On Mon, Apr 2, 2018 at 11:02 AM, Julian Inza via dev-security-policy <
[email protected]> wrote:

> El lunes, 2 de abril de 2018, 3:53:08 (UTC+2), Tom Prince  escribió:
> > On Sunday, April 1, 2018 at 4:16:47 AM UTC-6, [email protected] wrote:
> > > I fully understand the proposed solution about 2018 roots but as I
> previously said some concerns arise, [...]
> >
> >
> > That is unfortunate for Camerfirma, but it is not Mozilla or this lists
> issue. While people have provided some suggestions on how you can create a
> root that *might* be acceptable, I don't think any of the participants care
> if Camerfirma has a root accepted; given the issues previously identified
> and the responses to those issues, I think a number of participants would
> be just as happy if Camerfirma doesn't get accepted.
> >
> > >
> > > [...] A complete revocation of any SSL certificate issued by 2016 root
> [...]
> >
> > There are at least a couple of problems with this
> > 1. Revocation, while a useful tool to have, there are a number of issues
> surrounding it, including distribution of those revocations. Given that the
> root isn't currently trusted it doesn't make sense for Mozilla to start
> trusting it but also need to ship a bunch of revocations for mis-issued
> certificates from it.
> > 2. Given the issues that have already occured with this root, there is
> going to be questions of whether all the certificates that it has issued
> are properly recorded, so that they can now be revoked. That is, given the
> existing issues, how can Mozilla be confident that all the certificates
> will be revoked. This is not a question of willingness, but rather
> capability to identify and revoke all the certificates signed by this root.
> >
> > -- Tom
>
> I think the Camerfirma proposed solution is as acceptable as a new root
> with cross certification.
>
> At the end, you trust on that specific CA either directly or through the
> cross certification mechanism.
>
> Cross certification generates several problems for environments not based
> in browsers.
>

Such as?


>
> EU TSL (Trusted Service Status List) has been already been issued (this
> means the approval of a Supervisory Body). See also
> http://tlbrowser.tsl.website/tools/


I fail to see the issue here. Does the EU TSL prevent the issuance of
intermediates? If not, then this is an entirely irrelevant point.


> Confomity Assessment Bodies audits have been carried out.
>
> Shorter hierarchies are better maintained and generate less problems.
>

I see nothing to support the claim that shorter hierarchies are better
maintained or generate less problems. The entire hierarchy is relevant to
trust, and if there is a question about a part of the hierarchy (for
example, the 2016 root), then it's necessary to excise those parts that are
problematic, to ensure a reliable starting point.


> At the end we are dealing about how security and operational meassures are
> taken by a CA and how to demonstrate them to those with the power to
> withdraw the CA from a Trusted List.
>
> These past years european legislation regarding qualified trust services
> has evolved to define the European Regulation UE 910/2014 (also known as
> EIDAS). With that unbrella, several technical standards have been
> published, among them EN 319 412 and EN 319 411. Those standards include
> requirements from "CAB Forum Baseline Requirements Documents" and "Extended
> Validation SSL Certificate Guidelines". Withs those standards, Conformity
> Assessment Bodies (CABs) audit certification authorities. CABs also are
> audited by National Accreditation Bodies and their Assessment Reports are
> analyzed by National Supervisory Bodies, which in turn can request
> additional inofmation before approving the qualified status and including
> the CA in the TSL.
>
> This appears as an European-American confrontation.
>

I don't think this is a particularly useful framing. Indeed, it sets an
unnecessary framing when, as others have pointed out, this approach has
been consistently applied to both WebTrust and ETSI audited CAs.


> Of course, any service can be improved, and Mozilla rules for CA inclusion
> in the Mozilla root program conforms a consistent verification framework.
>
> But at the end, CABs also perform their duty harmonizing requirements from
> ETSI standards and CAB Forum requirements, to assess Certification
> Authorities which not only issue SSL certificates, but also natural person
> certificates for qualified electronic signatures, legal person certificates
> for qualified electronic seals, qualified electronic tiestamping, and other
> rlated trust services.
>
> So, one of the critical poits would be to identify what CABs are not doing
> well when assessing CAs.
>
> Because once CABs issue their Conformity Assessment Report stating thay
> some specific CA is complying with all requirements, the problem is not in
> the CA, is in the CAB.
>
> Sorry for this long description of the European PKI Assessment model, but
> I thought it could be useful.
>

I don't think it's particularly useful or relevant to the matter at hand,
and doesn't provide new information as to the matters being discussed.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to