On Thu, Oct 05, 2017 at 11:05:07AM +0800, Gervase Markham via 
dev-security-policy wrote:
> In addition, we do need to address the question of how we can ascertain
> that the organization has acquired the technical competence and
> management rigour which seems to be lacking. I know you have placed some
> audit requirements in there, but I do think we need to discuss whether
> those will provide a sufficient guarantee and, if not, if there's
> anything that could.

One thing that might provide at least a certain amount of motivation, if not
guarantee, would be to apply an additional delay in re-application
processing if review of the initial re-application is found to be deficient. 
I know a similar thing has been suggested in the past for applications in
general, to avoid the situation where new applications are essentially being
taught webPKI by the participants in the Mozilla application process,
although I don't recall off the top of my head what the concerns were in
general.

However, for a re-application of this sort, a "get it right or face delay"
would send a strong message that the applicant really needs to spend the
time to get their ducks in a row before coming back.  Otherwise, they could
very easily spend the entire next twelve months sitting on their hands, then
come back with the same infrastructure and play whack-a-mole with whatever
gets identified until everyone else gets tired and gives up finding more
holes.  If they know they'll face another three, six, or even twelve month
delay if anything untoward is found, it might encourage them to look a
little harder.  I'd like to include audit findings in that, although I'm
aware that audits, being controlled by the company under audit, can be
suppressed if they're not to the company's liking.

There is also the possibility of requiring an audit (not necessarily a
BR/WTCA audit; it could be any form of review based on identified
deficiencies in the organisation) by a Mozilla-selected auditor, *reporting
to Mozilla* (not the applicant), and paid for by the applicant.  This has a
degree of precedent in the StartCom case, where Mozilla required a code
audit (above and beyond the usual BR/WTCA ones).  There's also precedent in
financial auditing, I believe, although I can't find the reference I recall
reading (and thinking, "hmm, could that work for CAs?").  Whilst it might be
considered an excessive burden in general (even on a "random selection"
basis), for an applicant who has been previously distrusted, I don't think
it's out of the realm of possibility to say, "sorry, we're going to need a
bit more from you".

Sure, we can hypothesise about organisations doing shady reorgs to try and
look like they're "new".  However, the same problems could apply now --
Procert (or any other distrusted org) could try and get around whatever
sanctions have been imposed (such as a re-application delay) by re-forming
as a seemingly-unrelated entity.  Based on the impressive investigations
that have been undertaken in the past, I'm fairly confident that most forms
of shenanigan could be detected.  If Mozilla has "reasonable confidence"
that an applicant shares key personnel, or a controlling entity, with a
previously distrusted organisation, I don't think it's unreasonable to stick
then with the cost of an additional review of their previously-unacceptable
infrastructure and processes.

- Matt

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to