The 7 required items under the Mozilla template are:

1.      Timeline of events
2.      Timeline of actions taken
3.      Whether the CA has stopping issuing
4.      Summary of problematic certs
5.      Cert data
6.      How mistakes were made
7.      Remediation plan

 

The info we’re working on getting a complete list of:

1.      Blackout periods
2.      Where each cert is used in the infrastructure
3.      Why 30 day certs won’t work (on a per cert basis)
4.      Reason the certs are publicly trusted
5.      What risk are associated with the replacement
6.      The date each cert can be revoked

 

Mostly we’re hearing back general answers. They’re almost all the same answer, 
but I’m really trying to get the level of detail requested.

 

I see how you could interpret the question that way. I see it more as the CAB 
forum got the date wrong. Could Mozilla please extend this after weighing the 
risks of revoking vs. non-revoking? Maybe two sides of the same question.

 

The second deadline is coming from the impacted parties. That’s the request 
from them so I’m relaying it on. Everyone is willing to move, just a matter of 
timing. If there’s a better balance of risk vs. risk, then we’d be happy to 
hear that.

 

>> So the assumption here is that, in all of this discussion, DigiCert's done 
>> everything it can to understand the issue, the

>> timelines, remediation, etc, and has plans to address both each and every 
>> customer and the systemic issues that have

>>  emerged. If that's not the case, then how are we not in one of those two 
>> scenarios above? And if it is the case, isn't that

>> information readily available by now?

 

The information is readily available for the companies I posted in incident 
reports, particularly the first one. I think we’ve done everything reasonable 
to understand the issue. I haven’t, for example, chartered a flight to sit in 
their data center and examine their infrastructure. We do have daily calls with 
most of them on the issue.  Maybe the amount of information the company has 
provided should be the guiding light? 

 

 

From: Ryan Sleevi <[email protected]> 
Sent: Thursday, December 27, 2018 1:16 PM
To: Jeremy Rowley <[email protected]>
Cc: mozilla-dev-security-policy <[email protected]>
Subject: Re: Underscore characters

 

I'm not trying to throw you under the bus here, but I think it's helpful if you 
could highlight what new information you see being required, versus that which 
is already required.

 

I think, yes, you're right that it's not well received if you go violate the 
BRs and then, after the fact, say "Hey, yeah, we violated, but here's why", and 
finding out that the reasons are met with a lot of skepticism and the math 
being shaky, and you can see that from past incident reports it doesn't go over 
well.

 

But it's also not well received if it's before, and the statement is "Our 
customer thinks we should violate the BRs. What would happen if we did, and 
what information do you need from us?". That gets into the moral hazard that 
Matt spoke to, and is a huge burden on the community where the expectation is 
that the CA says "Sorry, we can't do that".

 

So the assumption here is that, in all of this discussion, DigiCert's done 
everything it can to understand the issue, the timelines, remediation, etc, and 
has plans to address both each and every customer and the systemic issues that 
have emerged. If that's not the case, then how are we not in one of those two 
scenarios above? And if it is the case, isn't that information readily 
available by now?

 

>From the discussions on the incident reports, I feel like that's been the 
>heart of the questions; which is trying to understand what the root cause is 
>and what the remediation plan is. The statement "We'll miss the first 
>deadline, but we'll hit the second", but without any details about how or why, 
>or the steps being taken to ensure no deadlines are missed in the future, 
>doesn't really inspire confidence, and is exactly the same kind of feedback 
>that would be given post-incident.

 

On Thu, Dec 27, 2018 at 1:50 PM Jeremy Rowley via dev-security-policy 
<[email protected] 
<mailto:[email protected]> > wrote:

There's a little bit of a "damned if you do, damned if you don't problem here". 
Wait until you have all the information? That's a paddlin'.  File before you 
have enough information? That's a paddlin'. I'd appreciate better guidance on 
what Mozilla expects from these incident reports timing-wise. 

-----Original Message-----
From: dev-security-policy <[email protected] 
<mailto:[email protected]> > On Behalf Of Jeremy 
Rowley via dev-security-policy
Sent: Thursday, December 27, 2018 11:47 AM
To: [email protected] <mailto:[email protected]> 
Cc: [email protected] 
<mailto:[email protected]> 
Subject: RE: Underscore characters

The original incident report contained all of the details of the initial 
filing.  The additional, separated reports are trickling in as I get enough 
info to post something in reply to the updated questions. As the questions 
asked have changed from the original 7 in the Mozilla incident report, getting 
the info back takes time. Especially during the holiday season. We’re also 
working to close out as many without an exception as possible. Note that the 
deadline has not passed yet so all of these incident reports are theoretical 
(and not actually incidents) until Jan 15th. I gave the community the total 
potential number of certificates impacted and the total number of customers so 
we can have a community discussion on the overall risk and get public comments 
into the process before the deadline passes.  I’m unaware of any policy at 
Mozilla or Google that provides guidance on how to file expected issues before 
they happen. If there is, I’d gladly follow that. 

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to