Recent incidents regarding recording Baseline Requirements version

878 views
Skip to first unread message

Aaron Gable

unread,
Feb 18, 2026, 6:21:18 PM (13 days ago) Feb 18
to dev-secur...@mozilla.org
Hi all,

I'd like to present two pieces of relevant context, and then ask a few questions. Although this does somewhat concern CA/BF processes and policies, I am sending this message to MDSP because it concerns a question of whether a particular action is a violation of the requirements, a topic upon which the CA/BF itself does not pass judgement.

Context #1:

In the past few weeks, three Bugzilla incidents have been opened regarding recording the current version of the Baseline Requirements in validation event audit logs:


The relevant requirement cited in the first two incidents (and I suspect likely to be cited in the third incident's full report) is from Section 3.2.2.4:

> CAs SHALL maintain a record of which domain validation method, including relevant BR version number, they used to validate every domain.

Context #2:

The CA/BF has recently published several new versions of the Baseline Requirements. For example:

- SC-094, with an Effective Date of 2026-02-16, was merged at 2026-02-16 21:06 UTC, and v2.2.3 was announced on the mailing list at 2026-02-16 21:13 UTC
- SC-096, with an Effective Date of 2026-02-17, was merged at 2026-02-17 20:30 UTC, and v2.2.4 was announced on the mailing list at 2026-02-17 20:36 UTC
- Both new versions were merged to the website repo at 2026-02-18 03:40 UTC, and the website itself was updated about four minutes later

Questions:

1. At what time does a new BRs version become effective? The BRs themselves only give a date, not including a time nor a time zone. But the new version of the BRs is often not published until some portion of the way through that day (or the previous day, or the next day, depending on time zones). Does a new version become effective at midnight UTC on the date given as the Effective Date within the document? Or when merged into the `main` branch of the github repo? When sent to the mailing list? When published to the website?

2. Let's assume for the moment that a new BRs version becomes effective when the email announcing it is sent to the mailing list. Suppose a validation is performed one second after that email is sent, and the CA records the previous Baseline Requirements version number. Is that a violation of the requirement from Section 3.2.2.4? If yes, is there a reasonable way for a CA to anticipate publication of a new BRs version and cease all validation activities until it is actually published?

Thank you for your time and discussion,
Aaron

Watson Ladd

unread,
Feb 18, 2026, 6:26:41 PM (13 days ago) Feb 18
to Aaron Gable, dev-secur...@mozilla.org
Dear Aaron,

I think this is premised on a misunderstanding of what I would think
the requirements are. The CA must record what version of the BRs was
used for validation. Let's say we go from version 1 to version 2 to
version 3. If Version 1 and version 2 don't contain any differences
relating to DV, then there is no problem. If 2 to 3 does, than the
requirement is that when the CA implements and deploys the new logic,
it records that it did so. The publication process of CABforum
documentation isn't I think linked to that transition.

Sincerely,
Watson

On Wed, Feb 18, 2026 at 3:21 PM 'Aaron Gable' via
dev-secur...@mozilla.org <dev-secur...@mozilla.org>
wrote:
> --
> You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
> To view this discussion visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CAEmnErddD53vAnY896_kUrVcpPRFrGbP70xH0E550PVOmX1S%3Dg%40mail.gmail.com.



--
Astra mortemque praestare gradatim

Aaron Gable

unread,
Feb 18, 2026, 6:31:10 PM (13 days ago) Feb 18
to Watson Ladd, dev-secur...@mozilla.org
I'd like to agree, but I'm not sure that's the case. The Mozilla Root Store Policy says that CAs "MUST conform to the latest version of the CA/Browser Forum's TLS BRs" (emphasis mine). Performing validation in line with an older version of the BRs would be a violation of the MRSP, even if there is no difference for that particular validation method.

Aaron

Dexter Castor Döpping

unread,
Feb 18, 2026, 7:18:27 PM (13 days ago) Feb 18
to dev-secur...@mozilla.org

Hi all,

Regarding question #2:

A CA must conform to the latest version version of the BRs, but I don't see anywhere that they aren't allowed to use the DV rules of older BRs and record this as the BR version. In this case the CA must make sure that what they're doing is allowed in both the old and new version of the BRs.

Imagine version 1 allows CAs to do (A,B,C) and version 2 allows (A,B,D).

If the records show that version 1 was used after version 2 was released, then they must not have done (C) or (D), but (A,B) would be fine.

If the CA wants to start doing (D), then the CA system must be updated to record that version 2 of the BRs was used for DV.

That's my interpretation at least.

CA's should be aware of upcoming changes, and breaking changes often go into effect at a later date. E.g., (C) isn't outright removed, rather the BRs would say "Effective [future date] a CA MUST NOT do (C)". So I don't think that following a common subset of DV rules after a new BR release would be challenging.

Technically a CA could stay on an ancient version of the BRs for DV requirements, it just wouldn't be a good idea because it becomes harder and harder to keep track of the common subset of requirements, and at some point it could even become impossible. E.g., version 1 says a CA MUST do (X) and version 101 says a CA MUST NOT do (X). So recording an old version of the BRs unnecessarily long would be a bad practice and isn't in the CA's interests.

Regards,
Dexter

Ryan Hurst

unread,
Feb 19, 2026, 12:41:43 PM (12 days ago) Feb 19
to dev-secur...@mozilla.org, Dexter Castor Döpping

Hi all,

I think the operative word in Section 3.2.2.4 is "used." The requirement is to record which BR version was used to validate every domain, not which version happened to be current when the clock ran.

"Used" is an operational term. It refers to the validation procedure actually applied. If a CA performed validation under rules that haven't changed between v2.2.2 and v2.2.3, it didn't use v2.2.3. It used the version whose logic it implemented.

The MRSP conformance obligation and the Section 3.2.2.4 recording obligation are distinct. Conformance to the latest version means deploying its logic, and the log should reflect what logic ran. A CA that logs the new version before deploying its logic is recording what it was supposed to conform to, not what actually ran.

The corollary matters, though. A CA whose validation code hasn't been updated to implement a new version cannot truthfully log that version. Logging the current version when the code hasn't caught up is a false record. It records what the CA was supposed to conform to, not what logic actually ran.

This interpretation is verifiable by an auditor, assuming a functioning change management regime is in place. A CA whose stamps are inconsistent with its deployment history has a substantive problem, not a record-keeping one.

Where I'd push back on Dexter's framing is on different grounds. Recording an older version and arguing the validation was permissible under both isn't the same thing as recording the version you actually implemented. The log should be a statement of fact about what governed the issuance, not a retroactive argument about compatibility with both versions.

The three incidents Aaron cited resolve differently under this reading. If those CAs' validation logic hadn't been updated, that's both a substantive compliance failure under MRSP and a recording failure, two distinct findings. If the logic was current but the version stamp wasn't, that's a record-keeping error of a different character, and one the audit record can help distinguish.

The operational gap Aaron describes largely disappears once "used" is understood as referring to deployed logic rather than clock time. The remaining ambiguity around effective dates and timezones is a CA/BF drafting problem worth fixing, and standardizing on UTC would largely close it. 

That said, a recording failure that stems solely from timezone ambiguity in the effective date, where the underlying validation logic was current, seems the kind of thing that should be a note in an audit and not something that would cause someone to do a incident report or lose their Webtrust seal.

Thanks, Ryan

Ben Wilson

unread,
Feb 19, 2026, 1:02:30 PM (12 days ago) Feb 19
to Ryan Hurst, dev-secur...@mozilla.org, Dexter Castor Döpping
Hi All,

I would like to add a brief perspective to the discussion regarding Section 3.2.2.4 and the obligation to record the relevant BR version used for domain validation.

My recollection of the original intent behind this provision was that the validation method number and the BR version number were meant to function together for identification of the validation method used. A validation method might evolve slightly while retaining the same method identifier, and the BR version number would provide additional precision about the exact rule set used for validation. In that sense, the BR version number was intended to complement the method number by identifying the governing text associated with that implementation. And it wasn't thought that CAs would revise domain validation code and logging processes every time a new version of the BRs was adopted.

In practice, however, the Forum has often chosen to obsolete prior validation methods and introduce new method numbers when changes are made. As a result, the method identifier itself now typically captures the substantive change. That evolution in drafting practice arguably reduces the independent utility of the BR version number as a proxy for method-level differences.

This is distinct from the MRSP obligation to conform to the latest version of the TLS BRs. If a new version introduces substantive changes to validation requirements, both implementation and recorded version must reflect those changes. That is not in dispute.

The narrower question is whether Section 3.2.2.4 requires version recording to track the publication state of the consolidated BR document at a given moment in time, even where no changes were made to the applicable validation method and no implementation changes occurred. If ambiguity exists on that point, it may be useful to clarify the language prospectively to ensure auditability and consistent interpretation.

I would be open to filing an MRSP GitHub issue to tighten our interpretation of Section 3.2.2.4 and, if appropriate, revise the MRSP language to ensure operational expectations are precise. The goal should be accurate record-keeping tied to governing validation logic, without creating unnecessary implementation churn where no substantive requirements have changed.

Best regards,
Ben


Gurleen Grewal

unread,
Feb 19, 2026, 2:52:59 PM (12 days ago) Feb 19
to dev-secur...@mozilla.org, Ben Wilson, dev-secur...@mozilla.org, Dexter Castor Döpping, Ryan Hurst

Thanks, Aaron, for initiating this discussion. You are correct that the relevant requirement we planned to cite in our recent incident is from section 3.2.2.4 (and also section 3.2.2.5 for IP validation). While we are working on a detailed report, we’ll offer some clarifications and thoughts relevant to this thread:


Our interpretation of BR Section 3.2.2.4 was mostly in line with Aaron’s - that the log should reflect the BR version in effect at the time of validation. Our incident report was filed because we discovered that the BR versions we were recording were outdated. 


With the interpretation that Dexter gave, our situation might not have been considered a reportable incident at all.


We agree with the concerns raised, particularly under Aaron's interpretation, that achieving instantaneous compliance the moment a new BR version becomes effective is operationally very challenging. 


On Ryan’s interpretation - the issue is that the analysis and any necessary code changes to comply with the substance of new BR requirements must logically be completed before the effective date. However, the separate act of changing the version number that is logged can only occur at or after the new version becomes effective.


This seems to imply that the mechanism for updating the logged BR version string must be decoupled from other code rollouts related to substantive BR changes. To meet a strict interpretation, a CA would likely need an independent process to monitor for newly effective BR versions and update a configuration value for the logging system, separate from regular code deployment cycles. This is further complicated by typical rollout schedules (e.g., weekly deployments) and potential production freezes, which can easily introduce delays.


Building and maintaining a system solely to ensure the logged BR version string flips at the precise moment of effectiveness, detached from the rollout of any actual logic changes, feels like it could become a significant overhead. In our day-to-day operations, we have not felt the need to query or filter validation data based on the BR version in force.


We are very interested in the community's thoughts and suggestions on:


  1. How the Baseline Requirements could be clarified regarding the expectations for logging the BR version, especially concerning the timing of updates. Is there an acceptable propagation delay?

  2. As Ben said: the forum has often chosen to obsolete prior validation methods and introduce new method numbers when changes are made. Based on this, should we consider dropping the requirement of keeping a record of the version, and simply rely on the creation timestamp of the log entry since CAs must always apply the current BR version anyway?

  3. A CA is expected to conform to its Certificate Policy and Certification Practice Statements, which are versioned independently of the BRs; would it make more sense to version validations with the CP/CPS versions in force instead of the BR versions?


We believe that the goal is to ensure audits can trace the rules applied, and we hope to find a solution that is both effective and implementable without excessive burden.


Thanks,
Gurleen Grewal/Google Trust Services

Watson Ladd

unread,
Feb 19, 2026, 3:29:44 PM (12 days ago) Feb 19
to Gurleen Grewal, MDSP, Ben Wilson, Dexter Castor Döpping, Ryan Hurst

On Thu, Feb 19, 2026, 11:52 AM 'Gurleen Grewal' via dev-secur...@mozilla.org <dev-secur...@mozilla.org> wrote:

Thanks, Aaron, for initiating this discussion. You are correct that the relevant requirement we planned to cite in our recent incident is from section 3.2.2.4 (and also section 3.2.2.5 for IP validation). While we are working on a detailed report, we’ll offer some clarifications and thoughts relevant to this thread:


Our interpretation of BR Section 3.2.2.4 was mostly in line with Aaron’s - that the log should reflect the BR version in effect at the time of validation. Our incident report was filed because we discovered that the BR versions we were recording were outdated. 


With the interpretation that Dexter gave, our situation might not have been considered a reportable incident at all.


We agree with the concerns raised, particularly under Aaron's interpretation, that achieving instantaneous compliance the moment a new BR version becomes effective is operationally very challenging. 


On Ryan’s interpretation - the issue is that the analysis and any necessary code changes to comply with the substance of new BR requirements must logically be completed before the effective date. However, the separate act of changing the version number that is logged can only occur at or after the new version becomes effective.


I don't think that's correct. Your code will through some mechanism change the validation behavior at some time t. At that time it can change the logging as well to match.

Ben Wilson

unread,
Feb 19, 2026, 3:36:25 PM (12 days ago) Feb 19
to Gurleen Grewal, dev-secur...@mozilla.org, Dexter Castor Döpping, Ryan Hurst

Hi Ryan, Gurleen, Aaron, et al,

Concerns about audit consistency are well taken. The compliance model works best when the trigger for action is objective and predictable, not dependent on individualized assessments by either CAs or auditors.

I agree with Ryan that we should not create a regime where auditors must independently decide, revision by revision, whether a particular BR update was “substantively relevant” to a given DV method. That kind of subtle technical determination is unlikely to be applied uniformly.

At the same time, I want to clarify what I was — and was not — suggesting.

My main point was that, in my opinion, Section 3.2.2.4 was originally conceived to track adherence to the specific language governing each validation method, rather than to require mechanical synchronization with every new version of the TLS BRs where no changes were made to the applicable method. The requirement states that CAs “SHALL maintain a record of which domain validation method, including relevant BR version number, they used to validate every domain.” I read that as outcome-oriented: for each validation event, the CA must be able to determine which validation method and which BR version governed that validation.

The text requires record-keeping but does not expressly prescribe the storage architecture, nor does it explicitly require that a literal BR version string appear in every transaction-level log entry, provided that the CA’s record-keeping system preserves a reliable and reproducible mapping to the governing BR version. In that sense, the core objective is traceability of the governing rule set — not publication-timestamp synchronization for its own sake.

I think Gurleen’s and other’s operational concerns have force in a scenario where a new BR version introduces no changes to the applicable DV method, yet a strict interpretation would still require the CA to update its logging of BR version number immediately upon the new version becoming effective. In such case, logging changes would not correspond to any change in the deployed validation logic.

Certainly, if a new BR version changed the validation method, that would be a different story.  But where the deployed validation logic is current and traceable, and the only delta is the publication of a new version of the TLS BRs, I don’t think the intent of §3.2.2.4 was to require changes to validation systems and logging solely to track that publication event.

Ultimately, I agree with Ryan on the principle that we want requirements that can be consistently implemented and verified, supported by language that reduces ambiguity and enables reliable CA oversight.  However, if our intent is strict synchronization with each effective BR version regardless of method changes,  we should state that clearly as a bright-line rule.  And, if the intent is to ensure traceability of the governing validation logic, then that should likewise be stated more clearly.

Thanks,
Ben


Aaron Gable

unread,
Feb 19, 2026, 6:22:34 PM (12 days ago) Feb 19
to Ben Wilson, Gurleen Grewal, dev-secur...@mozilla.org, Dexter Castor Döpping, Ryan Hurst
Thank you, everyone, for the discussion here. This has been very helpful and illuminating. I think I have one primary conclusion from the discussion so far, and that conclusion leads to a follow-up question:

Conclusion: It is not required that the CA's validation records contain an explicit BR version number, as long as the CA can concretely and reproducibly map each validation event to the version of the BRs validation method that their processes implemented. Since validation methods are never restricted without an effective date in the future, it should always be possible for a CA to update their validation processes (and therefore the "relevant BRs version number") between when the new version of the BRs is published and when that validation method's new restrictions come into effect.

Question: In that case, what purpose does this requirement serve? Maybe I'm being obtuse, but I fail to see how any mapping other than "the validation was performed at time X, and BRs version Y was in effect at that time" should ever matter. The CA is required to be in compliance with the latest version of the BRs at all times. If a CA's validation processes no longer comply with the current version of the BRs, that's a compliance incident even if they are explicitly logging the fact that they comply with some specific older version.

My current feeling is that the BRs version number is not a meaningfully useful part of the validation identifier, and that the BRs should be updated to merely state that the CA must record the validation method used.

Aaron

Trevoli Ponds-White

unread,
Feb 19, 2026, 6:36:48 PM (12 days ago) Feb 19
to dev-secur...@mozilla.org, Aaron Gable, Gurleen Grewal, dev-secur...@mozilla.org, Dexter Castor Döpping, Ryan Hurst, Ben Wilson

Ben that aligns with my understanding of that requirement as well. I don’t think having the wrong version in the code is really the incident of interest in any of these issues. That’s an option for how to implement that requirement. I would be surprised if that’s the only way a CA knows they reviewed relevant BR changes and that their code correctly aligns with the requirements.

Aaron I generally agree but one way the version is relevant is that the validation methods aren’t self-contained. Most of them refer to other sections of the doc that can be updated without changing the method number.

I do think it’s interesting that we are having two conversations about CP/CPS contents and how CAs describe they comply with the Baseline Requirements. Some of what we’ve discussed here I think overlaps the other discussion: https://groups.google.com/a/ccadb.org/g/public/c/iZg_253IZfo.

Maybe one way we could make it more clear what the expectations are is to update the existing language

From

“CAs SHALL maintain a record of which domain validation method, including relevant BR version number, they used to validate every domain.”

To something like

“CAs MUST maintain a record of which domain validation method they used to validate every domain. CAs MUST maintain a record that they have reviewed their implementation of domain validation each time the BRs updated to ensure it continues to meet the latest requirements."

Ryan Hurst

unread,
Feb 23, 2026, 11:42:00 AM (8 days ago) Feb 23
to dev-secur...@mozilla.org, Trevoli Ponds-White, Aaron Gable, Gurleen Grewal, dev-secur...@mozilla.org, Dexter Castor Döpping, Ryan Hurst, Ben Wilson
I want to make sure we don't lose something important in this discussion.

From my recollection, the version number requirement existed for several reasons, one of which is that validation methods aren't self-contained - as Trevoli noted this herself. They reference other sections that can change without touching the method number. That's one example of the kind of gap the version record closes. Remove it, and an auditor reconstructing what rules governed a validation event has to work from a timestamp and inference rather than a recorded fact. That's a meaningful loss of audit fidelity.

The thread is also conflating two separate questions, the first is whether we should record version information at all, the second is what the appropriate response is when a CA discovers their version logging is out of date. Those questions have different answers. An outdated version string in a log is the kind of finding that belongs in an audit cycle finding, addressed through compensating controls and a corrective action plan, not something that should trigger an issuance outage. The fact that one CA treated it as the latter shouldn't drive us to eliminate the requirement for everyone.

The existing requirement made a gap visible and that's a good thing. The right response is clarifying when and how the version string should update, not removing the requirement that surfaced the problem.

The operational concern Gurleen raised is real, but I think the trigger question is actually straightforward: the logged version should change when the validation logic changes, or when a meaningful dependency on another section of the BRs changes. That's not ambiguous. What the BRs should make explicit is that the version stamp tracks deployed logic, not publication date. If we state that clearly, the operational burden largely resolves itself.

That's auditable, predictable, and preserves the detail future auditors will actually need. I'd rather we sharpen the language around that principle than simplify away the data point entirely.

Aaron Gable

unread,
Feb 23, 2026, 12:20:32 PM (8 days ago) Feb 23
to Ryan Hurst, dev-secur...@mozilla.org, Trevoli Ponds-White, Gurleen Grewal, Dexter Castor Döpping, Ben Wilson
On Mon, Feb 23, 2026 at 8:42 AM Ryan Hurst <ryan....@gmail.com> wrote:
Remove it, and an auditor reconstructing what rules governed a validation event has to work from a timestamp and inference rather than a recorded fact. That's a meaningful loss of audit fidelity.

Auditors have to work from timestamps for literally all other records, including certificate issuance itself. CAs are not required to record the BRs version and certificate profile subsection every time they issue a certificate, but the Section 7.x.y profiles are just as likely to change in the middle of an audit cycle as validation methods are -- maybe even more so. The purpose of the BRs is to ensure that validation and issuance are secure and trustworthy, not to ensure that an auditor jumps through one fewer hoops in one particular circumstance.

And even if we do want to make the auditor's job easier in this way, it's not clear that recording a BRs version number actually accomplishes that goal. As you noted, there are many other subsections wrapped up in any given validation, including definitions, audit logging requirements, DNSSEC requirements, and more. If the DNSSEC requirements change, but a CA is still recording a BRs version number from before that change (because the validation method itself didn't change!), the auditor will have to do more work to realize from the timestamp that DNSSEC needed to be validated and then check to see if that happened.

This is what prompted me to propose that we remove the requirement entirely. I don't think it makes audits easier, and in fact I think it in practice makes audits harder. It is better for all logs to be evaluated solely based on their timestamp, not on some other claimed BRs version. This requirement should be removed for the sake of consistency with all other logs and records.

Aaron

Ryan Hurst

unread,
Feb 23, 2026, 12:42:05 PM (8 days ago) Feb 23
to dev-secur...@mozilla.org, Aaron Gable, dev-secur...@mozilla.org, Trevoli Ponds-White, Gurleen Grewal, Dexter Castor Döpping, Ben Wilson, Ryan Hurst

The timestamp consistency argument makes me uncomfortable. Applied broadly, it would justify removing every discrete data point the BRs require CAs to log, since auditors can always work backwards from a timestamp and a changelog.

On the DNSSEC example, a version stamp gives an auditor a bounded and deterministic starting point. They know exactly which two document versions to compare and can verify the CA's behavior against that specific set of changes. Without it, they first have to determine which version was in effect at the moment of validation, which is exactly the problem this thread started with: effective dates without times, timezone ambiguity, publication lag. That reconstruction has to happen for every validation event they want to scrutinize, and it has to happen with the same ambiguity CAs were dealing with operationally. It also assumes that the auditors would do that uniformly across the auditor set is a significant assumption that does not seem to align with the depth we have seen auditors apply historically.

The reality is that the history of this ecosystem is not short on examples where compliance gaps were visible in the record, long before anyone acted on them. We should be cautious about removing data points that can prompt harder questions.

If the logged version should reflect deployed validation logic rather than publication date, say that in the BRs. That addresses the operational concern Gurleen raised, keeps the audit value intact, and gives auditors something concrete to push on. That's the fix worth pursuing.

Ryan

Aaron Gable

unread,
Feb 23, 2026, 1:35:00 PM (8 days ago) Feb 23
to Ryan Hurst, dev-secur...@mozilla.org, Trevoli Ponds-White, Gurleen Grewal, Dexter Castor Döpping, Ben Wilson
On Mon, Feb 23, 2026 at 9:42 AM Ryan Hurst <ryan....@gmail.com> wrote:

The timestamp consistency argument makes me uncomfortable. Applied broadly, it would justify removing every discrete data point the BRs require CAs to log, since auditors can always work backwards from a timestamp and a changelog.

Sure, but I'm not talking about applying this broadly, and I'm not talking about reducing the CA's requirement to log what they do. I'm talking specifically about recording a specific piece of information which is at best redundant and at worst contradictory. That objection is to a strawman, not to the argument I'm making.

We have a direct statement from a root program representative above saying that the point of this requirement is outcome-oriented: "for each validation event, the CA must be able to determine which validation method and which BR version governed that validation.". That's possible entirely with timestamps, just as it is possible to map issuance events to BR versions solely using timestamps. 

On the DNSSEC example, a version stamp gives an auditor a bounded and deterministic starting point. They know exactly which two document versions to compare and can verify the CA's behavior against that specific set of changes.

Why are they comparing documents at all? That's more work! They only need to be looking at one document: the one that was in force at the time of the validation.

Without it, they first have to determine which version was in effect at the moment of validation, which is exactly the problem this thread started with: effective dates without times, timezone ambiguity, publication lag.

They have to make that determination anyway, which yes is hard and we should fix that, but providing a BR version in the log line does not make their job any easier.

