On Friday, March 23, 2018 at 4:20:51 PM UTC+1, Ryan Sleevi wrote: > On Fri, Mar 23, 2018 at 1:12 PM ramirommunoz--- via dev-security-policy < > [email protected]> wrote: > > > On Thursday, March 22, 2018 at 10:43:49 PM UTC+1, Ryan Sleevi wrote: > > > On Thu, Mar 22, 2018 at 6:26 PM ramirommunoz--- via dev-security-policy < > > > [email protected]> wrote: > > > > > > > Hi Ryan > > > > Many thanks for your report. I will try to answer to your concerns > > about > > > > our root inclusión. > > > > > > > > > In attempt to discuss continued trust, I have attempted to summarize > > the > > > > > patterns and issues of note, along with the timeline from reporting > > to > > > > > remediation. It is my goal that this will allow the public to make an > > > > > objective assessment of the risks introduced by Camerfirma, as well > > as > > > > the > > > > > responsiveness towards remediation. While the ecosystem continues to > > > > > improve both its understanding of the requirements and expectations, > > we > > > > > must nevertheless consider the full picture. > > > > > > > > > > Issue 1: Invalid dNSNames/CNs ( > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1390977 ) > > > > > 2014-09-25 - https://crt.sh/?id=5129200&opt=cablint issued > > > > > 2017-08-12 - Jonathan Rudenberg posts to m.d.s.p > > > > > 2017-08-13 - Jonathan Rudenberg contacts the CA > > > > > 2017-08-16 - Kathleen Wilson opens a Bugzilla incident > > > > > 2017-08-17 - Camerfirma Responds > > > > > 2017-09 - Scheduled remediation > > > > > 2017-12 - First attempted remediation > > > > > 2018-02-14 - Actual remediation, as per > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1390977#c33 > > > > > > > > > > Issue 2: Unrevoked Internal Servernames ( > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1390977 ) > > > > > 2016-10-01 - Deadline for revoking internal server name certificates > > > > > 2017-08-24 - Camerfirma shares list of misissued certificates > > affected by > > > > > Issue 1, along with their response > > > > > 2017-08-24 - Ryan Sleevi highlights that Camerfirma failed to > > identify > > > > and > > > > > revoke internal server name certificates - > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1390977#c13 > > > > > 2017-09-12 - Camerfirma revokes https://crt.sh/?id=8680123&opt=ocsp > > > > > 2017-11-28 - Gerv Markham highlights that Camerfirma has still not > > > > > responded to outstanding questions - > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1390977#c21 > > > > > 2017-12-21 - Camerfirma responds to the substance of the questions > > > > > > > > > > Issue 3 - Improperly Configured OCSP - > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1426233 > > > > > 2017-12-12 - Rob Stradling reports on CA's improperly configured OCSP > > > > > configurations at > > > > > > > > > > > https://groups.google.com/forum/#!topic/mozilla.dev.security.policy/C2vTpvouP3g > > > > > 2017-12-19 - Wayne Thayer opens a bug regarding OCSP non-conformance > > by > > > > > Camerfirma > > > > > 2017-12-22 - Camerfirma confirms the issue is resolved. It took one > > of > > > > > their sub-CAs from 12-12 to 12-19, and another from 12-12 to 12-22, > > to > > > > > implement these changes. Camerfirma did not self-report this > > > > > non-compliance, despite acknowledging it on 12-12. > > > > > 2018-01-03 - Camerfirma completes a minimal incident report with all > > > > > required information. > > > > > > > > > > Issue 4 - Improper CAA checking ( > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1420871 ) > > > > > 2017-09-08 - Baseline Requirements require checking CAA > > > > > 2017-11-27 - Quirin Scheitle reports CAA checking non-compliance by > > > > > Camerfirma > > > > > 2017-11-29 - Camerfirma confirms misissuance, believing it was valid > > > > > because they found "and for which CAA was checked" to be confusing > > and > > > > > indicating that CAA checking was optional. > > > > > 2017-11-29 - Camerfirma claims CAA checking is activated on all RAs > > > > > > > > > > > > > All previous bugs as you said are closed successfully. > > > > > > > > > > > > > > Issue 5 - Duplicate dNSNames and invalid > > > > localityName/stateOrProvinceName ( > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1357067 ) > > > > > 2017-04-17 - Issue reported > > > > > 2017-04-20 - Camerfirma reports the issue is fixed to StartCom. The > > issue > > > > > is apparently a Camerfirma issue, and with improper logging as well > > as > > > > > certificate configuration. > > > > > 2017-10-13 - StartCom provides incident report, as a Camerfirma > > reseller > > > > > Note: No response was provided by Camerfirma in this incident report. > > > > > > > > > We were not aware that an answer from us was needed. The incident > > report > > > > provided by StartCom was coordinated with us. > > > > > > > > > > Issue 6 - Out of date CP/CPSes > > > > > 2016-06 - Last published version of the CPS at > > > > > > > > > > > http://docs.camerfirma.com/publico/DocumentosWeb/politicas/CPS_V_3_2_7_EN.pdf > > > > > 2018-05 - Next proposed update of the CPS, as stated elsewhere on > > this > > > > > thread > > > > > > > > > We already have a new CPS version, next week we will publish it, and a > > new > > > > version when it was RFC 3647 compliant. > > > > > > > > > > > > > > I'm not sure whether to track issues with the new hierarchy, so I > > will > > > > > simply note the following: > > > > > 2017-08-23 - Last issued certificate with invalid dNSName ( > > > > > > > > > > > https://crt.sh/?caid=50473&opt=cablint,zlint,x509lint&minNotBefore=2011-01-01 > > > > > ) > > > > > 2017-12-13 - Last issued certificate that violates RFC 5280, > > 4.1.2.4's > > > > > requirements that "CAs conforming to this profile MUST use either the > > > > > PrintableString or UTF8String encoding of DirectoryString, with two > > > > > exceptions" ( > > > > https://crt.sh/?cablint=261&iCAID=50473&minNotBefore=2011-01-01 ) > > > > > > > > > there is an open bug > > https://bugzilla.mozilla.org/show_bug.cgi?id=1443857 > > > > where previous bug are treated. > > > > > > > > > > > > > > Notable is that Camerfirma includes the organizationIdentifier, > > > > > OID 2.5.4.97, in their certificates. This is documented in the CPS > > [5] > > > > from > > > > > the original message, within Section 3.1.1, with the validation > > process > > > > > described in 3.1.8.1. However, the CP/CPS lacks details as to the > > > > > construction