Re: [cabfpub] Potential F2F Topics

2016-10-11 Thread Rob Stradling via Public
On 10/10/16 23:01, Peter Bowen wrote: > While I think the IETF is the right place for technical work on redaction, > the IETF explicitly avoids work on policy. > > In the realm of CT, 6962bis section 4.2 includes the option to log a > name-constrained intermediate CA in place of logging end-en

[cabfpub] Browser Treatment of Bad SSL

2016-10-11 Thread Gervase Markham via Public
Dear CAB Forum, I have been doing some research recently into how the different browsers produced by CAB Forum members treat various forms of bad SSL. You can find it here: https://docs.google.com/document/d/1b7lenmn5XO06QohaJzVffnJxjXjY1rD70wg34gfuxRo/edit# The results may have implications for

Re: [cabfpub] Potential F2F Topics

2016-10-11 Thread Rob Stradling via Public
I think the discussion would be better led by somebody who is more motivated to solve the policy issues relating to redaction. Rick just posted a lengthy message about Recourse for domain owners, so I nominate him. ;-) As Ryan noted, redaction will undoubtedly come up in the Browser News slot an

Re: [cabfpub] CA key generation, storage, and FIPS

2016-10-11 Thread Robin Alden via Public
Hi Peter, > -Original Message- > Peter Bowen said on 30 September 2016 > In reviewing the Baseline Requirements and certain trust store > requirements, I ran into a set of questions I’m hoping someone can answer. > > The BRs have several sections that address CA key protection. The ones

Re: [cabfpub] Potential F2F Topics

2016-10-11 Thread Ryan Sleevi via Public
While I understand the IETF doesn't work on policy, I meant to suggest that the most important aspect - which absolutely belongs in the IETF - is use cases. I do not believe we can have a meaningful discussion of policy without understanding use cases. It's clear that the technical solutions explo

Re: [cabfpub] CA key generation, storage, and FIPS

2016-10-11 Thread philliph--- via Public
This likely dates from the time that NIST had decided to EOL the RSA algorithm and push everyone towards Elliptic Curves. Now that Quantum is looming as a more likely threat than a new factoring technique they are rowing back in the opposite direction. FIPS can be changed. I suggest that CABFor

Re: [cabfpub] CA key generation, storage, and FIPS

2016-10-11 Thread Myers, Kenneth (10421) via Public
Afternoon everyone, Unofficial response from a POC at NIST. One option would be to try to find a FIPS 140 validated module that has been validated for 4096-bit RSA signature generation. As noted, it would have to be an older module. However, according to http://csrc.nist.gov/groups/STM/cavp/do

[cabfpub] FW: Draft CABF agenda for Oct 13th 2016 TO PUBLIC LIST

2016-10-11 Thread Dean Coclin via Public
Here is the proposed agenda for our teleconference this Thursday at 16:00 UTC (9:00 Pacific, Noon Eastern, 17:00 London) Time Start (UTC) Stop Slot Description Notes / Presenters (Thur) 13 October 2016 0:02 16:00 16:02 1 Roll Call Dean 0:01 16:02 16:03 2 R

Re: [cabfpub] Recourse for domain owners who discover unknown certificates issued to their domain

2016-10-11 Thread Ryan Sleevi via Public
On Mon, Oct 10, 2016 at 8:34 PM, Peter Bowen via Public wrote: > > > On Oct 10, 2016, at 5:31 PM, public@cabforum.org wrote: > > > > During the discussions about CT name redaction ([1], [2]), it became > clear > > that there is no formal policy regarding what actions a CA should take > if a > > d

Re: [cabfpub] Public Digest, Vol 54, Issue 2

2016-10-11 Thread Kirk Hall via Public
I may be misunderstanding what you are saying, but I wasn't going to start the 30/60 day Review period until after 7 days discussion and success on a 7 day straw poll. Then the 30/60 day Review period, then straight to a real vote for adoption. Shortest period start to finish would be 51 days.

Re: [cabfpub] Recourse for domain owners who discover unknown certificates issued to their domain

2016-10-11 Thread Peter Bowen via Public
> On Oct 11, 2016, at 2:30 PM, Ryan Sleevi wrote: > > > > On Mon, Oct 10, 2016 at 8:34 PM, Peter Bowen via Public > wrote: > > > On Oct 10, 2016, at 5:31 PM, public@cabforum.org wrote: > > > > During the discussions about CT name redaction ([1], [2]), it became clear > > that there is no fo

Re: [cabfpub] Recourse for domain owners who discover unknown certificates issued to their domain

2016-10-11 Thread Ryan Sleevi via Public
On Tue, Oct 11, 2016 at 5:26 PM, Peter Bowen wrote: > > You are conflating two things here. "it's perfectly acceptable for the > domain operator to be distinct from the certificate applicant” - Yes. > Akamai or Fastly (or any CDN) can apply for a certificate for a domain > registered to one of t

Re: [cabfpub] Recourse for domain owners who discover unknown certificates issued to their domain

2016-10-11 Thread Kirk Hall via Public
As I read through the string, remember that we all have a Privacy Policy (BR 9.4 covers this, although we presently have no BR stipulations on privacy policies). So whatever we decide to do in responding to information requests from claimed domain owners will have to comply with our individual

Re: [cabfpub] Recourse for domain owners who discover unknown certificates issued to their domain

2016-10-11 Thread Ryan Sleevi via Public
Kirk, The point is to remove the degree of "CA discretion" that you suggest, to ensure there's a normalized, reasonable, and reliable set of options for domain holders. As Rick noted in the introduction, this is certainly one of the concerns with allowing redaction. For example, it would be undes

Re: [cabfpub] Proposal to remove RDAP from the Thick Whois CL&D Policy (was Proposed Path Forward | Thick Whois CL&D Policy, RDAP and RySG Request for Reconsideration)

2016-10-11 Thread Peter Bowen via Public
Francisco, What is the status of the revised newgtlds v2 file you presented a while back? I’ve noticed multiple TLDs have now been retired, and others seem to have never made it to the root zone before being removed from the newgtlds.csv file, so having the updated version would be helpful. T