Skip to content

Commit 19b0ab4

Browse files
Deployed e416ea0 to 2.7.1 with MkDocs 1.6.1 and mike 2.1.3
1 parent be571d7 commit 19b0ab4

File tree

4 files changed

+79
-72
lines changed

4 files changed

+79
-72
lines changed

2.7.1/discussion-topics/index.html

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -772,31 +772,31 @@ <h3 id="iteration-3">Iteration 3</h3>
772772
<td>O</td>
773773
<td><a href="o-catalogues-for-attestations/">Catalogues for Attestations</a></td>
774774
<td><a href="https://github.com/eu-digital-identity-wallet/eudi-doc-architecture-and-reference-framework/issues/345">Roadmap issue</a></td>
775-
<td>Not yet integrated</td>
775+
<td><a href="https://eu-digital-identity-wallet.github.io/eudi-doc-architecture-and-reference-framework/2.6.0/">2.6.0</a></td>
776776
</tr>
777777
<tr>
778778
<td>P</td>
779779
<td><a href="p-secure-cryptographic-interface-between-the-Wallet-Instance-and-WSCA/">Secure Cryptographic Interface between the Wallet Instance and the WSCA</a></td>
780780
<td><a href="https://github.com/eu-digital-identity-wallet/eudi-doc-architecture-and-reference-framework/issues/346">Roadmap issue</a></td>
781-
<td>Not yet integrated</td>
781+
<td><a href="https://eu-digital-identity-wallet.github.io/eudi-doc-architecture-and-reference-framework/2.7.0/">2.7.0</a></td>
782782
</tr>
783783
<tr>
784784
<td>Q</td>
785785
<td><a href="q-interface-user-wallet-instance/">Interface between the User and the Wallet Instance</a></td>
786786
<td><a href="https://github.com/eu-digital-identity-wallet/eudi-doc-architecture-and-reference-framework/issues/347">Roadmap issue</a></td>
787-
<td>Not yet integrated</td>
787+
<td><a href="https://eu-digital-identity-wallet.github.io/eudi-doc-architecture-and-reference-framework/2.7.0/">2.7.0</a></td>
788788
</tr>
789789
<tr>
790790
<td>R</td>
791791
<td><a href="r-authentication-of-user-to-device/">Authentication of the User to the device</a></td>
792792
<td><a href="https://github.com/eu-digital-identity-wallet/eudi-doc-architecture-and-reference-framework/issues/348">Roadmap issue</a></td>
793-
<td>Not yet integrated</td>
793+
<td><a href="https://eu-digital-identity-wallet.github.io/eudi-doc-architecture-and-reference-framework/2.7.0/">2.7.0</a></td>
794794
</tr>
795795
<tr>
796796
<td>S</td>
797797
<td><a href="s-certificate-transparancy/">Certificate transparency</a></td>
798798
<td><a href="https://github.com/eu-digital-identity-wallet/eudi-doc-architecture-and-reference-framework/issues/349">Roadmap issue</a></td>
799-
<td>Not yet integrated</td>
799+
<td><a href="https://eu-digital-identity-wallet.github.io/eudi-doc-architecture-and-reference-framework/2.7.0/">2.7.0</a></td>
800800
</tr>
801801
<tr>
802802
<td>T</td>
@@ -808,7 +808,7 @@ <h3 id="iteration-3">Iteration 3</h3>
808808
<td>Z</td>
809809
<td><a href="z-device-bound-attestations/">Device-bound Attestations</a></td>
810810
<td><a href="https://github.com/eu-digital-identity-wallet/eudi-doc-architecture-and-reference-framework/issues/567">Roadmap issue</a></td>
811-
<td>Not yet integrated</td>
811+
<td><a href="https://eu-digital-identity-wallet.github.io/eudi-doc-architecture-and-reference-framework/2.6.0/">2.6.0</a></td>
812812
</tr>
813813
<tr>
814814
<td>AA</td>
@@ -839,13 +839,13 @@ <h4 id="earlier-topics-planned-to-be-additionally-discussed-in-iteration-3">Earl
839839
<td>F</td>
840840
<td><a href="f-digital-credential-api/">Digital Credentials API</a></td>
841841
<td><a href="https://github.com/eu-digital-identity-wallet/eudi-doc-architecture-and-reference-framework/issues/336">Roadmap issue</a></td>
842-
<td></td>
842+
<td><a href="https://eu-digital-identity-wallet.github.io/eudi-doc-architecture-and-reference-framework/2.7.0/">2.7.0</a></td>
843843
</tr>
844844
<tr>
845845
<td>G</td>
846846
<td><a href="g-zero-knowledge-proof/">Zero Knowledge Proof</a></td>
847847
<td><a href="https://github.com/eu-digital-identity-wallet/eudi-doc-architecture-and-reference-framework/issues/337">Roadmap issue</a></td>
848-
<td></td>
848+
<td>-</td>
849849
</tr>
850850
</tbody>
851851
</table>

2.7.1/discussion-topics/s-certificate-transparancy/index.html

Lines changed: 22 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -429,7 +429,7 @@
429429

430430

431431

432-
<p>Version 0.5, updated 8 October 2025</p>
432+
<p>Version 1.0, updated 6 November 2025</p>
433433
<p><a href="https://github.com/eu-digital-identity-wallet/eudi-doc-architecture-and-reference-framework/discussions/584">Link to GitHub discussion</a></p>
434434
<h1 id="topic-s-certificate-transparency">Topic S - Certificate Transparency</h1>
435435
<h2 id="1-introduction">1 Introduction</h2>
@@ -462,7 +462,7 @@ <h3 id="21-commission-implementing-regulation-eu-2025848">2.1 Commission Impleme
462462
<li><em>a description, where relevant, on how a provider of wallet-relying party
463463
access certificates logs all wallet-relying party access certificates they
464464
have issued, in compliance with internet engineering task force (‘IETF’)
465-
request for comments (‘RFC’) 9162 Certificate Transparency version 2.0</em></li>
465+
request for comments (‘RFC’) 9162 Certificate Transparency Version 2.0</em></li>
466466
</ul>
467467
<p>Note: “<em>…a provider of wallet-relying party access certificates</em>” – above is
468468
a CA authorized to issue access certificates.</p>
@@ -480,7 +480,9 @@ <h2 id="3-discussion">3 Discussion</h2>
480480
<h3 id="31-certificate-transparency">3.1 Certificate Transparency</h3>
481481
<p>A CA issuing access certificates SHALL register these in a CT log according to
482482
RFC 9162. Examples of CT log providers are Google and Cloudflare for SSL/TLS
483-
certificates issued for a domain or subdomain.</p>
483+
certificates issued for a domain or subdomain. Currently no CT log providers are available in Europe. How to address this situation is out of scope of the ARF.</p>
484+
<p>CT logs are used to ensure accuracy of issued access certificates with two or more log providers. This does not mean that the RP is registered or published twice. It only means that there is way to detect access certificates that were issued in error or fraudulently.</p>
485+
<p>Trust provided by CT logs is limited to the issuance of access certificates. They are two or more sources of truth stating who an access certificate has been issued to.</p>
484486
<h4 id="certificate-transparency-logs">Certificate Transparency Logs</h4>
485487
<p>Certificate Transparency (CT) is an open framework designed to improve the
486488
security and accountability of the Public Key Infrastructure (PKI) used on the
@@ -551,9 +553,8 @@ <h4 id="331-eu-ct-log-infrastructure">3.3.1 EU CT log infrastructure</h4>
551553
append-only, and that no unauthorized modifications or omissions go unnoticed.
552554
Finally, drawing from the Web PKI best practice, it is important that
553555
<strong>each certificate be registered in at least two independent CT logs</strong>. </p>
554-
<p>It is assumed that the new European CT log infrastructure will define what
555-
version of RFC 9162 and other implementation requirements such as the number
556-
of CT logs a CA issuing access certificates shall register with is defined.</p>
556+
<p>It is assumed that the new European CT log infrastructure will define
557+
which standard to use, version of RFC 9162 or RFC 6962, and other implementation requirements such as the number of CT logs a CA issuing access certificates shall register with is defined.</p>
557558
<h4 id="332-ct-log-usage">3.3.2 CT log usage</h4>
558559
<p>In the Web PKI, browsers do not directly interact with Certificate Transparency
559560
(CT) logs to verify the inclusion of a certificate. Instead, they <strong>trust the
@@ -577,7 +578,7 @@ <h4 id="333-security-threats">3.3.3 Security threats</h4>
577578
for detecting new domains (see for example, Kondracki et al. "Uninvited Guests:
578579
Analyzing the Identity and Behavior of Certificate Transparency Bots", in Usenix
579580
Security, 2022)</p>
580-
<p>However, this is not expected to be case for CT logs for access certificates,
581+
<p>However, this is not expected to be the case for CT logs for access certificates,
581582
as the list of access certificates is already public. Collating all access certificates in one or more CT logs does not seem to pose any threat as this information is already publicly available.</p>
582583
<h4 id="334-incident-response">3.3.4 Incident response</h4>
583584
<p>It is important to recognise that <strong>Certificate Transparency (CT) logs do
@@ -613,39 +614,41 @@ <h3 id="41-possible-hlrs">4.1 Possible HLRs</h3>
613614
<tbody>
614615
<tr>
615616
<td>CT_01</td>
616-
<td>A CA issuing access certificates SHALL register these in a CT log according to RFC 9162, if such a log is available.</td>
617+
<td>An Access CA issuing access certificates SHALL register these in a CT log according to RFC 9162, if such a log is available for access certificates.</td>
617618
</tr>
618619
<tr>
619620
<td>CT_02</td>
620-
<td>A CA issuing access certificates SHALL include a description in its CPS how all access certificates are logged according to RFC 9162</td>
621+
<td>An Access CA issuing access certificates SHALL describe in its CPS how it logs all access certificates.</td>
621622
</tr>
622623
<tr>
623624
<td>CT_03</td>
624-
<td>In case a CT log provider is available, the Access CA's SHALL act as monitors in the CT eco-system</td>
625+
<td>In case a CT log provider for access certificates is available, all Access CAs SHALL act as monitors in the CT ecosystem. Access CAs SHOULD still monitor the CT logs in situations of temporary unavailability.</td>
625626
</tr>
626627
<tr>
627628
<td>CT_04</td>
628-
<td>The issuing CA SHALL include at least one Signed Certificate Timestamp (SCT) in the certificate</td>
629+
<td>An Access CA SHALL include at least one Signed Certificate Timestamp (SCT) in each access certificate.</td>
629630
</tr>
630631
<tr>
631632
<td>CT_05</td>
632-
<td>The Wallet Unit SHALL check that the access certificate includes at least one Signed Certificate Timestamp (SCT)</td>
633+
<td>When verifying an access certificate during PID or attestation issuance or presentation, a Wallet Unit SHALL also verify that the access certificate includes at least one valid Signed Certificate Timestamp (SCT).</td>
633634
</tr>
634635
<tr>
635636
<td>CT_06</td>
636-
<td>A Wallet Unit SHALL not communicate with a RP which access certificate does not include a SCT</td>
637+
<td>If an access certificate does not include a valid SCT, a Wallet Unit SHALL handle this as a failure or Relying Party authentication, in compliance with all requirements in [<a href="#a234-topic-6---relying-party-authentication-and-user-approval">Topic 6</a>] and in particular requirement RPI_06a.</td>
637638
</tr>
638639
</tbody>
639640
</table>
640641
<p>The HLRs should address:
641642
1. How the certificate verifier performs checks against the CT log? Directly or via a fraud detection system?
642643
2. What checks that should be performed and what constitutes a malicious entry?
643644
3. What protocols that should be offered by a fraud detection system to all certificate verifiers?</p>
644-
<h3 id="42-version-of-rfc-9162-in-cir-eu-2025848">4.2 Version of RFC 9162 in CIR (EU) 2025/848</h3>
645-
<p>The CIR clearly states that version 2 of RFC 9162 shall be used. From comments received it seems that the previous version is implemented and used. As version 2 includes substantial improvements and the Commission might be developing a European CT log infrastructure it should be a task for this initiative to decide which version to use. Consideration of which version to use is dependent on if existing services (version 1) from Cloudflare and Google are to be used.</p>
645+
<h3 id="42-rfc-9162-in-cir-eu-2025848">4.2 RFC 9162 in CIR (EU) 2025/848</h3>
646+
<p>The CIR clearly states that RFC 9162 shall be used. From comments received it seems that the previous standard (RFC 6962) is implemented and used. As RFC 9162 includes substantial improvements and the Commission might be developing a European CT log infrastructure it should be a task for this initiative to decide which standard
647+
to use. Consideration of which version to use is dependent on if existing services from Cloudflare and Google are to be used.</p>
646648
<h3 id="43-proposed-arf-changes">4.3 Proposed ARF changes</h3>
647649
<p>It is planned to introduce a new section in the ARF on Certificate Transparency. This new section will describe aspects of CA’s issuing access certificates.</p>
648650
<p>In addition to these planned changes, further changes on this subject will follow the outcome of the discussion.</p>
651+
<p>Topic S will be integrated into ARF 2.7.0</p>
649652
<h2 id="5-references">5 References</h2>
650653
<table>
651654
<thead>
@@ -663,6 +666,10 @@ <h2 id="5-references">5 References</h2>
663666
<td>[CIR 2025/848]</td>
664667
<td>Commission Implementing Regulation (EU) 2025/848</td>
665668
</tr>
669+
<tr>
670+
<td>[RFC 9162]</td>
671+
<td>IETF Certificate Transparency Version 2.0</td>
672+
</tr>
666673
</tbody>
667674
</table>
668675

0 commit comments

Comments
 (0)