[Servercert-wg] Ballot SC-75 - Pre-sign linting
Dimitris Zacharopoulos (HARICA)
dzacharo at harica.gr
Sun May 26 07:40:55 UTC 2024
Hi Ryan,
Thank you for the feedback. After some internal discussions with Corey
and Ben, please see comments inline.
On 20/5/2024 10:35 μ.μ., Ryan Dickson wrote:
>
> Hi Dimitris, Corey, and Ben,
>
>
> Thank you for bringing this ballot forward for the group’s consideration.
>
>
> A few questions:
>
> * Given the perceived value of linting, should we consider a
> stronger position on its adoption (i.e., MUST versus SHOULD)?
> While I recognize that the Baseline Requirements represent minimum
> expectations, consistent and reliable adoption of linting seems to
> provide the ecosystem with the best chance of addressing the
> problem statement described in the ballot summary.
> o To accomplish this goal, the ballot could be modified to
> require use of linting (either tbs certificate linting,
> pre-certificate linting, or final certificate linting), with
> tbs certificate linting being considered RECOMMENDED and final
> certificate linting as being considered NOT RECOMMENDED.
> o This goal could be further realized by either a (1)
> phased-implementation (i.e., SHOULD now, MUST later) - or (2)
> a forward-looking effective date that considers a reasonable
> timeline for adoption for those CA Owners looking to adhere to
> the BRs that do not perform linting today.
>
I see two issues here:
1. Require linting with either a phased-approach or directly with a
single effective date: I'm fine with either approach with a slight
preference to the phased-in. CAs should have been following public
incidents and m.d.s.p. discussions for years, so existing CAs should
already be doing pre-sign linting. OTOH new CAs need the additional
guidance. A CA will either have to create its own technical tools to
check their profiles accuracy or use the recommended open-source
tools we reference.
2. I'm fine with the stated preference for pre-signing over
post-signing linting but the post-signing linting should not be "NOT
RECOMMENDED" because it doesn't do any harm on its own. The fact is
that we must clearly state that the pre-sign linting is mandatory
and the post-sign linting is optional.
With that said, Ben and Corey have agreed with a SHOULD effective date
of 15 September, 2024 and a SHALL effective date of 15 March, 2025. If
people have objections to setting these effective dates, please let me know.
> * Is it worth more clearly establishing expectations for the
> evaluation and, when applicable, deployment of updatesmade by or
> to linting tools. For example, can we establish a reasonable
> expectation that within 30(?) days after an update has been made
> to a linting tool relied upon by a CA, it has either (1) been
> adopted in the production issuance environment - or (2) considered
> not applicable given the scope of recent updates (for example, if
> a CA only issues DV certificates, and the most recent update only
> pertains to EV certificates, there is no expectation that the
> updated version is deployed).
>
This may open a series of questions around updates in other, more
security-critical components of the CA pipeline. I think we should
address this issue more holistically as it affects updates to hardware
firmware, OS patches, CA vendor software updates, third-party software
dependencies, switches/router firmware, and other dependencies in
Certificate Management Systems.
It is also challenging to define what an "update" is, at which level
(major, minor version), etc. I would prefer leaving that out of this
particular ballot and let someone else address it in a separate ballot
without risking the speed and success of the linting ballot. I hope this
makes sense.
More feedback is welcome before proceeding with the changes.
Best regards,
Dimitris.
>
> Thanks for your consideration.
>
>
> - Ryan
>
>
>
> On Mon, May 20, 2024 at 2:04 PM Inigo Barreira via Servercert-wg
> <servercert-wg at cabforum.org> wrote:
>
> Hi Dimitris,
>
> I don´t know if the “(help to improve)” is adding any additional
> hidden requirement. IMO, I´d remove that.
>
> Regards
>
> *De:*Servercert-wg <servercert-wg-bounces at cabforum.org> *En nombre
> de *Dimitris Zacharopoulos (HARICA) via Servercert-wg
> *Enviado el:* lunes, 20 de mayo de 2024 19:57
> *Para:* CA/B Forum Server Certificate WG Public Discussion List
> <servercert-wg at cabforum.org>
> *Asunto:* [Servercert-wg] Ballot SC-75 - Pre-sign linting
>
> CAUTION: This email originated from outside of the organization.
> Do not click links or open attachments unless you recognize the
> sender and know the content is safe.
>
>
> SC-75 Pre-sign linting
>
>
> Summary
>
> There have been numerous compliance incidents publicly disclosed
> by CAs in which they failed to comply with the technical
> requirements described in standards associated with the issuance
> and management of publicly-trusted TLS Certificates. However, the
> industry has developed open-source tools, linters, that are free
> to use and can help CAs avoid certificate misissuance. Using such
> linters before issuing a precertificate from a Publicly-Trusted CA
> (pre-issuance linting) can prevent the mis-issuance in a wide
> variety of cases.
>
> The following motion has been proposed by Dimitris Zacharopoulos
> of HARICA and endorsed by Corey Bonnell of Digicert and Ben Wilson
> of Mozilla.
>
> You can view the GitHub pull request representing this ballot here
> <https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fcabforum%2Fservercert%2Fpull%2F518&data=05%7C02%7Cinigo.barreira%40sectigo.com%7Cba7a2f0fe37e4bb49d7a08dc78f6397c%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C638518246126378220%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=ZzEsOoXvcYi%2F%2BO8TpaYY%2FIP7FV9sVmgn2sXa4fhHMTo%3D&reserved=0>.
>
>
>
> Motion Begins
>
> MODIFY the "Baseline Requirements for the Issuance and Management
> of Publicly-Trusted TLS Server Certificates" based on Version
> 2.0.4 as specified in the following redline:
>
> * https://github.com/cabforum/servercert/compare/049237e096650fe01f67780b7c24bd5211ee3038...ada5d6e0db76b32be28d64edd7b0677bbef9c2f5
> <https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fcabforum%2Fservercert%2Fcompare%2F049237e096650fe01f67780b7c24bd5211ee3038...ada5d6e0db76b32be28d64edd7b0677bbef9c2f5&data=05%7C02%7Cinigo.barreira%40sectigo.com%7Cba7a2f0fe37e4bb49d7a08dc78f6397c%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C638518246126388782%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=0Yf5qjQ41hV93d91TsZ2PpvnRaK4zysf1UKIW%2Btuqwg%3D&reserved=0>
>
>
>
> Motion Ends
>
> This ballot proposes a Final Maintenance Guideline. The procedure
> for approval of this ballot is as follows:
>
>
> Discussion (at least 7 days)
>
> * Start time: 2024-05-20 18:00:00 UTC
> * End time: on or after 2024-05-27 18:00:00 UTC
>
>
> Vote for approval (7 days)
>
> * Start time: TBD
> * End time: TBD
>
> _______________________________________________
> Servercert-wg mailing list
> Servercert-wg at cabforum.org
> https://lists.cabforum.org/mailman/listinfo/servercert-wg
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/servercert-wg/attachments/20240526/21cffdfa/attachment-0001.html>
More information about the Servercert-wg
mailing list