On Wed, August 6, 2014 11:48 am, Kathleen Wilson wrote:
>  Let's please discuss the auditor questions a little more...
>
>  The auditor's statement (http://www.cfca.com.cn/file/PwC_CFCA(en).rar)
>  says that the auditor performed the procedures according to the
>  "WebTrust for Certification Authorities - SSL Baseline Requirements
>  Audit Criteria Version 1.1"
>  which is available here:
>  http://www.webtrust.org/homepage-documents/item72052.docx
>
>  If an auditor strictly performs the audit procedures required by
>  WebTrust SSL Baseline Requirements Audit Criteria v1.1 (link above),
>  would that auditor identify all of the issues raised by Erwann?
>
>  Thanks,
>  Kathleen

Principle 2, Item 2.1
"The CA maintains controls to provide reasonable assurance that
certificates issued meet the minimum requirements for Certificate Content
and profile as established in Section 9 of the Baseline Requirements"

The certificates identified by Erwann fail this test. They are
certificates that are key to the CA's infrastructure. These were and are
trivially identifiable, as Erwann showed.

The fact that such certificates were issued are proof that the controls
implemented do not provide said reasonable assurance.

Principle 2, Item 4.11
"The CA maintains controls to provide reasonable assurance that Root CA
Private Keys must not be used to sign Certificates except as permitted by
the Baseline Requirements."

The certificates signed violate this, ergo, the controls do not provide
reasonable assurance.

Principle 2, Item 6.2
"The CA maintains controls to provide reasonable assurance that:
the CA provides all personell performing information verification duties
with skills-training ...
the CA ... ensures that personel entrusted with Validation Specialist
duties maintain a skill level that enables them to perform such duties
satisfactorily
the CA requires all Validation Specialists to pass an examination provided
by the CA on the information verification requirements outlined in the
Baseline Requirements"

The response by the CA to Erwann's issues raises serious question about this.

I think the key tenet is whether or not the assertion, by
PricewaterhouseCoopers, that the CA "maintained effective controls to
provide reasonable assurance that the integrity of keys and certificates
it manages was established and protected throughout their life cycles" and
"CA systems development, maintenance and operations were properly
authorized and performed to maintain CA systems integrity", is
trustworthy.

The egregious evidence from Erwann, upon trivial inspection, seems to call
into question as to whether the assertion, by PricewaterhouseCoopers, as
to what constitutes "effective controls" and "reasonable assurance", is
trustworthy. Without this trust, the entire audit is invalidated.

Further, it calls into question as to whether PricewaterhouseCoopers
effectively "obtain(ed) an understanding of ABC Company's SSL certificate
life cycle management practices and procedures, including its relevant
controls over the issuance, renewal and revocation of SSL certificates".
(Appendix B, Example 1/3)

Note that Erwann identified issues were certificates or CRLs were issued
that failed, at a minimum, to conform to the policies set out in RFC 5280.

It is expected that a "competent party" (section 13, Mozilla Root
Inclusion policy" with "knowledge of CA-related technical issues such as
public key cryptography and related standards" would be capable of
determining that the controls implemented were ineffective/insufficient.

Given that Mozilla "reserves the right to designate your own
representative(s) to act as a competent independent party or parties
described above, should that prove to be necessary and appropriate"
(section 15, Mozilla Root Inclusion) and that Mozilla "reserve(s) the
right to not include a particular CA certificate in (our) software
products" for CA's that "issue certificates that have ... duplicate issuer
names and serial numbers" (Section 4, Mozilla Root Inclusion), it seems
appropriate and consistent action to either deny the inclusion request, or
to dictate an audit by an independent third-party.

The non-normative "how inclusion works" (
https://wiki.mozilla.org/CA:How_to_apply#Public_discussion ) describes
issues identified as "things to update in the CP/CPS and possibly
operational practices" - except what we have is a violation of the CP/CPS
(and of the Mozilla requirements)

Thus, it does not seem appropriate to treat this as an "item to fix" to be
sent to Phase 2, but a reason to deny inclusion.

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to