On Oct 26, 2016 5:26 AM, "Doug Beattie (Globalsign)" <douglas...@gmail.com> wrote:
>
> Ryan,
>
> When will Google be updating the CT policy (May 2016) to include this update? The policy remains somewhat EV centric and does not state chrome treatment of non EV certificates that are not compliant (and I assume EV certificate treatment will change from not showing the green bar to not being trusted in October).
>
Hi Doug,
Perhaps you're thinking of a different version? The policy very much defines what is CT Qualified, and does not treat EV as the only form of CT Qualified.
That is, I do not believe any policy uodate is needed, because we are not changing the definition or acceptance criteria of the existing term.
> Also, can name constrained CAs with the applicable number of SCTs (5?) enable the SSL certificates to be treated as compliant when they don't contain any SCTs per RFC 6962-biz? If so, then the definition of "CT Qualified" should be expanded to cover this case.
No. That is not part of RFC6962 and, as mentioned in the F2F discussions on redaction - and the IETF - not something in 6962-bis that we believe is required to be supported.
>
> Even though this might be a bit early (since there are ongoing discussion of RFC 6962-biz and CAs are being solicited for their input), having the currently proposed CT policy clearly stated would help us understand the baseline and provide more meaningful comments.
I believe it already is clearly specified, but would happy to understand your concerns further. Could you re-read and perhaps point out specific areas you feel are unclear? Certainly, if it is not listed, it is not supported - and that is not accidental.
On Wed, Oct 26, 2016 at 11:01 AM, Ryan Sleevi <rsl...@chromium.org> wrote:
Hi Doug,
Perhaps you're thinking of a different version? The policy very much defines what is CT Qualified, and does not treat EV as the only form of CT Qualified.
That is, I do not believe any policy uodate is needed, because we are not changing the definition or acceptance criteria of the existing term.
Chrome's current policy only provides a clear statement of penalties for EV (no green banner) and does not amend/change that with a statement that all non-compliant certificates will not be trusted, as of October, 2017. In order to understand the full policy, people will need to merge your statement in this thread into the Chrome CT policy to get the full picture. I'd suggest adding an item 5 to your list: As of <date> Google will not trust SSL certificates that are not CT qualified in accordance with the criteria below.Nit-pick: The footnote and the "Important Note" both imply something special about EV certificates or that this policy applies only to EV certificates. I'd recommend deleting them.
> Also, can name constrained CAs with the applicable number of SCTs (5?) enable the SSL certificates to be treated as compliant when they don't contain any SCTs per RFC 6962-biz? If so, then the definition of "CT Qualified" should be expanded to cover this case.
No. That is not part of RFC6962 and, as mentioned in the F2F discussions on redaction - and the IETF - not something in 6962-bis that we believe is required to be supported.
Your statement at the F2F about name redaction was clear, plus since it does not exist in the latest version of the RFC it's abundantly clear redaction is not supported - period (and discussion of that can take place on the trans list).The use of the intermediate CA certificate is supported in the RFC, section 4.2 (unless it's been removed since the -19 version), and is not called out in the Google Policy. Since this is new in the -bis version, I wanted to understand if it would be supported within the Google CT policy as of October 2017 (will there even be 6962-bis compliant logs by then? this might be a non-question). Name constrained CAs don't need to be disclosed so they already have a reduced reporting requirement. It seems reasonable to me that we can permit them to be posted in a sufficient number of CT logs and used in lieu of including SCTs in the issued certificates. Either you post/disclose the CA which would not normally be required, or don't disclose the CA and post all issued certificates. I apologize if the rational was provide at the F2F and this is a repeat.
>
> Even though this might be a bit early (since there are ongoing discussion of RFC 6962-biz and CAs are being solicited for their input), having the currently proposed CT policy clearly stated would help us understand the baseline and provide more meaningful comments.I believe it already is clearly specified, but would happy to understand your concerns further. Could you re-read and perhaps point out specific areas you feel are unclear? Certainly, if it is not listed, it is not supported - and that is not accidental.
As listed above, I think an item 5 would help so that the policy specifically says that SSL certificates not compliant with the CT Policy will not be trusted by Chrome as of October 2017. A foot note indicating that name constrained Intermediate CA certificates cannot be posted in lieu of the SSL certificates would also help clarify the policy (if that is the Google policy). I don't expect you to enumerate all items in the rfc that you don't support, but this is one that is central to the policy.
On Wed, Oct 26, 2016 at 2:18 PM, Doug Beattie <douglas...@gmail.com> wrote:Chrome's current policy only provides a clear statement of penalties for EV (no green banner) and does not amend/change that with a statement that all non-compliant certificates will not be trusted, as of October, 2017. In order to understand the full policy, people will need to merge your statement in this thread into the Chrome CT policy to get the full picture. I'd suggest adding an item 5 to your list: As of <date> Google will not trust SSL certificates that are not CT qualified in accordance with the criteria below.