and validation - it appears to be a construction of > > "VAT" > > > > > [member state] "-" [VAT number] > > > > > > > > > website certificates profile is defined in ETSI EN 319 412-4. This > > > > standard refers ETSI EN 319 412-1 where this OID is defined. VAT is as > > > > defined in CPS section 3.1.8.2.3 > > > > > > > > > > > > > > In this, we see a pattern of issues, with a strong reliance on > > trusting > > > > RAs > > > > > (which included entities such as StartCom, known to not be validating > > > > > correctly) and, when failure detected, on technical controls. We see > > a > > > > > pattern of delayed remediation, misunderstanding of expectations in > > the > > > > > face of misissuance, and misunderstandings of the requirements > > > > themselves. > > > > > If there is any one remark that perfectly captures this, it would be > > > > found > > > > > in https://bugzilla.mozilla.org/show_bug.cgi?id=1390977#c30 , > > provided > > > > on > > > > > 2017-12-21 (i.e. after many of these issues) > > > > > > > > > We rely on our RA network and we train them and audit them for assure a > > > > correct validation. As a result of > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1390977#c30 technical > > > > controls were deployed to avoid misissuance, misunderstandings and > > reduce > > > > this dependency on trusting RAs. > > > > > > > > > > > > > > "AC Camerfirma is a small CA that uses an in-house developed CA > > software > > > > > and is supported by our RA trusted operators and the continuous > > training > > > > > they receive. AC Camerfirma has been working with this technology and > > > > staff > > > > > for 17 years without problems and we have dedicated a big effort > > > > improving > > > > > it along those years. Due to the number of TLS certificates issued on > > > > > previous years, this working method was appropriate and suitable for > > us. > > > > > The increase of certificates issued, increasing technical > > requirements > > > > and > > > > > the analysis of these reported problems have helped us to realize the > > > > need > > > > > to extend the technical controls in the CA application to cover all > > > > > possible and new requirements and introduce a new person in charge of > > > > > coordinating these implementations." > > > > > > > > > > I think it's problematic to suggest "without problems", and > > concerning > > > > that > > > > > it required a "big effort" to improving. It equally remains > > > > > problematic/concerning that the in-house CA software has continued to > > > > show > > > > > issues. > > > > > > > > > When we said “without problems” means that our practices and tools (PKI > > > > platform included) has passed many audit successfully. Sure, we have to > > > > improve (this very process, and every control, audits, certifications > > helps > > > > us to improve it). Just to let the community know, this is the list of > > AC > > > > Camerfirma SA last audit process: > > > > ETSI 319 401 Audited by TÜV-IT (2017-2019) > > > > > > https://www.tuvit.de/fileadmin/Content/TUV_IT/zertifikate/de/9725UE_s.pdf > > > > ETSI 319 401 Audited by CSQA (2017-2019) > > > > > > http://docs.camerfirma.com/publico/DocumentosWeb/certificaciones/certificatocamerfirma2017.pdf > > > > ETSI 319 411-1 Audited by TÜV-IT (2017-2019) > > > > > > https://www.tuvit.de/fileadmin/Content/TUV_IT/zertifikate/de/9725UE_s.pdf > > > > ETSI 319 411-1 Audited by CSQA (2017-2019) > > > > > > http://docs.camerfirma.com/publico/DocumentosWeb/certificaciones/certificatocamerfirma2017.pdf > > > > ETSI 319 411-2 Audited by TÜV-IT (2017-2019) > > > > > > https://www.tuvit.de/fileadmin/Content/TUV_IT/zertifikate/de/9725UE_s.pdf > > > > ETSI 319 411-2 Audited by CSQA (2017-2019) > > > > > > http://docs.camerfirma.com/publico/DocumentosWeb/certificaciones/certificatocamerfirma2017.pdf > > > > ETSI 319 421 Audited by CSQA (2017-2019) > > > > > > http://docs.camerfirma.com/publico/DocumentosWeb/certificaciones/certificatocamerfirma2017.pdf > > > > WEBTRUST FOR CA Audited by AUREN (2017) > > > > https://cert.webtrust.org/SealFile?seal=2283&file=pdf > > > > WEBTRUST BR Audited by AUREN (2017-2018) > > > > https://cert.webtrust.org/SealFile?seal=2284&file=pdf > > > > WEBTRUST EV Audited by AUREN (2017-2018) > > > > https://cert.webtrust.org/SealFile?seal=2285&file=pdf > > > > ISO 27001 Audited by AENOR (2016-2019) > > > > > > http://docs.camerfirma.com/publico/DocumentosWeb/certificaciones/ISO_27001_AENOR.pdf > > > > ISO 20000 Audited by AENOR (2016-2019) > > > > > > http://docs.camerfirma.com/publico/DocumentosWeb/certificaciones/ISO_20000_AENOR.pdf > > > > . > > > > > > > > In spite of the issues arisen, hope that at least this could count on > > our > > > > favor when a decision about our root inclusion were taken. > > > > > > > > > Camerfirma states that it believes those issues remediated, in part, > > by > > > > > extending technical controls. Yet many of these failures also > > highlight > > > > > problems in the design of the system (and its reliance on RAs) and > > the > > > > > staff tasked with understanding and implementing compliance. > > > > > > > > > > In the midst of all of this overhaul at Camerfirma, the 2016 root was > > > > > created. The existing roots still show problems (such as their CP/CPS > > > > > issues), and it seems energy has been focused on the new root, > > despite it > > > > > operating for a considerable time on the legacy infrastructure and > > > > subject > > > > > to issues as recently as 3 months ago. > > > > > > > > > > If, despite the evidence, we are to believe that Camerfirma has > > > > remediated > > > > > the technical issues (via the technical controls deployed in February > > > > 2018) > > > > > and has remediated the policy issues (via the onboarding of new staff > > > > > tasked with ensuring compliance in December 2017), then it seems > > > > minimally > > > > > appropriate to suggest that a new, Camerfirma 2018 root be created > > and > > > > > established. Camerfirma's 2016 root can be used to cross-certify > > this, > > > > thus > > > > > supporting those users on Microsoft platforms for which 2016 is > > trusted, > > > > > while providing greater assurance that the issuance and trust is > > > > > appropriate. Such an inclusion should not occur until a key > > generation > > > > > ceremony report, a point in time audit, and a period of time audit > > report > > > > > have been provided for