I don't think a transfer action by a CA should be treated as an automatic 
accept ‎by the security community. The purpose of the root certs and thus the 
CA program is to establish and maintain trust in an organization and it's 
policies and procedures. From my perspective this means the transfer recipient 
first must establish that trust and, second, must provide evidence that the 
transfer itself will be performed in a secure and/or trustworthy manner.

As has already been pointed out there are different types of transfers to 
consider, each with its own conditions and concerns:

    a) legal ownership transfer, such as when one company buys out another. For 
example, if Symantec were to assign ownership of all their roots to the US 
military, is it reasonable that we be expected to transfer the trust we'd 
previously extended to Symantec? 

    b) physical relocation. For example, if the plan is to drop the private 
keys in a FedEx envelope and send it across the country we have every reason to 
expect the NSA to intercept that package.

    c) changes in "key personnel". For example if the head of the new 
organization previously ran a sausage factory and has no experience in PKI, I 
don't think we'd necessarily want to trust that transfer.


So, just some thoughts to get the conversation going. I don't so much have a 
problem with what you've suggested, Kathleen, but I think it's worth taking a 
step back first and identify the cases we even want to address.


  Original Message  
From: Kathleen Wilson
Sent: Thursday, April 23, 2015 6:38 PM
To: [email protected]
Subject: Re: Policy about root cert transfers

On 4/23/15 4:21 PM, Kathleen Wilson wrote:
> All,
>
> It has been brought to my attention that we do not have a documented
> procedure or policy about how to transfer a root certificate from one CA
> to another.
>
> Do we need to add expectations about root cert transfers to Mozilla's CA
> Certificate Policy?
>
> I think, at the minimum, we should add information about our
> expectations to one of our process wiki pages, or maybe this needs its
> own wiki page?
>
> Here's what I usually tell CAs when they ask:
>
> 1) I recommend creating a transfer agreement and have it reviewed by the
> auditors for both the current and the new CA.
>
> 2) New cert issuance (at the current CA's site) should be stopped before
> the transfer begins.
>
> 3) There should be an audit performed at the current CA's site to
> confirm when the root certificates is ready for transfer.
>
> 4) Before the new CA begins issuing certs in the transferred CA cert
> hierarchy, there should be an audit performed at the new CA's site to
> confirm that the transfer was successful and that the root cert is ready
> to resume issuance.
>
> 5) The regular annual audit statements are still expected to happen
> within a timely manner, or the root cert may be removed.
>
> 6) Keep the Mozilla CA Certificate Module Owner appraised of the status
> of these steps, and inform immediately if a problem occurs.
>
>
> I will appreciate your thoughtful and constructive input on this topic.
>
> Kathleen


Things to add:

7) The new CA must follow Mozilla's policy, and provide public-facing 
CP/CPS documentation and audit statements. So, the new CA has to send 
Mozilla the URLs to those.
https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/
https://wiki.mozilla.org/CA:Information_checklist#Verification_Policies_and_Practices

8) The agreement between the current and new CAs should take the trust 
bit settings into account (Websites (SSL/TLS), Email (S/MIME), and Code 
Signing), and the current and new CAs should inform Mozilla's CA 
Certificate Module Owner if one or more of the trust bits should be 
turned off. Of course, to turn a trust bit on requires the new CA to go 
through Mozilla's root change process - 
https://wiki.mozilla.org/CA:How_to_apply#Enable_Additional_Trust_Bits_for_an_included_root

Kathleen




_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to