Aaron

Trevoli Ponds-White

unread,
Feb 23, 2026, 2:21:47 PM (8 days ago) Feb 23
to dev-secur...@mozilla.org, Aaron Gable, dev-secur...@mozilla.org, Trevoli Ponds-White, Gurleen Grewal, Dexter Castor Döpping, Ben Wilson, Ryan Hurst

I agree Aaron, I also want to make sure we are focusing on operational and security outcomes. Not audit optimization driven ones. This is why I proposed we update that requirement to be more clear. I’m not also opposed to removing it given that we are now being more aggressive at deprecating methods. If I recall another reason we wanted to add that was so that we would have the ability to understand how much which validation methods are used to help understand impact of deprecation. Its not actually clear to me how you could reasonably issue a cert without knowing it’s validation method so requiring this may be moot.

Ryan Hurst

unread,
Feb 23, 2026, 3:40:55 PM (8 days ago) Feb 23
to Trevoli Ponds-White, dev-secur...@mozilla.org, Aaron Gable, Gurleen Grewal, Dexter Castor Döpping, Ben Wilson

The pressure in this thread is the same pressure that shows up repeatedly in this ecosystem, reduce specificity in the name of operational efficiency. Sometimes that pressure is legitimate. Sometimes the requirement being relaxed is genuinely redundant. But the cumulative effect of that pattern will be an environment where it will be progressively harder to audit and a CA ecosystem that is progressively less accountable.

That would not matter much if our audit regime were more robust than it is today.  WebTrust and ETSI audits are point-in-time, documentation-focused engagements that rarely involve deep technical inspection of deployed systems. Root programs have had to step in repeatedly because clean audit opinions were not reflecting operational reality. That is not a criticism of auditors individually, it is a structural problem.

Ultimately, this is a decision root programs will have to make. Optimize for CA operational flexibility and trust that CAs will make the right call, or optimize for accountability by preserving the signals that give auditors something concrete to work with. Removing requirements like this one makes the first choice easier. It makes the second choice harder. We should at least be clear that is the tradeoff we are making.

Ryan


--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.

Ryan Hurst

unread,
Feb 24, 2026, 11:44:26 PM (7 days ago) Feb 24
to dev-secur...@mozilla.org, Ryan Hurst, dev-secur...@mozilla.org, Aaron Gable, Gurleen Grewal, Dexter Castor Döpping, Ben Wilson, Trevoli Ponds-White

I realize this thread has gone quiet, but I wanted to add some context that I now realize I was taking for granted that others may not have remembered, especially since not everyone here was active in the community when this requirement was introduced.

Ballot 190 (https://cabforum.org/2017/09/19/ballot-190-revised-validation-requirements/) passed unanimously in September 2017. The version number requirement was a direct response to a specific problem that kept coming up. CAs believed their validation logic was correct and compliant, and when the community or an auditor concluded otherwise, nobody could determine which certificates had been issued using validation that didn't meet the requirements, how far back the problem went, or how many certificates needed to be revoked and reissued.

It was introduced with two fundamental goals.

  1. To make that scope assessment possible after the fact. Without a record of which method and which version governed each validation event, those questions got answered with inference and guesswork.
  2. To act as a forcing function. A CA that keeps an accurate version record has had to actually review BR changes and verify its implementation against them. A CA that hasn't done that can't accurately log the version. The record is evidence of the process, not just a label.

My earlier interpretation of "used" as referring to deployed logic rather than publication date stems directly from this history. SInce the goal was scope assessment and process verification, then "used" has to mean the logic that actually ran, not the version that happened to be current on the calendar.

Which brings us back to what raised this thread in the first place. Discovering that your version logging is out of sync with what you are issuing would not normally be something I would expect to trigger a stop issuance. Your change management process would serve as a mitigating control, capturing that you did in fact deploy the right validation logic. I would expect a CA to stop issuance only if they discovered they were actually running the wrong code, and to roll out the logging fix separately when it was safe to do so.

Ryan

Watson Ladd

unread,
Feb 24, 2026, 11:49:33 PM (7 days ago) Feb 24
to Ryan Hurst, Trevoli Ponds-White, MDSP, Aaron Gable, Gurleen Grewal, Dexter Castor Döpping, Ben Wilson
Have we learnt nothing from Crazy Eddie? If you don't go up to the shelves and count boxes, you aren't going to catch the fraud.


Astra mortemque praestare gradatim
> To view this discussion visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CALVZKwZnrjN-Dt-7-%2BQGTpe1RCjgE3_dsHk1SQdhYaNWwCS_wA%40mail.gmail.com.
Reply all
Reply to author
Forward
0 new messages