the new 2018 root, which would mean would not > > be > > > > > reconsidered for at least 3 months, at a minimum. This would also > > ensure > > > > > that Camerfirma has completed its remediation steps for its existing > > set > > > > of > > > > > hierarchy, such as updating the CP/CPS, demonstrating that the new > > > > controls > > > > > and personnel are equipped to maintain a globally trusted CA. > > > > > > > > > > Further, given Camerfirma's statements that their investment in > > > > compliance > > > > > is with regards to the 2016 root, and the issue the prior roots have > > had > > > > > (both from policy compliance and issuance), it seems that we should > > also > > > > > begin discussing at what point trust in those legacy roots should be > > > > > removed, up to and including disallowing new certificates from it if > > > > > existing certificates are to remain trusted, as new issuance will be > > > > > on/from the 2018 root (through the 2016 path, for Windows users) > > > > > > > > Creating a new root 2018 is unfeasible for us for the following > > reasons: > > > > •Root 2016 is already audited and incorporated into the European TSL > > based > > > > on the favorable evaluation of our national supervisor body for both > > the > > > > issuance of S/MIME, WEB and TSU certificates. > > > > •Root is already recognized by other comunities such as Microsoft and > > > > Adobe. > > > > •Root 2016 is already accredited in the Spanish public administration & > > > > Public Services. > > > > •And above all, because the problems found so far have not > > incorporated a > > > > significant risk to the user community and they have been solved by > > > > incorporating technical controls and specific resources that currently > > > > allow us to commit with the ecosystem requirements. > > > > > > > > > The path I provided ensures every one of those things continues to work. > > > > > > Can you please elaborate more as to why it is unfeasible? > > > > > > > > > > > Hi Ryan > > > > Sure, this could work for browsers validation, but our concern is about > > Web Certificates for Spanish Public administration. > > Spanish Public Administration is AC Camerfirma main customer. > > Additionally, Roots should be accepted by public administration validation > > services. > > > And cross-signing covers this. > > > > > > So, if we provide a new root 2018, first of all, we should pass a new > > eIDAS conformity assessment for the new roots and then send it to > > administration validation services to be accepted by each particular public > > service. > > > This is not correct. Cross-signing the 2018 Root with the 2016 root allows > all services that support your 2016 root to continue to work without > disruption. From the point of view of clients, you’ve just added another > intermediate certificate. > > > > We have been working for month to be our root 2016 recognized by Spanish > > public services. We hope this could be improved in a future but nowadays is > > so complicated. > > > Yes, but the cross-signing of the 2018 root with the 2016 root will ensure > all the work you have done for 2016 is applied. > > > > > > We have been waiting for Mozilla 2016 root inclusion for many years, and > > we have to going back to the starting point ? > > Root 2016 are not having problems, we have issue only a few SSL > > certificates. It has nothing to do with StartCom, Have technical controls > > to avoid related problems found with RA validation and other, have no CPS > > problems.... I don't know how creating a new root 2018 can improve our > > trust for the community, in contrast, it will produce an economic damage > > and time consuming tasks for Camerfirma. > > > > I’m afraid this statement is not correct, and it’s based on an unfortunate > understanding about what is being proposed - and how PKI works. > > None of what you’ve described is required by what I have proposed here. > > > > Regards > > Ramiro > > _______________________________________________ > > dev-security-policy mailing list > > [email protected] > > https://lists.mozilla.org/listinfo/dev-security-policy > >
On Friday, March 23, 2018 at 4:20:51 PM UTC+1, Ryan Sleevi wrote: > On Fri, Mar 23, 2018 at 1:12 PM ramirommunoz--- via dev-security-policy < > [email protected]> wrote: > > > On Thursday, March 22, 2018 at 10:43:49 PM UTC+1, Ryan Sleevi wrote: > > > On Thu, Mar 22, 2018 at 6:26 PM ramirommunoz--- via dev-security-policy < > > > [email protected]> wrote: > > > > > > > Hi Ryan > > > > Many thanks for your report. I will try to answer to your concerns > > about > > > > our root inclusión. > > > > > > > > > In attempt to discuss continued trust, I have attempted to summarize > > the > > > > > patterns and issues of note, along with the timeline from reporting > > to > > > > > remediation. It is my goal that this will allow the public to make an > > > > > objective assessment of the risks introduced by Camerfirma, as well > > as > > > > the > > > > > responsiveness towards remediation. While the ecosystem continues to > > > > > improve both its understanding of the requirements and expectations, > > we > > > > > must nevertheless consider the full picture. > > > > > > > > > > Issue 1: Invalid dNSNames/CNs ( > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1390977 ) > > > > > 2014-09-25 - https://crt.sh/?id=5129200&opt=cablint issued > > > > > 2017-08-12 - Jonathan Rudenberg posts to m.d.s.p > > > > > 2017-08-13 - Jonathan Rudenberg contacts the CA > > > > > 2017-08-16 - Kathleen Wilson opens a Bugzilla incident > > > > > 2017-08-17 - Camerfirma Responds > > > > > 2017-09 - Scheduled remediation > > > > > 2017-12 - First attempted remediation > > > > > 2018-02-14 - Actual remediation, as per > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1390977#c33 > > > > > > > > > > Issue 2: Unrevoked Internal Servernames ( > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1390977 ) > > > > > 2016-10-01 - Deadline for revoking internal server name certificates > > > > > 2017-08-24 - Camerfirma shares list of misissued certificates > > affected by > > > > > Issue 1, along with their response > > > > > 2017-08-24 - Ryan Sleevi highlights that Camerfirma failed to > > identify > > > > and > > > > > revoke internal server name certificates - > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1390977#c13 > > > > > 2017-09-12 - Camerfirma revokes https://crt.sh/?id=8680123&opt=ocsp > > > > > 2017-11-28 - Gerv Markham highlights that Camerfirma has still not > > > > > responded to outstanding questions - > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1390977#c21 > > > > > 2017-12-21 - Camerfirma responds to the substance of the questions > > > > > > > > > > Issue 3 - Improperly Configured OCSP - > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1426233 > > > > > 2017-12-12 - Rob Stradling reports on CA's improperly configured OCSP > > > > > configurations at > > > > > > > > > > > https://groups.google.com/forum/#!topic/mozilla.dev.security.policy/C2vTpvouP3g > > > > > 2017-12-19 - Wayne Thayer opens a bug regarding OCSP non-conformance > > by > > > > > Camerfirma > > > > > 2017-12-22 - Camerfirma confirms the issue is resolved. It took one > > of > > > > > their sub-CAs from 12-12 to 12-19, and another from 12-12 to 12-22, > > to > > > > > implement these changes. Camerfirma did not self-report this > > > > > non-compliance, despite acknowledging it on 12-12. > > > > > 2018-01-03 - Camerfirma completes a minimal incident report with all > > > > > required information. > > > > > > > > > > Issue 4 - Improper CAA checking ( > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1420871 ) > > > > > 2017-09-08 - Baseline Requirements require checking CAA > > > > > 2017-11-27 - Quirin Scheitle reports CAA checking non-compliance by > > > > > Camerfirma > > > > > 2017-11-29 - Camerfirma confirms misissuance, believing it was valid > > > > > because they found "and for which CAA was checked" to be confusing > > and > > > > > indicating that CAA checking was optional. > > > > > 2017-11-29 - Camerfirma claims CAA checking is activated on all RAs > > > > > > > > > > > > > All previous bugs as you said are closed successfully. > > > > > > > > > > > > > > Issue 5 - Duplicate dNSNames and invalid > > > > localityName/stateOrProvinceName ( > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1357067 ) > > > > > 2017-04-17 - Issue reported > > > > > 2017-04-20 - Camerfirma reports the issue is fixed to StartCom. The > > issue > > > > > is apparently a Camerfirma issue, and with improper logging as well > > as > > > > > certificate configuration. > > > > > 2017-10-13 - StartCom provides incident report, as a Camerfirma > > reseller > > > > > Note: No response was provided by Camerfirma in this incident report. > > > > > > > > > We were not aware that an answer from us was needed. The incident > > report > > > > provided by StartCom was coordinated with us. > > > > > > > > > > Issue 6 - Out of date CP/CPSes > > > > > 2016-06 - Last published version of the CPS at > > > > > > > > > > > http://docs.camerfirma.com/publico/DocumentosWeb/politicas/CPS_V_3_2_7_EN.pdf > > > > > 2018-05 - Next proposed update of the CPS, as stated elsewhere on > > this > > > > > thread > > > > > > > > > We already have a new CPS version, next week we will publish it, and a > > new > > > > version when it was RFC 3647 compliant. > > > > > > > > > > > > > > I'm not sure whether to track issues with the new hierarchy, so I > > will > > > > > simply note the following: > > > > > 2017-08-23 - Last issued certificate with invalid dNSName ( > > > > > > > > > > > https://crt.sh/?caid=50473&opt=cablint,zlint,x509lint&minNotBefore=2011-01-01 > > > > > ) > > > > > 2017-12-13 - Last issued certificate that violates RFC 5280, > > 4.1.2.4's > > > > > requirements that "CAs conforming to this profile MUST use either the > > > > > PrintableString or UTF8String encoding of DirectoryString, with two > > > > > exceptions" ( > > > > https://crt.sh/?cablint=261&iCAID=50473&minNotBefore=2011-01-01 ) > > > > > > > > > there is an open bug > > https://bugzilla.mozilla.org/show_bug.cgi?id=1443857 > > > > where previous bug are treated. > > > > > > > > > > > > > > Notable is that Camerfirma includes the organizationIdentifier, > > > > > OID 2.5.4.97, in their certificates. This is documented in the CPS > > [5] > > > > from > > > > > the original message, within Section 3.1.1, with the validation > > process > > > > > described in 3.1.8.1. However, the CP/CPS lacks details as to the > > > > > construction and validation - it appears to be a construction of > > "VAT" > > > > > [member state] "-" [VAT number] > > > > > > > > > website certificates profile is defined in ETSI EN 319 412-4. This > > > > standard refers ETSI EN 319 412-1 where this OID is defined. VAT is as > > > > defined in CPS section 3.1.8.2.3 > > > > > > > > > > > > > > In this, we see a pattern of issues, with a strong reliance on > > trusting > > > > RAs > > > > > (which included entities such as StartCom, known to not be validating > > > > > correctly) and, when failure detected, on technical controls. We see > > a > > > > > pattern of delayed remediation, misunderstanding of expectations in > > the > > > > > face of misissuance, and misunderstandings of the requirements > > > > themselves. > > > > > If there is any one remark that perfectly captures this, it would be > > > > found > > > > > in https://bugzilla.mozilla.org/show_bug.cgi?id=1390977#c30 , > > provided > > > > on > > > > > 2017-12-21 (i.e. after many of these issues) > > > > > > > > > We rely on our RA network and we train them and audit them for assure a > > > > correct validation. As a result of > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1390977#c30 technical > > > > controls were deployed to avoid misissuance, misunderstandings and > > reduce > > > > this dependency on trusting RAs. > > > > > > > > > > > > > > "AC Camerfirma is a small CA that uses an in-house developed CA > > software > > > > > and is supported by our RA trusted operators and the continuous > > training > > > > > they receive. AC Camerfirma has been working with this technology and > > > > staff > > > > > for 17 years without problems and we have dedicated a big effort > > > > improving > > > > > it along those years. Due to the number of TLS certificates issued on > > > > > previous years, this working method was appropriate and suitable for > > us. > > > > > The increase of certificates issued, increasing technical > > requirements > > > > and > > > > > the analysis of these reported problems have helped us to realize the > > > > need > > > > > to extend the technical controls in the CA application to cover all > > > > > possible and new requirements and introduce a new person in charge of > > > > > coordinating these implementations." > > > > > > > > > > I think it's problematic to suggest "without problems", and > > concerning > > > > that > > > > > it required a "big effort" to improving. It equally remains > > > > > problematic/concerning that the in-house CA software has continued to > > > > show > > > > > issues. > > > > > > > > > When we said “without problems” means that our practices and tools (PKI > > > > platform included) has passed many audit successfully. Sure, we have to > > > > improve (this very process, and every control, audits, certifications > > helps > > > > us to improve it). Just to let the community know, this is the list of > > AC > > > > Camerfirma SA last audit process: > > > > ETSI 319 401 Audited by TÜV-IT (2017-2019) > > > > > > https://www.tuvit.de/fileadmin/Content/TUV_IT/zertifikate/de/9725UE_s.pdf > > > > ETSI 319 401 Audited by CSQA (2017-2019) > > > > > > http://docs.camerfirma.com/publico/DocumentosWeb/certificaciones/certificatocamerfirma2017.pdf > > > > ETSI 319 411-1 Audited by TÜV-IT (2017-2019) > > > > > > https://www.tuvit.de/fileadmin/Content/TUV_IT/zertifikate/de/9725UE_s.pdf > > > > ETSI 319 411-1 Audited by CSQA (2017-2019) > > > > > > http://docs.camerfirma.com/publico/DocumentosWeb/certificaciones/certificatocamerfirma2017.pdf > > > > ETSI 319 411-2 Audited by TÜV-IT (2017-2019) > > > > > > https://www.tuvit.de/fileadmin/Content/TUV_IT/zertifikate/de/9725UE_s.pdf > > > > ETSI 319 411-2 Audited by CSQA (2017-2019) > > > > > > http://docs.camerfirma.com/publico/DocumentosWeb/certificaciones/certificatocamerfirma2017.pdf > > > > ETSI 319 421 Audited by CSQA (2017-2019) > > > > > > http://docs.camerfirma.com/publico/DocumentosWeb/certificaciones/certificatocamerfirma2017.pdf > > > > WEBTRUST FOR CA Audited by AUREN (2017) > > > > https://cert.webtrust.org/SealFile?seal=2283&file=pdf > > > > WEBTRUST BR Audited by AUREN (2017-2018) > > > > https://cert.webtrust.org/SealFile?seal=2284&file=pdf > > > > WEBTRUST EV Audited by AUREN (2017-2018) > > > > https://cert.webtrust.org/SealFile?seal=2285&file=pdf > > > > ISO 27001 Audited by AENOR (2016-2019) > > > > > > http://docs.camerfirma.com/publico/DocumentosWeb/certificaciones/ISO_27001_AENOR.pdf > > > > ISO 20000 Audited by AENOR (2016-2019) > > > > > > http://docs.camerfirma.com/publico/DocumentosWeb/certificaciones/ISO_20000_AENOR.pdf > > > > . > > > > > > > > In spite of the issues arisen, hope that at least this could count on > > our > > > > favor when a decision about our root inclusion were taken. > > > > > > > > > Camerfirma states that it believes those issues remediated, in part, > > by > > > > > extending technical controls. Yet many of these failures also > > highlight > > > > > problems in the design of the system (and its reliance on RAs) and > > the > > > > > staff tasked with understanding and implementing compliance. > > > > > > > > > > In the midst of all of this overhaul at Camerfirma, the 2016 root was > > > > > created. The existing roots still show problems (such as their CP/CPS > > > > > issues), and it seems energy has been focused on the new root, > > despite it > > > > > operating for a considerable time on the legacy infrastructure and > > > > subject > > > > > to issues as recently as 3 months ago. > > > > > > > > > > If, despite the evidence, we are to believe that Camerfirma has > > > > remediated > > > > > the technical issues (via the technical controls deployed in February > > > > 2018) > > > > > and has remediated the policy issues (via the onboarding of new staff > > > > > tasked with ensuring compliance in December 2017), then it seems > > > > minimally > > > > > appropriate to suggest that a new, Camerfirma 2018 root be created > > and > > > > > established. Camerfirma's 2016 root can be used to cross-certify > > this, > > > > thus > > > > > supporting those users on Microsoft platforms for which 2016 is > > trusted, > > > > > while providing greater assurance that the issuance and trust is > > > > > appropriate. Such an inclusion should not occur until a key > > generation > > > > > ceremony report, a point in time audit, and a period of time audit > > report > > > > > have been provided for the new 2018 root, which would mean would not > > be > > > > > reconsidered for at least 3 months, at a minimum. This would also > > ensure > > > > > that Camerfirma has completed its remediation steps for its existing > > set > > > > of > > > > > hierarchy, such as updating the CP/CPS, demonstrating that the new > > > > controls > > > > > and personnel are equipped to maintain a globally trusted CA. > > > > > > > > > > Further, given Camerfirma's statements that their investment in > > > > compliance > > > > > is with regards to the 2016 root, and the issue the prior roots have > > had > > > > > (both from policy compliance and issuance), it seems that we should > > also > > > > > begin discussing at what point trust in those legacy roots should be > > > > > removed, up to and including disallowing new certificates from it if > > > > > existing certificates are to remain trusted, as new issuance will be > > > > > on/from the 2018 root (through the 2016 path, for Windows users) > > > > > > > > Creating a new root 2018 is unfeasible for us for the following > > reasons: > > > > •Root 2016 is already audited and incorporated into the European TSL > > based > > > > on the favorable evaluation of our national supervisor body for both > > the > > > > issuance of S/MIME, WEB and TSU certificates. > > > > •Root is already recognized by other comunities such as Microsoft and > > > > Adobe. > > > > •Root 2016 is already accredited in the Spanish public administration & > > > > Public Services. > > > > •And above all, because the problems found so far have not > > incorporated a > > > > significant risk to the user community and they have been solved by > > > > incorporating technical controls and specific resources that currently > > > > allow us to commit with the ecosystem requirements. > > > > > > > > > The path I provided ensures every one of those things continues to work. > > > > > > Can you please elaborate more as to why it is unfeasible? > > > > > > > > > > > Hi Ryan > > > > Sure, this could work for browsers validation, but our concern is about > > Web Certificates for Spanish Public administration. > > Spanish Public Administration is AC Camerfirma main customer. > > Additionally, Roots should be accepted by public administration validation > > services. > > > And cross-signing covers this. > > > > > > So, if we provide a new root 2018, first of all, we should pass a new > > eIDAS conformity assessment for the new roots and then send it to > > administration validation services to be accepted by each particular public > > service. > > > This is not correct. Cross-signing the 2018 Root with the 2016 root allows > all services that support your 2016 root to continue to work without > disruption. From the point of view of clients, you’ve just added another > intermediate certificate. > > > > We have been working for month to be our root 2016 recognized by Spanish > > public services. We hope this could be improved in a future but nowadays is > > so complicated. > > > Yes, but the cross-signing of the 2018 root with the 2016 root will ensure > all the work you have done for 2016 is applied. > > > > > > We have been waiting for Mozilla 2016 root inclusion for many years, and > > we have to going back to the starting point ? > > Root 2016 are not having problems, we have issue only a few SSL > > certificates. It has nothing to do with StartCom, Have technical controls > > to avoid related problems found with RA validation and other, have no CPS > > problems.... I don't know how creating a new root 2018 can improve our > > trust for the community, in contrast, it will produce an economic damage > > and time consuming tasks for Camerfirma. > > > > I’m afraid this statement is not correct, and it’s based on an unfortunate > understanding about what is being proposed - and how PKI works. > > None of what you’ve described is required by what I have proposed here. > > > > Regards > > Ramiro > > _______________________________________________ > > dev-security-policy mailing list > > [email protected] > > https://lists.mozilla.org/listinfo/dev-security-policy > > On Friday, March 23, 2018 at 4:20:51 PM UTC+1, Ryan Sleevi wrote: > On Fri, Mar 23, 2018 at 1:12 PM ramirommunoz--- via dev-security-policy < > [email protected]> wrote: > > > On Thursday, March 22, 2018 at 10:43:49 PM UTC+1, Ryan Sleevi wrote: > > > On Thu, Mar 22, 2018 at 6:26 PM ramirommunoz--- via dev-security-policy < > > > [email protected]> wrote: > > > > > > > Hi Ryan > > > > Many thanks for your report. I will try to answer to your concerns > > about > > > > our root inclusión. > > > > > > > > > In attempt to discuss continued trust, I have attempted to summarize > > the > > > > > patterns and issues of note, along with the timeline from reporting > > to > > > > > remediation. It is my goal that this will allow the public to make an > > > > > objective assessment of the risks introduced by Camerfirma, as well > > as > > > > the > > > > > responsiveness towards remediation. While the ecosystem continues to > > > > > improve both its understanding of the requirements and expectations, > > we > > > > > must nevertheless consider the full picture. > > > > > > > > > > Issue 1: Invalid dNSNames/CNs ( > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1390977 ) > > > > > 2014-09-25 - https://crt.sh/?id=5129200&opt=cablint issued > > > > > 2017-08-12 - Jonathan Rudenberg posts to m.d.s.p > > > > > 2017-08-13 - Jonathan Rudenberg contacts the CA > > > > > 2017-08-16 - Kathleen Wilson opens a Bugzilla incident > > > > > 2017-08-17 - Camerfirma Responds > > > > > 2017-09 - Scheduled remediation > > > > > 2017-12 - First attempted remediation > > > > > 2018-02-14 - Actual remediation, as per > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1390977#c33 > > > > > > > > > > Issue 2: Unrevoked Internal Servernames ( > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1390977 ) > > > > > 2016-10-01 - Deadline for revoking internal server name certificates > > > > > 2017-08-24 - Camerfirma shares list of misissued certificates > > affected by > > > > > Issue 1, along with their response > > > > > 2017-08-24 - Ryan Sleevi highlights that Camerfirma failed to > > identify > > > > and > > > > > revoke internal server name certificates - > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1390977#c13 > > > > > 2017-09-12 - Camerfirma revokes https://crt.sh/?id=8680123&opt=ocsp > > > > > 2017-11-28 - Gerv Markham highlights that Camerfirma has still not > > > > > responded to outstanding questions - > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1390977#c21 > > > > > 2017-12-21 - Camerfirma responds to the substance of the questions > > > > > > > > > > Issue 3 - Improperly Configured OCSP - > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1426233 > > > > > 2017-12-12 - Rob Stradling reports on CA's improperly configured OCSP > > > > > configurations at > > > > > > > > > > > https://groups.google.com/forum/#!topic/mozilla.dev.security.policy/C2vTpvouP3g > > > > > 2017-12-19 - Wayne Thayer opens a bug regarding OCSP non-conformance > > by > > > > > Camerfirma > > > > > 2017-12-22 - Camerfirma confirms the issue is resolved. It took one > > of > > > > > their sub-CAs from 12-12 to 12-19, and another from 12-12 to 12-22, > > to > > > > > implement these changes. Camerfirma did not self-report this > > > > > non-compliance, despite acknowledging it on 12-12. > > > > > 2018-01-03 - Camerfirma completes a minimal incident report with all > > > > > required information. > > > > > > > > > > Issue 4 - Improper CAA checking ( > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1420871 ) > > > > > 2017-09-08 - Baseline Requirements require checking CAA > > > > > 2017-11-27 - Quirin Scheitle reports CAA checking non-compliance by > > > > > Camerfirma > > > > > 2017-11-29 - Camerfirma confirms misissuance, believing it was valid > > > > > because they found "and for which CAA was checked" to be confusing > > and > > > > > indicating that CAA checking was optional. > > > > > 2017-11-29 - Camerfirma claims CAA checking is activated on all RAs > > > > > > > > > > > > > All previous bugs as you said are closed successfully. > > > > > > > > > > > > > > Issue 5 - Duplicate dNSNames and invalid > > > > localityName/stateOrProvinceName ( > > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1357067 ) > > > > > 2017-04-17 - Issue reported > > > > > 2017-04-20 - Camerfirma reports the issue is fixed to StartCom. The > > issue > > > > > is apparently a Camerfirma issue, and with improper logging as well > > as > > > > > certificate configuration. > > > > > 2017-10-13 - StartCom provides incident report, as a Camerfirma > > reseller > > > > > Note: No response was provided by Camerfirma in this incident report. > > > > > > > > > We were not aware that an answer from us was needed. The incident > > report > > > > provided by StartCom was coordinated with us. > > > > > > > > > > Issue 6 - Out of date CP/CPSes > > > > > 2016-06 - Last published version of the CPS at > > > > > > > > > > > http://docs.camerfirma.com/publico/DocumentosWeb/politicas/CPS_V_3_2_7_EN.pdf > > > > > 2018-05 - Next proposed update of the CPS, as stated elsewhere on > > this > > > > > thread > > > > > > > > > We already have a new CPS version, next week we will publish it, and a > > new > > > > version when it was RFC 3647 compliant. > > > > > > > > > > > > > > I'm not sure whether to track issues with the new hierarchy, so I > > will > > > > > simply note the following: > > > > > 2017-08-23 - Last issued certificate with invalid dNSName ( > > > > > > > > > > > https://crt.sh/?caid=50473&opt=cablint,zlint,x509lint&minNotBefore=2011-01-01 > > > > > ) > > > > > 2017-12-13 - Last issued certificate that violates RFC 5280, > > 4.1.2.4's > > > > > requirements that "CAs conforming to this profile MUST use either the > > > > > PrintableString or UTF8String encoding of DirectoryString, with two > > > > > exceptions" ( > > > > https://crt.sh/?cablint=261&iCAID=50473&minNotBefore=2011-01-01 ) > > > > > > > > > there is an open bug > > https://bugzilla.mozilla.org/show_bug.cgi?id=1443857 > > > > where previous bug are treated. > > > > > > > > > > > > > > Notable is that Camerfirma includes the organizationIdentifier, > > > > > OID 2.5.4.97, in their certificates. This is documented in the CPS > > [5] > > > > from > > > > > the original message, within Section 3.1.1, with the validation > > process > > > > > described in 3.1.8.1. However, the CP/CPS lacks details as to the > > > > > construction and validation - it appears to be a construction of > > "VAT" > > > > > [member state] "-" [VAT number] > > > > > > > > > website certificates profile is defined in ETSI EN 319 412-4. This > > > > standard refers ETSI EN 319 412-1 where this OID is defined. VAT is as > > > > defined in CPS section 3.1.8.2.3 > > > > > > > > > > > > > > In this, we see a pattern of issues, with a strong reliance on > > trusting > > > > RAs > > > > > (which included entities such as StartCom, known to not be validating > > > > > correctly) and, when failure detected, on technical controls. We see > > a > > > > > pattern of delayed remediation, misunderstanding of expectations in > > the > > > > > face of misissuance, and misunderstandings of the requirements > > > > themselves. > > > > > If there is any one remark that perfectly captures this, it would be > > > > found > > > > > in https://bugzilla.mozilla.org/show_bug.cgi?id=1390977#c30 , > > provided > > > > on > > > > > 2017-12-21 (i.e. after many of these issues) > > > > > > > > > We rely on our RA network and we train them and audit them for assure a > > > > correct validation. As a result of > > > > https://bugzilla.mozilla.org/show_bug.cgi?id=1390977#c30 technical > > > > controls were deployed to avoid misissuance, misunderstandings and > > reduce > > > > this dependency on trusting RAs. > > > > > > > > > > > > > > "AC Camerfirma is a small CA that uses an in-house developed CA > > software > > > > > and is supported by our RA trusted operators and the continuous > > training > > > > > they receive. AC Camerfirma has been working with this technology and > > > > staff > > > > > for 17 years without problems and we have dedicated a big effort > > > > improving > > > > > it along those years. Due to the number of TLS certificates issued on > > > > > previous years, this working method was appropriate and suitable for > > us. > > > > > The increase of certificates issued, increasing technical > > requirements > > > > and > > > > > the analysis of these reported problems have helped us to realize the > > > > need > > > > > to extend the technical controls in the CA application to cover all > > > > > possible and new requirements and introduce a new person in charge of > > > > > coordinating these implementations." > > > > > > > > > > I think it's problematic to suggest "without problems", and > > concerning > > > > that > > > > > it required a "big effort" to improving. It equally remains > > > > > problematic/concerning that the in-house CA software has continued to > > > > show > > > > > issues. > > > > > > > > > When we said “without problems” means that our practices and tools (PKI > > > > platform included) has passed many audit successfully. Sure, we have to > > > > improve (this very process, and every control, audits, certifications > > helps > > > > us to improve it). Just to let the community know, this is the list of > > AC > > > > Camerfirma SA last audit process: > > > > ETSI 319 401 Audited by TÜV-IT (2017-2019) > > > > > > https://www.tuvit.de/fileadmin/Content/TUV_IT/zertifikate/de/9725UE_s.pdf > > > > ETSI 319 401 Audited by CSQA (2017-2019) > > > > > > http://docs.camerfirma.com/publico/DocumentosWeb/certificaciones/certificatocamerfirma2017.pdf > > > > ETSI 319 411-1 Audited by TÜV-IT (2017-2019) > > > > > > https://www.tuvit.de/fileadmin/Content/TUV_IT/zertifikate/de/9725UE_s.pdf > > > > ETSI 319 411-1 Audited by CSQA (2017-2019) > > > > > > http://docs.camerfirma.com/publico/DocumentosWeb/certificaciones/certificatocamerfirma2017.pdf > > > > ETSI 319 411-2 Audited by TÜV-IT (2017-2019) > > > > > > https://www.tuvit.de/fileadmin/Content/TUV_IT/zertifikate/de/9725UE_s.pdf > > > > ETSI 319 411-2 Audited by CSQA (2017-2019) > > > > > > http://docs.camerfirma.com/publico/DocumentosWeb/certificaciones/certificatocamerfirma2017.pdf > > > > ETSI 319 421 Audited by CSQA (2017-2019) > > > > > > http://docs.camerfirma.com/publico/DocumentosWeb/certificaciones/certificatocamerfirma2017.pdf > > > > WEBTRUST FOR CA Audited by AUREN (2017) > > > > https://cert.webtrust.org/SealFile?seal=2283&file=pdf > > > > WEBTRUST BR Audited by AUREN (2017-2018) > > > > https://cert.webtrust.org/SealFile?seal=2284&file=pdf > > > > WEBTRUST EV Audited by AUREN (2017-2018) > > > > https://cert.webtrust.org/SealFile?seal=2285&file=pdf > > > > ISO 27001 Audited by AENOR (2016-2019) > > > > > > http://docs.camerfirma.com/publico/DocumentosWeb/certificaciones/ISO_27001_AENOR.pdf > > > > ISO 20000 Audited by AENOR (2016-2019) > > > > > > http://docs.camerfirma.com/publico/DocumentosWeb/certificaciones/ISO_20000_AENOR.pdf > > > > . > > > > > > > > In spite of