Which of those two proposals are "privately extensible"?

The first one (with SemanticsInformation), once implemented, should work for any identifiers (LEI etc.) with almost no code change. Let's discuss those ETSI proposals separately :)

Thanks,
M.D.


On 7/9/2018 5:18 PM, Ryan Sleevi wrote:
They aren't well-specified, because they're privately extensible.

On Mon, Jul 9, 2018 at 10:13 AM Tim Hollebeek <[email protected] <mailto:[email protected]>> wrote:

    Right. My original objection was that the semantics weren’t
    specified, but as you and others (privately) have pointed out to
    me, they’re actually specified quite well.  We just need to point
    to the relevant ETSI standards documents.

    -Tim

    *From:*Moudrick M. Dadashov [mailto:[email protected] <mailto:[email protected]>]
    *Sent:* Sunday, July 8, 2018 9:18 AM
    *To:* Ryan Sleevi <[email protected] <mailto:[email protected]>>;
    CA/Browser Forum Public Discussion List <[email protected]
    <mailto:[email protected]>>; Tim Hollebeek
    <[email protected] <mailto:[email protected]>>
    *Subject:* Re: [cabfpub] LEI information in web certificates

    IMHO ETSI case needs some clarification - in fact we have two
    different issues here:

     1. qualified and non-qualified certificate profiles (use of
        "qcStatement-2" identified by the OID id-qcspkixQCSyntax-v2
        with the SemanticsInformation syntax, see
        
http://www.etsi.org/deliver/etsi_en/319400_319499/31941201/01.01.01_60/en_31941201v010101p.pdf).
     2. ETSI proposal related to certificates issued to payment
        service operators (see
        https://cabforum.org/pipermail/validation/2018-June/000948.html)

    In short, the first one says: if combined with the OID
    id-qcspkixQCSyntax-v2 the syntax of serial-number is:

    TTTCC-identifier

    where TTT is a type of  registry (from the list below);
    CC - an ISO 3166 country code;
    identifier means whatever we use today as a serial-number.

    The predefined types of registries (TTT) are:

    VAT - national VAT registry;
    NTR - national trade registry;
    PAS - national passport registry;
    IDC - national ID card registry;
    PNO - national civic registry;
    TIN - Tax Identification registry
    (https://ec.europa.eu/taxation_customs/tin/tinByCountry.html).

    but we can add more TTTs e.g. SSN, IRS etc., so the composite
    serial-number in a certificate would look like this: IRSUS-123456789
    Also, TTT allows you to identify the subjects from country
    specific registries (explicitly identified in certificate, see
    details in RFC 3739).

    As for the second ETSI proposal, I suspect a little
    misunderstanding - in the scenario where third party payment (TPP)
    service providers play their role (see attached) they need
    *client* authentication certificates.

    Thanks,
    M.D.

    On 7/7/2018 12:36 AM, Ryan Sleevi via Public wrote:

        On Fri, Jul 6, 2018 at 4:29 PM Tim Hollebeek via Public
        <[email protected] <mailto:[email protected]>> wrote:

            As many of you are aware, the GLEIF foundation recently
            invited CA/Browser Forum members to its identity
            management workshop.  Some people have contacted us about
            the possibility of putting LEI identifiers into web
            certificates.  This is in some ways similar to the recent
            proposal from ETSI to put additional identity information
            into certificates, though it has the advantage that we are
            free to determine ourselves how best to encode it.

            CAs are already allowed to include this information in
            certificates, assuming it has been appropriately
            validated.  There is a Global Legal Entity Identifier
            Index that is authoritative for LEIs.  However it would be
            valuable if there were a standardized CABF OID and
            extension so that every CA that chooses to include this
            information includes it in an interoperable way.  This
            also allocates the OID in a namespace we control, allowing
            us to state in the BRs the purpose and semantics of the
            extension, and require that it only be used for authentic
            and validated LEIs.

            It seems to me that it would be worthwhile to standardize
            this, instead of every CA coming up with their own way of
            doing it.  What do other people think?

        Could you explain how this information would be used by
        Relying Parties?

        The GLEIF model effectively relies on third-party RAs, with
        all of the attendant issues, and without a clear framework for
        addressing many of the issues that has been held in the CA
        ecosystem. I'm not sure the value proposition here, or that
        the information is something RPs should necessarily use. As to
        whether or not it's appropriate, I think that's going to be
        very much contingent upon what the intended semantics being
        introduced are - that is, what relationship, if any, is being
        expressed between the LEI ID and the domain - and that opens a
        host of complexity that could easily detract from the far more
        pressing and meaningful work on improving the domain and
        information validation.

        I'm not sure why a CABF OID would be more useful than a GLEIF
        OID (which seems far more appropriate), and with a defined
        syntax relevant for GLEIF. I can think of no good reason to
        use the CABF arc, so I'm hoping you could explain more that
        thinking.




        _______________________________________________

        Public mailing list

        [email protected] <mailto:[email protected]>

        https://cabforum.org/mailman/listinfo/public


_______________________________________________
Public mailing list
[email protected]
https://cabforum.org/mailman/listinfo/public

Reply via email to