Podcast
Root Causes 201: What Are the Baseline Requirements?


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
January 24, 2022
The CA/Browser Forum Baseline Requirements (BR) are hugely influential in the world of public-trust certificates. In this episode we explain what the Baseline Requirements are, how they are created, and why they matter.
Podcast Transcript
Lightly edited for flow and brevity.
So, one of the fields is called state name. There is a field called country name and for any OV, organization-validated certificate, you need to have a country name. You need to say what country this organization is in and then there are a pair of fields. One is called state name and the other one is called locality name. For an OV certificate, you must have at least one of these two. So, you must have a state name or you must have a locality name or you may have both. There is some logic behind there. You can take that concept I just said, and you can kind of unpeel it and I can state it a different way, which is if state name is not present you must have locality name. If locality name is not present, you must have state name. When you start thinking about it that way you see there’s also some logic around what and cannot be included or what must be included under certain circumstances.
This is my point earlier about how these things get pretty complex. There’s a lot going on and then another major one that’s very important is that the CA’s practices need to match the CA’s CPS. So, a CPS is a Certificate Practice of Statement. This is where a CA publishes this is what we do. This is how we might authenticate your domain name. What we call DCV. This is how we might authenticate your organization. This is how we might etc., etc. All of those things the CA has to spell out in the CPS and then part of what the Baseline Requirements say is that what you actually do has to correspond to what’s in your CPS. That’s about this visibility point that I made before where people or anybody who knows how to read these documents can go to your website, get these documents, read them and have a good basic understanding of what it is that the CA does and they can know that so that when they look at one of these certificates they can safely make certain assumptions about what that certificate does and does not mean.
The ultimate consequence is that one or more root store programs say, look, we just can’t trust you. We’ve seen that. You and I have podcasted on that. That happens once every couple years or so to a CA in one place or another and very, very visibly and very obviously in 2017 to Symantec. That was a big deal when that occurred. But that’s sort of the nuclear option. That’s the death penalty.
Without getting to the death penalty, there are other consequences, and a lot of the consequences are that the CAs have to publicly report any violation. Anytime a CA becomes aware of anything that is non-compliant with the Baseline Requirements, they have to do a detailed public report and they are subject to public scrutiny and they oftentimes are subject to a great deal of scrutiny and depending on exactly what went wrong, various outsiders might go onto the forum where this occurs called Bugzilla and ask the CA very detailed questions and the CA is expected to respond to these and deal with them and satisfy the community that the problem that occurred won’t occur again.
And so, that’s the biggest mitigation because, as I said, these rules are long, they are complicated, they are in places vague and it still occurs on a regular basis that CAs unwittingly find themselves out of alignment with something in these rules and often it’s something quite subtle. But under those circumstances, the CA is expected to report it, the CA is expected to understand why it happened and what to do about it and to have a clear plan and then the public is allowed to ask questions and clarify and criticize that plan and things along those lines and the public does and that’s the main mechanism and that’s going on all the time. Day in and day out that’s going on. It’s just part of running a large, complicated web PKI with many players.