the issues arisen, hope that at least this could count on > > our > > > > favor when a decision about our root inclusion were taken. > > > > > > > > > Camerfirma states that it believes those issues remediated, in part, > > by > > > > > extending technical controls. Yet many of these failures also > > highlight > > > > > problems in the design of the system (and its reliance on RAs) and > > the > > > > > staff tasked with understanding and implementing compliance. > > > > > > > > > > In the midst of all of this overhaul at Camerfirma, the 2016 root was > > > > > created. The existing roots still show problems (such as their CP/CPS > > > > > issues), and it seems energy has been focused on the new root, > > despite it > > > > > operating for a considerable time on the legacy infrastructure and > > > > subject > > > > > to issues as recently as 3 months ago. > > > > > > > > > > If, despite the evidence, we are to believe that Camerfirma has > > > > remediated > > > > > the technical issues (via the technical controls deployed in February > > > > 2018) > > > > > and has remediated the policy issues (via the onboarding of new staff > > > > > tasked with ensuring compliance in December 2017), then it seems > > > > minimally > > > > > appropriate to suggest that a new, Camerfirma 2018 root be created > > and > > > > > established. Camerfirma's 2016 root can be used to cross-certify > > this, > > > > thus > > > > > supporting those users on Microsoft platforms for which 2016 is > > trusted, > > > > > while providing greater assurance that the issuance and trust is > > > > > appropriate. Such an inclusion should not occur until a key > > generation > > > > > ceremony report, a point in time audit, and a period of time audit > > report > > > > > have been provided for the new 2018 root, which would mean would not > > be > > > > > reconsidered for at least 3 months, at a minimum. This would also > > ensure > > > > > that Camerfirma has completed its remediation steps for its existing > > set > > > > of > > > > > hierarchy, such as updating the CP/CPS, demonstrating that the new > > > > controls > > > > > and personnel are equipped to maintain a globally trusted CA. > > > > > > > > > > Further, given Camerfirma's statements that their investment in > > > > compliance > > > > > is with regards to the 2016 root, and the issue the prior roots have > > had > > > > > (both from policy compliance and issuance), it seems that we should > > also > > > > > begin discussing at what point trust in those legacy roots should be > > > > > removed, up to and including disallowing new certificates from it if > > > > > existing certificates are to remain trusted, as new issuance will be > > > > > on/from the 2018 root (through the 2016 path, for Windows users) > > > > > > > > Creating a new root 2018 is unfeasible for us for the following > > reasons: > > > > •Root 2016 is already audited and incorporated into the European TSL > > based > > > > on the favorable evaluation of our national supervisor body for both > > the > > > > issuance of S/MIME, WEB and TSU certificates. > > > > •Root is already recognized by other comunities such as Microsoft and > > > > Adobe. > > > > •Root 2016 is already accredited in the Spanish public administration & > > > > Public Services. > > > > •And above all, because the problems found so far have not > > incorporated a > > > > significant risk to the user community and they have been solved by > > > > incorporating technical controls and specific resources that currently > > > > allow us to commit with the ecosystem requirements. > > > > > > > > > The path I provided ensures every one of those things continues to work. > > > > > > Can you please elaborate more as to why it is unfeasible? > > > > > > > > > > > Hi Ryan > > > > Sure, this could work for browsers validation, but our concern is about > > Web Certificates for Spanish Public administration. > > Spanish Public Administration is AC Camerfirma main customer. > > Additionally, Roots should be accepted by public administration validation > > services. > > > And cross-signing covers this. > > > > > > So, if we provide a new root 2018, first of all, we should pass a new > > eIDAS conformity assessment for the new roots and then send it to > > administration validation services to be accepted by each particular public > > service. > > > This is not correct. Cross-signing the 2018 Root with the 2016 root allows > all services that support your 2016 root to continue to work without > disruption. From the point of view of clients, you’ve just added another > intermediate certificate. > > > > We have been working for month to be our root 2016 recognized by Spanish > > public services. We hope this could be improved in a future but nowadays is > > so complicated. > > > Yes, but the cross-signing of the 2018 root with the 2016 root will ensure > all the work you have done for 2016 is applied. > > > > > > We have been waiting for Mozilla 2016 root inclusion for many years, and > > we have to going back to the starting point ? > > Root 2016 are not having problems, we have issue only a few SSL > > certificates. It has nothing to do with StartCom, Have technical controls > > to avoid related problems found with RA validation and other, have no CPS > > problems.... I don't know how creating a new root 2018 can improve our > > trust for the community, in contrast, it will produce an economic damage > > and time consuming tasks for Camerfirma. > > > > I’m afraid this statement is not correct, and it’s based on an unfortunate > understanding about what is being proposed - and how PKI works. > > None of what you’ve described is required by what I have proposed here. > > > > Regards > > Ramiro > > _______________________________________________ > > dev-security-policy mailing list > > [email protected] > > https://lists.mozilla.org/listinfo/dev-security-policy > > Hi Ryan Thanks again for your remarks. In the end I am going to learn something of PKI :-). Surely I do not get a full understanding of you solution, but public administration is requiring a EU qualified Web certificate this means that should be included in the EUTL. I do know other solution for a new root but a new conformity assessment. Nevertheless, let me insist. In which aspects a new root 2018 improve our trustworthiness instead of the current root 2016? Best Regards Ramiro _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

