Re: The case for point in time readiness audits (PITRAs)

2014-09-02 Thread Man Ho (Certizen)

On 9/3/2014 4:26 AM, Kathleen Wilson wrote:
> I updated the wiki page some more, here's the text...
>
> https://wiki.mozilla.org/CA:BaselineRequirements#BR_Point_in_Time_Readiness_Assessment_.28BR_PITRA.29
>
> == BR Point in Time Readiness Assessment (BR PITRA) ==
>
> We previously said: "Any Certificate Authority being considered for
> root inclusion after February 15, 2013 must comply with Version 2.1 or
> later of Mozilla's CA Certificate Policy. This includes having a
> Baseline Requirements audit performed if the websites trust bit is to
> be enabled. *Note that the CA's first Baseline Requirements audit may
> be a Point in Time audit.*"
>
> There are two cases when a Point in Time Readiness Assessment of BR
> compliance (BR PITRA) may be used:
>
> 1.The CA has created a new root certificate, which is not yet in
> operation producing real certificates. In this case a BR PITRA prior
> to inclusion may be used, but the next annual audit after inclusion
> would need to be a full performance audit. Note: If the inclusion
> process spans more than one annual audit cycle, then more than one BR
> PITRA may be used, until the root certificate has been included or the
> root certificate is put into operation producing real certificates,
> whichever comes first.
CAs should have their self-assessment on their readiness to comply with
BRs before performing the BR PITRA. In fact, I will not surprise that
you will only get "clean" report from those CAs. If not, why the CA
bother to submit to Mozilla? Then I suppose that the root certificate
should be included in trust store based on the "clean" PITRA report.
Finally the CA put the root certificate into operation to produce real
certificates. No "whichever comes first" because CA may not have real
customers of certificates if the root certificate has not been included
yet. Mozilla should then expect the first performance audit within 12
months.
>
> 2.The CA did not know about the BRs, so did not get audited
> according to the BRs during their previous audit cycle. However, the
> CA does have a current valid audit statement indicating compliance
> with WebTrust Principles and Criteria for Certification Authorities or
> ETSI TS 102 042.
> -- The BR PITRA option was initially provided for CAs to use
> for their first BR audit, so they would not have to go through another
> full audit until their next regularly scheduled annual audit.
> -- The BR PITRA shall include a performance audit covering at
> least one month, or more as determined by the auditor.
If it is a performance audit, it is not a PITRA by definition. In some
conversations with auditors, they are quite confused at this point.
> -- However, it means that an untold number of the previously
> issued certificates might not conform to the BRs. This could be
> serious, depending on which BRs the CA did not previously comply with,
> the number of BRs the CA did not previously comply with, and the
> quantity of such certificates issued. Depending on the situation, the
> CA may be asked to create a new root certificate for inclusion.
Understood that's why you can expect a BR PITRA which may not be a
"clean" report.
> -- The CA and/or auditor shall provide a list of the BRs that
> the previously issued certificates did not comply with.
> -- The CA's next annual audit must include a full BR
> performance audit.
CAs usually perform annual audit over a 12 months period in the past.
For example, an audit report dated in January 2015 shows the audit
result of the period January - December 2014. If the first BR PITRA
audit is performed now in 2014, which may contains a list of the BRs
that yet to be complied with, CA must fix the issues on the list in
2015. If so, the first annual audit that include a full BR performance
audit should be in January 2016. Is my understanding correct?
> ==
>
> As always, I will appreciate thoughtful and constructive feedback on
> this.
>
> Kathleen
>
>
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>




smime.p7s
Description: S/MIME Cryptographic Signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


The case for point in time readiness audits (PITRAs) and performance audits

2014-09-02 Thread kirk_h...@trendmicro.com
Kathleen -

Chris Bailey and I talked about this, and we think FF's rules on what kind of 
audit a CA should present to add a root to the FF keystore should be different 
depending on whether the root is new (no certs issued yet, in part because the 
root is not in FF), or is an existing root in other browsers that is issuing 
certs to customers.

We think FF should accept a simple PITRA audit if the CA is not using its root 
in any browser (and so has no customers).  However, if the root is in other 
browsers and the CA has been using the root to issue certificates to customers, 
then a simple PITRA audit should not be accepted by FF and a full performance 
audit should be required - the CA is already issuing the certs, so why not make 
the CA show BR compliance over at least a 60-90 day period (which generally is 
sufficient under WebTrust as an initial period for a BR performance audit).  
Maybe certs issued prior to the start date of the (successful) performance 
audit should not be recognized in FF.

If a CA applying to be include in the FF keystore can't provide FF the 
necessary audits (regular WebTrust/ETSI and BR audits, plus EV audit if the 
root is to be EV-enabled), then the CA should be moved to the back of the queue 
until the audits have been presented.

On a related question, if a CA has a new root and is not issuing certificates 
yet, we think FF should allow the CA to continue presenting annual PITRA audits 
each year while waiting in the queue until the root is accepted by FF, then 
switch over to performance audits.  Or perhaps one PITRA audit should  be 
sufficient for more than a year waiting in the queue, if the new CA has been 
waiting in the FF queue for over a year like we did - it's not clear that a 
second PITRA audit really adds much, unless the applicable audit standards have 
changed since the first PITRA audit was presented the previous year.

Kirk R. Hall
Operations Director, Trust Services
Trend Micro
+1.503.753.3088



TREND MICRO EMAIL NOTICE
The information contained in this email and any attachments is confidential 
and may be subject to copyright or other intellectual property protection. 
If you are not the intended recipient, you are not authorized to use or 
disclose this information, and we request that you notify us by reply mail or
telephone and delete the original message from your mail system.

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: CFCA Root Inclusion Request

2014-09-02 Thread Kathleen Wilson

On 6/19/14, 4:20 PM, Kathleen Wilson wrote:

This begins the discussion of the request from CFCA to include the “CFCA
GT CA” and “CFCA EV ROOT” root certificates, turn on all three trust
bits for the “CFCA GT CA” root certificate, turn on the websites trust
bit for the “CFCA EV ROOT” root certificate, and enable EV treatment for
the ““CFCA EV ROOT” certificate. At the conclusion of this discussion I
will provide a summary of issues noted and action items. If there are
outstanding issues, then an additional discussion may be needed as
follow-up.



During the course of this discussion, this request was changed to only 
be for inclusion of the "CFCA EV Root" certificate, turn on all three 
trust bits, and enable EV for that root certificate.


In this timeframe we also created and discussed a new wiki page:
https://wiki.mozilla.org/CA:BaselineRequirements

Currently
https://wiki.mozilla.org/CA:BaselineRequirements#Audit_Mistakes
says: "When egregious mistakes were overlooked by the auditor or there 
are a significant number of oversights, then the CA must resolve the 
issues and be re-audited. For the re-audit the CA can either get 
re-audited by a different auditor, or have the current auditor provide 
an immediate plan for correction and compliance, and then present a 
mid-term partial audit following that plan. ..."



I propose to close this discussion with the following action items:

ACTION CFCA: state (in the bug) their plan for remediation of all of the 
issues noted in this discussion.


ACTION CFCA: Decide if they will be re-audited by the same auditor, or 
by a different auditor.


ACTION PwC: If CFCA's decision is to use the same auditor, then provide 
a plan to improve audits so that the oversights that were found during 
this discussion will not be missed in future audits.


ACTION Kathleen: After new audit statement has been received, start a 
second round of discussion for CFCA's root inclusion request.



Does that sound reasonable?

Kathleen








___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: The case for point in time readiness audits (PITRAs)

2014-09-02 Thread Peter Bowen
On Tue, Sep 2, 2014 at 1:26 PM, Kathleen Wilson  wrote:
> -- The BR PITRA shall include a performance audit covering at least
> one month, or more as determined by the auditor.

Does this make sense?  A point in time audit would seem to
intrinsically not cover a period of time.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Removal of 1024 bit roots - Thawte and GTE CyberTrust

2014-09-02 Thread Kathleen Wilson

On 9/2/14, 10:53 AM, Hubert Kario wrote:

I've finally found some time to analyse the data from last months scan
to see what happens when additional roots are removed[1,2].

The scan took place between 11th and 19th of July 2014.
Sites scanned are taken from Alexa top 1 million sites as of 11th of July.




Hubert, Thank you for doing this analysis and sharing your findings.




Removing the Thawte 1024 bit roots[1] causes following changes:

Untrusted: +33 sites.
Incomplete chain: +153, -2 sites.
Complete chain: -184 sites.

Sites that become untrusted:
aclens.com@199.242.144.30
brillenplatz.de@83.141.56.30
copagloja.com.br@54.225.100.66
cqccms.com.cn@124.207.135.23
datatilsynet.no@80.232.122.99
drewag.de@77.75.249.212
easy-forex.com@64.14.56.6
fachverlag-computerwissen.de@78.111.65.215
foreverwedstore.com@208.77.51.191
gold-super-markt.de@94.186.152.196
gold-to-go.com@94.186.152.196
golf.de@194.97.154.131
gumball3000.com@134.0.19.106
jokerit.com@89.250.52.17
loytec.com@88.198.4.4
madeindesign.de@194.213.124.118
meventi.com@78.47.246.235
motor-talk.de@94.198.62.121
nct.ie@193.120.166.32
ncts.ie@193.120.166.32
now.cn@119.146.222.146
pctonline.com@66.181.99.28
recyclingtoday.com@66.181.99.26
santander.be@212.78.166.49
showoffimports.nl@91.216.34.51
slotastic.com@54.204.19.24
tcd.ie@134.226.14.90
todaynic.com@119.146.222.146
whitireia.ac.nz@202.2.11.59
www.cqccms.com.cn@125.35.1.213
www.now.cn@119.146.222.153
www.todaynic.com@119.146.222.153
www.uri.edu@131.128.1.19




Looks like those SSL certs are 5 year certs that were issued in 2010, so 
those site administrators will be needing to update their certs within 
the next year.


The change is currently targeted for Firefox 35 (early January). That 
gives Thawte/Symantec time to contact these customers, and get their 
certs updated.





Removal of the GTE root has bigger impact:

complete -86
incomplete +17, -8
untrusted +77

since the list is so large I won't be quoting it here.


Would you please attach the list to the bug?

Thanks,
Kathleen


___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: The case for point in time readiness audits (PITRAs)

2014-09-02 Thread Kathleen Wilson

I updated the wiki page some more, here's the text...

https://wiki.mozilla.org/CA:BaselineRequirements#BR_Point_in_Time_Readiness_Assessment_.28BR_PITRA.29
== BR Point in Time Readiness Assessment (BR PITRA) ==

We previously said: "Any Certificate Authority being considered for root 
inclusion after February 15, 2013 must comply with Version 2.1 or later 
of Mozilla's CA Certificate Policy. This includes having a Baseline 
Requirements audit performed if the websites trust bit is to be enabled. 
*Note that the CA's first Baseline Requirements audit may be a Point in 
Time audit.*"


There are two cases when a Point in Time Readiness Assessment of BR 
compliance (BR PITRA) may be used:


1.The CA has created a new root certificate, which is not yet in 
operation producing real certificates. In this case a BR PITRA prior to 
inclusion may be used, but the next annual audit after inclusion would 
need to be a full performance audit. Note: If the inclusion process 
spans more than one annual audit cycle, then more than one BR PITRA may 
be used, until the root certificate has been included or the root 
certificate is put into operation producing real certificates, whichever 
comes first.


2.The CA did not know about the BRs, so did not get audited 
according to the BRs during their previous audit cycle. However, the CA 
does have a current valid audit statement indicating compliance with 
WebTrust Principles and Criteria for Certification Authorities or ETSI 
TS 102 042.
-- The BR PITRA option was initially provided for CAs to use 
for their first BR audit, so they would not have to go through another 
full audit until their next regularly scheduled annual audit.
-- The BR PITRA shall include a performance audit covering at 
least one month, or more as determined by the auditor.
-- However, it means that an untold number of the previously 
issued certificates might not conform to the BRs. This could be serious, 
depending on which BRs the CA did not previously comply with, the number 
of BRs the CA did not previously comply with, and the quantity of such 
certificates issued. Depending on the situation, the CA may be asked to 
create a new root certificate for inclusion.
-- The CA and/or auditor shall provide a list of the BRs that 
the previously issued certificates did not comply with.
-- The CA's next annual audit must include a full BR 
performance audit.

==

As always, I will appreciate thoughtful and constructive feedback on this.

Kathleen


___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Removal of 1024 bit roots - Thawte and GTE CyberTrust

2014-09-02 Thread Hubert Kario
I've finally found some time to analyse the data from last months scan
to see what happens when additional roots are removed[1,2].

The scan took place between 11th and 19th of July 2014.
Sites scanned are taken from Alexa top 1 million sites as of 11th of July.

Overall, the certificate stats look like this:

Statistics from 440559 chains provided by 585568 hosts

Server provided chainsCount Percent
-+-+---
complete  36329662.0416
incomplete29441 5.0278
untrusted 19283132.9306

Trusted chain statistics


Chain length  Count Percent
-+-+---
2 2385  0.5414
3 42883997.3397
4 9314  2.1141
5 210.0048

CA key size in chains Count
-+-
ECDSA 256 3
ECDSA 384 3
RSA 1024  1718
RSA 2045  1
RSA 2048  868749
RSA 4096  17615

Chains with CA keyCount Percent
-+-+---
ECDSA 256 3 0.0007
ECDSA 384 3 0.0007
RSA 1024  1708  0.3877
RSA 2045  1 0.0002
RSA 2048  43888999.6209
RSA 4096  17235 3.9121

Signature algorithm (ex. root) Count
--+-
ecdsa-with-SHA384  3
sha1WithRSAEncryption  384856
sha256WithRSAEncryption49903
sha384WithRSAEncryption12768

Eff. host cert chain LoS  Count Percent
-+-+---
8038570487.5488
112   54852 12.4505
128   3 0.0007

Removing the Thawte 1024 bit roots[1] causes following changes:

Untrusted: +33 sites.
Incomplete chain: +153, -2 sites.
Complete chain: -184 sites.

Sites that become untrusted:
aclens.com@199.242.144.30
brillenplatz.de@83.141.56.30
copagloja.com.br@54.225.100.66
cqccms.com.cn@124.207.135.23
datatilsynet.no@80.232.122.99
drewag.de@77.75.249.212
easy-forex.com@64.14.56.6
fachverlag-computerwissen.de@78.111.65.215
foreverwedstore.com@208.77.51.191
gold-super-markt.de@94.186.152.196
gold-to-go.com@94.186.152.196
golf.de@194.97.154.131
gumball3000.com@134.0.19.106
jokerit.com@89.250.52.17
loytec.com@88.198.4.4
madeindesign.de@194.213.124.118
meventi.com@78.47.246.235
motor-talk.de@94.198.62.121
nct.ie@193.120.166.32
ncts.ie@193.120.166.32
now.cn@119.146.222.146
pctonline.com@66.181.99.28
recyclingtoday.com@66.181.99.26
santander.be@212.78.166.49
showoffimports.nl@91.216.34.51
slotastic.com@54.204.19.24
tcd.ie@134.226.14.90
todaynic.com@119.146.222.146
whitireia.ac.nz@202.2.11.59
www.cqccms.com.cn@125.35.1.213
www.now.cn@119.146.222.153
www.todaynic.com@119.146.222.153
www.uri.edu@131.128.1.19

Adding certificate from comment 13 from bugzilla[1] changes the stats
compared to above results in very small way, only 6 hosts loose untrusted
status:

aclens.com@199.242.144.30
cqccms.com.cn@124.207.135.23
easy-forex.com@64.14.56.6
madeindesign.de@194.213.124.118
santander.be@212.78.166.49
www.cqccms.com.cn@125.35.1.213

So in total, removal of certificates referenced in [1] makes at least 27 hosts 
untrusted.

Removal of the GTE root has bigger impact:

complete -86
incomplete +17, -8
untrusted +77

since the list is so large I won't be quoting it here.

As such, I'd say that removing those roots now would be premature.

 1 - https://bugzilla.mozilla.org/show_bug.cgi?id=986014
 2 - https://bugzilla.mozilla.org/show_bug.cgi?id=1047011
-- 
Regards,
Hubert Kario
Quality Engineer, QE BaseOS Security team
Email: hka...@redhat.comg
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy