Re: Concerns with Dun & Bradstreet as a QIIS

2018-09-27 Thread Dimitris Zacharopoulos via dev-security-policy


Forgive my ignorance, but could you please explain what was your 
ultimate goal, as "an attacker", what were you hoping to gain and how 
could you use this against Relying Parties?


I read your email several times but I could not easily find a case where 
your fake address creates any serious concern for Relying Parties. Even 
if you used the same street address as CloudFlare, the CA would check 
against the database and would find two company records that share the 
same address. That would obviously block the process and additional 
checks would take place. Now, as a way to delay certificate issuance for 
CloudFlare, I find it interesting but it certainly doesn't seem to 
affect Relying Parties.


And to take this one step further, I believe there are several GISs that 
also accept whatever address you tell them because:


1. They have no reason to believe that you will lie to them (they know
   who you are and in some Jurisdictions you might be prosecuted for
   lying to the government)
2. No foreseeable harm to others could be done if you misrepresent your
   own address.

Since we are discussing about Data/Information Sources, the BRs define 
how CAs should evaluate a Data Source and declaring it "Reliable".



   "3.2.2.7 Data Source Accuracy

Prior to using any data source as a Reliable Data Source, the CA SHALL 
evaluate the source for its reliability, accuracy, and resistance to 
alteration or falsification. The CA SHOULD consider the following during 
its evaluation:


1. The age of the information provided,
2. The frequency of updates to the information source,
3. The data provider and purpose of the data collection,
4. The public accessibility of the data availability, and
5. The relative difficulty in falsifying or altering the data.

Databases maintained by the CA, its owner, or its affiliated companies 
do not qualify as a Reliable Data Source if the primary purpose of the 
database is to collect information for the purpose of fulfilling the 
validation requirements under this Section 3.2."


The EVGs also describe how to evaluate and declare the "Qualified" status:


 "11.11.5. Qualified Independent Information Source

A Qualified Independent Information Source (QIIS) is a regularly-updated 
and publicly available database that is generally recognized as a 
dependable source for certain information. A database qualifies as a 
QIIS if the CA determines that:


(1) Industries other than the certificate industry rely on the database 
for accurate location, contact, or other information; and


(2) The database provider updates its data on at least an annual basis.

The CA SHALL use a documented process to check the accuracy of the 
database and ensure its data is acceptable, including reviewing the 
database provider's terms of use. The CA SHALL NOT use any data in a 
QIIS that the CA knows is (i) self-reported and (ii) not verified by the 
QIIS as accurate. Databases in which the CA or its owners or affiliated 
companies maintain a controlling interest, or in which any Registration 
Authorities or subcontractors to whom the CA has outsourced any portion 
of the vetting process (or their owners or affiliated companies) 
maintain any ownership or beneficial interest, do not qualify as a QIIS."



In my understanding, this is the process each CA must perform to 
evaluate every Data Source before granting them the "Reliable" or 
"Qualified" status. Self-reported information without any supporting 
evidence is clearly not acceptable. I have not evaluated this database 
that you mention but if they accept self-reporting for "Street Address" 
and don't perform any additional verification (like asking you for a 
utility bill or cross-referencing it with a government database), then 
the "Street Address" information is unreliable and the CA's evaluation 
process should catch that.


That doesn't mean that the rest of the information is also unreliable. 
For example, an Information Source might describe in their documentation 
practices how they verify each piece of information, for example:


 * the Jurisdicion of Incorporation (they check official government
   records),
 * registry number (they check official government records),
 * the name of legal representative (they check official government
   records),
 * the official name of the legal entity (they check official
   government records),
 * street address (they check the address of a utility bill issued
   under the name of the legal entity),
 * telephone numbers (self-reported),
 * color of the building (self-reported),

and the CA, during evaluation, might decide to accept only the first 5 
as Reliable/Qualified Information as they have higher level of 
assurance. That would be the right thing to do. For the rest of the 
information, the CA should probably request additional validation 
information from the Applicant.


Sorry for the long email, quoting requirements always does that :)


Dimitris.

On 27/9/2018 2:52 πμ, Ian 

Re: Concerns with Dun & Bradstreet as a QIIS

2018-09-27 Thread Ryan Sleevi via dev-security-policy
On Thu, Sep 27, 2018 at 10:39 PM Tim Hollebeek 
wrote:

> I'm glad you added the smiley, because in my experience CAs have rarely,
> if ever, have had any discretion in such matters.


That does not match reports from multiple former employees of various CAs.

Nor do we (DigiCert) particularly want to, to be honest.  I prefer clear,
> open, and transparent validation rules that other CAs can't play games with.
>
> Whitelisting and disclosure of validation sources was an active topic of
> discussion at the Redmond F2F, if I'm remembering my meetings correctly.
> I'm surprised that more small CAs didn't support me in that effort at my
> previous employer, as they generally have not taken as much time or effort
> to find the correct sources, and instead rely upon inferior sources.
>
> If that's the direction people want to move, I'd echo Matt's concern that
> it will be a complex and difficult process.  It's best to recall we spent a
> year or three trying to reach consensus about what localities existed in
> Taiwan and how companies could be identified there, and failed.


I think that’s conflating bad proposals with difficulty.

I'm always willing to work with people on improving the baseline
> requirements, but there needs to be a recognition up front that this is not
> going to be an easy problem to solve, and people need to be willing to
> volunteer and roll up their sleeves and do their part in we're going to
> undertake such a time consuming effort.


Indeed. I look forward to CAs with the day to day expertise to suggest QGIS
to be added. I’m sure any CA of considerable size and scale will no doubt
have a readily available list of QGIS as appropriate for their validation
efforts, as part of ensuring a consistent application of their own
validation policies. I can’t imagine any CA but the very smallest not
already having guidance for their validation staff as to what serves as an
appropriate and reliable source, as they surely wouldn’t be making it up on
the fly.



>
> -Tim
>
> > -Original Message-
> > From: dev-security-policy 
> On
> > Behalf Of Ryan Sleevi via dev-security-policy
> > Sent: Thursday, September 27, 2018 4:18 PM
> > To: Matthew Hardeman 
> > Cc: mozilla-dev-security-policy <
> mozilla-dev-security-pol...@lists.mozilla.org>;
> > Ian Carroll 
> > Subject: Re: Concerns with Dun & Bradstreet as a QIIS
> >
> > Yes, it would be work, but would result in consistent and reliable
> information,
> > and already reflective of the fact that an EV certificate needs to
> identify the
> > jurisdictionOfIncorporation and it's incorporating documents. Or are we
> saying
> > that OV doesn't need to make sure it's actually a valid and legal
> entity, and can
> > just display whatever information the CA feels is appropriate? ;)
> >
> >
> > On Thu, Sep 27, 2018 at 6:48 PM Matthew Hardeman via dev-security-policy
> <
> > dev-security-policy@lists.mozilla.org> wrote:
> >
> > > A whitelist of QGIS sounds fairly difficult.  And how long would it
> > > take to adopt a new one?
> > >
> > > In some states you're going to have an authority per county.  It'd be
> > > a big list.
> > >
> > > On Thu, Sep 27, 2018 at 5:35 PM, Ian Carroll via dev-security-policy <
> > > dev-security-policy@lists.mozilla.org> wrote:
> > >
> > > > On Wednesday, September 26, 2018 at 6:12:22 PM UTC-7, Ryan Sleevi
> > wrote:
> > > > > Thanks for raising this, Ian.
> > > > >
> > > > > The question and concern about QIIS is extremely reasonable. As
> > > discussed
> > > > > in past CA/Browser Forum activities, some CAs have extended the
> > > > definition
> > > > > to treat Google Maps as a QIIS (it is not), as well as third-party
> > > WHOIS
> > > > > services (they’re not; that’s using a DTP).
> > > > >
> > > > > In the discussions, I proposed a comprehensive set of reforms that
> > > would
> > > > > wholly remedy this issue. Given that the objective of OV and EV
> > > > > certificates is nominally to establish a legal identity, and the
> > > > > legal identity is derived from State power of recognition, I
> > > > > proposed that
> > > only
> > > > > QGIS be recognized for such information. This wholly resolves
> > > differences
> > > > > in interpretation on suitable QIIS.
> > > > >
> > > > > However, to ensure there do not also emerge conflicting
> > > > > understandings
> > > of
> > > > > appropriate QGIS - and in particular, since the BRs and EVGs
> > > > > recognize
> > > a
> > > > > variety of QGIS’s with variable levels of assurance relative to
> > > > > the information included - I further suggested that the
> > > > > determination of a
> > > > QGIS
> > > > > for a jurisdictional boundary should be maintained as a normative
> > > > whitelist
> > > > > that can be interoperably used and assessed against. If a given
> > > > > jurisdiction is not included within that whitelist, or the QGIS is
> > > > > not
> > > on
> > > > > it, it cannot be used. Additions to that whitelist can be
> > > > > maintained by
> > > > the
> > > > 

RE: Concerns with Dun & Bradstreet as a QIIS

2018-09-27 Thread Tim Hollebeek via dev-security-policy
I'm glad you added the smiley, because in my experience CAs have rarely, if 
ever, have had any discretion in such matters.  Nor do we (DigiCert) 
particularly want to, to be honest.  I prefer clear, open, and transparent 
validation rules that other CAs can't play games with.

Whitelisting and disclosure of validation sources was an active topic of 
discussion at the Redmond F2F, if I'm remembering my meetings correctly.  I'm 
surprised that more small CAs didn't support me in that effort at my previous 
employer, as they generally have not taken as much time or effort to find the 
correct sources, and instead rely upon inferior sources.

If that's the direction people want to move, I'd echo Matt's concern that it 
will be a complex and difficult process.  It's best to recall we spent a year 
or three trying to reach consensus about what localities existed in Taiwan and 
how companies could be identified there, and failed.

I'm always willing to work with people on improving the baseline requirements, 
but there needs to be a recognition up front that this is not going to be an 
easy problem to solve, and people need to be willing to volunteer and roll up 
their sleeves and do their part in we're going to undertake such a time 
consuming effort.

