Re: DigiCert-Symantec Announcement

2017-09-07 Thread Peter Kurrasch via dev-security-policy
  I think the plan at the root level makes sense and is reasonable, at least as far as I think I understand it. (A diagram would be nice.)‎ At the intermediate level, however, I think more detail is needed. I'm especially interested in learning how resilient the cert hierarchy will be should it become necessary to alter the hierarchy in response to an adversarial act or management mishap or PKI community sanction or perhaps even future standards work.I also wonder about the plan to allocate the "economically critical" customer base across the various intermediates. For example, should soda companies, banks, shipping companies, and media sites all be given the same consideration? What about main web sites vs static content servers (CDNs)? What about sites that are important to the economy but aren't necessarily the most popular?‎My hope is that there will be enough fault tolerance, redundancy, resiliency--call it whatever you like--built in to the system so that we know we have options available should we need them. The extent to which DigiCert can flesh out some of these details will be of benefit to the whole community.From: Jeremy Rowley via dev-security-policySent: Monday, August 21, 2017 12:48 AMTo: mozilla-dev-security-policyReply To: Jeremy RowleySubject: RE: DigiCert-Symantec AnnouncementHi everyone, We’re still progressing towards close and transition.  One of the items we are heavily evaluating is the root structure and cross-signings post close.  Although the plan is still being finalized, I wanted to provide a community update on the current proposal.Right now, Mozilla post stated that they plan to deprecate Symantec roots for TLS by the end of 2018.  We continue to work on a plan to transition all customers using the roots for TLS to another root, likely the DigiCert High Assurance root.  We will not cross-sign any Symantec roots, however we will continue using those roots for code signing and client/email certs post close (non-TLS use cases).  We also plan on using Symantec roots to cross-sign some of the DigiCert roots to provide ubiquity in non-Mozilla systems and processes.  However, this sign will only provide one-way trust, with the ultimate chain in Mozilla being EE-> Issuing CA -> DigiCert root in all cases.DigiCert currently has four operational roots in the Mozilla trust store: Baltimore, Global, Assured ID, and High Assurance. The other roots are some permutation of these four roots that were established for future use cases/rollover (ECC vs. RSA).  We already separate operations by Sub CA, with TLS, email, and code signing using different issuing CAs. As mentioned in my previous post, we plan on using multiple Sub CAs chained to the DigiCert roots to further control the population trusted by each Sub CA but have not decided on exact numbers. OV and EV will be limited  by Alexa distribution and/or number of customers.  DV isn’t readily identifiable by customer and will use a common sub CA.Root separation proves a difficult, yet achievable, task as there are only four operational roots: Baltimore, High Assurance, Global, and Assured ID. Global and High Assurance issue mostly OV/EV certs but do include code signing and client certificates. High Assurance is our EV root and used for both EV code signing certificates and TLS certs.   Baltimore is our cross-signed root and used primarily by older Verizon customers. Assured ID is used mostly for code signing and client.  However, Assured ID is also our FBCA root, meaning government-issued TLS certificates chain to it.  Of course, all TLS certs are issued in accordance with the BRs regardless of root. Looking at the current customer base, our current plan is to issue EV (code and TLS) from High Assurance, OV (code and TLS) from Global. Assured ID will continue as our client certificate and government root. We plan to continue using Symantec roots for code signing and client.  We’re still looking into this though. We’d love to separate out the roots more than this, but that’s not likely possible given the current root architecture. If there is a non-cross-signed Symantec root that the browsers are not planning to remove, we’d like to continue using the root to issue high volume DV and device certificates.  If this is not possible and Mozilla is still planning on distrusting all Symantec roots, we’ll likely migrate DV certs to a Sub 

Re: Draft Security Blog about v2.5 of Root Store Policy

2017-09-07 Thread Kathleen Wilson via dev-security-policy
On Thursday, September 7, 2017 at 1:23:17 AM UTC-7, Buschart, Rufus wrote:
> I have a question regarding the meaning of:
> 
> > * The latest versions of the WebTrust and ETSI audit criteria are now 
> > required, and auditors are required to be appropriately qualified.

I will delete that sentence in the blog post, because I don't think it's really 
necessary.


> 
> Will you still accept ETSI TS 102 042 audits or does it mean, you will only 
> accept ETSI EN 319 411-1 audits? Both are acceptable according to BRG 8.4.
mozilla.org/listinfo/dev-security-policy

ETSI TS 102 042 audits are still allowed as per
https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy#audit-criteria

Thanks,
Kathleen




___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Idea for a stricter name constraint interpretation

2017-09-07 Thread Ryan Sleevi via dev-security-policy
On Thu, Sep 7, 2017 at 5:22 PM, Jakob Bohm via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> On 07/09/2017 21:00, Ryan Sleevi wrote:
>
Then there is your suggestion of requiring technically constrained
>>
>>> SubCAs (that were constrained under a previous set of relevant name
>>> types) could survive by subjecting themselves to the massive overhead of
>>> satisfying the requirements for an unconstrained SubCA (audits, dual
>>> user authentication, specially secured server facilities, geographic
>>> redundancy, etc.), where as a constrained SubCA they could operate under
>>> normal enterprise internal security rules.
>>>
>>>
>> Yup.
>>
>>
> What do you mean "Yup"?
>

This is a correct statement about what is currently required of CAs, and is
a technically viable and workable solution, albeit one with tradeoffs, and
does not require any breaking of compatibility.


> The goalposts have not moved at all.
>
> When you failed to understand the goals outlined in the first two and
> last paragraphs of my initial short post, I listed the two purposes
> explicitly in my post dated 2017-09-01 06:07 UTC (As "primary problem"
> and "secondary problem").
>

Respectfully, you are changing the goals as solutions are produced.

For example, your notation of primary/secondary fails to consider (or
explicitly ignores) the repeated attempts to highlight the principle in
https://www.mozilla.org/en-US/about/manifesto/#principle-06 outlined to you.

As I highlighted, your proposal (and all variations of it that you've
offered so far) fail to meet that. I offered you a variety of suggestions
that meet that principle - some of which do not achieve what you value, but
do achieve what Mozilla has explicitly valued.

At this point, I feel like there's not much productive communication to be
made here. I understand your goals. They are ignoring publicly-stated goals
and principles, and present compatibility issues, but I wish you the best
of luck in demonstrating how your solution can meet those goals.

I don't believe you realize you're setting value-based criteria and those
values are not shared, nor reasonable, but in any event, you have a
solution you believe works, I've offered you several solutions that balance
for other values, and it seems profoundly unlikely that you can be
convinced that interoperability and standards-compliance is more important
in the concrete than an abstract perception of cost that doesn't actually
manifestly exist.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: PROCERT issues

2017-09-07 Thread Ryan Sleevi via dev-security-policy
On Thu, Sep 7, 2017 at 11:17 AM, Gervase Markham via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> Mozilla has decided that there is sufficient concern about the
> activities and operations of the CA "PROCERT" to collect together our
> list of current concerns. That list can be found here:
> https://wiki.mozilla.org/CA:PROCERT_Issues
>
> Note that this list may expand or reduce over time as issues are
> investigated further, with information either from our or our
> community's investigations or from PROCERT.
>
> We expect PROCERT to engage in a public discussion of these issues and
> give their comments and viewpoint. We also hope that our community will
> make comments, and perhaps provide additional information based on their
> own investigations.
>
> When commenting on these issues, please clearly state which issue you
> are addressing on each occasion. The issues have been given identifying
> letters to help with this.
>
> At the end of a public discussion period between Mozilla, our community
> and PROCERT, which we hope will be no longer than a couple of weeks,
> Mozilla will move to make a decision about the continued trust of
> PROCERT, based on the picture which has then emerged.
>

(Unless stated, wearing a personal hat)

Hi Gerv,

Do you have an anticipated time period for discussion? That is, what
represents a time for which PROCERT may submit feedback to have it
considered, and at what point you will consider discussion closed?

Based on the information provided, Issue K represents an unconditional
security issue, in as much as names such as "autodiscover" and "owaserver"
are widely-used domains for Outlook Web Access. Many clients attempt to
access resources at this (unqualified) domain, relying on the combination
of DNS suffix search and locally-trusted certificates to ensure proper
resolution. By issuing a publicly trusted certificate for this name - and
then failing to revoke it - represents a critical security risk and
arguably a dereliction of responsibility.

Combined with Issue D and Issue G, it is questionable as to how it was ever
validated, and suggest serious failings over the most critical security
control of a CA - which is validation of a domain.

Combined with Issue L, Issue Q, Issue R, Issue X, and Issue W, serious
questions are raised about the oversight and technical ability of the
staff, as these are indicative of serious control failures.

Outside of Issue K, I would suggest that Issue O and Issue S show a lack of
awareness of developments in the CA ecosystem, as both of these controls
were direct responses to widely reported CA security issues. The failure to
take appropriate steps - or to appreciate the reasons behind such steps -
are indicative of a systematic misunderstanding of the security function of
a CA.

On the basis of the sum of these issues, it would seem that the criteria in
Section 7.3 of Mozilla policy -
https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/
- is met: "Mozilla will disable or remove a certificate if the CA
demonstrates ongoing or egregious practices that do not maintain the
expected level of service or that do not comply with the requirements of
this policy."
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Idea for a stricter name constraint interpretation

2017-09-07 Thread Jakob Bohm via dev-security-policy

On 07/09/2017 21:00, Ryan Sleevi wrote:

On Thu, Sep 7, 2017 at 1:20 PM, Jakob Bohm via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:


All but one of your suggestions would require the revocation of existing
SubCA certificates, essentially invalidating all existing uses of
certificates issued by those SubCAs (Each certificate holder would need
to obtain and install at least a new SubCA cert, possibly a complete new
end cert).



This is not at all an accurate representation of what it would require, but
I'm not sure it's worth pointing out the code to you, since I think the
broader conversation is whether or not that's a bad thing. While you're
presupposing it's objectively bad, you haven't demonstrated that it's an
unreasonable requirement.



What "code" are you talking about?  Surely not computer code, because
then there must be something buried in your posts that I haven't
spotted.


Then there is your suggestion of requiring technically constrained

SubCAs (that were constrained under a previous set of relevant name
types) could survive by subjecting themselves to the massive overhead of
satisfying the requirements for an unconstrained SubCA (audits, dual
user authentication, specially secured server facilities, geographic
redundancy, etc.), where as a constrained SubCA they could operate under
normal enterprise internal security rules.



Yup.



What do you mean "Yup"?




Could you suggest an alternative solution that does not impose such
significant costs?



Why? You're moving a goalpost as it suits, and that's not a productive line
of discussion. To the point that there are multiple ways to address this
problem is established. That there are paths forward that avoid radically
breaking backwards compatibility is also established.



The goalposts have not moved at all.

When you failed to understand the goals outlined in the first two and
last paragraphs of my initial short post, I listed the two purposes
explicitly in my post dated 2017-09-01 06:07 UTC (As "primary problem"
and "secondary problem").

For clarity, I consider redistributing a modified SubCA certificate to
existing certificate holders in order to meet new compliance rules as an
additional compliance requirement.


What you haven't stated, but which is clear from your replies, is you view
these costs to exceed the cost of breaking backwards compatibility. That's
certainly a viewpoint you can take, and I respect your view, but you
haven't advanced any arguments to support that, and merely stated it as
factual.

