Unfortunately, you seem to be be ignoring what I wrote and talking about 
something else.

On 13/11/2018 14:31, Ryan Sleevi wrote:
> I suppose I had unreasonably hoped it would be self-evident, particularly
> for someone who claims to follow the issues, to understand how directly
> that issue was related. Unfortunately, whether for intent or otherwise, it
> appears not.
> 

This discussion has been overfilled with discussions about the meanings 
of words, weather or not something is under one rule or another etc. 
etc., making it very hard to get a clear overview of the primary issues.

Furthermore the start of the thread was off-list.  Also neither I, nor 
some other participants have access to the audit reports etc. in CCADB.

This basic combination of noise and missing data is why I asked for a 
one-stop overview of your complaints against TUVIT, similar to the lists 
compiled for previous situations with multiple complaints against one 
party.

> While I do not believe nor agree with your approach to framing the issues,
> I do hope you can agree that both through the bug - which itself is an
> amalgamation of and reference to several bugs - that during the prior two
> audit cycles, T-Systems contained a substantial amount of misissuance that
> were undetected by TUVIT and that shared the same root cause:
> misconfiguration and misapplication of the relevant rules, both in terms of
> ASN.1 and in terms of normative requirement.
> 

"Misconfiguration and misapplication of the relevant rules..." is so 
broad as to describe the majority of CA failures without giving any 
useful specifics to assess the situation.  It's like saying someone's 
crime was to "violate and break the relevant laws" (which would apply to 
anything from jaywalking to mass murder).

It would also be useful to quantify the word substantial: Of all the 
certificates issued by the audited CA organization, how large a 
percentage suffered from each flaw, how many from none.  This is a key 
number when assessing if statistical sampling by the auditor should have 
caught an issue.  It is also a key number when assessing the level of 
incompetence of the CA (but the CA is not the subject of this thread).

Bug #1391074 contained counts of affected certificates, but not how 
many certificates did not have the listed issues.  So it is not clear if 
those issues were likely to be spotted by 3% sampling.

T4. One valid complaint is that TUVIT apparently (according to what I 
   read in this thread) didn't check the mailing list and bugzilla to 
   find out about the Bug #1391074 issue and include them in a relevant 
   audit statement (as this was already public information, the 
   confidentiality excuse doesn't apply).

T5. Another valid complaint is that TUVIT apparently did not see the 
   corrective measures described in bug #1391074, which should have been 
   in the CA's technical audit logs.

T6. Then there is the valid complain that the administrative paper trail 
   related to Bug #1391074 should have resulted in at least some event 
   observed by TUVIT as part of their ETSI/ISO monitoring during the 
   audit period, and that this should have caused TUVIT to look for the 
   rest of the issue and include it in the audit or audit followup 
   reports.

Issue U1 (Qc-statement misencoding) apparently affected all certificates 
from one issuing CA, and should thus have been caught by sampling by the 
auditor.  The auditor has (according to earlier posts) admitted that the 
bug was present in the sampled certificates from that issuing CA, but 
that this was overlooked because that particular extension was not one 
they had specific experience looking at.  Once the problem was pointed 
out the auditor looked at the previously collected evidence and 
confirmed the problem by checking that detail from first principles 
(similar to software developer hand-executing a function with pen and 
paper to confirm a bug).

T7. So this IS a valid complaint against TUVIT: That the auditor didn't 
   check the Qc-statement encoding from first principles during the 
   original audit, and thus failed to spot the problem.

T8. Then there is the issue that TUVIT didn't issue an official 
   qualification of the CA's status once the issue was both known and 
   public.

S9. There is also the issue if TUVIT should have issued an official 
   qualification of the CA's status if they knew before the U1 issue 
   became public.  This is subject to the debate about the 
   confidentiality provisions in the ISO audit standard versus the 
   expectations of Mozilla and Chrome.

S10. Then there is the issue if TUVIT was right or wrong in accepting a 
  slow phase out of the certificates affected by U1.  This involves both 
  the principal issue if there should be zero tolerance for incorrect 
  certificates, the practical issue of how much harm this specific 
  standards validation can cause, and how much time should be allowed 
  for an orderly replacement process.  Multiple months seems a quite 
  long time.  1 day quite a short time.


> If you are attempting to excuse such misissuance, rather than address it,
> one would take a similar tact as you are here; suggesting, for example,
> that it was T-Systems rather than TUVIT that did the misissuance or by
> suggesting that the incidence was low to be insignificant.

I am not excusing the misissuance, merely trying to catalog it as part 
of the evidence to assess the level of diligence or failure by TUVIT.

It is of cause the purpose of any audit scheme to check for the absence 
of irregularities, and to report if any were found.  But it is quite 
rare for the audit to essentially redo every piece of administrative 
work done by the audited company.

Thus there is often the question of why an irregularity (in this case 
incorrect CA issuances) did not make it into the public audited 
accounts.  And thus if the auditor was (also) at fault, which is the 
topic of this thread.

> I was careful
> not to try to muddy the conversation through an indictment on T-Systems, to
> avoid diluting the conversation, and because they’ve already provided
> several enumerations of the issues and that doing so again, as you’ve done,
> does not add value.

For assessment of TUVIT, this cataloging of known T-System mistakes 
versus what was in the audit reports and audit statements is a key 
measure of the quality of the auditing.

> However, it should be readily apparent from both the
> bug discussion and the list of issues a common pattern of misconfiguring
> relevant profiles and failing to ensure they comply with the relevant
> requirements.

Of cause.  But it is not clear from the documents you linked to (the 
discussion message and but #1391074) that all, or even most, of the 
issues were specifically profile misconfigurations rather than a litany 
of other mistakes.  This in turn ties in to the question how many of 
those mistakes should have been obvious to the auditors versus being 
buried too deep to be spotted.

The debate in bug #1391074 about the template used for ECDSA 
certificates is a good example.  According to the bug, the ECDSA 
certificate profile/template was correct, but some piece of software 
mishandled approved ECDSA certificate requests and used the RSA 
certificate profile/template, for at least some of the issued 
certificates.  An incorrect ECDSA profile/template saying to set the 
KeyEncryption bit should have been spotted by a configuration audit and 
review (by TUVIT).  But code bugs are notoriously harder to spot.

> 
> In the context of ETSI, each of these configuration changes - particularly
> once qualified - undergoes some review; whether after the fact
> (pre-qualification) or prior to such change. 

This is why it is interesting to look at each issue to determine if it 
was subject to such review by or notification to TUVIT.

> Similarly, misissuance
> involves a degree of notification to the CAB. 

Only once known (e.g. around the time of the bug reports).  Because I 
don't think you expect a CA to notify the auditor that it is about to 
misissue, and then proceed to actually misissue instead of stopping 
itself.

> As such, it is entirely
> reasonable to expect a degree of supervision, as that is the value of the
> certification scheme. All of this information would have been available at
> the time of configuring qualified certificates, including the pattern of
> issues existing when configuring profiles and templates.

Should have been available doesn't mean it was available.  There is 
always a limit to the depth of audits, and thus we need to assess if 
TUVIT was being sloppy, complacent, complicit or just unlucky.

> 
> As such, we functionally see two issues; the inadequate supervision that
> resulted in the first batch of misissuance, which can be attempted to be
> argued away by suggesting it was some small volume that sampling would not
> have caught (despite the inconsistencies of that argument with the
> criteria), 

Due to the lack of a consistent list of issues, I have not seen specific 
statements for each of the Bug #1391074 issues if that one should have 
been spotted by the auditor before it was found by the community, and 
why.  For example were the 3 incorrect ECDSA certificates 100%, 1% or 
0.01% of the issued certificates from that particular issuing CA?  And 
how many of the certificates from that issuing CA should have been 
sampled under the criteria?

This is of cause in addition to the question if or why not TUVIT was 
subsequently fully aware of the bug report and the reports uploaded to 
bugzilla by the CA.



> and inadequate supervision leading to this current issue,
> despite having all of that previous information available as context during
> the review and despite their being 100% misissuance rate. 

For the current issue (U1), there is also a major question of how hard or easy 
to spot that particular that encoding error was if not looking 
specifically for that particular error.  This applies both when 
"supervising" the creation of whatever configuration, template or code 
contained the bug and when auditing samples of issued certificates.

One could always take the extreme position that a supervisor has no 
responsibility for the acts of the supervised, or the equally extreme 
position that a supervisor is fully responsible for every act of the 
supervised.


> Both of these
> share a clear commonality of inadequate supervision, a key role played over
> the past several years.

Only if you define away all specifics and reduce the words to 
meaninglessness.

> 
> Audits understandably and obviously do not prevent a CA from making a
> change tomorrow that undermines the past audits; there is no guarantee they
> won’t start actively misissuing once the auditor has left the building. It
> is, however, meant to provide assurance regarding the present (and past)
> configuration. When a CA like T-Systems does misissue, whether this or
> previous incidents, it is entirely reasonable to ask “Was this
> configuration something the auditor previously reviewed, and did they catch
> it?” and, in the case of ETSI, “was this a change the auditor approved in
> relation to ongoing certification?”

Indeed, but the question has to be asked specifically, not just as a 
hypothetical generality.  For example did TUVIT review the ASN.1 module 
used by T-Systems to encode the qc-statements in the incorrect 
certificates?  Did TUVIT compare it to the right edition of the upstream 
standard?  Did subtleties of the ASN.1 semantics and conventions obscure 
the difference?

> 
> The qcStatements demonstrates a failure of the latter, the bug demonstrates
> a failure of the former, both speak to the process of review and the
> qualifications of the reviewer.
> 

Indeed, none of these mistakes should, ideally, have gotten past a 
perfect auditor.  The question is how far from ideal TUVIT was.

> If you don’t agree with the large swath of undetected past misissuance
> being a concern, it would be helpful if you could explain why it isn’t
> concerning. 

It is concerning, the question is how large this swath really was.  
Which requires actually looking at it, not just making blanket 
statements that it was "large" or "small".

> For example, do you believe that these requirements
> (collectively, for any of these issues) were not covered by existing
> criteria? 

They were all clearly covered by the criteria that mistakes should not 
happen and auditing should detect mistakes.  Most, if not all, were also 
covered by more specific criteria.

> Do you believe that sufficient documentation of TUVIT’s
> methodology exists so as to explain why such failure to detect may be seen
> as reasonable? 

I have yet to see sufficient documentation either way, and the thread 
has been a lot of grandstanding on all sides.

> Do you believe that ETSI does not require consideration by
> auditors prior to operational and configuration changes?
I am not a trained ETSI auditor, and don't know for certain.  You have 
certainly said ETSI does require consideration before deliberate 
operational and configuration changes.  On the other hand I doubt the 
auditor is supposed to consider every software patch to the level of a 
full code review.

> In short, do you
> disagree that, when presented with CA misissuance, such as by T-Systems,
> that it is both relevant and appropriate to question why the auditor failed
> to detect and/or prevent such misissuance?
> 

It is relevant to ask, but it takes a considerable level of certainty 
before starting formal proceedings to disqualify an auditor due to the 
failings of a single audit subject.

In comparison, E&Y was involved in auditing multiple bad CAs and RAs by 
the time some E&Y branches where disqualified by Mozilla.

In the world of technical review and testing, TUV SUD is a major player, 
reviewing the safety of many technical products far outside Germany, 
they rank in the same league as UL in the US.


> I am not arguing that an audit be a guarantee against misissuance; for
> example, a statistical sample will be just that, a sample, and stuff can
> reasonably slip through. I am, however, advocating that it’s both
> appropriate and necessary to question whether sampling was even done, and
> how it was constructed (e.g. CA selects the samples and sizes vs auditor),
> and what was reviewed, in order to ascertain whether or not it was
> “reasonable” to have missed something.

> In the case of T-Systems past
> misissuances, the collective sum - especially with respect to things like
> misconfigured templates - raises legitimate concerns about TUVITs approach
> and methodology, and those concerns are each themselves distinct issues
> with TUVIT for every misissuance “type” by T-Systems.
> 

Of all the T-Systems mistakes listed so far, only U1, and maybe U11 are 
clearly cases of bad templates.

Many others were mistakes at other parts of the issuing process.  Many 
in the area of technically (not semantically) validating the data 
inserted into templates.  For example, allowing absolute form DNS names 
when the RFCs require root-relative DNS names with the root period 
omitted.  No amount of checking and reviewing the templates could have 
found that the values being inserted would be wrong.

These are still bad of cause, but they involve other parts of the audit.




Enjoy

Jakob
-- 
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded 
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy
      • Re: Questions regard... Ryan Sleevi via dev-security-policy
        • Re: Questions re... Nick Pope via dev-security-policy
          • Re: Question... Ryan Sleevi via dev-security-policy
            • Re: Que... Nick Pope via dev-security-policy
            • Re: Que... Nick Pope via dev-security-policy
              • Re:... Ryan Sleevi via dev-security-policy
              • Re:... Jakob Bohm via dev-security-policy
              • Re:... Ryan Sleevi via dev-security-policy
              • Re:... Jakob Bohm via dev-security-policy
              • Re:... Ryan Sleevi via dev-security-policy
              • Re:... Jakob Bohm via dev-security-policy
              • Re:... Ryan Sleevi via dev-security-policy
              • Re:... Jakob Bohm via dev-security-policy
              • Re:... Wayne Thayer via dev-security-policy
              • Re:... Ryan Sleevi via dev-security-policy
              • Re:... Wayne Thayer via dev-security-policy
              • Re:... Nick Pope via dev-security-policy
              • Re:... Wayne Thayer via dev-security-policy
              • Re:... Nick Pope via dev-security-policy
              • Re:... Nick Pope via dev-security-policy
  • Re: Questions regarding the q... Moudrick M. Dadashov via dev-security-policy

Reply via email to