-Tim

> -Original Message-
> From: dev-security-policy  On
> Behalf Of Ryan Sleevi via dev-security-policy
> Sent: Thursday, September 27, 2018 4:18 PM
> To: Matthew Hardeman 
> Cc: mozilla-dev-security-policy 
> ;
> Ian Carroll 
> Subject: Re: Concerns with Dun & Bradstreet as a QIIS
> 
> Yes, it would be work, but would result in consistent and reliable 
> information,
> and already reflective of the fact that an EV certificate needs to identify 
> the
> jurisdictionOfIncorporation and it's incorporating documents. Or are we saying
> that OV doesn't need to make sure it's actually a valid and legal entity, and 
> can
> just display whatever information the CA feels is appropriate? ;)
> 
> 
> On Thu, Sep 27, 2018 at 6:48 PM Matthew Hardeman via dev-security-policy <
> dev-security-policy@lists.mozilla.org> wrote:
> 
> > A whitelist of QGIS sounds fairly difficult.  And how long would it
> > take to adopt a new one?
> >
> > In some states you're going to have an authority per county.  It'd be
> > a big list.
> >
> > On Thu, Sep 27, 2018 at 5:35 PM, Ian Carroll via dev-security-policy <
> > dev-security-policy@lists.mozilla.org> wrote:
> >
> > > On Wednesday, September 26, 2018 at 6:12:22 PM UTC-7, Ryan Sleevi
> wrote:
> > > > Thanks for raising this, Ian.
> > > >
> > > > The question and concern about QIIS is extremely reasonable. As
> > discussed
> > > > in past CA/Browser Forum activities, some CAs have extended the
> > > definition
> > > > to treat Google Maps as a QIIS (it is not), as well as third-party
> > WHOIS
> > > > services (they’re not; that’s using a DTP).
> > > >
> > > > In the discussions, I proposed a comprehensive set of reforms that
> > would
> > > > wholly remedy this issue. Given that the objective of OV and EV
> > > > certificates is nominally to establish a legal identity, and the
> > > > legal identity is derived from State power of recognition, I
> > > > proposed that
> > only
> > > > QGIS be recognized for such information. This wholly resolves
> > differences
> > > > in interpretation on suitable QIIS.
> > > >
> > > > However, to ensure there do not also emerge conflicting
> > > > understandings
> > of
> > > > appropriate QGIS - and in particular, since the BRs and EVGs
> > > > recognize
> > a
> > > > variety of QGIS’s with variable levels of assurance relative to
> > > > the information included - I further suggested that the
> > > > determination of a
> > > QGIS
> > > > for a jurisdictional boundary should be maintained as a normative
> > > whitelist
> > > > that can be interoperably used and assessed against. If a given
> > > > jurisdiction is not included within that whitelist, or the QGIS is
> > > > not
> > on
> > > > it, it cannot be used. Additions to that whitelist can be
> > > > maintained by
> > > the
> > > > Forum, based on an evaluation of the suitability of that QGIS for
> > > purpose,
> > > > and a consensus for adoption.
> > > >
> > > > This would significantly reduce the risk, while also further
> > > > reducing ambiguities that have arisen from some CAs attempting to
> > > > argue that non-employees of the CA or QGIS, but which act as
> > > > intermediaries on
> > > behalf
> > > > of the CA to the QGIS, are not functionally and formally DTPs and
> > > > this subject to the assessment requirements of DTPs. This
> > > > ambiguity is being exploited in ways that can allow a CA to
> > > > nominally say it checked a
> > QGIS,
> > > > but is relying on the word of a third-party, and with no assurance
> > > > of
> > the
> > > > system security of that third party.
> > > >
> > > > Do you think such a proposal would wholly address your concern?
> > >
> > > I think I'll always agree with removing intermediaries from the
> 

RE: SHA-1 exception history

2018-09-27 Thread Tim Hollebeek via dev-security-policy

> On Thu, 27 Sep 2018 14:52:27 +
> Tim Hollebeek via dev-security-policy
>  wrote:
> 
> > My personal impression is that by the time they are brought up here,
> > far too many issues have easily predicted and pre-determined outcomes.
> 
> It is probably true that many issues have predictable outcomes but I think
> predictability is on the whole desirable. Are there in fact CA
representatives
> who'd rather they had no idea how Mozilla would react when there's an
issue?

Asserting that the only alternative to pre-determined outcomes is  "no idea"
is a straw man.

If there is a lack of predictability because I can't predict the results of
an open and honest deliberation among a diverse community, then yes, I want
that.  I would actually love to see more widespread participation by
community members.  Different perspectives are useful.

> > I know most of the security and key management people for the payment
> > industry very well [1], and they're good people.
> 
> I mean this not sarcastically at all, but almost everybody is "good
people".
> That's just not enough. I would like to think that I'm "good people" and
yet it
> certainly would not be a good idea for the Mozilla CA root trust programme
to
> trust some CA root I have on this PC.

Almost everyone is certainly not "good people" in the sense that I meant.
Security is a difficult subject, and people who understand it well are rare.
It unfortunately also tends to attract the personality type that is keen on
finding faults and inherently suspicious of the motivations of others.  I
have a great deal of respect for many of the people I've met who have both a
profound understanding of technical issues and the ability to make sound
decisions.

If you read the entire long historical list of SHA-1 exchanges, you'll find
a profound lack of respect for the opinions of others in many places.  That
tends to cause people to not participate, in much the same way as it caused
me to slowly back away from the conversation at the time.

> > I attempted to speak up a few times in various fora but it was pretty
> > clear that anything that wasn't security posturing wasn't going to be
> > listened to, and finding a practical solution was not on the agenda.
> > It was pretty clear sitting in the room that certain persons had
> > already made up their minds before they even understood what a payment
> > terminal was, how they are managed, and what the costs and risks were
> > for each potential alternative.
> 
> If we're being frank, my impression is that First Data lied in their
submission to
> us and if it came solely to my discretion that would be enough to have
justified
> telling them "No" on its own the first time.

Honestly, First Data is not my favorite company.  I tend to disagree with
their representatives more often than not.  And I'm not asserting they or
others should have gotten what they wanted, only that the level of discourse
was not where it should have been.  This is perhaps less obvious to those
who only followed the discussions on the list, and did not participate on
the calls and in person.

I actually think the tone on m.d.s-p has improved quite a bit in the last
year or two.  It's one of the reasons I participate here from time to time,
where previously I rarely if ever did.  I would like to see it continue
moving in the right direction.

> As to understanding what a payment terminal is, how about "The cheapest
> possible device that passes the bare minimum of tests to scrape through" ?
Is
> that a good characterisation?

It is not.  Such extreme cynicism is generally a symptom of a lack of
objectivity.

-Tim



smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Concerns with Dun & Bradstreet as a QIIS

2018-09-27 Thread Ryan Sleevi via dev-security-policy
Yes, it would be work, but would result in consistent and reliable
information, and already reflective of the fact that an EV certificate
needs to identify the jurisdictionOfIncorporation and it's incorporating
documents. Or are we saying that OV doesn't need to make sure it's actually
a valid and legal entity, and can just display whatever information the CA
feels is appropriate? ;)


On Thu, Sep 27, 2018 at 6:48 PM Matthew Hardeman via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> A whitelist of QGIS sounds fairly difficult.  And how long would it take to
> adopt a new one?
>
> In some states you're going to have an authority per county.  It'd be a big
> list.
>
> On Thu, Sep 27, 2018 at 5:35 PM, Ian Carroll via dev-security-policy <
> dev-security-policy@lists.mozilla.org> wrote:
>
> > On Wednesday, September 26, 2018 at 6:12:22 PM UTC-7, Ryan Sleevi wrote:
> > > Thanks for raising this, Ian.
> > >
> > > The question and concern about QIIS is extremely reasonable. As
> discussed
> > > in past CA/Browser Forum activities, some CAs have extended the
> > definition
> > > to treat Google Maps as a QIIS (it is not), as well as third-party
> WHOIS
> > > services (they’re not; that’s using a DTP).
> > >
> > > In the discussions, I proposed a comprehensive set of reforms that
> would
> > > wholly remedy this issue. Given that the objective of OV and EV
> > > certificates is nominally to establish a legal identity, and the legal
> > > identity is derived from State power of recognition, I proposed that
> only
> > > QGIS be recognized for such information. This wholly resolves
> differences
> > > in interpretation on suitable QIIS.
> > >
> > > However, to ensure there do not also emerge conflicting understandings
> of
> > > appropriate QGIS - and in particular, since the BRs and EVGs recognize
> a
> > > variety of QGIS’s with variable levels of assurance relative to the
> > > information included - I further suggested that the determination of a
> > QGIS
> > > for a jurisdictional boundary should be maintained as a normative
> > whitelist
> > > that can be interoperably used and assessed against. If a given
> > > jurisdiction is not included within that whitelist, or the QGIS is not
> on
> > > it, it cannot be used. Additions to that whitelist can be maintained by
> > the
> > > Forum, based on an evaluation of the suitability of that QGIS for
> > purpose,
> > > and a consensus for adoption.
> > >
> > > This would significantly reduce the risk, while also further reducing
> > > ambiguities that have arisen from some CAs attempting to argue that
> > > non-employees of the CA or QGIS, but which act as intermediaries on
> > behalf
> > > of the CA to the QGIS, are not functionally and formally DTPs and this
> > > subject to the assessment requirements of DTPs. This ambiguity is being
> > > exploited in ways that can allow a CA to nominally say it checked a
> QGIS,
> > > but is relying on the word of a third-party, and with no assurance of
> the
> > > system security of that third party.
> > >
> > > Do you think such a proposal would wholly address your concern?
> >
> > I think I'll always agree with removing intermediaries from the
> validation
> > process. Outside of practical concerns, a whitelist of QGIS entities
> sounds
> > like a good idea.
> >
> > I would wonder what the replacement for D is in the United States. You
> > can normally get an address for a company from a QGIS but not (from the
> > states I've seen) a phone number for callback verification.
> > ___
> > dev-security-policy mailing list
> > dev-security-policy@lists.mozilla.org
> > https://lists.mozilla.org/listinfo/dev-security-policy
> >
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Concerns with Dun & Bradstreet as a QIIS

2018-09-27 Thread Matthew Hardeman via dev-security-policy
A whitelist of QGIS sounds fairly difficult.  And how long would it take to
adopt a new one?

In some states you're going to have an authority per county.  It'd be a big
list.

On Thu, Sep 27, 2018 at 5:35 PM, Ian Carroll via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> On Wednesday, September 26, 2018 at 6:12:22 PM UTC-7, Ryan Sleevi wrote:
> > Thanks for raising this, Ian.
> >
> > The question and concern about QIIS is extremely reasonable. As discussed
> > in past CA/Browser Forum activities, some CAs have extended the
> definition
> > to treat Google Maps as a QIIS (it is not), as well as third-party WHOIS
> > services (they’re not; that’s using a DTP).
> >
> > In the discussions, I proposed a comprehensive set of reforms that would
> > wholly remedy this issue. Given that the objective of OV and EV
> > certificates is nominally to establish a legal identity, and the legal
> > identity is derived from State power of recognition, I proposed that only
> > QGIS be recognized for such information. This wholly resolves differences
> > in interpretation on suitable QIIS.
> >
> > However, to ensure there do not also emerge conflicting understandings of
> > appropriate QGIS - and in particular, since the BRs and EVGs recognize a
> > variety of QGIS’s with variable levels of assurance relative to the
> > information included - I further suggested that the determination of a
> QGIS
> > for a jurisdictional boundary should be maintained as a normative
> whitelist
> > that can be interoperably used and assessed against. If a given
> > jurisdiction is not included within that whitelist, or the QGIS is not on
> > it, it cannot be used. Additions to that whitelist can be maintained by
> the
> > Forum, based on an evaluation of the suitability of that QGIS for
> purpose,
> > and a consensus for adoption.
> >
> > This would significantly reduce the risk, while also further reducing
> > ambiguities that have arisen from some CAs attempting to argue that
> > non-employees of the CA or QGIS, but which act as intermediaries on
> behalf
> > of the CA to the QGIS, are not functionally and formally DTPs and this
> > subject to the assessment requirements of DTPs. This ambiguity is being
> > exploited in ways that can allow a CA to nominally say it checked a QGIS,
> > but is relying on the word of a third-party, and with no assurance of the
> > system security of that third party.
> >
> > Do you think such a proposal would wholly address your concern?
>
> I think I'll always agree with removing intermediaries from the validation
> process. Outside of practical concerns, a whitelist of QGIS entities sounds
> like a good idea.
>
> I would wonder what the replacement for D is in the United States. You
> can normally get an address for a company from a QGIS but not (from the
> states I've seen) a phone number for callback verification.
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Concerns with Dun & Bradstreet as a QIIS

2018-09-27 Thread Ian Carroll via dev-security-policy
On Wednesday, September 26, 2018 at 6:12:22 PM UTC-7, Ryan Sleevi wrote:
> Thanks for raising this, Ian.
> 
> The question and concern about QIIS is extremely reasonable. As discussed
> in past CA/Browser Forum activities, some CAs have extended the definition
> to treat Google Maps as a QIIS (it is not), as well as third-party WHOIS
> services (they’re not; that’s using a DTP).
> 
> In the discussions, I proposed a comprehensive set of reforms that would
> wholly remedy this issue. Given that the objective of OV and EV
> certificates is nominally to establish a legal identity, and the legal
> identity is derived from State power of recognition, I proposed that only
> QGIS be recognized for such information. This wholly resolves differences
> in interpretation on suitable QIIS.
> 
> However, to ensure there do not also emerge conflicting understandings of
> appropriate QGIS - and in particular, since the BRs and EVGs recognize a
> variety of QGIS’s with variable levels of assurance relative to the
> information included - I further suggested that the determination of a QGIS
> for a jurisdictional boundary should be maintained as a normative whitelist
> that can be interoperably used and assessed against. If a given
> jurisdiction is not included within that whitelist, or the QGIS is not on
> it, it cannot be used. Additions to that whitelist can be maintained by the
> Forum, based on an evaluation of the suitability of that QGIS for purpose,
> and a consensus for adoption.
> 
> This would significantly reduce the risk, while also further reducing
> ambiguities that have arisen from some CAs attempting to argue that
> non-employees of the CA or QGIS, but which act as intermediaries on behalf
> of the CA to the QGIS, are not functionally and formally DTPs and this
> subject to the assessment requirements of DTPs. This ambiguity is being
> exploited in ways that can allow a CA to nominally say it checked a QGIS,
> but is relying on the word of a third-party, and with no assurance of the
> system security of that third party.
> 
> Do you think such a proposal would wholly address your concern?

I think I'll always agree with removing intermediaries from the validation 
process. Outside of practical concerns, a whitelist of QGIS entities sounds 
like a good idea.

I would wonder what the replacement for D is in the United States. You can 
normally get an address for a company from a QGIS but not (from the states I've 
seen) a phone number for callback verification.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: SHA-1 exception history

2018-09-27 Thread Nick Lamb via dev-security-policy
On Thu, 27 Sep 2018 14:52:27 +
Tim Hollebeek via dev-security-policy
 wrote:

> My personal impression is that by the time they are brought up here,
> far too many issues have easily predicted and pre-determined outcomes.

It is probably true that many issues have predictable outcomes but I
think predictability is on the whole desirable. Are there in fact CA
representatives who'd rather they had no idea how Mozilla would react
when there's an issue?

> I know most of the security and key management people for the payment
> industry very well [1], and they're good people.

I mean this not sarcastically at all, but almost everybody is "good
people". That's just not enough. I would like to think that I'm "good
people" and yet it certainly would not be a good idea for the Mozilla
CA root trust programme to trust some CA root I have on this PC.

> I attempted to speak up a few times in various fora but it was pretty
> clear that anything that wasn't security posturing wasn't going to be
> listened to, and finding a practical solution was not on the agenda.
> It was pretty clear sitting in the room that certain persons had
> already made up their minds before they even understood what a
> payment terminal was, how they are managed, and what the costs and
> risks were for each potential alternative.

If we're being frank, my impression is that First Data lied in their
submission to us and if it came solely to my discretion that would be
enough to have justified telling them "No" on its own the first time.

Here's what they wrote to us:

"In Nov. 2014 Datawire added SHA-2 certificates to our staging and
support environments."

And here's what they'd told their customers about one of those staging
environments as late as September 2015:

"Datawire will update to SHA-256 support on March 9, 2016 on the
following url: stg.dw.us.fdcnet.biz (staging)"

and yet when Symantec did create a SHA-256 certificate for
stg.dw.us.fdcnet.biz it wasn't in November 2014, or on March 9, 2016, it
was dated 10 June 2016.


OK, well, maybe it was just stg.dw.us.fdcnet.biz right? Let's try one
of their support sites, support.datawire.net.

That finally received a SHA-256 certificate in September 2016 almost
two years after Datawire told us it had happened, in fact, it was just
barely before Symantec forwarded us their request for an exception.
Rather than almost two _years_ their customers actually had two _days_
for this change before First Data put an onion in their pocket and came
to tell us about how hard they'd tried...

[support.datawire.net still exists at time of writing but is scheduled
to expire in the next few hours]


As to understanding what a payment terminal is, how about "The cheapest
possible device that passes the bare minimum of tests to scrape
through" ? Is that a good characterisation?

Nick.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Visa Issues

2018-09-27 Thread Wayne Thayer via dev-security-policy
Visa has filed a bug [1] requesting removal of the eCommerce root from the
Mozilla root store. Visa has also responded to the information requested in
the qualified audits bug [2], but it's unclear if or when they will respond
to the issues list presented in this thread. Two weeks have passed since I
posted the issues list, and I see no reason to delay the complete distrust
of Visa's eCommerce root. That is likely to happen in Firefox 64 [3] via
removal of the root from NSS version 3.40 . Visa is still welcome to
respond to the issues list, but I think the removal of Visa's only included
root, and thus Visa, from the Mozilla CA Certificate Program implies that
this discussion has reached a conclusion.

- Wayne

[1] https://bugzilla.mozilla.org/show_bug.cgi?id=1493822
[2] https://bugzilla.mozilla.org/show_bug.cgi?id=1485851#c2
[3] https://wiki.mozilla.org/Release_Management/Calendar

On Sun, Sep 23, 2018 at 1:15 PM Ryan Sleevi  wrote:

>
>
> On Thu, Sep 13, 2018 at 3:26 PM Wayne Thayer via dev-security-policy <
> dev-security-policy@lists.mozilla.org> wrote:
>
>> Visa recently delivered new qualified audit reports for their eCommerce
>> Root that is included in the Mozilla program. I opened a bug [1] and
>> requested an incident report from Visa.
>>
>> Visa was also the subject of a thread [2] earlier this year in which I
>> stated that I would look into some of the concerns that were raised. I've
>> done that and have compiled the following issues list:
>>
>> https://wiki.mozilla.org/CA:Visa_Issues
>>
>> While I have attempted to make this list as complete, accurate, and
>> factual
>> as possible, it may be updated as more information is received from Visa
>> and the community.
>>
>> I would like to request that a representative from Visa engage in this
>> discussion and provide responses to these issues.
>>
>> - Wayne
>>
>> [1] https://bugzilla.mozilla.org/show_bug.cgi?id=1485851
>> [2]
>>
>> https://groups.google.com/d/msg/mozilla.dev.security.policy/NNV3zvX43vE/ns8UUwp8BgAJ
>
>
> I've not seen Visa engage in this discussion. The silence is rather
> deafening, and arguably unacceptably so.
>
> With respect to the Qualified Audit, Visa's response as to the substance
> of the issue is particularly unsettling.
> https://bugzilla.mozilla.org/show_bug.cgi?id=1485851#c3 demonstrates that
> they've not actually remediated the qualification, that they've further
> failed to meet the BRs requirements on revocations by any reasonable
> perspective, and they don't even have a plan yet to remedy this issue.
>
> Examining the bug itself is fairly disturbing, and the responses likely
> reveal further BR violations. For example, the inability to obtain evidence
> of domain validation information reveals that there are further issues with
> 2-7.3 - namely, maintaining those logs for 7 years. The response to 2-7.3
> suggests that there are likely more endemic issues around the issuance.
>
> Given the past issues, the recently identified issues (that appear to have
> been longstanding), and the new issues that Visa's PKI Policy team is
> actively engaging in, I believe it would be appropriate and necessary to
> consider removing trust in this CA.
>
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Google Trust Services Root Inclusion Request

2018-09-27 Thread Wayne Thayer via dev-security-policy
A few additional points:

First off, thank you Rob and James for calling out unacceptable list
behavior. Personal attacks will not be tolerated from anyone on this list.

On Thu, Sep 27, 2018 at 10:26 AM Ryan Sleevi  wrote:

>
> On Thu, Sep 27, 2018 at 11:17 AM Jeremy Rowley 
> wrote:
>
>> Oh – I totally agree with you on the Google inclusion issue. Google meets
>> the requirements for inclusion in Mozilla’s root policy so there’s no
>> reason to exclude them. They have an audited CPS, support a community
>> broader with certs than just Google, and have operated a CA without
>> problems in the past. The discussion on Mozilla’s independence is important
>> IMO where a) a Mozilla competitor as a module peer and b) having that same
>> person also belong to a CA. There are legit concerns. Has any other CA
>> served as a module owner? If not, why? I know Tim Hollebeek would be
>> interested in being a peer. If he’s not permitted to be a peer, why not?
>>
>
> Again, I don't think there is or should be a ban on module peers being
employed by a CA.


> I think this again conflates peership with ownership, and it's good to
> revisit what policies are actually specified by how it works.
>
> I disagree with you as to the independence discussion being valuable,
> because that conclusion rests on a misunderstanding about module ownership
> and peership. Again,
> https://www.mozilla.org/en-US/about/governance/policies/module-ownership/
> addresses these concerns. It also is conflating MoCo and MoFo, which I know
> was a topic that Gerv was particularly sensitive to.
>
> To your second part, the selection of peers,
> https://wiki.mozilla.org/Modules addresses this - "A peer is a person
> whom the owner has appointed to help them." and "Owners may add and remove
> peers from their modules as they wish, without reference to anyone else"
>
>
My observation is that peers are appointed in recognition of the level of
work they've done for the module. Peer appointments are announced on the
Mozilla governance list, and I believe that a search of recent peer
announcements [1] supports my observation. If members of this list think
there is someone whose contributions should be recognized by making them a
peer, please let Kathleen and me know. Employees of CAs often have the
knowledge needed to make meaningful contributions here, and we welcome
their contributions.

[1]
https://groups.google.com/forum/#!searchin/mozilla.governance/peer%7Csort:date

To be fair, separating out Ryan as a Google browser representative and Ryan
>> as a module peer is…hard. Perhaps, he specifically is seen as more
>> influential (from my point of view) than others simply because of his dual
>> role.
>>
>
> What is difficult separating out? You're intimating at some degree of
> influence that is not transparent, but that's not supported by any
> evidence. You're also intimating influence over Mozilla somehow, but that
> seems like the separation would be easy.
>
>
>> As I said before, Ryan’s a good module peer so I don’t disagree with your
>> conclusion or any decision to keep him in that spot. But I think openness
>> should include respectful conversation on the impact of influences,
>> perceived or real, on the Mozilla direction.  What might help alleviate
>> concerns is to describe how you (as a module owner) are going to ensure
>> that if Ryan is reviewing and approving code or CA policies, they won’t be
>> unfairly biased towards google or against its competitors? Maybe that’s a
>> bad question, but I’m spit-balling on how we can move past speculation to
>> address concerns raised.
>>
>
> Considering that all of this happens in the open, on m.d.s.p., what are
> you using to support your thinking that there's some undue influence? Do
> you believe that if the title peer is removed, the relationship changes?
> Between questions asked and concerns raised? You're not just spit-balling,
> you're intimating that the speculation has a reasonable foundation that
> requires redress, but you're not actually addressing why that speculation
> is seen as reasonable. That things happen here, transparently, should
> itself serve to demonstrate the speculation as unfounded. Further, the
> influence or lack of influence is based on the discussions that happen
> here, and that regardless of any influence that may be perceived, the
> community discussion that Wayne facilitates as Module Owner provides ample
> opportunity to explore or influence in any other preferable direction.
>
> Just want to point out that Kathleen is currently still the CA Certificate
Policy Module Owner.

But let's humour the specious reasoning here, and imagine there was some
> undue influence on the peership
> - One scenario is that such influence is exercised, and that there isn't a
> public review or discussion phase to 'undo' that influence, and that's bad.
> That's not a failure of peership though, that's a failure of Module
> Ownership
> - Another scenario is that such influence is 

Re: Google Trust Services Root Inclusion Request

2018-09-27 Thread Ryan Sleevi via dev-security-policy
On Thu, Sep 27, 2018 at 11:17 AM Jeremy Rowley 
wrote:

> Oh – I totally agree with you on the Google inclusion issue. Google meets
> the requirements for inclusion in Mozilla’s root policy so there’s no
> reason to exclude them. They have an audited CPS, support a community
> broader with certs than just Google, and have operated a CA without
> problems in the past. The discussion on Mozilla’s independence is important
> IMO where a) a Mozilla competitor as a module peer and b) having that same
> person also belong to a CA. There are legit concerns. Has any other CA
> served as a module owner? If not, why? I know Tim Hollebeek would be
> interested in being a peer. If he’s not permitted to be a peer, why not?
>

I think this again conflates peership with ownership, and it's good to
revisit what policies are actually specified by how it works.

I disagree with you as to the independence discussion being valuable,
because that conclusion rests on a misunderstanding about module ownership
and peership. Again,
https://www.mozilla.org/en-US/about/governance/policies/module-ownership/
addresses these concerns. It also is conflating MoCo and MoFo, which I know
was a topic that Gerv was particularly sensitive to.

To your second part, the selection of peers,
https://wiki.mozilla.org/Modules addresses this - "A peer is a person whom
the owner has appointed to help them." and "Owners may add and remove peers
from their modules as they wish, without reference to anyone else"


> To be fair, separating out Ryan as a Google browser representative and
> Ryan as a module peer is…hard. Perhaps, he specifically is seen as more
> influential (from my point of view) than others simply because of his dual
> role.
>

What is difficult separating out? You're intimating at some degree of
influence that is not transparent, but that's not supported by any
evidence. You're also intimating influence over Mozilla somehow, but that
seems like the separation would be easy.


> As I said before, Ryan’s a good module peer so I don’t disagree with your
> conclusion or any decision to keep him in that spot. But I think openness
> should include respectful conversation on the impact of influences,
> perceived or real, on the Mozilla direction.  What might help alleviate
> concerns is to describe how you (as a module owner) are going to ensure
> that if Ryan is reviewing and approving code or CA policies, they won’t be
> unfairly biased towards google or against its competitors? Maybe that’s a
> bad question, but I’m spit-balling on how we can move past speculation to
> address concerns raised.
>

Considering that all of this happens in the open, on m.d.s.p., what are you
using to support your thinking that there's some undue influence? Do you
believe that if the title peer is removed, the relationship changes?
Between questions asked and concerns raised? You're not just spit-balling,
you're intimating that the speculation has a reasonable foundation that
requires redress, but you're not actually addressing why that speculation
is seen as reasonable. That things happen here, transparently, should
itself serve to demonstrate the speculation as unfounded. Further, the
influence or lack of influence is based on the discussions that happen
here, and that regardless of any influence that may be perceived, the
community discussion that Wayne facilitates as Module Owner provides ample
opportunity to explore or influence in any other preferable direction.

But let's humour the specious reasoning here, and imagine there was some
undue influence on the peership
- One scenario is that such influence is exercised, and that there isn't a
public review or discussion phase to 'undo' that influence, and that's bad.
That's not a failure of peership though, that's a failure of Module
Ownership
- Another scenario is that such influence is exercised, and there is a
public review and discussion phase. If the result produced by that
influence is the same as the community expectation, then there's nothing
improper here. If the result produced by that influence is different from
the community expectation, then that can be corrected and identified during
the review and discussion phase, and such 'influence' is actually either
non-existent or equivalent to the same influence practiced by all
participating members of the community
- Another scenario is that there is no such influence, and the
participation and peership is identical to that of what the community
expects and concurs with.

It's almost as if influence is being conflated with consistency - that is,
if I'm expressing views that the community agrees with, I'm seen as
influential, while ignoring the fact that if I express views the community
disagrees with, they are just as influential as to call that out. Do you
see the logical flaws here?
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org

RE: Google Trust Services Root Inclusion Request

2018-09-27 Thread Jeremy Rowley via dev-security-policy
Maybe Jake’s opinion is not being discarded as readily as I supposed. However, 
Jake’s last message left me disturbed that he didn’t feel listened to. 
Apologies if I’m overblowing the issue, which are definitely hypothetical at 
this point. I did want Jake to feel like his input is an important part of this 
discussion board. Not saying anyone made him feel otherwise intentionally of 
course, but his last message seemed frustrated.

 

From: Ryan Sleevi  
Sent: Wednesday, September 26, 2018 10:49 AM
To: Jeremy Rowley 
Cc: Ryan Sleevi ; mozilla-dev-security-policy 

Subject: Re: Google Trust Services Root Inclusion Request

 

 

On Wed, Sep 26, 2018 at 12:04 PM Jeremy Rowley mailto:jeremy.row...@digicert.com> > wrote:

I also should also emphasize that I’m speaking as Jeremy Rowley, not as 
DigiCert.

 

Note that I didn’t say Google controlled the policy. However, as a module peer, 
Google does have significant influence over the policy and what CAs are trusted 
by Mozilla. Although everyone can participate in Mozilla discussions publicly, 
it’s a fallacy to state that a general participant has similar sway or 
authority to a module peer. That’s the whole point of having a separate class 
for peers compared to us general public.  With Google acting as a CA and module 
peer, you now have one CA heavily influencing who its competitors are, how its 
competitors operate, and what its competitors can do.  Although I personally 
find that you never misuse your power as a module peer, I can see how Jake has 
concerns that Google (as a CA) has very heavy influence over the platform that 
has historically been the CA watchdog (Mozilla).

 

Jeremy, I think this again deserves calling out, because this is 
misrepresenting what module peership does, as well as the CA relationship.

 

I linked you to the definition of Module Ownership, which highlights and 
emphasizes that the module peer is simply a recognized helper. To the extent 
there is any influence, it is through the public discussions here. If your 
concern is that the title confers some special advantage, that's to misread 
what module peer is. If your concern is that the participation - which provides 
solid technical arguments as well as the policy alternatives - is influential, 
then what you're arguing against is public participation.

 

You're presenting these as factual, and that's misleading, so I'd like to 
highlight what is actually entailed.

  

The circumstances are different between the scenarios you describe with respect 
to the other browsers, as is market share.  If Microsoft wants to change CAs 
(and they already use multiple), they can without impacting public perception. 
If Apple wants to use another CA, they can without people commenting how odd it 
is that Apple doesn’t use the Apple CA. With Google controlling the CA and the 
Google browser, all incentive to eliminate any misbehaving Google CA disappears 
for financial reasons, public perception, and because Google can control the 
messaging (through marketshare and influence over Mozilla policy). Note that 
there is historical precedent for Google treating Google special – i.e. the 
exclusion for Google in the Symantec distrust plan.  Thus, I think Jake’s 
concerns should not be discarded so readily.

 

I can understand and appreciate why you have this perspective. I disagree that 
it's an accurate representation, and as shown by the previous message, it does 
not have factual basis. I think it's misleading to suggest that the concerns 
are being discarded, much like yours - they're being responded to with 
supporting evidence and careful analysis. However, they do not hold water, and 
while it would be ideal to convince you of this as well, it's equally important 
to be transparent about it.

 

Your argument above seems to boil down to "People would notice if Google 
changed CAs, but not if Microsoft" - yet that's not supported (see, example, 
the usage of Let's Encrypt by Google, or the former usage of WoSign by 
Microsoft). Your argument about incentives entirely ignores the incentives I 
just described to you previously - which look at public perception, internet 
security, and ecosystem stability. Your argument about influence over Mozilla 
policy has already been demonstrated as false and misleading, but it seems you 
won't be convinced by that. And your suggestion of special treatment ignores 
the facts of the situation (the validation issues, the scoping of audits, that 
Apple and 2 other CAs were also included in the exclusion), ignores the more 
significant special treatment granted by other vendors (e.g. Apple's exclusion 
of a host of mismanaged Symantec sub-CAs now under DigiCert's operational 
control), the past precedent (e.g. the gradual distrust of WoSign/StartCom 
through whitelists, of CNNIC through whitelists), and the public discussion 
involved so entirely that it's entirely unfounded.

 

So I think your continued suggestion that it's being discarded so 

RE: Google Trust Services Root Inclusion Request

2018-09-27 Thread Jeremy Rowley via dev-security-policy
Oh – I totally agree with you on the Google inclusion issue. Google meets the 
requirements for inclusion in Mozilla’s root policy so there’s no reason to 
exclude them. They have an audited CPS, support a community broader with certs 
than just Google, and have operated a CA without problems in the past. The 
discussion on Mozilla’s independence is important IMO where a) a Mozilla 
competitor as a module peer and b) having that same person also belong to a CA. 
There are legit concerns. Has any other CA served as a module owner? If not, 
why? I know Tim Hollebeek would be interested in being a peer. If he’s not 
permitted to be a peer, why not?

 

To be fair, separating out Ryan as a Google browser representative and Ryan as 
a module peer is…hard. Perhaps, he specifically is seen as more influential 
(from my point of view) than others simply because of his dual role.  

 

As I said before, Ryan’s a good module peer so I don’t disagree with your 
conclusion or any decision to keep him in that spot. But I think openness 
should include respectful conversation on the impact of influences, perceived 
or real, on the Mozilla direction.  What might help alleviate concerns is to 
describe how you (as a module owner) are going to ensure that if Ryan is 
reviewing and approving code or CA policies, they won’t be unfairly biased 
towards google or against its competitors? Maybe that’s a bad question, but I’m 
spit-balling on how we can move past speculation to address concerns raised.

 

From: Wayne Thayer  
Sent: Wednesday, September 26, 2018 3:39 PM
To: Ryan Sleevi 
Cc: Jeremy Rowley ; mozilla-dev-security-policy 

Subject: Re: Google Trust Services Root Inclusion Request

 

I'm disputing the conclusion that is being drawn from Jake's concerns, rather 
than the concerns themselves. Primarily, I disagree with the conclusion that 
because Google owns a browser with dominant market share and - due to the 
substantial contributions they make here - because Google has considerable 
influence in this community, they should not be allowed to participate in our 
root program as a CA. Secondarily, I disagree that a Google employee should not 
be a peer of this module due to the potential for a conflict of interest.

 

Unpacking this conclusion in terms of policy it implies, I think the argument 
being made is that any root store operator should be excluded from membership 
in the Mozilla program as a CA, and any employee of a CA should be prohibited 
from being a module peer. The argument is that this will protect us from future 
conflicts of interest (there seems to be agreement that the concern is 
hypothetical at this point).

 

My conclusion is that rather than creating somewhat arbitrary, exclusionary 
rules, we can and should instead rely on the openness and inclusiveness of our 
process to protect us from conflicts of interest. If Google attempts to gain 
preferential treatment for their CA from Mozilla, our community can and will 
identify it, reject it, and hold Mozilla accountable for acting in their best 
interest.

 

On Wed, Sep 26, 2018 at 9:49 AM Ryan Sleevi via dev-security-policy 
mailto:dev-security-policy@lists.mozilla.org> > wrote:

On Wed, Sep 26, 2018 at 12:04 PM Jeremy Rowley mailto:jeremy.row...@digicert.com> >
wrote:

> I also should also emphasize that I’m speaking as Jeremy Rowley, not as
> DigiCert.
>
>
>
> Note that I didn’t say Google controlled the policy. However, as a module
> peer, Google does have significant influence over the policy and what CAs
> are trusted by Mozilla. Although everyone can participate in Mozilla
> discussions publicly, it’s a fallacy to state that a general participant
> has similar sway or authority to a module peer. That’s the whole point of
> having a separate class for peers compared to us general public.  With
> Google acting as a CA and module peer, you now have one CA heavily
> influencing who its competitors are, how its competitors operate, and what
> its competitors can do.  Although I personally find that you never misuse
> your power as a module peer, I can see how Jake has concerns that Google
> (as a CA) has very heavy influence over the platform that has historically
> been the CA watchdog (Mozilla).
>

Jeremy, I think this again deserves calling out, because this is
misrepresenting what module peership does, as well as the CA relationship.

I linked you to the definition of Module Ownership, which highlights and
emphasizes that the module peer is simply a recognized helper. To the
extent there is any influence, it is through the public discussions here.
If your concern is that the title confers some special advantage, that's to
misread what module peer is. If your concern is that the participation -
which provides solid technical arguments as well as the policy alternatives
- is influential, then what you're arguing against is public participation.

You're presenting these as factual, and that's misleading, so I'd like to
highlight what is 

RE: Concerns with Dun & Bradstreet as a QIIS

2018-09-27 Thread Tim Hollebeek via dev-security-policy

> The question and concern about QIIS is extremely reasonable. As discussed in
> past CA/Browser Forum activities, some CAs have extended the definition to
> treat Google Maps as a QIIS (it is not), as well as third-party WHOIS services
> (they’re not; that’s using a DTP).

It's worth noting that the BRs currently say "WHOIS: Information retrieved 
directly from the Domain Name Registrar or registry operator ..." so I'm not 
sure using a DTP is actually permitted.  Though I don't think we've discussed 
that point since the language was added.

> In the discussions, I proposed a comprehensive set of reforms that would
> wholly remedy this issue. Given that the objective of OV and EV certificates 
> is
> nominally to establish a legal identity, and the legal identity is derived 
> from
> State power of recognition, I proposed that only QGIS be recognized for such
> information. This wholly resolves differences in interpretation on suitable 
> QIIS.

We agree with this.

-Tim


smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: SHA-1 exception history

2018-09-27 Thread Tim Hollebeek via dev-security-policy
Speaking for myself ...

My personal impression is that by the time they are brought up here, far too
many issues have easily predicted and pre-determined outcomes.

I know most of the security and key management people for the payment
industry very well [1], and they're good people.  The discussions are
generally one or two orders of magnitude more sophisticated (and far more
polite) than what happens in the web ecosystem.  Yes, there's a lot of
silliness in payments, but that's what happens when you try to run and
manage a low cost/high volume payment system with complex interconnected
audit requirements from multiple SDOs, implemented by hundreds of companies
with their own unique perspectives at global scale.

They did not deserve the treatment they received.  Perhaps things would have
gone better if Symantec wasn't involved, but I was shocked at how the
situation was handled.

I attempted to speak up a few times in various fora but it was pretty clear
that anything that wasn't security posturing wasn't going to be listened to,
and finding a practical solution was not on the agenda.  It was pretty clear
sitting in the room that certain persons had already made up their minds
before they even understood what a payment terminal was, how they are
managed, and what the costs and risks were for each potential alternative.

-Tim

[1] whenever you swipe a payment card, the card number is likely encrypted
with keys from an algorithm that I was first to implement: 

https://x9.org/x9news/asc-x9-releases-standard-ensuring-security-symmetric-k
ey-management-retail-financial-transactions-aes-dukpt-algorithm/

https://x9.org/wp-content/uploads/2018/03/X9.24-3-2017-Python-Source-2018012
9-1.pdf

> -Original Message-
> From: dev-security-policy 
On
> Behalf Of Nick Lamb via dev-security-policy
> Sent: Thursday, September 27, 2018 5:34 AM
> To: dev-security-policy@lists.mozilla.org
> Cc: Nick Lamb 
> Subject: Re: Google Trust Services Root Inclusion Request
> 
> On Wed, 26 Sep 2018 23:02:45 +0100
> Nick Lamb via dev-security-policy
>  wrote:
> > Thinking back to, for example, TSYS, my impression was that my post on
> > the Moral Hazard from granting this exception had at least as much
> > impact as you could expect for any participant. Mozilla declined to
> > authorise the (inevitable, to such an extent I pointed out that it
> > would happen months before it did) request for yet another exception
> > when TSYS asked again.
> 
> Correction: The incident I'm thinking of is First Data, not TSYS, a
different SHA-
> 1 exception.
> 
> Nick.
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://clicktime.symantec.com/a/1/FEUDWpqLnNV5UXAkVPLzsHo_VYc5BQ
> WHYUSdSzjAW5Q=?d=LmNFimUxfoPxKiRYG3qhoRqwu2zE3CPQipLjtaTDkdRpP
> KDL2JS8yPFFNKYTcWKtHyZ4rfj1O0ZZS5x3vkArKDCzRP3ZCC07l-
> SNhD8B4TkkcnDmXJPFlTmuf9Jbc_AGZOos_RYIwD_0TM7s5q9yJyB2Xw6t5iggY1
> qYMgWdJXSo_R6PJYrWiQCv3l_B3q3HEhjoTqZLi0nRxnuoK_Q5ROt-Zy0xZpG-
> sj5lFU44sFfHxhQZR6NBUP6c04vZz2FSHrPV6tFf4x3Sa_hEAhK45l3xKbycZO3xCai
> M4pZCF2dAtJ2mTfuGBl9_FgLu3Btz2-siKIw39AtkuiKptp6JWNszrsiDBQb66B-
> GVQX7M4F7fgMvyaalslF6KHHg5RFi-uOgM8PlilUBCygn0pZylNrU2thPuy-
> Nn9jC=https%3A%2F%2Flists.mozilla.org%2Flistinfo%2Fdev-security-policy


smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Re: Google Trust Services Root Inclusion Request

2018-09-27 Thread Peter Bowen via dev-security-policy
Richard,

Unfortunately Gerv is no longer with us, so he cannot respond to this
accusation.  Having been involved in many discussions on m.d.s.p and with
Gerv directly, I am very sure Gerv deeply owned the decisions on StartCom
and WoSign.  It was by no means Ryan telling Gerv or Mozilla what to do.
Gerv put many hours into researching the issues and is the one who wrote
the wiki and summary docs.

