Re: CA generated keys

2017-12-10 Thread Gervase Markham via dev-security-policy
Hi Tim,

The more I think about it, the more I see this is actually a interesting
question :-)

I suspect the first thing Mozilla allowing this would do would be to
make it much more common. (Let's assume there are no other policy
barriers.) I suspect there are several simpler workflows for certificate
issuance and installation that this could enable, and CAs would be keen
to make their customers lives easier and reduce support costs.

On 09/12/17 18:20, Tim Hollebeek wrote:
> First, third parties who are *not* CAs can run key generation and escrow
> services, and then the third party service can apply for a  certificate for
> the key, and deliver the certificate and the key to a customer.

That is true. Do you know how common this is in SSL/TLS?

> I'm not
> sure how this could be prevented.  So if this actually did end up being a
> Mozilla policy, the practical effect would be that SSL keys can be generated
> by third parties and escrowed, *UNLESS* that party is trusted by Mozilla.

Another way of putting it it: "unless that party were the party the
customer is already dealing with and trusts". IoW, there's a much lower
barrier for the customer in getting the CA to do it (trust and
convenience) compared to someone else. So removing this ban would
probably make it much more common, as noted above. If it's something we
want to discourage even if we can't prevent it, the current ban makes sense.

> Second, although I strongly believe that in general, as a best practice,
> keys should be generated by the device/entity it belongs to whenever
> possible, we've seen increasing evidence that key generation is difficult
> and many devices cannot do it securely.  I doubt that forcing the owner of
> the device to generate a key on a commodity PC is any better (it's probably
> worse).

That's also a really interesting question. We've had dedicated device
key generation failures, but we've also had commodity PC key generation
failures (Debian weak keys, right?). Does that mean it's a wash? What do
the risk profiles look like here? One CA uses a MegaRNG2000 to generate
hundreds of thousands of certs.. and then a flaw is found in it. Oops.
Better or worse than a hundred thousand people independently using a
broken OpenSSL shipped by their Linux vendor?

> With an increasing number of small devices running web servers,
> keys generated by audited, trusted third parties under whatever rules
> Mozilla chooses to enforce about secure key delivery may actually in many
> circumstances be superior than what would happen if the practice is banned.

Is there a way to limit the use of this to those circumstances?

Gerv
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: ComSign Root Renewal Request

2017-12-10 Thread YairE via dev-security-policy
Thank you for your notes,
Here are the answers to your points.

all the "bad" points about the CPS were addressed:
Both CPS's are now changed to ver 4.1
section 1 states that we are addressing the latest BR
3.2.2.4 was corrected 
i'm also attaching the new CPS'es so you can review them

About the "creative commons license" it is indeed not listed and therefore 
according to Mozilla policy 3.3 will automatically be treated as CC-BY-ND 4.0.
I'm also attaching the audit for October 2014 as requested and recent audits 
who include the intermediate certificates.


Link to all the attachments:

https://drive.google.com/open?id=1VzrWqouZeda5bQkyhdboO_KvfBo9QV17


___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: ComSign Root Renewal Request

2017-12-10 Thread YairE via dev-security-policy
Thank you for your notes,
Here are the answers to your points.

all the "bad" points about the CPS were addressed:
Both CPS'es are changed to ver 4.1 
section 1 states that we are addressing the *latest* BR
3.2.2.4 was corrected 
the CPS'es in our site has been updated
I’m attaching the new CPS'es so you can review them

about the "creative commons license" it is indeed not listed and therefore 
according to Mozilla policy 3.3 will automatically be treated as CC-BY-ND 4.0.
I’m also attaching the audit for October 2014 as requested and recent audits 
who include the intermediate certificates.

Link to all the attachments:

https://drive.google.com/open?id=1VzrWqouZeda5bQkyhdboO_KvfBo9QV17
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy