On Sat, Feb 23, 2019 at 06:51:11AM -0800, alex.gaynor--- via 
dev-security-policy wrote:
> (Writing in my personal capacity)

I'm writing in my personal capacity, as much as possible, as well (I am
a Tor/Tor Browser developer).

> 
> One of the things that I think is important is to tease out factual 
> predicates that could be grounds for exclusion.
[...]
> 
> First, is honesty. Even as we build technologies such as CT and audit regimes 
> which improve auditability and accountability, CAs are ultimately in the 
> business of trust. https://twitter.com/josephfcox/status/1090592247379361792 
> makes the argument that DarkMatter has been in the business of lying to 
> journalists. Lying is fundamentally incompatible with trust.
> 

A phrase I've seen used repeatedly with regard to CAs is they must
operate "beyond reproach", Ryan Sleevi has used this phrase more times
than I can remember since I began following this mailing list (and CA/B
discussions, in general). Certificate Authorities are placed in a unique
position of trust on the Internet, and this trust must not be given
easily. I appreciate this community's attempts at holding the CAs
accountable for their errors, thank you.

Cooper described the process of Root Certificate Inclusion as technical
and bureaucratic. If a CA reaches BR compliance, then it shows some
technical competence, but is that enough? This achievement presents no
evidence of trustworthiness. That (trustworthiness) comes from ones
reputation. As Alex, and others, mentioned, DarkMatter have a bad
reputation when it comes to honesty and they are not a trusted
organization.

In addition, DarkMatter assert all of their public trust EV and OV TLS
certificates are included in Certificate Transparency logs. Again this
is a necessary step in achieving a reputation of being trustable, but by
no means is it sufficient (DV certificates should be logged, as well, at
a minimum). Regardless, Certificate Transparency only helps at
post-compromise - it does not protect the user who was affected. We
should not sacrifice one user for the greater good. Similary, DigiCert
"[...] do not revoke certificates based purely on allegations of
wrongdoing". This is understandable from a business and legal
perspective, but not from the perspective of maintaining trust and
protecting end-users from possible harm. Any direct evidence of
intentional misissuance will be too late.

The risk of misuse cannot be ignored even if we believe these root
certificates are currently only used within their National PKI as a
"national authentication and digital signing platform". There is a
significant conflict of interest within DarkMatter. Based on that
mounting evidence detailing their secret, offensive exploitation
department (read defensive cyber security), their operation as a CA is
absolutely reproachable and this sets an awful precedent. This holds
true for their current intermediate, as well.

Jeopardizing the security, safety, and privacy of Internet users because
we don't have any publicly-known, direct evidence, of DarkMatter
misusing their intermediate CA doesn't help me sleep at night. They are
not a trusted entity, and they should not be treated as if they are
trusted. Period. Mozilla should use their discretion and protect their
users.

Thanks,
Matt
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to