Final Minutes for CA/Browser Forum Teleconference 27 April 2017 (as approved 
May 11, 2017))

Attendees: Arno Fiedler (D-Trust), Atsushi Inaba (Globalsign), Ben Wilson 
(DigicertBruce Morton (Entrust), Christopher Kemmerer (SSL.com), Connie Enke 
(SwissSign), Curt Spann (Apple), Dean Coclin (Symantec), Dimitris Zacharopoulos 
(Harica), Doug Beattie (Globalsign), Erwann Abalea (DocuSign), Fotis Loukos 
(SSL.com), Frank Corday (Trustwave), Geoff Keating, Apple, Gervase Markham 
(Mozilla), JC Jones (Mozilla), Josh Aas (Let's Encrypt), Ken Myers (US PKI), 
Kirk Hall (Entrust), Mads Henriksveen (BuyPass), Masakazu Asano (GlobalSign), 
Neil Dunbar, Trustcor, Peter Bowen (Amazon), Peter Miscovic, (Disig), Rich 
Smith (Comodo), Rick Andrews (Symantec), Robin Alden (Comodo), Ryan Sleevi 
(Google), Sissel Hoel, (Buypass), Tarah Wheeler (Symantec), Tim Shirley 
(Trustwave), Tyler Myers (GoDaddy), .

1.    Roll Call

2.    Read Antitrust Statement

3.    Review Agenda.  The Agenda was approved.


4.    (a) Approve Minutes of CABF teleconference of April 13, 2017 as amended.  
The Minutes were approved.



       (b) Complete F2F meeting minutes: Kirk noted that the following Minutes 
segments had not been posted to the wiki, and asked the volunteers to complete 
the missing Minutes:


Jeremy - Validation WG
Doug- Microsoft Program Update
Liang - 360 Update
Andrew Whalley - The Role and Relationship of the Forum

Kirk said he wasn't certain if anyone intended to post Minutes for the guest 
presentation by Eric Mill - GSA update.  He will ask Eric if he wants to 
provide minutes or a summary.  Kirk also noted that he had asked the leader of 
each breakout group for the three Future of Web sessions to provide Minutes, 
but none had done it so we will not provide Minutes for those sessions.

(c) Update on Cisco-provided WebEx account (Jos, Ben).  Kirk noted that Cisco 
had graciously created a WebEx account that the Forum could use for its 
teleconferences and also for working group meetings.  Ben and Dean said they 
would try using the new account for some working group meetings first.  
Credentials will only be provided to a limited number of leaders to avoid 
misuse.

5.    Governance Change Working Group update.  Dean said the WG was making good 
progress on draft amendments to the Bylaws.  We will start using Webex on our 
bi-weekly calls and the goal is to have a complete set of documents to 
implement the governance changes by the time of the next F2F meeting in June.

6.    Validation Working Group update.  Ben said the WG had met the prior week 
and worked on a number of draft ballots, which should be ready soon.

7.    Policy Review Working Group update.  Ben said the WG had a meeting just 
before this Forum meeting, and continued to work on clarifying the use of terms 
like CA, CA operator, etc. in the Baseline Requirements.  They were also trying 
to better incorporate RFC 5280 terminology in the BRs.

8.    Draft Code of Conduct.  Virginia was not on the call to review her draft 
of the proposed Code of Conduct.  Tarah, who had volunteered at the F2F to move 
forward with this project, said she had reviewed the draft and thanked Virginia 
for all her hard work.  There were no comments on the draft from the members.  
Kirk said the topic would be on the agenda for the next call, and he hoped 
Virginia could participate on that call to provide an overview.

9.    Ballot Status.  Kirk noted the status of the following ballots:

Ballots in voting period: Ballot 197 - Effective Date of Ballot 193 Provisions 
- Ends May 3.



Ballots in discussion period: Ballot 198 - .Onion Revisions - Ends May 1.  
Ballot 199 - Require commonName in Root and Intermediate Certificates - Ends 
May 2.



Ballots in IPR Review Period: Ballot 189 - Amend BR 6.1.7 to clarify signing by 
root keys (ends May 15); Ballot 194 -  Effective Date of Ballot 193 Provisions 
(ends May 16); Ballot 195 - CAA Fixup (ends May 18); Ballot 196 - Define "Audit 
Period" (ends May 18).



Kirk noted that other draft ballots had been listed on the Agenda, and asked if 
anyone wanted to discuss any ballots during the call.