I hope we can agree there are multiple ways to address the introduction of
new nametypes. These different approaches have different tradeoffs for them
- revocation, auditing, new functionality, breaking old functionality - and
I've presented this multitude in the hopes of demonstrating to you that
jumping to a solution which notably runs counter to Mozilla's Principles
isn't necessary - there are alternatives.



You have failed to list any (non-accidental) old functionality broken by
my original suggestion (with appropriate bug fixes such as the one for
the Subject distinguished name).

So far I have seen you suggest the following approaches:

 - Revoke existing, previously accepted, SubCA certificates.

 - Replace and reissue existing SubCA certificates with new ones with a
  changed value of the name constraints extension, revoking the previous
  SubCA certificate.

 - Introduce a new extension that would have to be added to previously
  issued SubCA certificates, requiring replace, reissue and revoke, but
  only once rather than each time the requirements change within the
  SubCA lifetime.

 - Convert existing, previously accepted, SubCA operations to much
  higher standards not applicable to their intended use, only to their
  (unintentional) acceptance as valid for a different name type.

My suggestion was a 5th way:

 - Applications that add new names types (or resurrect old forgotten
  ones) should consider name constrained SubCAs that don't mention the
  new name type as not trusted for the new name type.  Ditto for
  root programs that adjust their TCSC definitions to encompass new
  name types.

There is also a 6th way, which I considered too dangerous:

 - Root programs could grandfather as TCSC existing SubCAs (issued
  before a cutoff date) that met an older definition of TCSC, without
  actually making the associated certificate validation code check
  for the resulting loophole.




You may still wish to view a solution that breaks backwards compatibility
favorably, and it's unlikely I can convince you otherwise. But I can
highlight for those on the list that alternatives do exist, and your
solution has notable costs - costs that, in many cases, are deemed
unacceptably high.



I explicitly stated in my first post that the changed design would need
to be checked against the corpus of known public CAs to make sure
nothing actually in use is broken.  Perhaps the design should also be

Re: Idea for a stricter name constraint interpretation

2017-09-07 Thread Ryan Sleevi via dev-security-policy
On Thu, Sep 7, 2017 at 1:20 PM, Jakob Bohm via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> All but one of your suggestions would require the revocation of existing
> SubCA certificates, essentially invalidating all existing uses of
> certificates issued by those SubCAs (Each certificate holder would need
> to obtain and install at least a new SubCA cert, possibly a complete new
> end cert).
>

This is not at all an accurate representation of what it would require, but
I'm not sure it's worth pointing out the code to you, since I think the
broader conversation is whether or not that's a bad thing. While you're
presupposing it's objectively bad, you haven't demonstrated that it's an
unreasonable requirement.

Then there is your suggestion of requiring technically constrained
> SubCAs (that were constrained under a previous set of relevant name
> types) could survive by subjecting themselves to the massive overhead of
> satisfying the requirements for an unconstrained SubCA (audits, dual
> user authentication, specially secured server facilities, geographic
> redundancy, etc.), where as a constrained SubCA they could operate under
> normal enterprise internal security rules.
>

Yup.


> Could you suggest an alternative solution that does not impose such
> significant costs?
>

Why? You're moving a goalpost as it suits, and that's not a productive line
of discussion. To the point that there are multiple ways to address this
problem is established. That there are paths forward that avoid radically
breaking backwards compatibility is also established.

What you haven't stated, but which is clear from your replies, is you view
these costs to exceed the cost of breaking backwards compatibility. That's
certainly a viewpoint you can take, and I respect your view, but you
haven't advanced any arguments to support that, and merely stated it as
factual.

I hope we can agree there are multiple ways to address the introduction of
new nametypes. These different approaches have different tradeoffs for them
- revocation, auditing, new functionality, breaking old functionality - and
I've presented this multitude in the hopes of demonstrating to you that
jumping to a solution which notably runs counter to Mozilla's Principles
isn't necessary - there are alternatives.

