There is no easy way to temporary sanction non-compliant CAs for lateness
of documents, incidents and etc.
There needs to be a switch developed which allows program members to
disable features such as EV without messing around in code.

James


On Wed, Jan 24, 2018 at 1:56 PM, Ryan Sleevi via dev-security-policy <
[email protected]> wrote:

> On Tue, Jan 23, 2018 at 7:47 PM, Wayne Thayer via dev-security-policy <
> [email protected]> wrote:
>
> > Hi Everyone,
> >
> > I have reviewed the responses we received from the November 2017 CA
> > Communication [1], and I have the following comments to share:
> >
> > * Beginning with the good news, no new concerns related to the suspected
> > .tg Registry compromise were reported (Action #8)
> > * The deadline for submitting the survey was 15-December, but Amazon,
> > DSV-Gruppe, and Web.com required repeated prodding in January before they
> > responded. It may be that mid-December is not the best time of the year
> for
> > a survey deadline, but the response we received fell short of our
> > expectations.
> > * In action #1, CAs were asked to confirm that they comply with version
> 2.5
> > of the Mozilla root store policy. This policy took effect last June [2],
> > but a number of CAs stated that they needed more time to bring their CPS
> > into compliance. Most CAs said they would comply by 1-March, but some
> > requested much more time. Microsec Ltd. stated that “The next version of
> > our public documents will contain the exact reference to these BR
> sections
> > which will be issued by 2018-09-30.” I expect CAs to update their CPS
> much
> > more frequently when requirements change. I propose that we require CAs
> to
> > update their CPS to comply with version 2.5 of the Mozilla root store
> > policy no later than 15-April 2018.
> >
>
> This seems to be a perennial problem with CAs, and doesn't inspire
> confidence in them or their operations. I am also concerned that an
> extension of this nature does not inspire confidence in the Mozilla Root
> Program, either as relying parties (CAs that are not competent are allowed
> to continue to be incompetent) or for competent CAs (Mozilla's
> requests/requirements are not actual requirements, but merely suggestions)
>
> I am specifically concerned about the CP/CPS updates and the impact they
> have to global trust. Am I mistaken in evaluating
> https://github.com/mozilla/pkipolicy/compare/2.4.1...2.5 that the
> substance
> of those changes are:
> 1) Documenting which of the 10 Blessed Methods a CA does not use
> 2) Updating the version number and adding a dated change log
>
> 2 should be inconsequential, but 1 has a very real effect - unless/until
> the CA updates their CP/CPS to explicitly state what methods they are using
> (implicitly disavowing the 'any other method'), then a CA can receive a
> fully compliant audit, despite actively issuing certificates using 'any
> other method', in contravention of Mozilla Policy.
>
> That seems concerning, and the effect is that delaying such updates to
> 15-April-2018 would mean the community is being asked to accept, based on
> the honor system, a CA's word that they're not issuing certificates using
> arbitrary methods.
>
> Is my concern misplaced? This seems fairly critical to security, and given
> the number of CA incidents over the past year, I have very little faith
> that CAs are in compliance, and that some form of 'human error or
> oversight' didn't cause them to 'forget' they were using Any-Other-Method.
>
> Does Mozilla plan to sanction non-compliant CAs, either now or in the
> future? Certainly, it seems the removal of any EV status would be
> appropriate for any CA still needing time to update their CP/CPS, as the
> level of assurance provided by these CAs regarding their validation methods
> surely does not rise to the high levels of assurance EV is presumed to
> convey. But more importantly, should new certificates be distrusted until
> such a time as the CA can demonstrate compliance? I cannot help but think
> that is the only way to ensure timely compliance - any CA found to need
> more time to adjust to policy changes will have trust in their certificates
> immediately disabled, and for some fixed period (which may grow if the
> incidents are repeated). 6 months seems an appropriate start.
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to