be adopted, two thirds or more of the votes cast by 
members in the CA category and greater than 50% of the votes cast by members in 
the browser category must be in favor. Quorum is currently ten (10) members– at 
least ten members must participate in the ballot, either by voting in favor, 
voting against, or abstaining.


_______________________________________________
Public mailing list
Public@cabforum.org
https://cabforum.org/mailman/listinfo/public

--- End Message ---
_______________________________________________
Public mailing list
Public@cabforum.org
https://cabforum.org/mailman/listinfo/public

Reply via email to