Re: Regarding Mozilla auditors choosen standards

2014-08-05 Thread fhw843
‎Hi Wallas,Setting aside Ryan's petulance, if I may, I think the simple answer to all your questions can be stated thusly: no one is in charge and we depend on people doing the right things.Mostly I think that works out OK but there's just no escaping that much of the PKI system ‎relies on nothing more than "please don't do that" and "okay I promise I won't". Requirements and specifications and best practices and audits and open discussion forums such as this one all help ‎but if any given actor chooses to lean in a different direction there is little recourse we can take. What's worse is that the rationale for taking any such action is so narrow that only the most egregious cases are ever pursued.The obvious poster child for egregious cases is DigiNotar. Cases which are not so clear cut would have to include the CFCA request under discussion right now and the TeliaSonera situation of the recent past. In both cases the concerns are real and justified and yet the available options seem limited. I'd like to see us improve upon that, but that's a whole other conversation. In any case, I hope this helps answer your questions.From: Ryan SleeviSent: Tuesday, July 29, 2014 10:47 AM‎On Tue, July 29, 2014 2:01 am, Wallas Smith wrote:>  Thank you very much for your precise answers. This helped me to come to>  new questions :Which you will find already answered athttps://www.mozilla.org/en-US/about/governance/policies/security-group/certs/, as I suspected.>>  1) According to what I understand, when trying to express the chain of>  Certificate trust starting from a Mozilla User, the upper trust is placed>  into Governmental Regulations and/or Professional code of Conduct of>  auditors.>  Could you tell me more about the Governmental Regulations you were>  mentioning ?>  Also, is there a global regulation which gather all these governmental>  regulations, and who controls them ? In other words, who is on top of the>  chain of control ?This was already answered in my previous email, which provided enoughinformation for you to discover the relationship of ETSI and WebTrust (asAudit Frameworks) to the CA/Browser Forum's Baseline Requirements, and howthose flow into the Mozilla requirements.Which is, of course, also answered byhttps://www.mozilla.org/en-US/about/governance/policies/security-group/certs/>  2) If I still understand you well, Mozilla never really check by>  themselves the good "quality" of a given CA at a specific date (by quality>  I am not talking about the required content which can be easily checked),>  but they report their responsibility to Auditors and Governmental>  Regulations. Do Mozilla still have some exceptional process for checking>  fully a CA by themselves, that could lead to the removal of a CA in their>  product?This is also already answered byhttps://www.mozilla.org/en-US/about/governance/policies/security-group/certs/https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/enforcement/>>  3) Finally, if Mozilla don't have contract with auditors, do Mozilla have>  contract(s) with any stratum of what I called the trust chain (with the CA>  itself or Governmental regulations, or above depending of your answer) to>  discharge their responsibility in case of failing CA? Who is responsible>  in case of failing/neglected/wrongly handled CA in front of the law ?Once again, already answered.https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/enforcement/Also, read the CA's CPs/CPSes to understand what liabilities and how theyfit.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Regarding Mozilla auditors choosen standards

2014-07-29 Thread Ryan Sleevi
On Tue, July 29, 2014 2:01 am, Wallas Smith wrote:
>  Thank you very much for your precise answers. This helped me to come to
>  new questions :

Which you will find already answered at
https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/
, as I suspected.

>
>  1) According to what I understand, when trying to express the chain of
>  Certificate trust starting from a Mozilla User, the upper trust is placed
>  into Governmental Regulations and/or Professional code of Conduct of
>  auditors.
>  Could you tell me more about the Governmental Regulations you were
>  mentioning ?
>  Also, is there a global regulation which gather all these governmental
>  regulations, and who controls them ? In other words, who is on top of the
>  chain of control ?

This was already answered in my previous email, which provided enough
information for you to discover the relationship of ETSI and WebTrust (as
Audit Frameworks) to the CA/Browser Forum's Baseline Requirements, and how
those flow into the Mozilla requirements.

Which is, of course, also answered by
https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/

>  2) If I still understand you well, Mozilla never really check by
>  themselves the good "quality" of a given CA at a specific date (by quality
>  I am not talking about the required content which can be easily checked),
>  but they report their responsibility to Auditors and Governmental
>  Regulations. Do Mozilla still have some exceptional process for checking
>  fully a CA by themselves, that could lead to the removal of a CA in their
>  product?

This is also already answered by
https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/

https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/enforcement/
>
>  3) Finally, if Mozilla don't have contract with auditors, do Mozilla have
>  contract(s) with any stratum of what I called the trust chain (with the CA
>  itself or Governmental regulations, or above depending of your answer) to
>  discharge their responsibility in case of failing CA? Who is responsible
>  in case of failing/neglected/wrongly handled CA in front of the law ?

Once again, already answered.

https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/enforcement/

Also, read the CA's CPs/CPSes to understand what liabilities and how they
fit.

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Regarding Mozilla auditors choosen standards

2014-07-29 Thread Wallas Smith
Ryan Sleevi wrote :
> On Mon, July 28, 2014 6:39 am, Wallas Smith wrote:
> 
> >  [Please note that it has been the second time that I am trying to send
> 
> >  this mail to the mozilla.dev.security.policy mailing list. I didn't
> 
> >  noticed it appearing in the mailing list the first time, I guess it
> 
> >  failed, I hope it will work this time. Thank you for your understanding.]
> 
> >
> 
> 
> 
> Hi Wallas,
> 
> 
> 
> I suspect you may have missed some basic research into this problem, based
> 
> on the questions.
> 
> 
> 
> I suspect that if you read
> 
> https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/
> 
> , you will find many of your questions and the technical details about
> 
> what is (and is not) required already answered. This is the sum of the set
> 
> of requirements imposed, so if it's not there, it's not a requirement.
> 
> 
> 
> >  Hello,
> 
> >
> 
> >  As explained in the checklist
> 
> >  
> > (https://wiki.mozilla.org/CA:Information_checklist#Verification_Policies_and_Practices),
> 
> >  one of the 3 following audit is required when asking for CA inclusion :
> 
> >
> 
> >  * ETSI TS 101 456
> 
> >  * ETSI TS 102 042
> 
> >  * WebTrust Principles and Criteria for Certification Authorities
> 
> >
> 
> >  I therefore have some questions regarding these audits.
> 
> >
> 
> >  1) I would like to know the precise criteria that Mozilla took into
> 
> >  account when
> 
> >  initially choosing these 3 audits. How did Mozilla chose them, on which
> 
> >  points
> 
> >  did the auditors fit with Mozilla requirements ?
> 
> 
> 
> Prior to the CA/Browser Forum's publication of the Baseline Requirements,
> 
> ETSI TS 101 456 and WebTrust for CAs both effectively provide the same set
> 
> of common audit criteria regarding best practices for CAs.
> 
> 
> 
> After the publication, these Baseline Requirements (which Mozilla is a
> 
> participant in developing, through its involvement in the CA/Browser
> 
> Forum) have been rolled into ETSI TS 102 042 and WebTrust for CAs (v2.0).
> 
> 
> 
> That is, the Baseline Requirements set forth the practices, but they are
> 
> not audit criteria. These are then turned into an auditable set of
> 
> controls by AICPA and ETSI, which result in the publication of the two
> 
> audit criteria.
> 
> 
> 
> >  2) Which auditors are allowed to deliver the audit for Mozilla (is there a
> 
> >  list) and how were they chosen ?
> 
> 
> 
> See
> 
> https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/inclusion/
> 
> points 12 - 16
> 
> 
> 
> Note that it incorporates the Baseline Requirements Section 17.6 set of
> 
> Auditor Requirements.
> 
> 
> 
> There is not an explicit list. An auditor that meets this requirements is,
> 
> according to Mozilla's policy, a reasonable auditor.
> 
> 
> 
> You can see exactly who the auditors are for all of the included certs at
> 
> https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/included/
> 
> 
> 
> >
> 
> >  3) Is there a contract with the auditor(s) in case Mozilla criteria are
> 
> >  not respected ? What sanctions can be taken (did it happened before) ?
> 
> >  Who, by Mozilla side, check the auditors actions and sayings (in case
> 
> >  there is anyone, if it not just an assurance contract), and what is the
> 
> >  checking  process if it is public ?
> 
> 
> 
> If you read Mozilla's policy, you will see at no point does Mozilla impose
> 
> a requirement that CAs are audited to *their* requirements. Without
> 
> providing a set of audit criteria that an auditor can then apply, this is
> 
> not something that auditors will engage in.
> 
> 
> 
> Instead, Mozilla requires that the CA be audited according to one of the
> 
> three audit frameworks, which derive their audit requirements from the
> 
> Baseline Requirements (and for which both AICPA and ETSI have
> 
> representatives within the CA/Browser Forum ensuring that the audit
> 
> criteria are consistent with the Forum's publications). It is then
> 
> incumbent upon the CA to ensure the fulfillment of additional requirements
> 
> imposed by Mozilla.
> 
> 
> 
> The way this generally takes place is that the CA is expected to note
> 
> within the CP/CPS how they follow Mozilla's criteria, which is then
> 
> expanded upon in the inclusion bug. The auditor measures compliance with
> 
> the CP/CPS, where applicable.
> 
> 
> 
> There is no contract with the auditors.
> 
> 
> 
> There have been no sanctions towards auditors (to this date).
> 
> 
> 
> The auditors are bound by professional code of conduct and various
> 
> governmental regulations regarding the authenticity of their audit. If an
> 
> auditor "cooks the books", as it were, it's the same as any other form of
> 
> audit malfeasance.