Ballot 198: Ryan said the ballot adds to the EV Guidelines the Tor service 
descriptor because the onion name is essentially a truncated hash of the public 
key used to identify hidden services.  The subject is computed by generating a 
1024 bit RSA key and hashing that with SHA1; the truncated hash of that is then 
encoded and the onion name results.  In the discussion as to why we are 
permitting onion certificates, the goal is to ensure that there is no ambiguity 
as to how the naming is done.  In this ballot the goal is to ensure the certs 
issued for onion clearly identified the public key that they are attesting to 
so if someone is exploiting a SHA1 collision they will do so by generating a 
different public key.  A goal of the ballot is to put additional information in 
the EV certificate to make sure you are going to the right site.  In the 
original onion ballot it was not a required extension, so the intent in this 
ballot is to fix that oversight in the earlier drafting to make it mandatory.



Ballot 199: Gerv noted there was a discussion going on concerning the wisdom of 
allowing a certificate to be reissued with the same name but different 
metadata.  Gerv noted his draft ballot would not permit this.  Bruce had 
suggested the use of the same name might be useful in some circumstances, but 
had no concrete use cases - Gerv asked people to come forward if they had any.  
Kirk asked Gerv why the ballot was originally proposed, and Gerv said it was 
mainly housekeeping because the current rules would allow issuance of an 
intermediate with no common name in it, which seems wrong if you want to avoid 
ambiguity.



Ben asked if the ballot would prohibit reissuing a subordinate CA certificate 
that had the same public key, same common name, but different metadata in it.  
Gerv said that was what the current discussion was about.  Ryan noted there are 
a couple of attributes that arguably are in this gray area where we need more 
discussion and feedback, such as cross-certification cases and AIA where you 
later have to add that to assist in chain building.  This needs to be discussed 
because there are a lot of ways to reissue that cause negative security 
consequences, so we need to figure out what the positive use cases are to 
support those.



Bruce said Entrust definitely supported requiring common names.  If the ballot 
is just a clean up to put that in the BRs, then he supported it, but if it's 
also a security ballot then he's prefer that discussion happen separately, as 
the group has zero data on that.  Ryan said the ballot is a little of both - 
when you add the requirement of a common name you want to make sure you don't 
introduce additional risk or challenge.  Gerv thought that discussion might 
take more time than was left for Ballot 199's discussion period.  It would be 
more than a minor change to add permitted use cases to the ballot a day before 
voting starts.  On this basis, it might make more sense to remove the 
uniqueness constraint from this ballot and put in a future ballot.  Ryan said 
he saw a risk from someone reading these requirements and end up with the same 
FQDN for two different logical CAs with two different keys - a CA in Taiwan had 
run into this situation.



Gerv noted that the RFC key words used "should" for something you normally 
should do, but where exceptions were permitted for a good reason - maybe that 
should be used in this ballot instead of the current "must" for unique names 
for now, and we can come back later and change that if we decide that is too 
permissive.  Ryan agreed.  Peter mentioned the GIAG2 example of reusing the 
same key and name with changing other things in the certificate, plus we have 
seen several CAs change the key for the same name and use things like authority 
key identifier to disambiguate any end entity certs - so changing "must" to 
"should" in the ballot is a viable path forward.



Kirk noted there were about a dozen other pending ballots listed on the Agenda 
and asked if anyone wanted to talk about any of them.



Mandating RFC 3647 format.  Ryan noted he had put out two ideas (not listed as 
a ballot on the Agenda) and wanted feedback.  One touches on RFC 3647 and 
mandating its format in CPs and CPSs.  The current wording would require 
updating to that format by December 8.  One question was, should a CA's CP/CPS 
use the same headings and sections as RFC 3647 - the Forum has done that for 
its own Baseline Requirements, with "No stipulation" for those sections that 
aren't relevant.  We don't rename section headers, but may introduce new 
subsections.  Ryan asked if that was controversial, or there were concerns, and 
would that make it harder to convert to the format over the next six months.



Ben asked if CAs could substitute certain words in RFC 3647 headings - e.g., 
change "Subscriber" to "User".  Also, what if the CA is writing the document in 
another language (even with an English translation) - you may need different 
words and may not want to do a literal translation because it may not make 
sense.  Ryan said that was a good point - he had seen a translation from one CA 
where they had introduced a Section 9 to cover issues like that, and it was 
hard to understand in the English translation what they were doing.  That kind 
of substitution makes him nervous - he wants to make sure all information is 
present and there is consistency, so he leans against it.  There was also 
discussion of RFC 3647 not using capitals in titles, except for the first word. 
 Ryan said he would update his draft in GitHub, and wanted more input.



Ballot re OCSP Profile.  Ryan next mentioned another ballot concerning the OCSP 
profile.  He had floated a basic outline to capture a profile for OCSP 
responses and requirements for OCSP responders.  Under the BRs we put the 
profile of how the request works and what sort of requests are generated and 
other requirements in Section 4, but it's actually describing here's how the 
request works fail to specify the OCSP Profile in Section 7.  There is an 
opportunity to clarify this.



We've got a lot of requirements in the BRs, some inherited from WebTrust for 
CAs such as physical security controls, etc.  In areas of "no stipulation", for 
some there is nothing that can be said, but others were perhaps overlooked.  
Some of the OCSP language in the BRs is outdated, plus there are some other 
changes that would be useful regarding delegated OCSP responder certificates - 
right now we don't have a specified maximum lifetime, and a compromised OCSP 
certificate could compromise the whole revocation infrastructure system.  Ryan 
is working with GlobalSign to deal with RFC 5280's recommendation to keep such 
delegated OCSP responder certificate lives short, such as 30 days for a maximum 
validity period.  Ryan would like more feedback on these proposals, some of 
which could affect operations.  We should first formulate an ideal end state 
that all can accept, and then figure out how to get there - clearly we will 
need time to implement any changes.   We want a vision of OCSP that will 
support stapling, high availability, and timeliness to help promote stapling.



Ballot 190: Ryan asked if Ben knew what the status of Ballot 190 on validation 
methods was - it had been withdrawn over concerns with Section 2.  He noted 
Peter had suggestions on how to incorporate Section 2 into Section 1.  Gerv 
said he wanted to see Ballot 190 move forward, and offered his help.  Ben said 
Jeremy had been busy which had caused the delay.  Ryan also offered to help.  
Kirk noted he had drafted language to incorporate Section 2 into Section 1, and 
would resend to the list.



Membership Rules Ballot.  Gerv raised his membership requirements cleanup 
ballot and asked if there were endorsers.  Kirk mentioned some comments he had 
forwarded - membership suspension for CAs would occur exactly 15 months after 
their last WebTrust audit, which might be too soon as audits are due no later 
than 15 months after the last audit, and there can always be last minute delays 
with the auditor.  Gerv noted that suspension is a light-weight process that is 
easily reversed, so that should not be a great concern if an audit is a little 
bit late, and it's better to match the time period with the audit requirement 
date.



Kirk said his second concern is that the new membership suspension rule is not 
self-enforcing - how does the Forum learn a member is in suspended status, how 
is notice provided, what is the effect on a vote, etc.?  He suggested a 
procedure be included to determine all this publicly, and made suggestions in 
his email to Gerv.  Geoff agreed it was necessary to have membership status 
known at the time of a Forum vote, and not challenged later.  Gerv discussed 
how the rule would apply to a CA with multiple roots where the audits were late 
for some but not all roots.  He will draft an updated ballot.

10.  Next F2F meetings: June 20-22, 2017 Berlin (D-Trust) - Arno said the Forum 
had invited Dr. Jens Bender from "Bundesamt für Sicherheit in der 
Informationstechnik Referat D13 - eID Technologies and Smart Cards" to be our 
speaker on topics like e-Identification, eIDAS and Website Certificates.  We 
will finalize the title of the lecture in May.

11.  Preliminary discussion F2F Agenda - June 20-22 Berlin.  Kirk asked if 
anyone had preliminary ideas for the next F2F agenda.  Dean thought the 
breakout sessions on the Future of Web PKI and GitHub training in North 
Carolina had been useful, and suggested we might want another session on 
Network Security requirements in Berlin.  Gerv thought it might be better to 
wait a bit before more breakout sessions as we did for the Future of Web PKI, 
but wondered who was going to follow up on the discussion about Network 
Security at the last session.

Dean recalled that several people had intended to move forward on a possible 
replacement for the Network Security requirements, possibly through a new 
working group or subcommittee.  Gerv thought two or three people were going to 
come back with some specific ideas.  Ryan noted that Jody is a fan of CI 
Security, and he thought people were going to look at those standards in depth 
and try to figure out if they would be a good starting point for the Forum, 
plus talk with the auditors about possible changes.

Kirk asked if the Forum should create a new Security Controls working group to 
work on this.  Dean noted there had been interest in this, but there was 
already a lot going on.  He suggested adding new Security Controls as its own 
topic again at the next F2F, but this time with some concrete action plans for 
moving forward.  Kirk asked members to provide suggestions for other full 
sessions in Berlin.

The last F2F meeting of the year would be Oct. 3-5, 2017 in Taipei, hosted by 
Chunghwa Telecom.  Dean noted the hotel for the meeting had been changed, and 
the updated information was on the wiki.

12.  Any Other Business.  Wayne noted that the Forum's email server had crashed 
two days in a row, so delivery of some messages would be delayed.

13.  Next call May 11, 2017

14.  Adjourn

_______________________________________________
Public mailing list
[email protected]
https://cabforum.org/mailman/listinfo/public

Reply via email to