Dear Derek, all,
Just to clarify the ballot results a bit, as for
> (3) Will all currently-valid certificates with an OU field in them need
> to be replaced before September 1?
the answer is "No".
The change is BR (and EV) guidance is "Prohibited if [...] the certificate is
issued on or after September 1, 2022.". So it's about issuance. The certs that
are still valid (depending on the provider, that can be between 90 and 398 days
for CABF BR and EV certs) need not be re-issued. Of course, if you suffer a
revocation after the sunset date, any replacement cert can no longer have
the OU field in.
Formally, BR OV guidance applies to server certs, not SMIME personal certs,
but I guess that most providers will sunset OU for both at the same time,
if they depend on the same validation. Hence also your personal certs, if they
have an OU today, and are publicly trusted and/or issued by the same supplier
that gives you SSL certs, will be affected.
The change affects:
- those OV CAs that are (also) subject to CABF BR requirements (like the
InCommon IGTF Server CA)
- services, communities, and their relying parties that currently have a
credential with the OU field in it (attribute authorities, mostly, but
it may extend to client credentials as we talked about above)
My personal take is that OU was always rather ill-defined. The fewer elements
you have in a certificate, the less chance of "RS-style" random revocation.
Cheers,
DavidG.
--
David Groep
** Nikhef, Dutch National Institute for Subatomic Physics, PDP programme **
** Visiting address: Science Park 110 room D1.09, NL 1098 XG Amsterdam NL **
** Phone:
+31 20 5922179,
keybase.io: dlg, Signal:
+31646812179 **
** PGP: 0xD80134C2 308E076A FP: 2facebea12803ba145685a21d80134c2308e076a **