Thank you very much for your precise answers. This helped me to come to new 
questions :

1) According to what I understand, when trying to express the chain of 
Certificate trust starting from a Mozilla User, th

Re: Regarding Mozilla auditors choosen standards

2014-07-28 Thread Ryan Sleevi
On Mon, July 28, 2014 6:39 am, Wallas Smith wrote:
>  [Please note that it has been the second time that I am trying to send
>  this mail to the mozilla.dev.security.policy mailing list. I didn't
>  noticed it appearing in the mailing list the first time, I guess it
>  failed, I hope it will work this time. Thank you for your understanding.]
>

Hi Wallas,

I suspect you may have missed some basic research into this problem, based
on the questions.

I suspect that if you read
https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/
, you will find many of your questions and the technical details about
what is (and is not) required already answered. This is the sum of the set
of requirements imposed, so if it's not there, it's not a requirement.

>  Hello,
>
>  As explained in the checklist
>  
> (https://wiki.mozilla.org/CA:Information_checklist#Verification_Policies_and_Practices),
>  one of the 3 following audit is required when asking for CA inclusion :
>
>  * ETSI TS 101 456
>  * ETSI TS 102 042
>  * WebTrust Principles and Criteria for Certification Authorities
>
>  I therefore have some questions regarding these audits.
>
>  1) I would like to know the precise criteria that Mozilla took into
>  account when
>  initially choosing these 3 audits. How did Mozilla chose them, on which
>  points
>  did the auditors fit with Mozilla requirements ?

Prior to the CA/Browser Forum's publication of the Baseline Requirements,
ETSI TS 101 456 and WebTrust for CAs both effectively provide the same set
of common audit criteria regarding best practices for CAs.

After the publication, these Baseline Requirements (which Mozilla is a
participant in developing, through its involvement in the CA/Browser
Forum) have been rolled into ETSI TS 102 042 and WebTrust for CAs (v2.0).

That is, the Baseline Requirements set forth the practices, but they are
not audit criteria. These are then turned into an auditable set of
controls by AICPA and ETSI, which result in the publication of the two
audit criteria.

>  2) Which auditors are allowed to deliver the audit for Mozilla (is there a
>  list) and how were they chosen ?

See
https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/inclusion/
points 12 - 16

Note that it incorporates the Baseline Requirements Section 17.6 set of
Auditor Requirements.

There is not an explicit list. An auditor that meets this requirements is,
according to Mozilla's policy, a reasonable auditor.

You can see exactly who the auditors are for all of the included certs at
https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/included/

>
>  3) Is there a contract with the auditor(s) in case Mozilla criteria are
>  not respected ? What sanctions can be taken (did it happened before) ?
>  Who, by Mozilla side, check the auditors actions and sayings (in case
>  there is anyone, if it not just an assurance contract), and what is the
>  checking  process if it is public ?

If you read Mozilla's policy, you will see at no point does Mozilla impose
a requirement that CAs are audited to *their* requirements. Without
providing a set of audit criteria that an auditor can then apply, this is
not something that auditors will engage in.

Instead, Mozilla requires that the CA be audited according to one of the
three audit frameworks, which derive their audit requirements from the
Baseline Requirements (and for which both AICPA and ETSI have
representatives within the CA/Browser Forum ensuring that the audit
criteria are consistent with the Forum's publications). It is then
incumbent upon the CA to ensure the fulfillment of additional requirements
imposed by Mozilla.

The way this generally takes place is that the CA is expected to note
within the CP/CPS how they follow Mozilla's criteria, which is then
expanded upon in the inclusion bug. The auditor measures compliance with
the CP/CPS, where applicable.

There is no contract with the auditors.

There have been no sanctions towards auditors (to this date).

The auditors are bound by professional code of conduct and various
governmental regulations regarding the authenticity of their audit. If an
auditor "cooks the books", as it were, it's the same as any other form of
audit malfeasance.

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Regarding Mozilla auditors choosen standards

2014-07-28 Thread Wallas Smith
[Please note that it has been the second time that I am trying to send this 
mail to the mozilla.dev.security.policy mailing list. I didn't noticed it 
appearing in the mailing list the first time, I guess it failed, I hope it will 
work this time. Thank you for your understanding.]

Hello,

As explained in the checklist 
(https://wiki.mozilla.org/CA:Information_checklist#Verification_Policies_and_Practices),
 
one of the 3 following audit is required when asking for CA inclusion : 

* ETSI TS 101 456
* ETSI TS 102 042
* WebTrust Principles and Criteria for Certification Authorities 

I therefore have some questions regarding these audits.

1) I would like to know the precise criteria that Mozilla took into account 
when 
initially choosing these 3 audits. How did Mozilla chose them, on which points 
did the auditors fit with Mozilla requirements ? 

2) Which auditors are allowed to deliver the audit for Mozilla (is there a 
list) and how were they chosen ?

3) Is there a contract with the auditor(s) in case Mozilla criteria are not 
respected ? What sanctions can be taken (did it happened before) ? Who, by 
Mozilla side, check the auditors actions and sayings (in case there is anyone, 
if it not just an assurance contract), and what is the checking  process if it 
is public ? 


Thank you in advance for the help.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Regarding Mozilla auditors choosen standards

2014-07-18 Thread wallas . smith445
Hello,

As explained in the checklist 
(https://wiki.mozilla.org/CA:Information_checklist#Verification_Policies_and_Practices),
 one of the 3 following audit is required when asking for CA inclusion : 

* ETSI TS 101 456
* ETSI TS 102 042
* WebTrust Principles and Criteria for Certification Authorities 

I would like to know the precise criteria that Mozilla took into account when 
initially choosing these 3 auditors. How did Mozilla chose them, on which 
points did the auditors fit with Mozilla requirements ? 

Is there a contract with the auditor in case Mozilla criteria are not respected 
? What sanctions can be taken (did it happened before) ? Who, by Mozilla side, 
check the auditors actions and sayings (in case there is anyone, if it not just 
an assurance contract), and what is the checking  process if it is public ? 

Thank you in advance for the help.

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy