A great write up Jon!

As you know in a past life I was responsible for the Microsoft Root program and 
introduced much of the process that is used today - It really makes me happy to 
someone speak positively possibly about what they do and I couldn't agree more.

The only thing I would change in your description below Is that Microsoft does 
allow government CA's to be included in the program as do most if the other 
root programs.

See: http://unmitigatedrisk.com/?p=181

Requirement is that the CA is designed and operated with the purpose of serving 
the Internet a large not in a commercial sense.

With that said I agree with everything you said other than that.

Ryan Hurst


Sent from my phone, please forgive the brevity.

On Jan 5, 2013, at 11:42 AM, Jon Callas <j...@callas.org> wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> I'm really glad you asked this question. It gives me to tell a story I've 
> wanted to tell for some time. I know the answer to your question because I've 
> done it.
> 
> Some years ago, PGP Corporation toyed off and on with the idea of becoming a 
> CA. We looked at ways to get there through the side door, like buying the 
> assets of some company that was going out of business, and managed to be too 
> little, too late.
> 
> So after a lot of dithering, we started a project to create a CA from 
> scratch. I led the project and it had a budget of US$250K. I code-named the 
> project Casablanca. Partially because Casablanca begins and ends with a CA, 
> but mostly because I really like the phrase, "I am shocked, shocked that PGP 
> is issuing X.509 certificates." 
> 
> The process for setting up a CA is straightforward and exacting. You have to 
> have physical and logical controls on things, dual-authentication and 
> separation of duties on just about everything, but it's straightforward. You 
> have to write a lot of documents, create a lot of procedures, and have all of 
> that audited. You have to get audited regularly and often as you start out, 
> and then the audits taper off after you show that you're running a tight 
> ship. 
> 
> The main thing you're looking to do is to pass the WebTrust audit and 
> associated practices that the platforms will require you to do. Microsoft has 
> the most mature process. They have a set of rules and guidelines. If you 
> follow them, you're in. One of those, by the way, is that you have to be a 
> retail CA, as opposed to an internal one or a government one. It's best to 
> work with Microsoft first, and once you're in their root program move to the 
> others. They are fair, disciplined, and helpful. Most of all, once you've 
> gone through all that, it's easier to get into the other important root 
> stores.
> 
> If you go into this business with the attitude that you're doing a job that 
> protects the Internet at large, defends the public trust, and so on, then 
> you'll find the requirements completely reasonable and easy to do. 
> 
> Now that $250K that I spent got an offline root CA and an intermediate online 
> CA. The intermediate was not capable of supporting workloads that would make 
> you a major business. You need a data center after that, that supports the 
> workloads that your business requires. But of course, you can grow that with 
> your customer workload, and you can buy the datacenter space you need.
> 
> The costs got split out to about 40% hardware, etc. and 60% people. It does 
> not include the people costs of the internal PGP personnel who worked on it. 
> I raided part time help from around the company. It took about fourteen 
> months from start to end.
> 
> PGP bought an existing company, TrustCenter. TrustCenter was the remaining 
> end of GeoTrust (spun out Equifax) that Verisign did not buy. The plan was 
> that the PGP-branded Casablanca roots would be put into the TrustCenter 
> machinery and datacenters, and then you have a major CA. That got interrupted 
> by Symantec buying PGP and then buying Verisign. Casablanca is now rolled up 
> into their Norton CA business along with Verisign and Thawte, GeoTrust, etc.
> 
> There are rumors, which you've read here about how there are lots of 
> underhanded obstacles in the way of becoming a CA. My experience is that the 
> only underhanded part of the industry is that no one in it dispels the rumors 
> that there are underhanded obstacles in your path. This is pretty much the 
> first time I have, so I suppose I'm as guilty as anyone else.
> 
> Furthermore, there are lots of overblown rumors about the CA/Browser Forum. 
> You don't have to be a Forum member to be a CA. If you plan to issue EV 
> certificates, you have to follow the EV guidelines which are produced by the 
> CA/Browser Forum, but that is because the platforms won't put your EV root in 
> their stores unless you do. You don't have to be a member of the Forum to be 
> a CA. As a matter of fact, there are a large number of CAs that are not 
> members.
> 
> The situation is similar to Internet protocols and the IETF. If you want to 
> make routers, you don't have to be a member of the IETF. You *will* have to 
> follow IETF documents, but you don't have to participate. Obviously, there 
> are advantages in participating, but there are also costs.
> 
> I was involved in the CA/Browser Forum for a few years, first with Apple (on 
> the browser end) and then with Entrust (on the CA end). I heard the stories 
> about how it's a cartel, etc. At PGP, we had no plans to be members because 
> we had no interest in being part of a cartel. It was a huge disappointment to 
> be there and find out that it isn't a cartel at all, it's a volunteer 
> organization that handles lots of the rough edges of web PKI with the same 
> combination of spurts of efficiency and spurts of fecklessness that you find 
> in just about any organization that tries to get a bunch of organizations 
> with different goals to work together.
> 
> Presently, the Forum is reorganizing itself for greater transparency and 
> participation, which is not going as well as it could, despite lots of good 
> ideas. But this is the way of all volunteer organizations, which often merely 
> shuffle around the dumb things and smart things they do -- in correcting a 
> dumb thing, they correct a smart one, too. There are many things one can 
> criticize the Forum for, but it's not the usual things you hear. If you're 
> starting a CA, you can deal with the Forum as you think it benefits you most.
> 
> The long pole in the tent of setting up a CA is getting your roots in all the 
> platforms you need. It's much easier now than it has been in years past, but 
> that's the annoying part because every platform has their own rules. As I 
> said, start with Microsoft. These days, cross-certification is much harder 
> than it was. In the wake of the last few years, most CAs are not interested 
> in cross-certifying any more.
> 
>    Jon
> 
> 
> -----BEGIN PGP SIGNATURE-----
> Version: PGP Universal 3.2.0 (Build 1672)
> Charset: us-ascii
> 
> wj8DBQFQ6IImsTedWZOD3gYRAoUfAKDaIbRMkcJ/BsBsBvsL2juv8Ip88ACgu3zx
> 9d+6LZUy2RMSiB8hfn44EHA=
> =G5aJ
> -----END PGP SIGNATURE-----
> _______________________________________________
> cryptography mailing list
> cryptography@randombit.net
> http://lists.randombit.net/mailman/listinfo/cryptography

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to