On Tue, September 8, 2015 9:13 am, Jürgen Brauckmann wrote:
>  Ryan,
>
>  sorry, I don't understand you. You cannot pass an Webtrust for CAs audit
>  when you do the things you mentioned. There is no difference between
>  email/codesigning certs and TLS server certs.

Juergen,

The unfortunate reality is that you can.

For example, regarding CRLs and OCSP, using "WebTrust for CAs 2.0" (
http://www.webtrust.org/homepage-documents/item54279.pdf ), the
requirement is established in Section 6.8.

However, note that the criteria is that complete and accurate certificate
status information is made available to relevant entities _in accordance
with the CA's disclosed business practices_.

This does not *require* support for these methods, if a CA's CP/CPS does
not disclose them. Further, even if the CA does disclose they make
revocation information available, they may not make it available via CRLs
or OCSP. For example, I've seen availability be done via LDAP (not
delivery of a CRL via LDAP, but where the presence of an LDAP entity
signifies revocation) or via a Web form (enter in a serial number, get a
human-readable revocation status). Both of these examples - or no support
at all - meet the criteria of WebTrust for CAs.

Other examples - such as uptime - are not embodied in "WebTrust for CAs".
Further, on the topic of misissuance, what an auditor is examining whether
or not controls exist - and they're followed. If a control exists for
identity validation, and it's "insufficient" (as deemed by the Mozilla
community), that still meets the criteria set forth in "WebTrust for CAs".
Further, if following the policies and practices that the CA has
documented leads to a 'misissued' certificate - but those policies were
fully adhered to - then that's not a qualified finding from the POV of an
auditor.

I hate pointing out that the emperor has no clothes, but you can see why
so much effort has been focused on improving the SSL/TLS ecosystem, often
with quantifiable measures (for example, the use of Certificate
Transparency to examine BR compliance), because the audit is not designed
to be perfect.

And, of course, I'm ignoring the fact that auditors are not obligated or
needed to examine a CA's CP/CPS when making these calls, so it's entirely
possible for a CA to document one thing, and then provide a different
document to an auditor demonstrating a different set of controls. This
would fully pass "WebTrust for CAs" - and while it might make the auditor
unhappy (especially if they notice), the system does not have intrinsic
defenses against this.

Cheers,
Ryan

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to