(Writing with an individual hat)

I would like to suggest that consideration be given to rejecting future
audits from TUVIT and from that of Matthias Wiedenhorst and Dr. Anja
Widermann, for some period of time. I would suggest this period be at least
one year long; however, given the technical details of ETSI accreditation,
believe a period of three years may be more appropriate.

As part of an investigation into the incorrect qcStatements reported at
https://groups.google.com/forum/#!topic/mozilla.dev.security.policy/x3s3CSKdIlY
, I've used this as an example to explore the complaint handling process
under ETSI EN 319 403.

For those not familiar with the process, ETSI EN 319 403 normatively
incorporates various portions of ISO/IEC 17065, which is an international
standard for Conformity Assessment Bodies. Under the eIDAS scheme, auditors
(henceforth called Conformity Assessment Bodies, or CAB) are assessed by
their National Accreditation Body, or NAB, as being accredited under EN 319
403 to conduct audits against the schemes in ETSI EN 319 411-1 and ETSI EN
319 411-2. When a CA (called a Trust Service Provider, or TSP, by eIDAS)
has been audited (accredited) by a CAB against the scheme in EN 319 411-1
or 411-2, the CAB is applying the principles in EN 319 403.

If there is a belief that a TSP has failed to meet the requirements of
their accreditation, EN 319 403 describes a process for which complaints
may be made to either the TSP or to the CAB. This complaint process is
further expanded upon in ISO/IEC 17065, which 319 403 incorporates. This
same process also applies when there have been mistakes by the CAB to
adhere to its scheme requirements under EN 319 403 - a complaint may be
made with either the CAB or the NAB regarding the CAB's accreditation.

Each CAB and NAB must make available their information for processing
complaints. Given that 100% of the qualified certificates issued by
T-Systems have failed to comply with the requirements of ETSI EN 319 411-2,
by virtue of failing to comply with ETSI EN 319 412-5, I lodged a complaint
regarding T-System's certification with TUVIT, which certified T-Systems.

As part of processing the complaint, the following issues regarding TUVIT's
handling of complaints and overall approach to audits were revealed.

Issue A) As part of their initial response to my complaint, TUVIT, by way
of Matthias Wiedenhorst (Head of Certification Division TSP) stated "As a
very first, quick cross check with our audit evidence record, I can only
say that we did check issued certificates from within the declared period
and that they did contain the proper qcStatement-6.3 / id-etsi-qcs-QcType
3". However, this statement was in direct conflict with the TSP's own
investigation and incident report, provided at
https://bugzilla.mozilla.org/show_bug.cgi?id=1498463#c3 , which states the
mistake was introduced during the development of support - that is, no such
properly issued certificates were issued.

In follow-up with TUVIT, I requested they provide any evidence to support
the claim that such certificates were issued, knowing the matter reported
by T-Systems means this is highly improbable.

In subsequent reply, Matthias Wiedenhorst acknowledged that their
methodology for testing compliance with ETSI EN 319 412-5 stated that the
process was "the auditors have to check the website certificates manually
for the presence of the QC-statement. In this case, the existence of the
id-etsi-qct-web was identified, but for any reason it was not realized that
the esi4-qcStatements-6 was missing. We informed the auditors about how to
check the QC-statement correctly so that we are confident, that in future
an incorrect coding will be detected. "

This implies a significant lack of core competencies within TUVIT to assess
against the criteria of ETSI EN 319 412-5, which provides a normative ASN.1
module within its specification.

Issue C) In regards to remedies, I requested a suspension of T-Systems
current ETSI EN 319 411-2 accreditation, and a subsequent assessment of a
Full audit, given concerns with respect to the audit team performing the
initial audit. TUVIT declined this, on the basis that they assess such
technical non-compliance to be a 'minor non-conformity' that, per ETSI EN
319 403, may be resolved in the next three months by T-Systems without
adversely affecting their accreditation.

Further, T-Systems and TUVIT decided that, on the basis that it is a
non-conformity, such certificates do not need to be revoked according to
the Baseline Requirements' timeline. Furthermore, the failure to revoke
according to the Baseline Requirements' timeline was a further minor
non-conformity, not adversely affecting the certification decision of
T-Systems, and may be remedied over the next 3 months.

Furthermore, in response to whether or not such matters of non-conformities
would be reported by TUVIT (the CAB), Matthis Wiedenhorst acknowledged that
they are not required to make such information public at this time.

I believe this significantly undermines the level of confidence and
assurance that relying parties should place in audits conducted by TUVIT.
The inducement to non-compliant actions, combined with the non-disclosure
of these "non-conformities" to affected parties, is at odds with the
principles and values of the respective Root Programs' goals.


In addition to these concerns with respect to the audits provided, I will
be further lodging a complaint with the German National Accreditation
Body, Deutsche Akkreditierungsstelle GmbH, regarding TUVIT's accreditation
under EN 319 403 to asses TSPs against EN 319 411-1 and EN 319 411-2. The
handling of this incident, the material misstatement as to what was
examined, combined with the failure to ensure appropriate and prompt
notification to the CAB and the Supervisory Body (as detailed in
https://bugzilla.mozilla.org/show_bug.cgi?id=1498463#c3 ) call into serious
question the compliance with Regulation (EU) N°910/2014 on behalf of both
T-Systems and TUVIT. In particular, the failure to perform a timely
notification under Article 19(2) of the "loss of integrity that has a
significant impact on the trust service provider" represents a significant
breach of trust.

With respect to what constitutes a "loss of integrity", both Article 8 and
Article 7(f) note compliance to the appropriate technical standards and the
prohibition of any "specific disproportionate technical requirements on
relying parties ..." that would "significantly impede the interoperability
of the notified electronic identification schemes".

Through their failure to assure a timely disclosure, and the failure to
revoke, TUVIT's certifications disproportionately and adversely affect
Relying Parties. Such certificates assert that they are qualified
certificates, and thus Relying Parties should be able to rely upon them for
their constitutive value. However, in the absence of the appropriate and
mandatory notice as to the qualified purpose of such certificates, as this
incident demonstrates, Relying Parties are left without an interoperable
means of determining whether or not such Qualified Certificates are indeed
qualified, and thus subject to the protections afforded by eIDAS.

Furthermore, the complaint process established under EN 319 403 refers to
that of ISO/IEC 17065:2012. Under ISO/IEC 17065:2012, the requirement is
put forward within 7.13.5 and 7.13.6 that the complaint resolution process
be independent from those from those involved in the audit or those who
have consulted with or been employed by the subject of the audit. Matthias
Wiedenhorst's involvement in, and resolution of, this complaint, calls into
question whether TUVIT has acted according to this, given that they are
represented as Lead Auditor for T-Systems' audit. At this point, the only
objective means of resolving whether or not the process was followed is to
lodge a complaint such that the NAB may themselves investigate the handling
of this complaint.

Given that the Supervisory Body and National Accreditation bodies exist to
protect the legal value of this scheme, the failure by TUVIT to uphold the
safety and security of the eIDAS regime represents an ongoing threat to the
ecosystem.
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to