Re: Questions regarding the qualifications and competency of TUVIT

2018-10-30 Thread Moudrick M. Dadashov via dev-security-policy
Thanks for good overview. I'd  like to add some more. Actually the most questionalble part of the chain is so called Supervisory bodies. Of course, root programs do not rely on SB assessment, but under eIDAS they are authorised to audit TSPs and then publish National trust lists (as Scheme

Re: Google OCSP service down

2018-01-22 Thread Moudrick M. Dadashov via dev-security-policy
Hi Wayne, This is how its supposed to work under eIDAS: 1. Check the value of the QCStatement [1] of the certificate under problem (which is the location of PDS); 2. Open the PDS and check relevant contact info as in [2]. Thanks, M.D. [1] see 4.3.4 (QCStatement regarding location of PKI Disc

Re: ETSI audits not listing audit periods

2017-11-07 Thread Moudrick M. Dadashov via dev-security-policy
Thank you for clarification. Do you think the terms "/approval scheme/", "/supervision scheme/", "/accreditation//scheme/" etc. (used in some ETSI TSs or the Commission Decisions) have the same meaning and ETSI EN 319 403 is just one of possible "/certification scheme/s"? Thanks, M.D. On 11

Re: ETSI audits not listing audit periods

2017-10-30 Thread Moudrick M. Dadashov via dev-security-policy
You might want to add one more: REGULATION (EC) No 765/2008 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 9 July 2008 setting out the requirements for accreditation and market surveillance relating to the marketing of products and repealing Regulation (EEC) No 339/93 see also eIDAS  recit

Re: ETSI audits not listing audit periods

2017-10-30 Thread Moudrick M. Dadashov via dev-security-policy
FYI: see section 7.4.4 of ETSI EN 319 403, Electronic Signatures and Infrastructures (ESI); Trust Service Provider Conformity Assessment - Requirements for conformity assessment bodies assessing Trust Service Providers, http://www.etsi.org/deliver/etsi_en/319400_319499/319403/02.02.02_60/en_3

Re: Machine- and human-readable format for root store information?

2017-06-26 Thread Moudrick M. Dadashov via dev-security-policy
Hi Gerv, FYI: ETSI TS 119 612 V2.2.1 (2016-04), Electronic Signatures and Infrastructures (ESI); Trusted Lists http://www.etsi.org/deliver/etsi_ts/119600_119699/119612/02.02.01_60/ts_119612v020201p.pdf Thanks, M.D. On 6/26/2017 4:50 PM, Gervase Markham via dev-security-policy wrote: A few ro

Re: On remedies for CAs behaving badly

2017-06-05 Thread Moudrick M. Dadashov via dev-security-policy
+1 Thanks, M.D. On 6/5/2017 7:16 PM, Ryan Sleevi via dev-security-policy wrote: On Mon, Jun 5, 2017 at 11:52 AM, Matthew Hardeman via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: Has there ever been an effort by the root programs to directly assess monetary penalties to

Re: SSC Root Inclusion Request

2016-02-08 Thread Moudrick M. Dadashov
The updated CP/CPS are now under internal review and will be published before end of February. Thanks, M.D. On 2/8/2016 8:00 PM, Kathleen Wilson wrote: On 2/7/16 2:53 AM, winpackja...@gmail.com wrote: And how much more time is this going to take? Since no issues have been highlighted... W

Re: Question: BR requirement about structuring CPS according to RFC 3647

2015-10-22 Thread Moudrick M. Dadashov
eIDAS is becoming the only common Law on e-signatures (for the EU) and I'm not aware of any regulation on mandatory CP/CPS structures. Thanks, M.D. On 10/22/2015 8:56 PM, Richard Barnes wrote: On Thu, Oct 22, 2015 at 1:42 PM, Kathleen Wilson wrote: All, In section 2.2 of version 1.3 of th

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-10 Thread Moudrick M. Dadashov
On 9/11/2015 3:23 AM, Peter Bowen wrote: On Thu, Sep 10, 2015 at 3:54 PM, Peter Kurrasch wrote: It seems to me that the benefits of this proposed change are minimal while the negative impacts to embedded systems ‎are significant. Perhaps I've missed something? It should be understood that cod

Re: SSC Root Inclusion Request

2015-09-08 Thread Moudrick M. Dadashov
Thank you for your comments. Let me start with your questions first. RS-Q1: "From interpreting Section 3.1.1, it would appear that a TLS server certificate (e.g. DVCP, OVCP, EVCP, EVCP+) will never have a commonName field appear within the subject, as the commonName is expressly identified a

Re: Remove Roots used for only Email and CodeSigning?

2015-08-31 Thread Moudrick M. Dadashov
On 9/1/2015 3:56 AM, Ryan Sleevi wrote: On Mon, August 31, 2015 5:48 pm, Moudrick M. Dadashov wrote: I'm afraid there seems to be a bit misinterpretation of ETSI policies: EVCP, EVCP+, DVCP, OVCP are based on the same general requirements and have cumulative effect: higher level

Re: Remove Roots used for only Email and CodeSigning?

2015-08-31 Thread Moudrick M. Dadashov
I'm afraid there seems to be a bit misinterpretation of ETSI policies: EVCP, EVCP+, DVCP, OVCP are based on the same general requirements and have cumulative effect: higher level (e.g. EVCP) conformance assessment assumes lower level conformence while the opposite is not true. In other words i

Re: Remove Roots used for only Email and CodeSigning?

2015-08-31 Thread Moudrick M. Dadashov
Thank you, we too consider general policy related discussions separate from specific Root inclusion applications. As for email trust bit enabled Roots, isn't TB another popular product from Mozilla? However I'm not sure if NSS currently stores any "code signing only" roots. Thanks, M.D. On

Re: SSC Root Inclusion Request

2015-08-31 Thread Moudrick M. Dadashov
Dear Ryan, thank you for your constructive criticism, suggestions and recommendations. This is just a short confirmation that we are working on the feedback which we expect to post in a couple of days. All the best, M.D. On 8/29/2015 4:16 AM, Ryan Sleevi wrote: On Wed, July 29, 2015 1:34 pm

RE: EU Trust-lists (was: Letter from US House of Representatives)

2015-07-10 Thread Moudrick M. Dadashov
Its hard not to agree with you. >At the most basic level, it's not clear to me >to whom this legislation is >directed. Is it >citizens within the EU? This is funniest part of the game, in fact member states supposed to maintain their TSLs but to my best knowledge, there is no obligation to

Re: Letter from US House of Representatives

2015-07-07 Thread Moudrick M. Dadashov
+1 Thanks, M.D. On 7/7/2015 4:02 AM, Peter Bowen wrote: Thinking about this from a technical perspective, rather than a political one, this seems very similar to a user deciding to add additional certificates to their trust store. I think the primary differences are the need to add a set of ce

Re: Policy about root cert transfers

2015-06-03 Thread Moudrick M. Dadashov
Peter, a while back a well known [bank industry] supervisor here has stated: "ethics and moral are not of dimensions this world". So, how about a more realistic scenario where TeliaSonera buys whatever foreign legislation needed for its baby CA in Estonia? Since our 3 years discussion on this

Re: Policy about root cert transfers

2015-04-24 Thread Moudrick M. Dadashov
creation of an Issuing CA (s), p. 8, 9 and 10 of the Root inclusion policy apply. Would it be sufficient? Thanks, M.D. On 4/24/2015 7:19 PM, Ryan Sleevi wrote: On Fri, April 24, 2015 8:39 am, Moudrick M. Dadashov wrote: So I thought everybody "standing under the umbrella" is tr

Re: Policy about root cert transfers

2015-04-24 Thread Moudrick M. Dadashov
On 4/24/2015 5:30 PM, Ryan Sleevi wrote: On Fri, April 24, 2015 6:34 am, Moudrick M. Dadashov wrote: Kathleen, wouldn't be it easier to apply the transferred CA the same requirements as to any other? That means the new CA must have its operations audited under its ***fully comp

Re: Policy about root cert transfers

2015-04-24 Thread Moudrick M. Dadashov
Kathleen, wouldn't be it easier to apply the transferred CA the same requirements as to any other? That means the new CA must have its operations audited under its ***fully completed transfer*** operations. The root and all associated intermediates must pass audit against ***then applicable***

Re: Clarification about WebTrust BR and WebTrust EV audits

2014-11-06 Thread Moudrick M. Dadashov
I think what you are saying is exactly how it works for ETSI audits. Baseline requirements are part of ETSI TS 102 042 audit: "The present document provides guidance on the assessment of Certification Authorities issuing Certificates primarily for use with Transport Layer Security (TLS) proto

Re: Organization info in certs not being properly recognized byFirefox

2014-11-01 Thread Moudrick M. Dadashov
On 10/31/2014 1:04 PM, Anne van Kesteren wrote: On Fri, Oct 31, 2014 at 11:22 AM, Moudrick M. Dadashov wrote: The document below proposes a generic syntax for unique identification of natural/legal Subjects (see Section 5): http://docbox.etsi.org/ESI/Open/Latest_Drafts/prEN_319412-1v006-cert

Re: Organization info in certs not being properly recognized byFirefox

2014-10-31 Thread Moudrick M. Dadashov
On 10/31/2014 11:20 AM, Anne van Kesteren wrote: On Wed, Oct 29, 2014 at 10:02 PM, Dean Coclin wrote: But many people do in fact look at the security indicators. If that statement were true, why do fraudsters bother to get SSL certs (mostly DV) for their phishing websites? Given that "Orga

Re: Proposal: Advocate to get Section 9.3.1 (Reserved Certificate Policy Identifiers) made mandatory.

2014-07-23 Thread Moudrick M. Dadashov
"Having these identifiers takes us a long way towards our goal of deterministic evaluation of certificate issuance policy — that said not all CAs have adopted them which is technically alright since the Baseline Requirements do allow them to use their own Policy Identifiers". This is what Ryan

Re: Question about disclosing subCA certs

2014-05-20 Thread Moudrick M. Dadashov
Eddy, do you mean SSL client authentication? We too rely on this a lot. Thanks, M.D. On 5/20/2014 11:45 PM, Eddy Nigg wrote: On 05/19/2014 07:40 PM, Rick Andrews wrote: Kathleen, that means we'll be disclosing a number of intermediates used to sign certificates that are not used for SSL, Code

Re: DRAFT: May CA Communication

2014-05-13 Thread Moudrick M. Dadashov
Hi Rob, thanks, good news for us :) M.D. On 5/13/2014 11:52 PM, Rob Stradling wrote: On 13/05/14 21:41, Moudrick M. Dadashov wrote: "1. All new intermediate certificates that include the EKU extension and will be used for SSL certificate issuance, must include the id-kp-serve

Re: DRAFT: May CA Communication

2014-05-13 Thread Moudrick M. Dadashov
On 5/13/2014 8:46 PM, Kathleen Wilson wrote: On 5/13/14, 8:46 AM, Jeremy Rowley wrote: That actually clears things up. Intermediate certs aren't required to have an EKU but, if they do and the intermediate will be used for SSL, they must have the id-kp-serverAuth (1.3.6.1.5.5.7.3.1) EKU.

Re: DRAFT: May CA Communication

2014-05-13 Thread Moudrick M. Dadashov
On 5/13/2014 6:26 PM, Jeremy Rowley wrote: During the CAB Forum discussion on this issue, someone brought up that Qualified Certs in the EU are supposed to have either the anyEKU present or omit the EKU. I think the post originated from Chema Gonzalez, but I'll let him confirm. I'm not sure the

Re: "Super" CAs

2014-04-09 Thread Moudrick M. Dadashov
On 4/9/2014 2:04 PM, Rob Stradling wrote: On 09/04/14 11:57, Moudrick M. Dadashov wrote: Comodo operate intermediate CAs for several of our partners in a similar fashion. The partner is named in the intermediate certificate's Subject organizationName, but it is Comodo who control

Re: "Super" CAs

2014-04-09 Thread Moudrick M. Dadashov
On 4/9/2014 1:25 PM, Rob Stradling wrote: On 09/04/14 00:27, Kurt Roeckx wrote: The first example, Gandi, does sign certificates for other organizations. Hi Kurt. You seem to be assuming that the Subject organizationName in the intermediate CA certificate ("O=GANDI SAS" in this case) identi

Re: Root Certificates of USA CAs still trustworthy?

2013-10-17 Thread Moudrick M. Dadashov
On 10/17/2013 1:04 PM, Gervase Markham wrote: On 17/10/13 00:07, Phillip Hallam-Baker wrote: Each HSM vendor has their own security controls but a FIPS140 level 4 device won't release them except to another FIPS-140 device. There is no way to extract the key from the system unencrypted. Phil: w