Hello

Thank you all for your feedback for which we have tried to provide additional 
information below. Know that if necessary, you will also find the description 
of our practices through the following links:
•       our CPS :
* Services CA : http://politique.certigna.fr/en/DPCcertignaservicesca.pdf
*       Wild CA : http://politique.certigna.fr/en/DPCcertignawildca.pdf 
•       Our BR self-assessment file 
:https://bugzilla.mozilla.org/attachment.cgi?id=9007984

Wayne: Thank you. We linked the ticket to the bug as requested.

Tyler Schroder: We confirm that the certificate in question is the one that 
Tyler identified. It was revoked and we updated our CP / CPS to clarify the 
changes made following the incident and to provide additional information on 
other practices.

> 1.  Can you explain in more detail the user experience of the RA interface 
> which was used to misissue this certificate?  Specifically, did approval 
> of the issuance in the face of a CAA validation failure require a positive 
> acknowledgement and override of the CAA validation failure, separate and 
> distinct from the actions required to issue a certificate which passed CAA 
> validation? 

The interface used by registration officer is dedicated to the processing of 
certificate requests and is accessible with strong authentication with a 
smartcard certificate. Via this interface, registration officer operates and 
runs all the required checks for each FQDN requested.
All the manual controls to achieve are successively presented to the 
registration operator so that he operates and acknowledges the validation of 
each control. The results of automatic checks, such as CAA DNS and DCV, are 
also presented to the operator in the validation workflow.
Previously, the CAA DNS control was the only one that was an alert and not a 
blocking element for validating the request. The interface has been fixed and 
the negative CAA DNS control result now blocks request validation as for other 
controls.

> 2.  What details can you share around the risk analysis that deemed it 
> appropriate to deploy a system where human operators were able to override 
> critical issuance controls without any oversight, approval, or subsequent 
> review of that override? 

3.  What other parts of the issuance process have had a similar risk 
> analysis undertaken with similar initial results? 

6.  In what specific ways did those compensating controls fail to properly 
manage the risk? 

> Are you saying that you don't account for the risk of possibly issuing a 
> certificate in contravention of the BRs and Mozilla policy? 

To clarify our risk assessment process. We perform a risk assessment on the 
perimeter of PKI at least once a year and before major changes. We employ an 
exhaustive methodology aligned with the EBIOS method and the guidelines of 
ISO/IEC 27005. Our risk management processes are audited both in accordance 
with the requirements of ETSI standards, BRs, but also ISO/IEC 27001, standard 
on which we are also certified. We therefore consider legal, regulatory, 
contractual and normative security requirements for the conduct of risk 
assessments, and therefore the risks of non-compliance with the requirements 
set out by the BRs.

Our different risk assessments incorporate the analysis of risks related to the 
registration operator activities. The different iterations led to the 
establishment of the RA interface with a rigorous script to follow and to 
respect in order to limit any risk or non-compliance in the processing of 
requests.
We made an error regarding CAA DNS control and the fact that its result is not 
blocking for validation. We assessed during the risk assessment that the form 
of consent of the legal representative, and the control of the CAA DNS with a 
warning prompted to the registration officer, would be sufficient to limit the 
risks of obtaining the consent of the organization. This certificate issuance 
showed that we should have set up an automatic block as soon as the 
implementation of the control. Now the automatic blocking is active and the 
wrong results of all controls are blocking.

4.  Which other parts of the issuance process have been modified as a result of 
the review of those risk analyses, in light of the failure of the risk analysis 
around CAA override to correctly control for the 
misissuance risk inherent in CAA override functionality being available to RAs 
without sufficient compensating controls? 

5.  What compensating controls *were* in place to prevent misuse of this manual 
CAA override? 

All controls results, manual as well as automatic, are now blocking for 
validation of a request. Only the CAA DNS control was not blocking. The risk 
assessment did not lead to action on the other controls. From now on, even if 
the control methodologies differ from one set of requirements to another, we 
will automatically ensure that validation is automatically blocked until all 
controls are positive, even if the risk is considered to be covered. by one of 
the methods used, and this also to ensure compliance. It should be noted that 
control of consent is the only point on which control practices were 
heterogeneous in our normative requirements. For the other controls, the 
methodologies used are homogeneous.

13. Did or Do you consider that this CPS was in line with the BRs and Mozilla 
policy?

Yes. We consider that our CPS was and is in line with the BRs and Mozilla 
policy. As mentioned earlier, we have implemented CAA DNS control as required. 
We mistakenly felt that the control of the consent of the legal representative, 
which is blocking it, and the addition of alerts related to the CAA DNS control 
would meet the requirements.

17. Which criteria were required under your old policy to override a CAA 
failure?  (Besides rechecking after a DNS change by the applicant)? 
I realize these were only used once, but the incorrect criteria you had 
instructed your validation officers to use would be interesting to understand 
how this mistaken policy was created. 

As mentioned above, in addition to the automatic control of the CAA DNS, a 
blocking control is already carried out on the supply of a certificate request 
signed by the legal representative of the organization, with the provision of a 
copy of his identity document.

18. How many certificates were delayed until the customer changed their CAA 
records?
 The only identified blocking cases corresponded to typographical errors in the 
registration of Certigna autority name (example: certignia.com, certgna.com, 
...).
After CAA DNS records were updated, theses certificates has been issued.
 
19. How many certificates were not issued because CAA failed and was not 
corrected by the applicant changing their DNS?
 
As a result of our audit, other than the certificate identified by this 
incident and the cases listed for question 18, we have not identified any other 
case where the CAA DNS control should have been blocking. The majority of our 
certificates are issued under group contracts or public contracts for which the 
conditions of delivery and the obligations are known by the applicants even 
before placing their orders online. As a result, the majority of requests are 
received the first time with a valid DNS CAA record (when completed) or without 
(DNS CAA record not used by applicants).
 
20. Have you informed CAB/F about the specific situations in questions 17 to 19 
above. 

These points were exchanged as part of the referencing of our new root and this 
led to the creation of this incident ticket. If we had identified other cases 
following our audit, we would have also declared them in this ticket.

21. Are there any other places where your CP / CPS do or did fall short of the 
BR requirements?
22. Are there any places where your CP / CPS do or did fall short of Mozilla 
requirements beyond the BRs?  (This wasn't one, it was a BR).

We currently have not identified any other areas that may be subject to 
non-compliance. We regularly monitoring our practices to ensure compliance and 
you will see that we are regularly updating our practices and CP / CPS in line 
with the evolutions of BRs. In addition to these controls, our internal audits 
and annual audits by a certification body help to verify the compliance of our 
practices and documentation.
  
23. Which validation controls listed in your CP / CPS are not fully enforced by 
automated systems?  (Your answers suggest at least one, so make sure your 
answer is complete).
 
The following controls always involve manual control by a registration 
operator. The interface allows registration operator  to track and confirm the 
validation operations they perform and their results. These manual controls 
relate to:
⦁ The entity identity validation;
⦁ The identity validation of the Certificate Manager and the legal 
representative;
⦁ The validation of the certificate application form with the signature of the 
Certificate Manager and the legal representative;
⦁ The realization of face-to-face with the Certificate Manager and telephone 
calls;
⦁ Validation of the identity of servers when it is a client server;

We are currently working to automate some of the controls mentioned above such 
as those on identity checks.

24. Your CPS for the Root and Wild CPSs as of 8/31/2018 note in section 4.2.1 
that a certificate issue that did not comply with RFC6844 would be 
automatically blocked. Your note in the first post says that "our new practices 
that automatically block any certificate request for which the DNS CAA record 
controls induce that the CA is not allowed to issue, without possible bypass by 
the RA". Was this blocking process not fully automated as described prior 
(going off of Q23 from Jakob)? 

Indeed, we have updated our CP and CPS to specify that the DNS CAA negative 
results automatically blocks the issuance of the certificate, which was not the 
case at the time of the occurrence of this incident.

25. What exactly prompted the manual override for CAA Checking? A request from 
the origin certificate requestor, the RA on their own... 

As mentioned above, we made an error concerning the control of the DNS CAA 
records and the fact that its result is not blocking for validation. We 
assessed during the risk assessment that the form of consent of the legal 
representative, and the control of the DNS CAA with a warning to registration 
officer, would be sufficient to limit the risks relating to obtaining the 
consent of the organization. The registration operator in charge of processing 
this request, finding that the DNS CAA error was not blocking, and having the 
consent in another form, performed the validation of the request. This 
certificate issuance showed that we should have set up an automatic block as 
soon as the implementation of the control. Now the automatic blocking is active 
and the results of all controls are blocking.

We hope to have answered your questions and we remain at your disposal if you 
want more details.

Best regards
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to