--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtab_XKqMqxrkvY3DSYm5LXRFfF0X4xgA6Om4r1Vrm6FjDw%40mail.gmail.com.
Ben, I’m glad this subject is being brought up, and I think this item needs to be broader than just the updates for version 2.8.
As you may remember, we at Sectigo have in the past suffered from unclear expectations on effective dates (https://bugzilla.mozilla.org/show_bug.cgi?id=1741777) and have even brought up the issue of new requirements and pre-existing services at one of the 2021 CA/B Forum F2F meetings.
As Aaron mentioned, section 6.1.1 calls out very specifically what’s being affected and how to proceed with past revocations.
Section 5.4.3, in a way is also very specific. We, at least, don’t see another way of interpreting the word “all”. The effective date states when the OCSP and CRL services must comply, for the CA’s entire non-expired certificate base.
However as there do appear to be different interpretations, it seems we may need a path forward for when new changes are proposed and/or implemented.
In general, we believe the review periods given by Mozilla are fair. CAs need to take this time to analyze the impact of a proposed change and raise concerns when they see them. But besides that, CAs and other members of this community should also try and see if different interpretations could possibly be created from a proposed change.
Thanks,
Martijn