Dear Ryan,
I really appreciate your time and the constructive feedback you provided. 
Really encouraging that after your in-deep analysis there aren't "red flags".

Please allow us to prepare a comprehensive answer to your comments and we'll 
come back to this  ASAP.

Thanks and regards,
Pedro

El sábado, 29 de agosto de 2015, 1:22:10 (UTC+2), Ryan Sleevi  escribió:
> On Wed, August 5, 2015 10:53 am, Kathleen Wilson wrote:
> >  WISeKey has applied to include the "OISTE WISeKey Global Root GB CA"
> >  root certificate, turn all all three trust bits, and enable EV
> >  treatment. This SHA-256 root cert will eventually replace WISeKey's
> >  SHA-1 root cert that was included in NSS via Bugzilla Bug #371362.
> >
> >  WISeKey provides worldwide eSecurity services based or related to
> >  electronic identities and digital certificates. Thereâ EURO (tm)s no focus 
> > on a
> >  particular region or customer profile.
> >
> >  The request is documented in the following bug:
> >  https://bugzilla.mozilla.org/show_bug.cgi?id=1172819
> >
> >  And in the pending certificates list:
> >  https://wiki.mozilla.org/CA:PendingCAs
> >
> >  Summary of Information Gathered and Verified:
> >  https://bugzilla.mozilla.org/attachment.cgi?id=8640737
> <SNIP>
> >  This begins the discussion of the request from WISeKey to include the
> >  "OISTE WISeKey Global Root GB CA" root certificate, turn all all three
> >  trust bits, and enable EV treatment.
> >
> >  At the conclusion of this discussion I will provide a summary of issues
> >  noted and action items. If there are outstanding issues, then an
> >  additional discussion may be needed as follow-up. If there are no
> >  outstanding issues, then I will recommend approval of this request in
> >  the bug.
> >
> 
> Kathleen,
> 
> Thanks for organizing this information. I've completed a thorough
> secondary review of WISeKey's relevant CPS. Overall, I'd like to commend
> them for the adoption of RFC 3647 for their CPS at the beginning of this
> year, and for the thoroughness and (general) attention to detail within
> the CPS. Of those I've reviewed thoroughly, this was unquestionably the
> easiest to review.
> 
> I've identified things I'd like to specifically call out as good practices
> (as a benefit to other CAs), things that are Meh (not intrinsically
> problematic, but good be improved), things that may be Bad (and may
> require remediation), as well as a long series of follow-up questions and
> clarifications.
> 
> These remarks apply to the CPS v2.4,
> https://cdn.wisekey.com/uploads/images/WKPKI.DE001-OWGTM-PKI-CPS.v2.4-CLEAN.pdf
> 
> == Good ==
> * Section 1.3.1 is clear to call out the deprecation of SHA-1 (this is
> later expressed in Section 6.1.5)
> * Section 3.1.1 (and subsequent Sections 3.1.4, Section 3.1.4.2, and Annex
> B) in describing and detailing the form that names take and are validated
> * Section 4.6 and Section 4.7 for being explicit in that renewal and rekey
> are treated as new certificate issuance
> * Section 14.2.4 making it explicit that wildcard certificates may not be
> validated using a URL-based demonstration of control
> 
> == Meh ==
> * Section 3.4 (nor elsewhere in the CPS) appear to provide information for
> how Relying Parties may notify WISeKey of potential issues with Subscriber
> Certificates (such as Key Compromise) that may require revocation.
> * Sections 4.4.3, 4.6.7, and 4.7.7 may be interpreted as prohibitions
> against WISeKey publishing certificate information via Certificate
> Transparency
> * Section 6.1 suggests that sub-CAs ("Issuing CAs") may not follow the
> same audit criteria as Root Keys. This may be due to ambiguity in the
> Baseline Requirements, and may represent a conflict with the intent of the
> Mozilla Inclusion Policy. At question is whether or not a Qualified
> Auditor must be present for the issuance of Issuing CA certificates (which
> I believe is desired), or whether an internal auditor suffices.
> * Section 11 (throughout) treats the subjectAlternativeName as part of the
> Subject naming, rather than as an X.509v3 extension
> * Section 11.4.1 Policy Qualifier Info contains User Notices which may
> unnecessarily increase the size of certificates for no technical benefit.
> * Section 11.4.3 does not provide a comprehensive OCSP profile, either for
> responder certificates or for the OCSP responses themselves. This makes it
> difficult to, for example, look for the id-pkix-ocsp-nocheck extension, as
> described in Section 4.9.9 of the Baseline Requirements, v1.3.0
> * There's a lot of cross-referencing to find out the appropriate name
> types and associated validation procedures (Section 3.1 references Section
> 7.1, which leads to Section 11.1 of Annex B, which leads to Section 12.2
> in Annex C, which ultimately leads to Section 14 in Annex E)
> 
> == Bad ==
> * Section 4.3 specifies that the information used in a certificate may be
> used up to a period of 39 months from gathering, but this would be
> inconsistent with Section 11.14.3 of the EV Guidelines, Version 1.5.6.
> * Section 11 (throughout) calls the Extended Key Usages extension
> "Enhanced Key Usages"
> * Section 11.3.1 lacks a description of the Extended Key Usages employed
> * Section 11.3.2 / 11.3.3 treats the EKU as part of the Key Usages
> extension. As a result, it fails to indicate the criticality of the EKU
> extension.
> * Section 14.1.3 / Section 14.2.3 refer to the catch-all method for IP
> address validation, without specifying the CA's practices regarding this.
> I believe this should either be removed, or the relevant practices and
> procedures employed by the CA should be documented in the CP/CPS
> explicitly so that the public may review and raise concerns.
> * I could find no reference in your information gathering document, or the
> relevant repositories, for the three test URLs required in accordance with
> Section 2.2 of the Baseline Requirements, v1.3.0. Namely, test URLs for
> valid, expired, and revoked certificates.
> 
> == Questions ==
> * The CPS was updated on 8/17/2015 to clarify that EV certificates may be
> issued up to two years. The information gathering document by Kathleen
> indicates a validity period of 1 year. This inconsistency permeates the
> CPS, in that Section 14.3.9 suggests EV for only 1 year, but that's
> inconsistent with the profile of Section 11.3.3 of 2 years. Which is it?
> * Section 1.1 includes the phrase "intended to serve as a common services
> infrastructure for [CAs] worldwide" - would this imply that WISeKey is
> operating as a meta-CA?
> * Section 1.1 establishes that the OISTE Foundation is subject to the
> supervision of the Swiss Federal Government, as it cannot be owned by any
> individual or corporation. Does this represent any concern to the Mozilla
> community with respect to discussions of Government CAs? I don't believe
> it should, but I wanted to expressly highlight this during review.
> * Section 1.3.1 suggests that there may be externally-operated sub-CAs;
> this would appear to be in conflict with Section 1.3.1.3 which suggests
> that WISeKey handles the commercial and technical operation. Elsewhere in
> the document, Issuing CAs are referred to as technically-constrained
> subordinate CAs. Kathleen's information gathering document suggests these
> are supported, but I couldn't find clear guidance on how such CAs would be
> processed (and audited)
> * Section 3.2.4 suggests the common name may be controlled by the
> subscriber, if it's a "Standard Personal Certificate". If Section 1.4.1.1
> is accurate, and it lacks the "TLS Server Authentication" EKU, this would
> not represent a concern. However, Section 4.9.13 establishes that
> "Standard Personal Certificates" may be suspended (a process forbidden for
> TLS certificates via the Baseline Requirements), particularly if the
> request came from an unauthenticated party (e.g. a Relying Party).
> Consider a hypothetical where an SPC certificate was misissued with the
> TLS Server Auth EKU. Is it conceivable that WISeKey, in accordance with
> its policies, might temporarily suspend, rather than revoke this
> certificate? If so, that would represent an action forbidden by the BRs.
> * Section 5 supports the notion that externally-operated SubCAs may exist,
> but leaves ambiguity with respect to Baseline Requirements audits being
> required before issuance, as required by Mozilla's policy.
> * Section 6.1.1 implies that sub-CAs may not always store private keys
> within HSMs. While Section 6.2.1 may provide some clarity on the practice,
> the wording within 6.1.1 leaves it ambiguous if this is the case, which
> would be concerning if so.
> * Section 7.2.2 does not indicate that the CRLs make use of the Issuing
> Distribution Point extension. I want to explicitly confirm that WISeKey
> only publishes a single, complete CRL - and, if that's the case, if that's
> stated in the CPS and I missed it. The risk would be signing two different
> CRLs that represent two different certificate populations, which, in the
> absence of an IDP extension, may allow for CRL substitution attacks.
> * Section 11.3 does not appear to constrain the subscriber common name to
> a value within the SAN, as required by the BRs. This is later stated (in
> Section 14.1.1.1), but it may help to provide the early clarity, and I
> wanted to confirm this was the case. See my earlier "meh" remarks about
> the naming cross-reference complexity.
> * Section 14.1.2 suggests that URL-based proof of control may be accepted.
> Can WISeKey provide additional details about the methods employed - e.g.
> does any subscriber-provided path work? Is there some challenge response
> employed? etc. This represents a real security risk (being resolved in the
> CA/B Forum's Validation WG), but it would help to provide clearer
> information to the Mozilla community about the methods employed here.
> 
> Overall, I do not see significant red flags with this review, and would
> recommend proceeding once WISeKey has had an opportunity to review this
> feedback, to respond, and for the Mozilla community to review the
> responses.
> 
> 
> In addition to the above remarks, though, which may also bear consideration:
> * I was unable to independently verify the WebTrust Seal. While it appears
> you (Kathleen) directly contacted the auditor, having the seal information
> (which I could not find on WISeKey's website) would allow for the Mozilla
> community to examine if the Seal is revoked, for example.
> * WISeKey has a Root CA Certificate Embedding agreement, which sets forth
> stipulations on the usage and inclusion of certificates. Is this document
> consistent with Mozilla's policies with respect to open source?
> * The Redistribution Agreement provided on WISeKey's site prohibits
> redistribution for commercial purposes (see
> https://www.wisekey.com/Repository/CACertificates )
> * The IPR Rights in Section 6 from the Relying Party Agreement (
> https://www.wisekey.com/Repository/Documents/Relying-Party-Agreement-1.0-wk-signed.pdf?41cef1
> ) appear somewhat troubling, although kudos is due for the final bullet in
> Section 5 of the Subscriber Agreement (
> https://www.wisekey.com/Repository/CertifyID%20Certificate%20Subscriber%20Agreement.pdf?41cef1
> )
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to