You may still wish to view a solution that breaks backwards compatibility
favorably, and it's unlikely I can convince you otherwise. But I can
highlight for those on the list that alternatives do exist, and your
solution has notable costs - costs that, in many cases, are deemed
unacceptably high.


> You seem to be ignoring my actual arguments and arguing only against
> specific words and phrases.


Hopefully, you can see from above that I haven't done so at all, but in
fact been explaining to you why your proposal is unacceptably costly. It
may be simply you disagree.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Idea for a stricter name constraint interpretation

2017-09-07 Thread Jakob Bohm via dev-security-policy

On 01/09/2017 20:07, Ryan Sleevi wrote:

On Fri, Sep 1, 2017 at 2:07 AM, Jakob Bohm via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

...

So, from the get-go with the standards, it was possible to name constrain

DNS. Unless you were referencing certificates prior to them being bound to
domain names, but I can't see how that would be relevant, since the
context
is about DNS names.



Point was that RFC2818 (and RFC2459 which it references for SAN usage)
changed the established interpretation of WebPKI certificates from the
established Mozilla standard.  And that this is an obvious precedent to
making such changes.



I'm sorry, this is simply factually false.


That depends on how you interpret the deprecation of matching against CN
only, as was the case at least up to and including Netscape 4.x Browsers
(according to old Netscape documentation listing supported standard and
Netscape cert extensions).

However this whole discussion of the SAN introduction by PKIX was only
intended as an example of how such changes (may) have happened in the
past.  It was prolonged by your repeated use of anachronistic references
such as RFC2818.





The primary problem is the need to not weaken security for code that
starts looking at new (or previously unused) name types after existing
PKI restricted CAs have (obviously) not mentioned the "new" type(s) as
"deny all" entries in their name restrictions.

The secondary problem is not to burden such restricted CAs with
additional audit or other compliance requirements when such "new" name
types are added to standards such as the CAB/F BRs and the Mozilla root
program polices.



I gave multiple suggestions on how to avoid both of those.



All but one of your suggestions would require the revocation of existing
SubCA certificates, essentially invalidating all existing uses of
certificates issued by those SubCAs (Each certificate holder would need
to obtain and install at least a new SubCA cert, possibly a complete new
end cert).

Then there is your suggestion of requiring technically constrained
SubCAs (that were constrained under a previous set of relevant name
types) could survive by subjecting themselves to the massive overhead of
satisfying the requirements for an unconstrained SubCA (audits, dual
user authentication, specially secured server facilities, geographic
redundancy, etc.), where as a constrained SubCA they could operate under
normal enterprise internal security rules.

Could you suggest an alternative solution that does not impose such
significant costs?





Indeed, I am just trying to see those very requirements from the
perspective of the already deployed PKI and its subscribers being the
"existing users" for which interop needs to be ensured.



Unfortunately, I do not believe you are succeeding in doing so through
proposing semantic changes.



You seem to be ignoring my actual arguments and arguing only against
specific words and phrases.


Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


PROCERT issues

2017-09-07 Thread Gervase Markham via dev-security-policy
Mozilla has decided that there is sufficient concern about the
activities and operations of the CA "PROCERT" to collect together our
list of current concerns. That list can be found here:
https://wiki.mozilla.org/CA:PROCERT_Issues

Note that this list may expand or reduce over time as issues are
investigated further, with information either from our or our
community's investigations or from PROCERT.

We expect PROCERT to engage in a public discussion of these issues and
give their comments and viewpoint. We also hope that our community will
make comments, and perhaps provide additional information based on their
own investigations.

When commenting on these issues, please clearly state which issue you
are addressing on each occasion. The issues have been given identifying
letters to help with this.

At the end of a public discussion period between Mozilla, our community
and PROCERT, which we hope will be no longer than a couple of weeks,
Mozilla will move to make a decision about the continued trust of
PROCERT, based on the picture which has then emerged.

Gerv

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: Draft Security Blog about v2.5 of Root Store Policy

2017-09-07 Thread Buschart, Rufus via dev-security-policy
Hello Kathleen!

Thank you for sharing your draft version. I have a question regarding the 
meaning of:

> * The latest versions of the WebTrust and ETSI audit criteria are now 
> required, and auditors are required to be appropriately qualified.

Will you still accept ETSI TS 102 042 audits or does it mean, you will only 
accept ETSI EN 319 411-1 audits? Both are acceptable according to BRG 8.4.

With best regards,
Rufus Buschart

Siemens AG
Information Technology
Human Resources
PKI / Trustcenter
GS IT HR 7 4
Hugo-Junkers-Str. 9
90411 Nuernberg, Germany
Tel.: +49 1522 2894134
mailto:rufus.busch...@siemens.com

www.siemens.com/ingenuityforlife

-Original Message-
From: dev-security-policy 
[mailto:dev-security-policy-bounces+rufus.buschart=siemens@lists.mozilla.org]
 On Behalf Of Kathleen Wilson via dev-security-policy
Sent: Mittwoch, 6. September 2017 20:23
To: mozilla-dev-security-pol...@lists.mozilla.org
Subject: Draft Security Blog about v2.5 of Root Store Policy

All,

Here is a draft of a security blog about version 2.5 of Mozilla's Root Store 
Policy.  I will greatly appreciate constructive feedback about it.

Thanks,
Kathleen

== Mozilla Releases Version 2.5 of Root Store Policy ==

Recently, Mozilla released version 2.5 of our Root Store Policy, which 
continues our efforts to improve standards and reinforce public trust in the 
security of the Web. We are grateful to all those in the security and 
Certificate Authority (CA) communities who contributed constructively to the 
discussions surrounding the new provisions.

The changes of greatest note in version 2.5 of our Root Store Policy are as 
follows:

* CAs are required to follow industry best practice for securing their 
networks, for example by conforming to the CA/Browser Forum’s Network Security 
Guidelines or a successor document.

* CAs are required to use only those methods of domain ownership validation 
which are specifically documented in the CA/Browser Forum’s Baseline 
Requirements 1.4.1.

* Additional requirements were added for intermediate certificates that are 
used to sign certificates for S/MIME. In particular, such intermediate 
certificates must be name constrained in order to be considered 
technically-constrained and exempt from being audited and disclosed on the 
Common CA Database. 

* Clarified that point-in-time audit statements do not replace the required 
period-of-time assessments. Mozilla continues to require full-surveillance 
period-of-time audits that must be conducted annually, and successive audit 
periods must be contiguous.

* Clarified the information that must be provided in each audit statement, 
including the distinguished name and SHA-256 fingerprint for each root and 
intermediate certificate in scope of the audit.

* CAs are required to follow and be aware of discussions in the 
mozilla.dev.security.policy forum, where Mozilla's root program is coordinated, 
although they are not required to participate. 

* The latest versions of the WebTrust and ETSI audit criteria are now required, 
and auditors are required to be appropriately qualified.

* CAs are required at all times to operate in accordance with the applicable 
Certificate Policy (CP) and Certificate Practice Statement (CPS) documents, 
which must be reviewed and updated at least once every year.

* Our policy on root certificates being transferred from one organization or 
location to another has been updated and included in the main policy. Trust is 
not transferable; Mozilla will not automatically trust the purchaser of a root 
certificate to the level it trusted the previous owner.

The differences between versions 2.5 and 2.4.1 may be viewed on Github. 
(Version 2.4.1 contained exactly the same normative requirements as version 2.4 
but was completely reorganized.)

As always, we re-iterate that participation in Mozilla’s CA Certificate Program 
is at our sole discretion, and we will take whatever steps are necessary to 
keep our users safe. Nevertheless, we believe that the best approach to 
safeguard that security is to work with CAs as partners, to foster open and 
frank communication, and to be diligent in looking for ways to improve.

Mozilla Security Team

==



___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy