Having received no comments on these proposed changes, I plan to include
them in version 2.7 of our policy.

- Wayne

On Fri, Apr 19, 2019 at 11:55 AM Wayne Thayer <[email protected]> wrote:

> Ryan Sleevi made the following proposal:
>
> Issue #122 [1] previously discussed Section 8 in the context of
>> subordinate CAs, with a change [2] being made to include subordinate CAs
>> (in the context of Section 5.3.2) within scope of notification requirements.
>>
>> However, as presently worded, it's ambiguous as to whether or not
>> Sections 8.1 through 8.3 also apply to subordinate CAs, or whether the only
>> disclosure required is upon the initial introduction of the subordinate.
>> This confusion results from language such as in Section 8.1, "or when an
>> organization buys the private key of a certificate in Mozilla's root
>> program", implying that private keys which transitively chain to a root
>> certificate within Mozilla's program are exempt from such requirements.
>>
>> This ambiguity creates incentives for situations such as cross-signing
>> CAs that might otherwise or have been otherwise rejected from direct
>> inclusion within the Mozilla program. It further creates issues with
>> respect to the supervision of audits and auditors.
>>
>> While it is true that the signing CA accepts the risk that an unfavorable
>> verdict on the subordinate may impact the root, the cost of such a decision
>> is primarily borne by Mozilla and the broader community, in that they are
>> responsible for the collateral ecosystem challenges and devising
>> appropriate solutions. This has been demonstrated, for example, through the
>> discussion of Symantec issues [3].
>>
>> Because Mozilla and the community bear significant cost, especially as
>> more time passes and more certificates are issued, the following changes
>> are suggested:
>>
>>    1. Align Section 8, and its subsections, with language similar to
>>    that of Section 3.1.2.1. That is, that the policy is applicable to a CA 
>> and
>>    all subordinate CAs technically capable of issuing (server or e-mail)
>>    certificates
>>    2. With respect to Section 8.1, extend the requirements of the last
>>    paragraph to the issuance of subordinate CA certificates. Namely, if the
>>    private key is in possession of an entity that is new to the Mozilla root
>>    program, or subject to a CP or CPS that is new to the Mozilla Root 
>> Program,
>>    that prior to the issuance of such a certificate, there be a public
>>    discussion that results in a favorable conclusion.
>>
>> With the current policy as written, an existing/included root CA that
>> plans to exit the CA business might be prohibited (by virtue of Section
>> 8.1) from selling the business or (by virtue of Section 8.3) from
>> transferring the private key material. However, they are fully permitted to
>> cross-certify a new 'root' and then proverbially close up shop - with no
>> consideration for if their root gets removed as a consequence. These are
>> the same set of concerns that led to the introduction of Section 8, but
>> today exist due to the ambiguity with respect to the subsections.
>>
>
> I've proposed a fix for this issue:
> https://github.com/mozilla/pkipolicy/commit/175aed5f145ae0f29735a13801a5639e70f1f0a8
> It also attempts to clarify the applicability of section 8.3 as "only"
> when section 8.1 and/or section 8.2 also apply.
>
> This is https://github.com/mozilla/pkipolicy/issues/169 and
> https://github.com/mozilla/pkipolicy/issues/140
>
> I will greatly appreciate everyone's input on this topic. In particular, I
> would like to hear from CAs that would be affected by the requirement for
> any new subordinate CAs to go through a public discussion before issuing
> certificates, with the outcome being positive or else the subordinate CA
> certificate will be added to OneCRL (section 8.1).
>
> - Wayne
>
> [1] https://github.com/mozilla/pkipolicy/issues/122
> [2]
> https://github.com/mozilla/pkipolicy/commit/7a33f1d065733c19b6030261c1a11f860c30dc10
> [3] https://wiki.mozilla.org/CA:Symantec_Issues
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to