All,
I have reviewed many of the CA operator survey responses, and I am working to present them in a structured and insightful way. I am also preparing an FAQ document that will provide further implementation and compliance guidance for CA operators to address many of the questions and concerns raised in their responses to the survey questions.
To facilitate the display of recent changes to the draft of MRSP 3.0, I have created an additional branch in GitHub—Updates-from-Survey-Responses—which reflects proposed revisions based on the feedback received. And, for a direct comparison between the language in the current MRSP 3.0 branch and this new GitHub branch, see: Comparison of Branches.
One other key step that I’m working on is to prepare MRSP 3.0 for publication on the Mozilla website, pending legal review. We are on track for this, and I want to reaffirm our commitment to the March 1, 2025, effective date.
To ensure everyone is aligned with upcoming compliance milestones, here’s a brief overview of key dates (some of which are included in the new GitHub branch):
If you have any questions or need further clarification, please don't hesitate to reach out.
Thanks,
Ben
All,
In response to survey feedback on the proposed requirements in section 6.1.3 for mass revocation planning and testing, I have developed a draft Mass Revocation Incident Preparation and Testing Plan (MRIP&TP) template.
Since this is not a Mozilla recommendation, but rather a resource that may help CAs in meeting upcoming requirements, I’m wondering how best to share it. Would it be useful to post it to the list for discussion, or would another approach be preferable?
I’d appreciate any thoughts on this.
Thanks,
Ben
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/a31ec4e1-d36d-4975-a288-2a4c4e4e1633%40mtasv.net.
Hi Jeremy,
Thanks for reaching out. The intent of the proposed changes is twofold (both a clarification and a new requirement) because:
This aligns with GitHub Issue #275, which I opened in January 2024. At the time, I noted that audit templates for key lifecycle management reports are valuable for CAs seeking root inclusion, as they provide evidence of key protection over a period of time. (Period-of-time audits are preferable to point-in-time audits, readiness assessments, or even key generation reports in this context.
Additionally, this change is particularly relevant for intermediate CA certificates that might be signed and created well after a key generation ceremony. In such cases, tracking the status and handling of those "parked" keys becomes especially important to ensure their security and proper management during the period between the key generation ceremony and CA certificate creation.
Additionally, this change is intended to bring further clarity to section 3.1.3 of the MRSP and other parts of section 3, emphasizing the usefulness of period-of-time key lifecycle reports in meeting cradle-to-grave key protection requirements.
With this clarification, we aim to improve the accuracy and completeness of CA key tracking throughout their entire lifecycle (from the key generation report until the key is destroyed or no longer trusted).
Thanks again,
Ben
To view this discussion visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/c3e32b1a-1b28-4248-b6c4-67da814ba542n%40mozilla.org.
You received this message because you are subscribed to the Google Groups "dev-security-policy@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-policy+unsub...@mozilla.org.