Please give Gerv credit where credit is due.

Thanks,
Peter

On Wed, Sep 26, 2018 at 11:55 PM Richard Wang via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> Sorry, I don't agree with this point. Ryan Sleevi is the Mozilla Module
> Peer that gave too many pressures to the M.D.S.P community to misleading
> the Community and to let Mozilla make the decision that Google want.
>
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Google Trust Services Root Inclusion Request

2018-09-27 Thread Richard Wang via dev-security-policy
It is unfair that somebody attacked me in the WoSign sanction discussion, but 
no body say any word for this! Why? Due to Ryan is famous person and I am 
nobody?


Best Regards,

Richard Wang

On Sep 27, 2018, at 18:24, James Burton mailto:j...@0.me.uk>> 
wrote:

Richard,

Your conduct is totally unacceptable and won’t be tolerated. You must read the 
forum rules regarding etiquette.

Also I suggest you apologise to Ryan.

James



On Thu, 27 Sep 2018 at 10:33, Rob Stradling via dev-security-policy 
mailto:dev-security-policy@lists.mozilla.org>>
 wrote:
Richard,

You might like to familiarize yourself with the Mozilla Forum Etiquette
Ground Rules:
https://www.mozilla.org/en-US/about/forums/etiquette/

Note this in particular:
"Be civil.
No personal attacks. Do not feel compelled to defend your honor in
public. Posts containing personal attacks may be removed from the news
server."

On 27/09/2018 07:59, Richard Wang via dev-security-policy wrote:
> Sorry, I don't agree with this point. Ryan Sleevi is the Mozilla Module Peer 
> that gave too many pressures to the M.D.S.P community to misleading the 
> Community and to let Mozilla make the decision that Google want.
>
> There are two facts to support my opinion:
>
> (1) For StartCom sanction, Mozilla agreed in Oct 2nd 2016 London meeting that 
> if we separate StartCom completely from WoSign, then Mozilla don't sanction 
> StartCom that still trust StartCom root. But Google as peer of Mozilla Module 
> don't agree this, and Ryan even found many very very old problems of StartCom 
> to be a "fact" that must be distrusted. Google changed the Mozilla decision!
>
> (2) For Symantec sanction, everyone can see the argues in M.D.S.P discussion 
> from Ryan Sleevi that Google changed the Mozilla initial decision, this also 
> is the fact.
>
> So, we can see Ryan not just a Mozilla Module Peer, he represents Google 
> browser that affect Mozilla to make the right decision.
>
> Ryan, don't feel too good about yourself. Peoples patiently look at your long 
> emails at M.D.S.P and listen to your bala bala speaking at the CABF meeting, 
> this is because you represent Google Chrome, and Google Chrome seriously 
> affects Mozilla that have the power to kill any CAs. If you leave Google, you 
> will be nothing, no one will care about your existence, and no one will care 
> what you say. So, please don't declare that you don't represent Google before 
> you speak next time, nonsense!
>
> Your myopic has brought global Internet security to the ditch. Chrome display 
> "Secure" for a website just it has SSL(https). Many fake banking websites and 
> fake PayPal websites have Lets Encrypt certificates, and Google Chrome say it 
> is "Secure", this completely misleads global Internet users, resulting in 
> many users are deceived and lost property. Encryption is not equal to secure. 
> Secure means not only encryption, but also need to tell user the website's 
> true identity. Does a fake bank website encryption mean anything? nothing and 
> more worse.
>
> Ryan, 别自我感觉太好,别人耐心看你在M.D.S.P的长篇大论和听你在CABF meeting上说过没完 
> ,是因为你代表谷歌浏览器,而谷歌浏览器严重影响Mozilla对所有CA有生杀大权。如果你离开谷歌,你将什么也不是,没有人会理会你的存在,也没有人会在意你说的话。所以下次不要在发言之前就声明不代表谷歌,废话哦!
>
> 你的短视把全球互联网安全带到了沟里,认为有SSL证书(https)就安全,许多假冒银行网站、假冒PayPal 网站都有Lets 
> Encrypt证书,谷歌浏览器显示为安全,完全误导了全球互联网用户,导致许多用户上当受骗和财产损失。已加密并不等于安全,安全不仅意味着需要加密,而且还需要告知用户此网站的真实身份,一个假冒银行网站加密有任何意义吗?没有并且更糟糕。
>
>
> Best Regards,
>
> Richard Wang
>
>  Original Message 
> From: Ryan Sleevi via dev-security-policy
> Received: Thursday, 27 September 2018 00:53
> To: Jeremy Rowley
> Cc: Ryan Sleevi ; mozilla-dev-security-policy
> Subject: Re: Google Trust Services Root Inclusion Request
>
>
> On Wed, Sep 26, 2018 at 12:04 PM Jeremy Rowley 
> mailto:jeremy.row...@digicert.com>>
> wrote:
>
>> I also should also emphasize that I’m speaking as Jeremy Rowley, not as
>> DigiCert.
>>
>>
>>
>> Note that I didn’t say Google controlled the policy. However, as a module
>> peer, Google does have significant influence over the policy and what CAs
>> are trusted by Mozilla. Although everyone can participate in Mozilla
>> discussions publicly, it’s a fallacy to state that a general participant
>> has similar sway or authority to a module peer. That’s the whole point of
>> having a separate class for peers compared to us general public.  With
>> Google acting as a CA and module peer, you now have one CA heavily
>> influencing who its competitors are, how its competitors operate, and what
>> its competitors can do.  Although I personally find that you never misuse
>> your power as a module peer, I can see how Jake has concerns that Google
>> (as a CA) has very heavy influence over the platform that has historically
>> been the CA watchdog (Mozilla).
>>
>
> Jeremy, I think this again deserves calling out, because this is
> misrepresenting what module peership does, as well as the CA relationship.
>
> I linked you to the definition of Module Ownership, which highlights and
> emphasizes that the 

Re: Google Trust Services Root Inclusion Request

2018-09-27 Thread Nick Lamb via dev-security-policy
On Wed, 26 Sep 2018 23:02:45 +0100
Nick Lamb via dev-security-policy
 wrote: 
> Thinking back to, for example, TSYS, my impression was that my post on
> the Moral Hazard from granting this exception had at least as much
> impact as you could expect for any participant. Mozilla declined to
> authorise the (inevitable, to such an extent I pointed out that it
> would happen months before it did) request for yet another exception
> when TSYS asked again.

Correction: The incident I'm thinking of is First Data, not TSYS, a
different SHA-1 exception.

Nick.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Google Trust Services Root Inclusion Request

2018-09-27 Thread James Burton via dev-security-policy
Richard,

Your conduct is totally unacceptable and won’t be tolerated. You must read
the forum rules regarding etiquette.

Also I suggest you apologise to Ryan.

James



On Thu, 27 Sep 2018 at 10:33, Rob Stradling via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> Richard,
>
> You might like to familiarize yourself with the Mozilla Forum Etiquette
> Ground Rules:
> https://www.mozilla.org/en-US/about/forums/etiquette/
>
> Note this in particular:
> "Be civil.
> No personal attacks. Do not feel compelled to defend your honor in
> public. Posts containing personal attacks may be removed from the news
> server."
>
> On 27/09/2018 07:59, Richard Wang via dev-security-policy wrote:
> > Sorry, I don't agree with this point. Ryan Sleevi is the Mozilla Module
> Peer that gave too many pressures to the M.D.S.P community to misleading
> the Community and to let Mozilla make the decision that Google want.
> >
> > There are two facts to support my opinion:
> >
> > (1) For StartCom sanction, Mozilla agreed in Oct 2nd 2016 London meeting
> that if we separate StartCom completely from WoSign, then Mozilla don't
> sanction StartCom that still trust StartCom root. But Google as peer of
> Mozilla Module don't agree this, and Ryan even found many very very old
> problems of StartCom to be a "fact" that must be distrusted. Google changed
> the Mozilla decision!
> >
> > (2) For Symantec sanction, everyone can see the argues in M.D.S.P
> discussion from Ryan Sleevi that Google changed the Mozilla initial
> decision, this also is the fact.
> >
> > So, we can see Ryan not just a Mozilla Module Peer, he represents Google
> browser that affect Mozilla to make the right decision.
> >
> > Ryan, don't feel too good about yourself. Peoples patiently look at your
> long emails at M.D.S.P and listen to your bala bala speaking at the CABF
> meeting, this is because you represent Google Chrome, and Google Chrome
> seriously affects Mozilla that have the power to kill any CAs. If you leave
> Google, you will be nothing, no one will care about your existence, and no
> one will care what you say. So, please don't declare that you don't
> represent Google before you speak next time, nonsense!
> >
> > Your myopic has brought global Internet security to the ditch. Chrome
> display "Secure" for a website just it has SSL(https). Many fake banking
> websites and fake PayPal websites have Lets Encrypt certificates, and
> Google Chrome say it is "Secure", this completely misleads global Internet
> users, resulting in many users are deceived and lost property. Encryption
> is not equal to secure. Secure means not only encryption, but also need to
> tell user the website's true identity. Does a fake bank website encryption
> mean anything? nothing and more worse.
> >
> > Ryan, 别自我感觉太好,别人耐心看你在M.D.S.P的长篇大论和听你在CABF meeting上说过没完
> ,是因为你代表谷歌浏览器,而谷歌浏览器严重影响Mozilla对所有CA有生杀大权。如果你离开谷歌,你将什么也不是,没有人会理会你的存在,也没有人会在意你说的话。所以下次不要在发言之前就声明不代表谷歌,废话哦!
> >
> > 你的短视把全球互联网安全带到了沟里,认为有SSL证书(https)就安全,许多假冒银行网站、假冒PayPal 网站都有Lets
> Encrypt证书,谷歌浏览器显示为安全,完全误导了全球互联网用户,导致许多用户上当受骗和财产损失。已加密并不等于安全,安全不仅意味着需要加密,而且还需要告知用户此网站的真实身份,一个假冒银行网站加密有任何意义吗?没有并且更糟糕。
> >
> >
> > Best Regards,
> >
> > Richard Wang
> >
> >  Original Message 
> > From: Ryan Sleevi via dev-security-policy
> > Received: Thursday, 27 September 2018 00:53
> > To: Jeremy Rowley
> > Cc: Ryan Sleevi ; mozilla-dev-security-policy
> > Subject: Re: Google Trust Services Root Inclusion Request
> >
> >
> > On Wed, Sep 26, 2018 at 12:04 PM Jeremy Rowley <
> jeremy.row...@digicert.com>
> > wrote:
> >
> >> I also should also emphasize that I’m speaking as Jeremy Rowley, not as
> >> DigiCert.
> >>
> >>
> >>
> >> Note that I didn’t say Google controlled the policy. However, as a
> module
> >> peer, Google does have significant influence over the policy and what
> CAs
> >> are trusted by Mozilla. Although everyone can participate in Mozilla
> >> discussions publicly, it’s a fallacy to state that a general participant
> >> has similar sway or authority to a module peer. That’s the whole point
> of
> >> having a separate class for peers compared to us general public.  With
> >> Google acting as a CA and module peer, you now have one CA heavily
> >> influencing who its competitors are, how its competitors operate, and
> what
> >> its competitors can do.  Although I personally find that you never
> misuse
> >> your power as a module peer, I can see how Jake has concerns that Google
> >> (as a CA) has very heavy influence over the platform that has
> historically
> >> been the CA watchdog (Mozilla).
> >>
> >
> > Jeremy, I think this again deserves calling out, because this is
> > misrepresenting what module peership does, as well as the CA
> relationship.
> >
> > I linked you to the definition of Module Ownership, which highlights and
> > emphasizes that the module peer is simply a recognized helper. To the
> > extent there is any influence, it is through the public discussions here.
> > If your concern 

Re: Google Trust Services Root Inclusion Request

2018-09-27 Thread Rob Stradling via dev-security-policy
Richard,

You might like to familiarize yourself with the Mozilla Forum Etiquette 
Ground Rules:
https://www.mozilla.org/en-US/about/forums/etiquette/

Note this in particular:
"Be civil.
No personal attacks. Do not feel compelled to defend your honor in 
public. Posts containing personal attacks may be removed from the news 
server."

On 27/09/2018 07:59, Richard Wang via dev-security-policy wrote:
> Sorry, I don't agree with this point. Ryan Sleevi is the Mozilla Module Peer 
> that gave too many pressures to the M.D.S.P community to misleading the 
> Community and to let Mozilla make the decision that Google want.
> 
> There are two facts to support my opinion:
> 
> (1) For StartCom sanction, Mozilla agreed in Oct 2nd 2016 London meeting that 
> if we separate StartCom completely from WoSign, then Mozilla don't sanction 
> StartCom that still trust StartCom root. But Google as peer of Mozilla Module 
> don't agree this, and Ryan even found many very very old problems of StartCom 
> to be a "fact" that must be distrusted. Google changed the Mozilla decision!
> 
> (2) For Symantec sanction, everyone can see the argues in M.D.S.P discussion 
> from Ryan Sleevi that Google changed the Mozilla initial decision, this also 
> is the fact.
> 
> So, we can see Ryan not just a Mozilla Module Peer, he represents Google 
> browser that affect Mozilla to make the right decision.
> 
> Ryan, don't feel too good about yourself. Peoples patiently look at your long 
> emails at M.D.S.P and listen to your bala bala speaking at the CABF meeting, 
> this is because you represent Google Chrome, and Google Chrome seriously 
> affects Mozilla that have the power to kill any CAs. If you leave Google, you 
> will be nothing, no one will care about your existence, and no one will care 
> what you say. So, please don't declare that you don't represent Google before 
> you speak next time, nonsense!
> 
> Your myopic has brought global Internet security to the ditch. Chrome display 
> "Secure" for a website just it has SSL(https). Many fake banking websites and 
> fake PayPal websites have Lets Encrypt certificates, and Google Chrome say it 
> is "Secure", this completely misleads global Internet users, resulting in 
> many users are deceived and lost property. Encryption is not equal to secure. 
> Secure means not only encryption, but also need to tell user the website's 
> true identity. Does a fake bank website encryption mean anything? nothing and 
> more worse.
> 
> Ryan, 别自我感觉太好,别人耐心看你在M.D.S.P的长篇大论和听你在CABF meeting上说过没完 
> ,是因为你代表谷歌浏览器,而谷歌浏览器严重影响Mozilla对所有CA有生杀大权。如果你离开谷歌,你将什么也不是,没有人会理会你的存在,也没有人会在意你说的话。所以下次不要在发言之前就声明不代表谷歌,废话哦!
> 
> 你的短视把全球互联网安全带到了沟里,认为有SSL证书(https)就安全,许多假冒银行网站、假冒PayPal 网站都有Lets 
> Encrypt证书,谷歌浏览器显示为安全,完全误导了全球互联网用户,导致许多用户上当受骗和财产损失。已加密并不等于安全,安全不仅意味着需要加密,而且还需要告知用户此网站的真实身份,一个假冒银行网站加密有任何意义吗?没有并且更糟糕。
> 
> 
> Best Regards,
> 
> Richard Wang
> 
>  Original Message 
> From: Ryan Sleevi via dev-security-policy
> Received: Thursday, 27 September 2018 00:53
> To: Jeremy Rowley
> Cc: Ryan Sleevi ; mozilla-dev-security-policy
> Subject: Re: Google Trust Services Root Inclusion Request
> 
> 
> On Wed, Sep 26, 2018 at 12:04 PM Jeremy Rowley 
> wrote:
> 
>> I also should also emphasize that I’m speaking as Jeremy Rowley, not as
>> DigiCert.
>>
>>
>>
>> Note that I didn’t say Google controlled the policy. However, as a module
>> peer, Google does have significant influence over the policy and what CAs
>> are trusted by Mozilla. Although everyone can participate in Mozilla
>> discussions publicly, it’s a fallacy to state that a general participant
>> has similar sway or authority to a module peer. That’s the whole point of
>> having a separate class for peers compared to us general public.  With
>> Google acting as a CA and module peer, you now have one CA heavily
>> influencing who its competitors are, how its competitors operate, and what
>> its competitors can do.  Although I personally find that you never misuse
>> your power as a module peer, I can see how Jake has concerns that Google
>> (as a CA) has very heavy influence over the platform that has historically
>> been the CA watchdog (Mozilla).
>>
> 
> Jeremy, I think this again deserves calling out, because this is
> misrepresenting what module peership does, as well as the CA relationship.
> 
> I linked you to the definition of Module Ownership, which highlights and
> emphasizes that the module peer is simply a recognized helper. To the
> extent there is any influence, it is through the public discussions here.
> If your concern is that the title confers some special advantage, that's to
> misread what module peer is. If your concern is that the participation -
> which provides solid technical arguments as well as the policy alternatives
> - is influential, then what you're arguing against is public participation.
> 
> You're presenting these as factual, and that's misleading, so I'd like to
> highlight what is actually entailed.
> 
> 
>> The 

RE: AC Camerfirma's CP & CPS disclosure

2018-09-27 Thread Ramiro Muñoz via dev-security-policy
Hi Wayne

All problems have already been resolved from our side and we wait for the
PIT audit planned for the next week. 
We will be able to provide the PIT before October 31th.

Best regards
Ramiro Muñoz Muñoz 
AC Camerfirma SA.
CTO, Exploitation Manager, CISA.
+34 619 746 291 · rami...@camerfirma.com. 
https://www.linkedin.com/in/ramirom.

Este mensaje, y en su caso, cualquier fichero anexo al mismo, puede contener
información CONFIDENCIAL, siendo para uso exclusivo del destinatario,
quedando prohibida su divulgación copia o distribución a terceros. Si Vd. ha
recibido este mensaje erróneamente, se ruega lo notifique al remitente y
proceda a su borrado.
De conformidad con lo establecido en el Reglamento UE 2016/679 de 27 de
abril de 2016 General de Protección de Datos, se le informa que la empresa
AC CAMERFIRMA, S.A. tratará la información que nos facilita con el exclusivo
fin de cumplir con las obligaciones derivadas de la relación comercial o
contractual adquirida con usted y que sus datos no podrán ser objeto de otro
tratamiento ni de cesión a terceros salvo en los casos en que exista una
obligación legal. 
Usted tiene derecho a obtener confirmación acerca del tratamiento de sus
datos personales, y a ejercer sus derechos de acceso, rectificación,
supresión, limitación y portabilidad en el tratamiento, dirigiéndose a AC
CAMERFIRMA, S.A., mediante comunicación escrita remitida a la dirección C/
Ribera del Loira 12 (28042) Madrid, o a la dirección electrónica
jurid...@camerfirma.com o a través de la web de incidencias disponible en la
página web http://webcrm.camerfirma.com/incidencias/incidencias.php

[EN]
This message, and if applicable, any file attached to it, may contain
CONFIDENTIAL information for the exclusive use of the recipient, being
prohibited its disclosure copy or distribution to third parties. If you have
received this message incorrectly, please notify the sender and proceed with
its deletion.
In accordance with the provisions of the EU Regulation 2016/679 of April 27,
2016 General Data Protection, you are informed that the company AC
CAMERFIRMA, S.A. will treat the information you provide us with the sole
purpose of complying with the obligations derived from the commercial or
contractual relationship acquired with you and that your data will not be
subject to another treatment or assignment to third parties except in cases
where there is an legal obligation.
You have the right to obtain confirmation about your personal data
treatement, and to exercise your rights of access, rectification, deletion,
limitation and portability, contacting AC CAMERFIRMA, SA, by written
communication sent to the address C / Ribera del Loira 12 (28042) Madrid, or
to the legal address jurid...@camerfirma.com or through the website
http://webcrm.camerfirma.com/incidencias/incidencias.php


-Mensaje original-
De: dev-security-policy
[mailto:dev-security-policy-boun...@lists.mozilla.org] En nombre de Wayne
Thayer via dev-security-policy
Enviado el: jueves, 27 de septiembre de 2018 0:38
Para: Ramiro Muñoz Muñoz 
CC: mozilla-dev-security-policy

Asunto: Re: AC Camerfirma's CP & CPS disclosure

Hello Ramiro,

On Tue, Sep 4, 2018 at 3:13 PM Wayne Thayer  wrote:

> Thank you for this response Ramiro. I have copied this to the bug [1] 
> and have described Mozilla's expectations for point-in-time audits 
> that confirm that these issues have been resolved.
>
> [1] https://bugzilla.mozilla.org/show_bug.cgi?id=1478933
>
> On Tue, Sep 4, 2018 at 5:47 AM ramirommunoz--- via dev-security-policy 
> < dev-security-policy@lists.mozilla.org> wrote:
>
>>
>> 7- List of steps your CA is taking to resolve the situation and 
>> ensure such issuance will not be repeated in the future, accompanied 
>> with a timeline of when your CA expects to accomplish these things.
>>
>> AC Camerfirma has made changes in the CP/CPS to fix the 
>> inconsistences found by the auditor and will disseminate the 
>> documents and the new procedures to avoid news problems in a future.
>> AC Camerfirma is working on correcting the imbalances detected and 
>> the effective processes to ensure that the information offered by the 
>> OCSP and the CRL is the same.
>> 2018-07-14 -> Qualified Audit Report
>> 2018-09-17 -> CPS & CP's new versions will be disclosed New 
>> procedures and CPS/CP versions will be distributed among all affected 
>> people in other to avoid new differences between CP/CPS New 
>> procedures for self-assessment include full revision of OV 
>> certificates.
>> Best control over changes in the BR version and modifications in AC 
>> Camerfirma CP/CPS.
>> 2018-09-17 -> Finish a full review of the OCSP DDBB and 
>> synchronization with the PKI DDBB.
>> 2018-09-24 -> fixed all inconsistences found. We've reviewed the 
>> complete databases and checked the correct OCSP/PKI/CRL alignment, 
>> correcting the problems found.
>> 2018-10-01 -> Technical control to avoid inconsistences. We've 
>> 

RE: Re: Google Trust Services Root Inclusion Request

2018-09-27 Thread Richard Wang via dev-security-policy
Sorry, I don't agree with this point. Ryan Sleevi is the Mozilla Module Peer 
that gave too many pressures to the M.D.S.P community to misleading the 
Community and to let Mozilla make the decision that Google want.

There are two facts to support my opinion:

(1) For StartCom sanction, Mozilla agreed in Oct 2nd 2016 London meeting that 
if we separate StartCom completely from WoSign, then Mozilla don't sanction 
StartCom that still trust StartCom root. But Google as peer of Mozilla Module 
don't agree this, and Ryan even found many very very old problems of StartCom 
to be a "fact" that must be distrusted. Google changed the Mozilla decision!

(2) For Symantec sanction, everyone can see the argues in M.D.S.P discussion 
from Ryan Sleevi that Google changed the Mozilla initial decision, this also is 
the fact.

So, we can see Ryan not just a Mozilla Module Peer, he represents Google 
browser that affect Mozilla to make the right decision.

Ryan, don't feel too good about yourself. Peoples patiently look at your long 
emails at M.D.S.P and listen to your bala bala speaking at the CABF meeting, 
this is because you represent Google Chrome, and Google Chrome seriously 
affects Mozilla that have the power to kill any CAs. If you leave Google, you 
will be nothing, no one will care about your existence, and no one will care 
what you say. So, please don't declare that you don't represent Google before 
you speak next time, nonsense!

Your myopic has brought global Internet security to the ditch. Chrome display 
"Secure" for a website just it has SSL(https). Many fake banking websites and 
fake PayPal websites have Lets Encrypt certificates, and Google Chrome say it 
is "Secure", this completely misleads global Internet users, resulting in many 
users are deceived and lost property. Encryption is not equal to secure. Secure 
means not only encryption, but also need to tell user the website's true 
identity. Does a fake bank website encryption mean anything? nothing and more 
worse.

Ryan, 别自我感觉太好,别人耐心看你在M.D.S.P的长篇大论和听你在CABF meeting上说过没完 
,是因为你代表谷歌浏览器,而谷歌浏览器严重影响Mozilla对所有CA有生杀大权。如果你离开谷歌,你将什么也不是,没有人会理会你的存在,也没有人会在意你说的话。所以下次不要在发言之前就声明不代表谷歌,废话哦!

你的短视把全球互联网安全带到了沟里,认为有SSL证书(https)就安全,许多假冒银行网站、假冒PayPal 网站都有Lets 
Encrypt证书,谷歌浏览器显示为安全,完全误导了全球互联网用户,导致许多用户上当受骗和财产损失。已加密并不等于安全,安全不仅意味着需要加密,而且还需要告知用户此网站的真实身份,一个假冒银行网站加密有任何意义吗?没有并且更糟糕。


Best Regards,

Richard Wang

 Original Message 
From: Ryan Sleevi via dev-security-policy 
Received: Thursday, 27 September 2018 00:53
To: Jeremy Rowley 
Cc: Ryan Sleevi ; mozilla-dev-security-policy 
Subject: Re: Google Trust Services Root Inclusion Request


On Wed, Sep 26, 2018 at 12:04 PM Jeremy Rowley 
wrote:

> I also should also emphasize that I’m speaking as Jeremy Rowley, not as
> DigiCert.
>
>
>
> Note that I didn’t say Google controlled the policy. However, as a module
> peer, Google does have significant influence over the policy and what CAs
> are trusted by Mozilla. Although everyone can participate in Mozilla
> discussions publicly, it’s a fallacy to state that a general participant
> has similar sway or authority to a module peer. That’s the whole point of
> having a separate class for peers compared to us general public.  With
> Google acting as a CA and module peer, you now have one CA heavily
> influencing who its competitors are, how its competitors operate, and what
> its competitors can do.  Although I personally find that you never misuse
> your power as a module peer, I can see how Jake has concerns that Google
> (as a CA) has very heavy influence over the platform that has historically
> been the CA watchdog (Mozilla).
>

Jeremy, I think this again deserves calling out, because this is
misrepresenting what module peership does, as well as the CA relationship.

I linked you to the definition of Module Ownership, which highlights and
emphasizes that the module peer is simply a recognized helper. To the
extent there is any influence, it is through the public discussions here.
If your concern is that the title confers some special advantage, that's to
misread what module peer is. If your concern is that the participation -
which provides solid technical arguments as well as the policy alternatives
- is influential, then what you're arguing against is public participation.

You're presenting these as factual, and that's misleading, so I'd like to
highlight what is actually entailed.


> The circumstances are different between the scenarios you describe with
> respect to the other browsers, as is market share.  If Microsoft wants to
> change CAs (and they already use multiple), they can without impacting
> public perception. If Apple wants to use another CA, they can without
> people commenting how odd it is that Apple doesn’t use the Apple CA. With
> Google controlling the CA and the Google browser, all incentive to
> eliminate any misbehaving Google CA disappears for financial reasons,
> public perception, and because Google can control the messaging 

RE: Re: Re: Google Trust Services Root Inclusion Request

2018-09-27 Thread Richard Wang via dev-security-policy
Hi Ryan,

Thanks for your point out the link "https://wiki.mozilla.org/CA:WoSign_Issues'. 
 I think I need to say more words about  "misleading" and "lie".

I like to expose some FACTs to show the public, to let public know who is 
misleading and lie.

For the initiate WoSign issues email in M.D.S.P in Aug 24, 2016 -- Issue 0 
(a.k.a. Issue L: Any Port (Jan - Apr 2015), Mozilla wrote:
"This problem was reported to Google, and thence to WoSign and resolved.
Mozilla only became aware of it recently.”

The FACT is Google Ryan Sleevi sent email to Richard Wang at April 4th 2015 to 
point out the problems (see below original email), NOT WoSign reported to 
Google, this is the first misleading and lie.

The second "lie" is Ryan Sleevi is the Mozilla Module Peer, this mean Mozilla 
know this case, why someone say “Mozilla only became aware of it 
recently."(August 24, 2016)? This is second misleading and lie.
-
 Original Message 
From: Ryan Sleevi 
Received: Saturday, 04 April 2015 09:25
To: Richard Wang
Subject: WoSign Irregularities

Hi Richard, 

It's come to our attention that WoSign may be issuing certificates that are not 
conforming to your CPS and not conforming to the Baseline Requirements.

While we're still investigating the nature and scope, I was hoping you could 
take the opportunity and ensure that the certificates you're issuing are 
consistent with the Baseline Requirements and consistent to your CPS.

Among other things, I've noted irregularities in:
- Subject Information
- Extensions
- Certificate Policies
- Issuer Alternative Name

Could you please examine your certificates and let me know of any 
irregularities that you have detected and what steps have been taken (per 
Section 8.2 of your CPS)

Also, can you please provide your most recent audit? The most recent BR audit 
available was for the period of 1 January 2013 through 31 December 2013, 
completed on 28 March 2014. I see you've already completed Seals 1843 
(Principles & Practices) and 1842 (EV). When do you expect an audit for the 
period of 1 January 2014 through 31 December 2014 to be made available?
---


Best Regards,

Richard Wang


 Original Message 
From: Ryan Sleevi via dev-security-policy 
Received: Thursday, 27 September 2018 00:44
To: Richard Wang 
Cc: Ryan Sleevi ; mozilla-dev-security-policy ; Jeremy Rowley 
Subject: Re: Re: Google Trust Services Root Inclusion Request


Hi Richard,

A few corrections:

On Wed, Sep 26, 2018 at 11:36 AM Richard Wang via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> Ryan mentioned WoSign/StartCom and 360, so I like to say some words.
>
> First, I think your idea is not a proper metaphor because 360 browser
> can't compare to Google browser, Google browser have absolutely strong
> market share to say YES/NO to all CAs, but I am sure not to Google CA.
>

That wasn't the comparison. I was more highlighting how you actively
mislead (lied?) to the community about the relationship between the
entities, by trying to argue as separate entities. While Google Trust
Services is a separate legal entity, which is about ensuring there is a
firewall between these organizations, my concern about bringing it up was
because of how you actively mislead the community.


> Third, your comparison of Apple and Microsoft is also not correct, they
> use its own CA system for their own system use only, not for public, not to
> be a global public CA like Google.
>

I'm afraid this also misunderstands things. Microsoft does issue
certificates for end-users using its services (like Google). To the point
of the discussion, however, it was about the assumption and implication
that you cannot distrust an entity that operates a large web presence and
also a CA, or that browsers would play special favors to the CAs of their
properties, whether in-house or external. Both of these apply to all
browsers - arguably, even Mozilla (which uses certs from DigiCert as well,
either through the Amazon-branded sub-CA that DigiCert operates or directly
through DigiCert)


> Ryan, thank you for still remembering WoSign.
>

I think it will be very hard for the community to ever forget
https://wiki.mozilla.org/CA:WoSign_Issues
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy