Yeah - these types of weird continuity requirements are all over the place and the reason the consolidation has taken this long. A lot of the effort has been trying to figure out how to replace things tied to old hardware with updated systems, essentially rebuilding things (like the timestamp service) so it can scale better and use more current technology.
-----Original Message----- From: dev-security-policy <dev-security-policy-boun...@lists.mozilla.org> On Behalf Of Jakob Bohm via dev-security-policy Sent: Thursday, August 29, 2019 8:26 AM To: mozilla-dev-security-pol...@lists.mozilla.org Subject: Re: Symantec migration update Note that while not used by Mozilla, the Time Stamping Authority services formerly owned by Symantec have some unique business continuity requirements: 1. Time stamp signatures, by their very purpose, need to remain valid and trusted for decades after signing, even if no more signatures are generated. This means keeping up private key protection and revocation checking. 2. The specific Symantec time stamping URLs are baked into thousands of scripts, as they have remained the same since before Symantec acquired VeriSign's CA business. But nothing prevents pointing them to equivalent DigiCert servers, as Symantec had already pointed them to Thawte servers. 3. The unique protocol for generated Microsoft-compatible SHA-1 time stamp signatures remain important as long as there are still Vista, Windows 7, Server 2008 and older machines around (even though Microsoft support for those is going away, that hasn't historically stopped users from keeping stuff running and asking 4th party vendors for fresh application updates, thus causing those 4th party vendors to need old form signatures trusted by those old systems). CAs would instead need to take additional precautions to guard against SHA-1 weaknesses. On 29/08/2019 00:58, Jeremy Rowley wrote: > Hey – I realized it’s been a long time since I posted an update about where > we are at on shutting down the legacy Symantec systems. I thought the > community might find it interesting on what we’re doing to consolidate all > the system. > > > When we bought the Symantec CA business, we promised to bring the systems up > to modern compliance standards and deprecate systems or improve the customer > experience by consolidating storefronts. We soon realized that we may have > underestimate the scope of this promise as the systems were a bit old. As > soon as we gained access to the legacy Symantec systems, we audited the > systems for features use and functionality and the legal business agreements > requiring certain things. From this list, we created a migration roadmap that > ensured we could support customer needs and maintain their certificate > landscapes without extensive interference, prioritizing systems based on > complexity and risk. > > > > Once we had a preliminary list, engineering started developing solutions to > to migrate customers to our primary certificate management system, > CertCentral. This was a necessary foundational step to moving customers off > legacy Symantec storefronts and APIs, so that we can shut down the old > Symantec systems. As everyone knows, we did the migration of all validation > first (per the browser requirements), followed by the migration of org > details, and other information. We are still working on some migration tools. > > > > Migration to a new system is complicated for customers, and we’ve tried to > take an approach that would accommodate their needs. To do this, we’re > migrating customers in a staged approach that allows us to target groups as > soon as we have system readiness for different customer subsets. We began > migration efforts with small accounts and accounts who had outgrown the > performance of their old Symantec console. Moving these customers first > allowed us to learn and adapt our migration plan. Next, we began targeting > larger enterprise customers and partners with more complicated, business > integrations. Finally, we have begun targeting API integrated customers with > the most difficult migration plans. We’re working with these customers to > provide them the resources they need to update integrations as soon as > possible. > > > > Of course, on the backend, we already migrated all legacy Symantec customers > to the DigiCert validation and issuance systems for TLS and most code > signing. We’re still working on it for SMIME. > > > > To date, we’ve migrated a total of about 50,000 legacy accounts. This is > important progress towards our goal of system consolidation since we need to > move customers off legacy systems before we turn them off. This isn’t the > half-way point, but we’ve been ramping up migration as new portions of the > code come into completion. Most of the migration has completed since June. > > > > Now that we’re nearly product ready for all customer types to migrate, we > have a line of sight for end of life of the Symantec systems that I thought > would be useful to share: > > > > **Timeline of migration events** > > November 2017: purchased Symantec > > December 1 2017: Began revalidation of Symantec certificates > > December 2017-December 2018: Symantec business migration (transition > service agreement exits) > > January 2018: Symantec product audit > > February-November 2018: Required TSA exits and internal process > updates to absorb additional business > > February 2018: Began planning massive effort to shut down legacy > systems > > February 2018-December 2019: Developing required customer > functionality for all markets > > January 2018? -April 2019: Data center migrations > > February 2019 -November 2019: Developing a means to migrate active > certificate data into > > April 2019: Began migrating retail customers > > June 2019: Began migrating Enterprise customers and Partners > > August 2019: Completed DigiCert MPKI migration > > August 2019: Begin DigiCert Retail migration for domain validation > consolidation (target completion Oct 31) > > > > **Coming next** > > Q4 2019: End of sale of Symantec Enterprise solutions > > Q4 2019: End of life of Symantec Encryption Everywhere, a service for > hosting providers > > Q1 2020: We will begin the shutdown process for legacy systems > > Q3 2020: Target completion for all account migrations > > Q3 2020: Target for system shut down for legacy storefronts, including > migration of legacy DigiCert and Symantec systems. We aim to shut down > systems sooner, but this largely depends on how the shutdown process proceeds. > > > > We’re currently evaluating any additional time required to migrate API > customers. > > > > We are constantly working towards these dates and will post updates as things > change. > > > > ** Note that this plan excludes QuoVadis; we will be posting updates on the > QuoVadis system migration later once we free up resources from the Symantec > migration. > > > > Looking forward to the questions! > > > > Jeremy > > > > > > Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 This public discussion message is non-binding and may contain errors. WiseMo - Remote Service Management for PCs, Phones and Embedded _______________________________________________ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy _______________________________________________ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy