Hi Ben,

On Mon, 23 Oct 2023, Ben Wilson wrote:

*Ballot FORUM-019:  Amend Server Certificate Working Group Charter*

*Purpose of the Ballot*

This ballot proposes changes to the Server Certificate Working Group (SCWG)
Charter, based on existing version 1.2 of the Charter and on recent updates
to the Forum's Bylaws.

During discussions at Face-to-Face Meeting 58, it was noted that the
membership criteria for Certificate Consumers in the SCWG Charter lacked
sufficient detail. Since then, through discussions on the mailing list of
the SCWG, better criteria for membership of Certificate Consumers in the
SCWG have been developed, and the ballot also adds a 6-month probationary
period for all applicants to the SCWG before they become voting members.

*Motion Begins*

MODIFY the Charter of the Server Certificate Working Group as specified in
the following redline:

https://github.com/cabforum/forum/compare/59185f16917cc7f5b83564fe5fddff32cf84c8ce?f029c48cfd8a53ca563904835d6bd5d4b41fa4c8

*Motion Ends*

My biggest concern with this Ballot is the language in 4. (d), which introduces the limitation of "upon the request of any Member that challenges the Applicant's adherence to all of the requirements of section 3(a) or 3(b)" for requesting the membership to be decided by a vote.

I recognize that we have members that interpret the current mechanism of deciding membership by vote "upon the request of any Member" to only result in a vote about the applicant meeting the formal membership criteria. Understandably, from that perspective, adding pretty much any sensible requirement to the list of formal membership criteria for Certificate Consumer members is obviously beneficial and without any downsides.

As someone who does not share that perspective but maintains that the current "upon the request of any Member" mechanism results in a vote in which members can apply a level of discretion which allows at least e.g. refusing membership to applicants who's membership (if granted) might substantially erode trust into the WebPKI ecosystem or endanger the SCWG's ability to maintain and produce documents that are incorporated into root program policies in a mostly verbatim fashion, the new language is extremely concerning.

When taking into account that the new set of requirements for Certificate Consumers can indeed still be trivially met by even a single individual with a few hours of time on their hands (unless, maybe, "software product intended for use by the general public for browsing the Web securely" somehow will turn into a requirement that will not be considered to be trivially fulfilled), the new language in my opinion becomes disqualifying. I hope that this change to the mechanism can be reverted until we have a set of formal membership criteria for Certificate Consumers that makes such discretion obsolete.

In addition, I have some minor concerns regarding the new formal membership criteria for Certificate Consumers in 3.(b). In particular, for the sake of the argument, I assume a browser that generally uses the OS root store as a base mechanism (potentially with the ability to exclude specific certificates that might be included in the OS root store). It is my understanding that for example Google Chrome has worked like this until somewhat recently, which to me kind of implies that it ought to be considered an acceptable practice for SCWG Certificate Consumer Member qualifying software products in good standing. From our discussion during the F2F #60 (I am not sure if this was in the SCWG or Forum plenary) I understand that you intend

  "its membership-qualifying software product uses a list of CA
  certificates to validate the chain of trust from a TLS certificate to a
  CA certificate in such list"

to cover that case. However, such a software as described would indeed use different lists on different platforms. We could consider the specific version for one platform to be the "membership qualifying software", but that does not seem elegant, and might come into conflict with "for the general public" in a strict interpretation.

In such a case, it would also be problematic to

  "publishes the list of CA certificates used to validate the chain of
  trust from a TLS certificate to a CA certificate in such list"

as any static copy of such a list would only give an indication of intent, but misses to represent the actual mechanism at play. It would in this case be much more reasonable to simply explain how the mmebership qualifying software decides which certificates to trust.

In the same way, when it comes to

  "it publishes how it adds or removes a CA certificate from such list"

the published documentation might be something along the lines of "we do not add certificates ourselves, but have mechanisms to override and thus remove trust when we detect violations of the BRs or other security concerns, please contact us if you would like to reoprt any such violation or security concern".

It seems to me that the Ballot language is not all that clear around such scenarios and that members could easily form interpretations going any which way without being to blame for it.

I would propose to instead use the following language:

* its membership qualifying software product validates the chain of trust
  from a TLS certificate to a CA certificate included in a list or root
  store or similar mechanism and being signified (by presence or flag or
  similar mechanism) as either being in accordance with the SCWG's
  Baseline Requirements or specifically requested to be trusted locally on
  the device in question;

* it provides documentation explaining which lists or root stores or
  similar mechanism are used for determining whether a certificate chain
  is valid and trusted; and

* provides documentation allowing Certificate Issuers to determine what
  steps they might need to take in order to have their Root Certificates
  trusted or distrusted by the membership-qualifying software, as well as
  documentation about how to contact the member regarding Baseline
  Requirements violations or security or other issues and concerns related
  to certificate validation in the membership qualifying software.

Tobi
_______________________________________________
Public mailing list
[email protected]
https://lists.cabforum.org/mailman/listinfo/public

Reply via email to