Hi Doug,It's actually rather different. Our goal with the CT Policy document is to clearly document what constitutes CT Qualified, as introduced in the first sentence. The two subsequent paragraphs further explain places where CT Qualified might be used, but we explicitly and intentionally wanted to decouple the documentation of what is CT Qualified from any policies related to expectations of CT Qualification. That is, it's structured this way precisely to provide clear and unambiguous guidance about what constitutes an appropriately disclosed certificate.Indeed, I think we'll update the policy to remove the description of the implementation, which is out of date, and that may hopefully resolve that initial concern.
Your statement at the F2F about name redaction was clear, plus since it does not exist in the latest version of the RFC it's abundantly clear redaction is not supported - period (and discussion of that can take place on the trans list).The use of the intermediate CA certificate is supported in the RFC, section 4.2 (unless it's been removed since the -19 version), and is not called out in the Google Policy. Since this is new in the -bis version, I wanted to understand if it would be supported within the Google CT policy as of October 2017 (will there even be 6962-bis compliant logs by then? this might be a non-question).
It hasn't been removed, but please see the discussion at https://mailarchive.ietf.org/arch/msg/trans/z4n6tFE5sq3s1KR79mfm1VIN8zEAs far as policy, you should be operating under the assumption that the current policy, as written - which uses 6962 - is the policy that will be in place in October 2017. That's not to say there won't or can't be changes, merely that you should not operate on any assumptions that it will be any different than what's explicitly stated.
Name constrained CAs don't need to be disclosed so they already have a reduced reporting requirement.
That's with respect to Mozilla requirements.
It seems reasonable to me that we can permit them to be posted in a sufficient number of CT logs and used in lieu of including SCTs in the issued certificates. Either you post/disclose the CA which would not normally be required, or don't disclose the CA and post all issued certificates. I apologize if the rational was provide at the F2F and this is a repeat.
Right, this is not something that, at present, we think is a good thing :)
As listed above, I think an item 5 would help so that the policy specifically says that SSL certificates not compliant with the CT Policy will not be trusted by Chrome as of October 2017. A foot note indicating that name constrained Intermediate CA certificates cannot be posted in lieu of the SSL certificates would also help clarify the policy (if that is the Google policy). I don't expect you to enumerate all items in the rfc that you don't support, but this is one that is central to the policy.
Well, I would hope that the absence of support for name-constrained would be inferred given that only RFC 6962 is supported. If and when 6962-bis is supported, I certainly agree, it'd be useful to enumerate what parts, if any, of 6962-bis are supported.I anticipate that we'd remove the places in the policy where the CT implementation is documented, precisely because our implementation continues to mature, and I wouldn't want to do a policy document update every time - as what matters is the policy.If we did that - remove the discussion of implementation - would that help or hinder? It sounds like you're ideally looking for a document about what cases CT support is required - e.g. for EV, for Symantec, and for CNNIC, and, in the future, for all certs.I do note this is slightly different than how we handled/announced EV (which coupled the statements in the policy document), but it was precisely because of those experiences we were trying to avoid that for this announcement.
On Wed, Oct 26, 2016 at 3:34 PM, Ryan Sleevi <rsl...@chromium.org> wrote:As far as policy, you should be operating under the assumption that the current policy, as written - which uses 6962 - is the policy that will be in place in October 2017. That's not to say there won't or can't be changes, merely that you should not operate on any assumptions that it will be any different than what's explicitly stated.
As listed above, I think an item 5 would help so that the policy specifically says that SSL certificates not compliant with the CT Policy will not be trusted by Chrome as of October 2017. A foot note indicating that name constrained Intermediate CA certificates cannot be posted in lieu of the SSL certificates would also help clarify the policy (if that is the Google policy). I don't expect you to enumerate all items in the rfc that you don't support, but this is one that is central to the policy.
Well, I would hope that the absence of support for name-constrained would be inferred given that only RFC 6962 is supported. If and when 6962-bis is supported, I certainly agree, it'd be useful to enumerate what parts, if any, of 6962-bis are supported.I anticipate that we'd remove the places in the policy where the CT implementation is documented, precisely because our implementation continues to mature, and I wouldn't want to do a policy document update every time - as what matters is the policy.
Will there be a centralized place that describes the Chrome CT implementation that we will be able to convey to our customers for this purpose (without needing to track the latest status in multiple discussions or the chrome change log)? I had been assuming this would be included in the Policy document (it was for EV).
--
You received this message because you are subscribed to the Google Groups "Certificate Transparency Policy" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ct-policy+unsubscribe@chromium.org.
To post to this group, send email to ct-p...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/ct-policy/539ee1fb-5827-4091-bd45-77bb4529ccd4%40chromium.org.
I want to define domain name privacy options if the certificates were issued from a publicly-trusted root, which would be:a) Do not logb) Log, but use wildcard certificatec) Log, but use a certificate issued from a name contrained CAFor clarity can option a) be used with "Utilize existing enterprise configurations features to disable CT enforcement for specific URLs." I assume this would mean that Chrome in the enterprise would trust a non-CT logged certificate, which was issued from a publicly-trusted root.