On 3/6/2024 12:48 μ.μ., Rob Stradling wrote:
> the CA SHOULD implement a Linting process to test the technical conformity of the Certificate to be issued with these Requirements.

If a CA runs one or more linters during preissuance but chooses to always completely ignore those linters' findings, can that CA claim to be compliant with this (currently draft) ballot language?

If so, should this ballot be more prescriptive regarding how CAs are expected to handle linter findings?

(For example, perhaps we could write something along the lines of "The CA MUST block issuance if the linter(s) return one or more 'fatal', 'error', or 'bug' findings, and SHOULD block issuance if the linter(s) return one or more 'warning' findings").

I didn't want to go too much into the specifics of a "Linter" because this was supposed to be a technical/policy requirement and not a software engineering requirement. Some in-house linters may not even follow the logic of returning specific exit codes.

I think the requirement makes it clear that it is in the best interest of the CA to run effective Linting software to prevent mis-issuances and future security incidents. If a CA wants to run a linter which provides an output signalling that "something's wrong here", and the CA decides to ignore that warning, so be it.

With that said, I'd be happy to see if we can come up with technology-neutral language that can address Rob's concern. I couldn't come up with anything.


Dimitris.


------------------------------------------------------------------------
*From:* Servercert-wg <[email protected]> on behalf of Dimitris Zacharopoulos (HARICA) via Servercert-wg <[email protected]>
*Sent:* 20 May 2024 18:56
*To:* CA/B Forum Server Certificate WG Public Discussion List <[email protected]>
*Subject:* [Servercert-wg] Ballot SC-75 - Pre-sign linting
CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you recognize the sender and know the content is safe.


  SC-75 Pre-sign linting


    Summary

There have been numerous compliance incidents publicly disclosed by CAs in which they failed to comply with the technical requirements described in standards associated with the issuance and management of publicly-trusted TLS Certificates. However, the industry has developed open-source tools, linters, that are free to use and can help CAs avoid certificate misissuance. Using such linters before issuing a precertificate from a Publicly-Trusted CA (pre-issuance linting) can prevent the mis-issuance in a wide variety of cases.

The following motion has been proposed by Dimitris Zacharopoulos of HARICA and endorsed by Corey Bonnell of Digicert and Ben Wilson of Mozilla.

You can view the GitHub pull request representing this ballot here <https://github.com/cabforum/servercert/pull/518>.


    Motion Begins

MODIFY the "Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates" based on Version 2.0.4 as specified in the following redline:

  * 
https://github.com/cabforum/servercert/compare/049237e096650fe01f67780b7c24bd5211ee3038...ada5d6e0db76b32be28d64edd7b0677bbef9c2f5
    
<https://github.com/cabforum/servercert/compare/049237e096650fe01f67780b7c24bd5211ee3038...ada5d6e0db76b32be28d64edd7b0677bbef9c2f5>



    Motion Ends

This ballot proposes a Final Maintenance Guideline. The procedure for approval of this ballot is as follows:


        Discussion (at least 7 days)

  * Start time: 2024-05-20 18:00:00 UTC
  * End time: on or after 2024-05-27 18:00:00 UTC


        Vote for approval (7 days)

  * Start time: TBD
  * End time: TBD


_______________________________________________
Servercert-wg mailing list
[email protected]
https://lists.cabforum.org/mailman/listinfo/servercert-wg

Reply via email to