Re: [cabfpub] [EXTERNAL] Re: [Cscwg-public] Code signing and Time stamping

2021-04-26 Thread Ryan Sleevi via Public
a code signing certificate as well, so it's
in scope", because that logic could also say "Well, code is delivered via
TLS, and the certificate is used to sign the TLS handshake transcript, so
in a way, a TLS certificate is a code signing certificate".

While we're sympathetic to understand the role that timestamping can play
within code signing, particularly with respect to validation and the
operation of revocation services, we're interested in finding a workable
path forward here, but we want to make sure we've got a clear understanding
of the scope that participants have agreed upon, to ensure we don't create
a situation that is going to further creep in scope.


On Mon, Apr 26, 2021 at 9:18 AM Bruce Morton via Public 
wrote:

> To follow up, the CSCWG charter includes the following documents:
>
> a. EV Code Signing Guidelines, v. 1.4 and subsequent versions
>
> b. Version 1.0 Draft of November 19, 2015, Baseline Requirements for the
> Issuance and Management of Publicly-Trusted Code Signing Certificates
> (subject to the CSCWG making a written finding that the provenance of such
> document is sufficiently covered by the Forum’s IPR Policy)
>
>
>
> The documents define requirements or reference: timestamp authority (TSA),
> timestamps, timestamp implementation method, timestamp certificate,
> timestamp signed objects, TSA logging, and timestamp key protection. The
> documents also define the certificate profiles for timestamp root,
> timestamp subordinate CA and timestamp authority. As such, the CSCWG has
> considered it is in scope to manage these documents and the requirements
> associated to allow timestamp signatures with code signed using
> certificates conforming to the CSBRs.
>
>
>
> The CSBRs also state, “CAs complying with these Requirements MAY also
> assert the reserved policy OIDs in such Certificates.” The reserved policy
> OIDs reference those required for Non-EV and EV code signing certificates.
> The CSBRs do not reference an OID for a timestamp certificate, since the
> OID has not been reserved. It is also considered appropriate to use all
> applicable reserved certificate policy OIDs as we consider deploying
> dedicated PKI hierarchies to support code signing.
>
>
>
> As such, the CSCWG plans to add the following reserved certificate policy
> OID to the CSBRs, which may be included in a timestamp certificate, which
> meets the requirements of the CSBRs:
>
> {joint-iso-itu-t(2) international-organizations(23) ca-browser-forum(140)
> certificate-policies(1) code-signing-requirements(4) timestamping(2)}
> (2.23.140.1.4.2)
>
>
>
>
>
> Bruce.
>
>
>
>
>
> *From:* Cscwg-public  *On Behalf Of *Ben
> Wilson via Cscwg-public
> *Sent:* Tuesday, April 20, 2021 12:09 PM
> *To:* Dean Coclin ; CA/Browser Forum Public
> Discussion List 
> *Cc:* cscwg-pub...@cabforum.org
> *Subject:* [EXTERNAL] Re: [Cscwg-public] [cabfpub] Code signing and Time
> stamping
>
>
>
> WARNING: This email originated outside of Entrust.
> DO NOT CLICK links or attachments unless you trust the sender and know the
> content is safe.
> --
>
> Just a few thoughts to move this conversation forward, and speaking as a
> CSCWG interested party and not to advocate any position of Mozilla, I think
> the answer depends on how strict or flexible the CABF wants to be as an
> organization when it comes to interpreting the scope of a working group
> charter.
>
>
>
> It seems that the mention of time stamping in a code signing work product
> would be allowed even under a strict interpretation.  While creating
> standards for issuing and managing time stamping certificates would
> certainly be out of scope with a flexible interpretation.
>
>
>
> The Scope in the Charter does not expressly include or exclude the
> assignment of a time stamping OID for time stamping certificates.
>
>
> https://cabforum.org/2019/03/26/code-signing-certificate-wg-charter/#1-Scope
> <https://urldefense.com/v3/__https:/cabforum.org/2019/03/26/code-signing-certificate-wg-charter/*1-Scope__;Iw!!FJ-Y8qCqXTj2!KO_2DRjCLlG3XphTaFOKt3DIbyewuzdXb3w04DZftMjNQ74YZEHuLmO13bB-Y764wXA$>
>
>
>
> Included in the scope is "Version 1.0 Draft of November 19, 2015, Baseline
> Requirements for the Issuance and Management of Publicly-Trusted Code
> Signing Certificates (subject to the CSCWG making a written finding that
> the provenance of such document is sufficiently covered by the Forum’s IPR
> Policy)."  Time stamping was discussed in that draft, and I recall that the
> CSCWG did make the required written finding of provenance.  Is the
> assignment of a timestamping OID a logical outcome of the continued work on
> that earlier do

Re: [cabfpub] [EXTERNAL] Re: [Cscwg-public] Code signing and Time stamping

2021-04-26 Thread Bruce Morton via Public
To follow up, the CSCWG charter includes the following documents:
a. EV Code Signing Guidelines, v. 1.4 and subsequent versions
b. Version 1.0 Draft of November 19, 2015, Baseline Requirements for the 
Issuance and Management of Publicly-Trusted Code Signing Certificates (subject 
to the CSCWG making a written finding that the provenance of such document is 
sufficiently covered by the Forum’s IPR Policy)

The documents define requirements or reference: timestamp authority (TSA), 
timestamps, timestamp implementation method, timestamp certificate, timestamp 
signed objects, TSA logging, and timestamp key protection. The documents also 
define the certificate profiles for timestamp root, timestamp subordinate CA 
and timestamp authority. As such, the CSCWG has considered it is in scope to 
manage these documents and the requirements associated to allow timestamp 
signatures with code signed using certificates conforming to the CSBRs.

The CSBRs also state, “CAs complying with these Requirements MAY also assert 
the reserved policy OIDs in such Certificates.” The reserved policy OIDs 
reference those required for Non-EV and EV code signing certificates. The CSBRs 
do not reference an OID for a timestamp certificate, since the OID has not been 
reserved. It is also considered appropriate to use all applicable reserved 
certificate policy OIDs as we consider deploying dedicated PKI hierarchies to 
support code signing.

As such, the CSCWG plans to add the following reserved certificate policy OID 
to the CSBRs, which may be included in a timestamp certificate, which meets the 
requirements of the CSBRs:
{joint-iso-itu-t(2) international-organizations(23) ca-browser-forum(140) 
certificate-policies(1) code-signing-requirements(4) timestamping(2)} 
(2.23.140.1.4.2)


Bruce.


From: Cscwg-public  On Behalf Of Ben Wilson 
via Cscwg-public
Sent: Tuesday, April 20, 2021 12:09 PM
To: Dean Coclin ; CA/Browser Forum Public Discussion 
List 
Cc: cscwg-pub...@cabforum.org
Subject: [EXTERNAL] Re: [Cscwg-public] [cabfpub] Code signing and Time stamping

WARNING: This email originated outside of Entrust.
DO NOT CLICK links or attachments unless you trust the sender and know the 
content is safe.

Just a few thoughts to move this conversation forward, and speaking as a CSCWG 
interested party and not to advocate any position of Mozilla, I think the 
answer depends on how strict or flexible the CABF wants to be as an 
organization when it comes to interpreting the scope of a working group charter.

It seems that the mention of time stamping in a code signing work product would 
be allowed even under a strict interpretation.  While creating standards for 
issuing and managing time stamping certificates would certainly be out of scope 
with a flexible interpretation.

The Scope in the Charter does not expressly include or exclude the assignment 
of a time stamping OID for time stamping certificates.
https://cabforum.org/2019/03/26/code-signing-certificate-wg-charter/#1-Scope<https://urldefense.com/v3/__https:/cabforum.org/2019/03/26/code-signing-certificate-wg-charter/*1-Scope__;Iw!!FJ-Y8qCqXTj2!KO_2DRjCLlG3XphTaFOKt3DIbyewuzdXb3w04DZftMjNQ74YZEHuLmO13bB-Y764wXA$>

Included in the scope is "Version 1.0 Draft of November 19, 2015, Baseline 
Requirements for the Issuance and Management of Publicly-Trusted Code Signing 
Certificates (subject to the CSCWG making a written finding that the provenance 
of such document is sufficiently covered by the Forum’s IPR Policy)."  Time 
stamping was discussed in that draft, and I recall that the CSCWG did make the 
required written finding of provenance.  Is the assignment of a timestamping 
OID a logical outcome of the continued work on that earlier document?

Ben



On Mon, Apr 19, 2021 at 2:31 PM Dean Coclin via Public 
mailto:public@cabforum.org>> wrote:
A discussion on last week’s CA/B call about code signing and time stamping 
brought up a question as to whether the latter was in scope of the CSCWG 
charter 
(https://cabforum.org/2019/03/26/code-signing-certificate-wg-charter/<https://urldefense.com/v3/__https:/cabforum.org/2019/03/26/code-signing-certificate-wg-charter/__;!!FJ-Y8qCqXTj2!KO_2DRjCLlG3XphTaFOKt3DIbyewuzdXb3w04DZftMjNQ74YZEHuLmO13bB-wNVdJJQ$>).

Bruce said there was no CP OID for time stamping and that the group wanted to 
create one IAW with the CA/B Forum registry. Ryan was concerned that this was 
outside the CSCWG charter as it was not specifically mentioned therein. 
Dimitris commented that it was included in charter scope 1a which pulls in the 
EV CS guidelines where time stamping is specified. Ryan did not seem convinced 
and asked that the discussion continue on the list.

The working group has not had a chance to discuss this since the Forum meeting 
but plans to do so on the next call.

I’ve included the CS Public list on this thread since the topic is of interest 
to members/observers there. If a resp