Wayne, Thank you for your detailed review of the CP/CPS.
In attempt to discuss continued trust, I have attempted to summarize the patterns and issues of note, along with the timeline from reporting to remediation. It is my goal that this will allow the public to make an objective assessment of the risks introduced by Camerfirma, as well as the responsiveness towards remediation. While the ecosystem continues to improve both its understanding of the requirements and expectations, we must nevertheless consider the full picture. Issue 1: Invalid dNSNames/CNs ( https://bugzilla.mozilla.org/show_bug.cgi?id=1390977 ) 2014-09-25 - https://crt.sh/?id=5129200&opt=cablint issued 2017-08-12 - Jonathan Rudenberg posts to m.d.s.p 2017-08-13 - Jonathan Rudenberg contacts the CA 2017-08-16 - Kathleen Wilson opens a Bugzilla incident 2017-08-17 - Camerfirma Responds 2017-09 - Scheduled remediation 2017-12 - First attempted remediation 2018-02-14 - Actual remediation, as per https://bugzilla.mozilla.org/show_bug.cgi?id=1390977#c33 Issue 2: Unrevoked Internal Servernames ( https://bugzilla.mozilla.org/show_bug.cgi?id=1390977 ) 2016-10-01 - Deadline for revoking internal server name certificates 2017-08-24 - Camerfirma shares list of misissued certificates affected by Issue 1, along with their response 2017-08-24 - Ryan Sleevi highlights that Camerfirma failed to identify and revoke internal server name certificates - https://bugzilla.mozilla.org/show_bug.cgi?id=1390977#c13 2017-09-12 - Camerfirma revokes https://crt.sh/?id=8680123&opt=ocsp 2017-11-28 - Gerv Markham highlights that Camerfirma has still not responded to outstanding questions - https://bugzilla.mozilla.org/show_bug.cgi?id=1390977#c21 2017-12-21 - Camerfirma responds to the substance of the questions Issue 3 - Improperly Configured OCSP - https://bugzilla.mozilla.org/show_bug.cgi?id=1426233 2017-12-12 - Rob Stradling reports on CA's improperly configured OCSP configurations at https://groups.google.com/forum/#!topic/mozilla.dev.security.policy/C2vTpvouP3g 2017-12-19 - Wayne Thayer opens a bug regarding OCSP non-conformance by Camerfirma 2017-12-22 - Camerfirma confirms the issue is resolved. It took one of their sub-CAs from 12-12 to 12-19, and another from 12-12 to 12-22, to implement these changes. Camerfirma did not self-report this non-compliance, despite acknowledging it on 12-12. 2018-01-03 - Camerfirma completes a minimal incident report with all required information. Issue 4 - Improper CAA checking ( https://bugzilla.mozilla.org/show_bug.cgi?id=1420871 ) 2017-09-08 - Baseline Requirements require checking CAA 2017-11-27 - Quirin Scheitle reports CAA checking non-compliance by Camerfirma 2017-11-29 - Camerfirma confirms misissuance, believing it was valid because they found "and for which CAA was checked" to be confusing and indicating that CAA checking was optional. 2017-11-29 - Camerfirma claims CAA checking is activated on all RAs Issue 5 - Duplicate dNSNames and invalid localityName/stateOrProvinceName ( https://bugzilla.mozilla.org/show_bug.cgi?id=1357067 ) 2017-04-17 - Issue reported 2017-04-20 - Camerfirma reports the issue is fixed to StartCom. The issue is apparently a Camerfirma issue, and with improper logging as well as certificate configuration. 2017-10-13 - StartCom provides incident report, as a Camerfirma reseller Note: No response was provided by Camerfirma in this incident report. Issue 6 - Out of date CP/CPSes 2016-06 - Last published version of the CPS at http://docs.camerfirma.com/publico/DocumentosWeb/politicas/CPS_V_3_2_7_EN.pdf 2018-05 - Next proposed update of the CPS, as stated elsewhere on this thread I'm not sure whether to track issues with the new hierarchy, so I will simply note the following: 2017-08-23 - Last issued certificate with invalid dNSName ( https://crt.sh/?caid=50473&opt=cablint,zlint,x509lint&minNotBefore=2011-01-01 ) 2017-12-13 - Last issued certificate that violates RFC 5280, 4.1.2.4's requirements that "CAs conforming to this profile MUST use either the PrintableString or UTF8String encoding of DirectoryString, with two exceptions" ( https://crt.sh/?cablint=261&iCAID=50473&minNotBefore=2011-01-01 ) Notable is that Camerfirma includes the organizationIdentifier, OID 2.5.4.97, in their certificates. This is documented in the CPS [5] from the original message, within Section 3.1.1, with the validation process described in 3.1.8.1. However, the CP/CPS lacks details as to the construction and validation - it appears to be a construction of "VAT" [member state] "-" [VAT number] In this, we see a pattern of issues, with a strong reliance on trusting RAs (which included entities such as StartCom, known to not be validating correctly) and, when failure detected, on technical controls. We see a pattern of delayed remediation, misunderstanding of expectations in the face of misissuance, and misunderstandings of the requirements themselves. If there is any one remark that perfectly captures this, it would be found in https://bugzilla.mozilla.org/show_bug.cgi?id=1390977#c30 , provided on 2017-12-21 (i.e. after many of these issues) "AC Camerfirma is a small CA that uses an in-house developed CA software and is supported by our RA trusted operators and the continuous training they receive. AC Camerfirma has been working with this technology and staff for 17 years without problems and we have dedicated a big effort improving it along those years. Due to the number of TLS certificates issued on previous years, this working method was appropriate and suitable for us. The increase of certificates issued, increasing technical requirements and the analysis of these reported problems have helped us to realize the need to extend the technical controls in the CA application to cover all possible and new requirements and introduce a new person in charge of coordinating these implementations." I think it's problematic to suggest "without problems", and concerning that it required a "big effort" to improving. It equally remains problematic/concerning that the in-house CA software has continued to show issues. Camerfirma states that it believes those issues remediated, in part, by extending technical controls. Yet many of these failures also highlight problems in the design of the system (and its reliance on RAs) and the staff tasked with understanding and implementing compliance. In the midst of all of this overhaul at Camerfirma, the 2016 root was created. The existing roots still show problems (such as their CP/CPS issues), and it seems energy has been focused on the new root, despite it operating for a considerable time on the legacy infrastructure and subject to issues as recently as 3 months ago. If, despite the evidence, we are to believe that Camerfirma has remediated the technical issues (via the technical controls deployed in February 2018) and has remediated the policy issues (via the onboarding of new staff tasked with ensuring compliance in December 2017), then it seems minimally appropriate to suggest that a new, Camerfirma 2018 root be created and established. Camerfirma's 2016 root can be used to cross-certify this, thus supporting those users on Microsoft platforms for which 2016 is trusted, while providing greater assurance that the issuance and trust is appropriate. Such an inclusion should not occur until a key generation ceremony report, a point in time audit, and a period of time audit report have been provided for the new 2018 root, which would mean would not be reconsidered for at least 3 months, at a minimum. This would also ensure that Camerfirma has completed its remediation steps for its existing set of hierarchy, such as updating the CP/CPS, demonstrating that the new controls and personnel are equipped to maintain a globally trusted CA. Further, given Camerfirma's statements that their investment in compliance is with regards to the 2016 root, and the issue the prior roots have had (both from policy compliance and issuance), it seems that we should also begin discussing at what point trust in those legacy roots should be removed, up to and including disallowing new certificates from it if existing certificates are to remain trusted, as new issuance will be on/from the 2018 root (through the 2016 path, for Windows users) _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

