Re: Symantec Issues doc updated

2017-04-12 Thread Gervase Markham via dev-security-policy
On 11/04/17 23:07, Jakob Bohm wrote:
> Please consider the fact that this is Easter week, and most of the
> industry, including many people (on both the Browser and Symantec sides
> of the process) are likely to be unavailable for precisely this week of
> the entire year.
> 
> In general, sending deadline mails (by paper, e-mail, process server or
> otherwise) to anyone during a public holiday demanding actions during
> that holiday is considered morally deficient at a minimum.

That seems hyperbolic. However, your point is well taken.

I have emailed Symantec to put back the deadline to 23:59 UTC on Thu
20th April.

Gerv
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Symantec Issues doc updated

2017-04-11 Thread Jakob Bohm via dev-security-policy

On 11/04/2017 18:53, Gervase Markham wrote:

On 11/04/17 17:34, Ryan Sleevi wrote:

Can you clarify what issues you believe this to be related?


That is a fair question. And also hard work to answer  :-)


Given that Symantec has a routine habit of exceeding any reasonable
deadline for response, at what point do you believe it is appropriate for
the Mozilla Root Store to begin discussing what steps can or should be
taken with respect to the documented and supported incidents, which
Symantec has not provided counter-factual data?


Yes, fair enough. Rick and Steve: I will be taking Symantec's statements
to this group as of one week from today as the sum total of what you
have to say on the subjects under discussion. After that point, we will
draw conclusions based on the available data and decide on what course
of action we may take. I hope that by then you will be able to answer my
8 questions, and provide responses or comments to any of Ryan's or other
people's questions that you wish to address.

Kathleen is on vacation this week, and so no decisions could be taken
until next week at the earliest anyway.



Please consider the fact that this is Easter week, and most of the
industry, including many people (on both the Browser and Symantec sides
of the process) are likely to be unavailable for precisely this week of
the entire year.

In general, sending deadline mails (by paper, e-mail, process server or
otherwise) to anyone during a public holiday demanding actions during
that holiday is considered morally deficient at a minimum.




Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Symantec Issues doc updated

2017-04-11 Thread urijah--- via dev-security-policy
>Within a few days of discovering these issues they shut down their 
>entire RA program. That seems pretty swift and comprehensive to me. The 
>fact that they didn't discover these issues for years is clearly a 
>problem, but it's not the same problem. 


I don't believe that's a fair characterization--looking at 
https://knowledge.symantec.com/support/ssl-certificates-support/index?page=content=INFO4154
it was more like "After approximately 3 weeks (Jan 19-Feb 12) they *decided* to 
shut down their RA program." 

("we have made the decision to terminate our partner RA program. We will 
continue to work with select partners that have local market contacts and 
expertise to facilitate an interface with customers and collection of relevant 
documentation, however Symantec personnel will validate 100% of all asserted 
identity data and control certificate issuance going forward. We have 
communicated this change to each of our RA partners, we are finalizing a 
transition plan, and intend to implement that transition quickly.")

Their latest update (approximately 3 months from the initial report) is that 
"Symantec announced the decision to wind down the RA program for publicly 
trusted SSL/TLS."

https://groups.google.com/forum/#!msg/mozilla.dev.security.policy/dVMxrUVygS0/xeUCJ1kmDQAJ

While Symantec re-validating each issued cert from their RA's is good, and it 
appears CrossCert  is fully terminated, they clearly have not "shut down their 
entire RA program."

 



On Tuesday, April 11, 2017 at 12:53:56 PM UTC-4, Gervase Markham wrote:
> On 11/04/17 17:34, Ryan Sleevi wrote:
> > Can you clarify what issues you believe this to be related?
> 
> That is a fair question. And also hard work to answer  :-)
> 
> > Given that Symantec has a routine habit of exceeding any reasonable
> > deadline for response, at what point do you believe it is appropriate for
> > the Mozilla Root Store to begin discussing what steps can or should be
> > taken with respect to the documented and supported incidents, which
> > Symantec has not provided counter-factual data?
> 
> Yes, fair enough. Rick and Steve: I will be taking Symantec's statements
> to this group as of one week from today as the sum total of what you
> have to say on the subjects under discussion. After that point, we will
> draw conclusions based on the available data and decide on what course
> of action we may take. I hope that by then you will be able to answer my
> 8 questions, and provide responses or comments to any of Ryan's or other
> people's questions that you wish to address.
> 
> Kathleen is on vacation this week, and so no decisions could be taken
> until next week at the earliest anyway.
> 
> > It's unclear from your remark "Started to draw some conclusions where that
> > is warranted" what you see as the process and next steps. Perhaps you could
> > clarify what you imagine happening next, and on what timeline, to provide
> > clarity both to Symantec and the general population here. I must admit, I'm
> > quite confused as to where things stand, given that many items have
> > conclusions to them.
> 
> See above. After one week, I will be taking stock of the assembled
> evidence, and will invite community members also to draw conclusions. I
> will then present a recommendation for what we should do next. As you
> know, Mozilla's process is a little fuzzy around the edges, but Kathleen
> is the final decision maker. (And she doesn't always agree with me :-)
> 
> > With respect to the conclusion to Issue T "Symantec's reaction to the
> > discovery of these problems was unarguably swift and comprehensive.", I 
> > would disagree with this. Symantec's response was not swift, relative to
> > other CAs that have been informed of issues. It was not comprehensive -
> > Symantec failed to identify the issues until question, and still maintains,
> > in the latest response, that there is a conclusion unsupported by the
> > evidence they have shared with the community. Their timeline for
> > responsiveness was not swift - we're still discussing this specific issue,
> > and it was first reported on Issue T. I would be happy to find evidence of
> > issues from other CAs that demonstrate a more thorough response or a more
> > timely response.
> 
> Within a few days of discovering these issues they shut down their
> entire RA program. That seems pretty swift and comprehensive to me. The
> fact that they didn't discover these issues for years is clearly a
> problem, but it's not the same problem.
> 
> > With respect to the conclusion to Issue T, "Their case is that WebTrust
> > audit monitoring should have been sufficient," it's unclear if you are
> > agreeing with that conclusion or simply stating Symantec claims.
> 
> Stating Symantec's claims.
> 
> > With respect to the conclusion to Issue V, 
> 
> That's not part of my conclusion, that's a quotation from Symantec which
> I need to check the accuracy of with Kathleen.
> 
> > "to specifically address the
> > 

Re: Symantec Issues doc updated

2017-04-11 Thread Ryan Sleevi via dev-security-policy
On Tue, Apr 11, 2017 at 12:53 PM, Gervase Markham via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> > "to specifically address the
> > GeoRoot audit status and remediation plan" - this was not reflected
> within
> > https://www.symantec.com/content/en/us/about/media/
> repository/23_Symantec_GeoTrust_WTBR_period_end_11-30-2016.pdf
> > , the relevant audit for the roots, ending on 2016-11-30.
>
> I'm a little confused - I think Symantec are saying that the cover
> letter explains the plan to wind down the two sub-CAs, not that the
> audit does?


I believe you are correct that they are claiming the letter sent addresses
that.

I am highlighting, however, that such a statement was not recorded in their
audit, despite it being a violation of the Baseline Requirements during the
period of time in the audit.

That is, if you are accepting that such a letter is relevant to the
discussion (and I believe it's fair to consider it as part of that), then
you should also consider as relevant to the conversation the failure to
either disclose that to the auditors or for the auditors to note that
(whichever it may be).
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Symantec Issues doc updated

2017-04-11 Thread Gervase Markham via dev-security-policy
On 11/04/17 17:34, Ryan Sleevi wrote:
> Can you clarify what issues you believe this to be related?

That is a fair question. And also hard work to answer  :-)

> Given that Symantec has a routine habit of exceeding any reasonable
> deadline for response, at what point do you believe it is appropriate for
> the Mozilla Root Store to begin discussing what steps can or should be
> taken with respect to the documented and supported incidents, which
> Symantec has not provided counter-factual data?

Yes, fair enough. Rick and Steve: I will be taking Symantec's statements
to this group as of one week from today as the sum total of what you
have to say on the subjects under discussion. After that point, we will
draw conclusions based on the available data and decide on what course
of action we may take. I hope that by then you will be able to answer my
8 questions, and provide responses or comments to any of Ryan's or other
people's questions that you wish to address.

Kathleen is on vacation this week, and so no decisions could be taken
until next week at the earliest anyway.

> It's unclear from your remark "Started to draw some conclusions where that
> is warranted" what you see as the process and next steps. Perhaps you could
> clarify what you imagine happening next, and on what timeline, to provide
> clarity both to Symantec and the general population here. I must admit, I'm
> quite confused as to where things stand, given that many items have
> conclusions to them.

See above. After one week, I will be taking stock of the assembled
evidence, and will invite community members also to draw conclusions. I
will then present a recommendation for what we should do next. As you
know, Mozilla's process is a little fuzzy around the edges, but Kathleen
is the final decision maker. (And she doesn't always agree with me :-)

> With respect to the conclusion to Issue T "Symantec's reaction to the
> discovery of these problems was unarguably swift and comprehensive.", I   
> would disagree with this. Symantec's response was not swift, relative to
> other CAs that have been informed of issues. It was not comprehensive -
> Symantec failed to identify the issues until question, and still maintains,
> in the latest response, that there is a conclusion unsupported by the
> evidence they have shared with the community. Their timeline for
> responsiveness was not swift - we're still discussing this specific issue,
> and it was first reported on Issue T. I would be happy to find evidence of
> issues from other CAs that demonstrate a more thorough response or a more
> timely response.

Within a few days of discovering these issues they shut down their
entire RA program. That seems pretty swift and comprehensive to me. The
fact that they didn't discover these issues for years is clearly a
problem, but it's not the same problem.

> With respect to the conclusion to Issue T, "Their case is that WebTrust
> audit monitoring should have been sufficient," it's unclear if you are
> agreeing with that conclusion or simply stating Symantec claims.

Stating Symantec's claims.

> With respect to the conclusion to Issue V, 

That's not part of my conclusion, that's a quotation from Symantec which
I need to check the accuracy of with Kathleen.

> "to specifically address the
> GeoRoot audit status and remediation plan" - this was not reflected within
> https://www.symantec.com/content/en/us/about/media/repository/23_Symantec_GeoTrust_WTBR_period_end_11-30-2016.pdf
> , the relevant audit for the roots, ending on 2016-11-30.

I'm a little confused - I think Symantec are saying that the cover
letter explains the plan to wind down the two sub-CAs, not that the
audit does?

Gerv
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Symantec Issues doc updated

2017-04-11 Thread Ryan Sleevi via dev-security-policy
On Tue, Apr 11, 2017 at 6:49 AM, Gervase Markham via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> I have attempted to integrate the information provided by Symantec into:
> https://wiki.mozilla.org/CA:Symantec_Issues
> and started to draw some conclusions where that is warranted.
>
> There are of course still open questions from myself, Ryan and others,
> and so the truth relating to some incidents is not yet clear.
>

Can you clarify what issues you believe this to be related?

Many of my questions related to Symantec's approach to handling incidents,
which were unaddressed or meaningfully deficient in ways that undermines
trust substantially, but were limited related to the material facts.

The only point where I believe Symantec disagreed with the summary was
Issue W, but it does not appear Symantec was bothered to support that claim
with objective data, rather than with statements. That is, that Symantec
disagrees is useful to know, but if Symantec has failed to provide any
evidence with that disagreement, I do not believe it should block reaching
a conclusion.

Given that Symantec has a routine habit of exceeding any reasonable
deadline for response, at what point do you believe it is appropriate for
the Mozilla Root Store to begin discussing what steps can or should be
taken with respect to the documented and supported incidents, which
Symantec has not provided counter-factual data?

Does the Mozilla Root Program seek to consider the intent of the CA that
violated the Baseline Requirements repeatedly for a span of several years?
If so, does it have a process at which point it will stop considering
feedback, versus allowing a CA to indefinitely delay meaningful action to
protect users?

It's unclear from your remark "Started to draw some conclusions where that
is warranted" what you see as the process and next steps. Perhaps you could
clarify what you imagine happening next, and on what timeline, to provide
clarity both to Symantec and the general population here. I must admit, I'm
quite confused as to where things stand, given that many items have
conclusions to them.

With respect to the conclusion to Issue T "Symantec's reaction to the
discovery of these problems was unarguably swift and comprehensive.", I
would disagree with this. Symantec's response was not swift, relative to
other CAs that have been informed of issues. It was not comprehensive -
Symantec failed to identify the issues until question, and still maintains,
in the latest response, that there is a conclusion unsupported by the
evidence they have shared with the community. Their timeline for
responsiveness was not swift - we're still discussing this specific issue,
and it was first reported on Issue T. I would be happy to find evidence of
issues from other CAs that demonstrate a more thorough response or a more
timely response.

With respect to the conclusion to Issue T, "Their case is that WebTrust
audit monitoring should have been sufficient," it's unclear if you are
agreeing with that conclusion or simply stating Symantec claims.

With respect to the conclusion to Issue V, "to specifically address the
GeoRoot audit status and remediation plan" - this was not reflected within
https://www.symantec.com/content/en/us/about/media/repository/23_Symantec_GeoTrust_WTBR_period_end_11-30-2016.pdf
, the relevant audit for the roots, ending on 2016-11-30. Do you believe
this should play in with any determination about the reliability of KPMG
audits (to discover this) and/or to Symantec (to disclose this to their
auditors)?
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Symantec Issues doc updated

2017-04-11 Thread Gervase Markham via dev-security-policy
I have attempted to integrate the information provided by Symantec into:
https://wiki.mozilla.org/CA:Symantec_Issues
and started to draw some conclusions where that is warranted.

There are of course still open questions from myself, Ryan and others,
and so the truth relating to some incidents is not yet clear.

Please let me know if you see that I have included anything inaccurate
or misleading, or if an entry seems incomplete.

Gerv

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy