My question to the browser vendors, in particular Mozilla, is still
unanswered:

> Doesn't that call for more a rigorous action from the browser vendors
> (given that Verizon is apparently no longer a CABF member, so the
> stick of cancelling their membership is already ineffective)?

As demonstrated by the cclearning.accenture.com case, Verizon does its
own "risk assessment", decides to not follow the BR, Mozilla (Corp.)
remains silent... and then everyone goes back to regular schedule? I
don't think that's an appropriate way of dealing with this issue.

Meanwhile I had another look at Verizon's EV SSL machinery. Since its
inception, the EV Guidelines have very clearly stated:

  "CAs MUST support an OCSP capability for Subscriber Certificates that
   are issued after Dec 31, 2010."

(Draft 11 from 20 October 2006 already had it, in version 1.4 it
disappeared due to the BR being incorporated by reference)

And
http://www.verizonenterprise.com/us/products/security/identity/ssl/evssl.xml
at least states:

  "We support and use Version 1.3 of the Extended Validation
   Certificate Guidelines developed by the CA/Browser Forum"

They refer to an older version of the EV Guidelines on their Web site,
but their CP/CPS
(http://cybertrust.omniroot.com/repository/Cybertrust_CPS_v_5_4.pdf) on
the other hand is fine when saying:

  "SureServer EV issuance and management practices comply with the
   current version of the said Guidelines."

Ok, then in 2013 there must sure[server]ly be an OCSP responder for
these EV thingies, right? Just an unfortunate glitch that they forgot to
include the respective URI in the cert... but nobody is perfect. Let's
see if we can figure out ourselves where that responder lives:

> $ openssl s_client -connect ev.omniroot.com:443 </dev/null 2>&0 | openssl 
> x509 -noout -text | grep http >                   
> URI:http://crl.omniroot.com/SureServerEV.crl
>                   CPS: http://cybertrust.omniroot.com/repository

Ah, must be ocsp.omniroot.com, most likely. Let's try:

> $ host ocsp.omniroot.com
> ocsp.omniroot.com is an alias for evocsp.us.omniroot.com.
> evocsp.us.omniroot.com has address 64.18.17.38

Great! Apparently they operate a responder in the US. Let's try to ask
it for the status of the "ev.omniroot.com" cert, then:

> $ curl -siH Accept: 
> http://ocsp.omniroot.com/ME8wTTBLMEkwRzAJBgUrDgMCGgUABBQ5h1nWidcsYM7en%2F2U9AwLuY57WgQUm3tY6z0D5IfI5IzqRnySVOk2u54CDgIAAAAAATOE8KOLdzwV
> HTTP/1.1 404 Not Found
> Date: Sun, 06 Oct 2013 14:13:55 GMT
> Server: Apache/2.2.15 (CentOS)
> Content-Length: 389
> Connection: close
> Content-Type: text/html; charset=iso-8859-1
> 
> <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
> <html><head>
> <title>404 Not Found</title>
> </head><body>
> <h1>Not Found</h1>
> <p>The requested URL 
> /ME8wTTBLMEkwRzAJBgUrDgMCGgUABBQ5h1nWidcsYM7en/2U9AwLuY57WgQUm3tY6z0D5IfI5IzqRnySVOk2u54CDgIAAAAAATOE8KOLdzwV
>  was not found on this server.
> </p>
> <hr>
> <address>Apache/2.2.15 (CentOS) Server at ocsp.omniroot.com Port 80</address>
> </body></html>

Ouch. Hmm, apparently no GET support here yet - wasn't there a section
about this somewhere in the BR... (13.2.2)? Well, anyway, let's be nice
and try again, this time with POST:

> $ echo 
> ME8wTTBLMEkwRzAJBgUrDgMCGgUABBQ5h1nWidcsYM7en/2U9AwLuY57WgQUm3tY6z0D5IfI5IzqRnySVOk2u54CDgIAAAAAATOE8KOLdzwV
>  | openssl base64 -d -A | curl -iH "Content-Type: application/ocsp-request" 
> -H Accept: --data-binary @- http://ocsp.omniroot.com
> HTTP/1.1 200 OK
> Date: Sun, 06 Oct 2013 14:14:04 GMT
> Server: Apache/2.2.15 (CentOS)
> Last-Modified: Mon, 18 Feb 2013 16:54:02 GMT
> ETag: "20117-7-4d6029275fa0f"
> Accept-Ranges: bytes
> Content-Length: 7
> Connection: close
> Content-Type: text/html; charset=UTF-8
> 
> server

Wow, fantastic! It's telling us that it is a *server* (not some toy, in
case you were wondering). And of course text/html is perfectly matching
for a request of type application/ocsp-request, isn't it?

Going back to the first message in this thread and the Netcraft blog
entry, what is really egregious is not so much the fact that Netcraft
found "an EV certificate without an OCSP URL!" for
enroll.americanexpress.com - the point is that Verizon does not provide
a working OCSP responder for their EV certs *at all*... even though the
EV Guidelines made a responder mandatory as of January 1, 2011 (see above).

I fail to see a reason why Mozilla's next action should not consist of
reverting the Cybertrust-related changes committed with
https://bugzilla.mozilla.org/show_bug.cgi?id=493709, and only re-enable
Verizon for EV after they have completed a new full WebTrust EV audit.

Kaspar


P.S. Apart from the non-compliant businessCategory attributes mentioned
before, the issuer DN for the Verizon EV SSL CA also does not meet the
requirement from BR section 9.1.4: there's no countryName RDN (it's just
"O=Cybertrust Inc, CN=Cybertrust SureServer EV CA").
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to