The 7 required items under the Mozilla template are: 1. Timeline of events 2. Timeline of actions taken 3. Whether the CA has stopping issuing 4. Summary of problematic certs 5. Cert data 6. How mistakes were made 7. Remediation plan
The info we’re working on getting a complete list of: 1. Blackout periods 2. Where each cert is used in the infrastructure 3. Why 30 day certs won’t work (on a per cert basis) 4. Reason the certs are publicly trusted 5. What risk are associated with the replacement 6. The date each cert can be revoked Mostly we’re hearing back general answers. They’re almost all the same answer, but I’m really trying to get the level of detail requested. I see how you could interpret the question that way. I see it more as the CAB forum got the date wrong. Could Mozilla please extend this after weighing the risks of revoking vs. non-revoking? Maybe two sides of the same question. The second deadline is coming from the impacted parties. That’s the request from them so I’m relaying it on. Everyone is willing to move, just a matter of timing. If there’s a better balance of risk vs. risk, then we’d be happy to hear that. >> So the assumption here is that, in all of this discussion, DigiCert's done >> everything it can to understand the issue, the >> timelines, remediation, etc, and has plans to address both each and every >> customer and the systemic issues that have >> emerged. If that's not the case, then how are we not in one of those two >> scenarios above? And if it is the case, isn't that >> information readily available by now? The information is readily available for the companies I posted in incident reports, particularly the first one. I think we’ve done everything reasonable to understand the issue. I haven’t, for example, chartered a flight to sit in their data center and examine their infrastructure. We do have daily calls with most of them on the issue. Maybe the amount of information the company has provided should be the guiding light? From: Ryan Sleevi <[email protected]> Sent: Thursday, December 27, 2018 1:16 PM To: Jeremy Rowley <[email protected]> Cc: mozilla-dev-security-policy <[email protected]> Subject: Re: Underscore characters I'm not trying to throw you under the bus here, but I think it's helpful if you could highlight what new information you see being required, versus that which is already required. I think, yes, you're right that it's not well received if you go violate the BRs and then, after the fact, say "Hey, yeah, we violated, but here's why", and finding out that the reasons are met with a lot of skepticism and the math being shaky, and you can see that from past incident reports it doesn't go over well. But it's also not well received if it's before, and the statement is "Our customer thinks we should violate the BRs. What would happen if we did, and what information do you need from us?". That gets into the moral hazard that Matt spoke to, and is a huge burden on the community where the expectation is that the CA says "Sorry, we can't do that". So the assumption here is that, in all of this discussion, DigiCert's done everything it can to understand the issue, the timelines, remediation, etc, and has plans to address both each and every customer and the systemic issues that have emerged. If that's not the case, then how are we not in one of those two scenarios above? And if it is the case, isn't that information readily available by now? >From the discussions on the incident reports, I feel like that's been the >heart of the questions; which is trying to understand what the root cause is >and what the remediation plan is. The statement "We'll miss the first >deadline, but we'll hit the second", but without any details about how or why, >or the steps being taken to ensure no deadlines are missed in the future, >doesn't really inspire confidence, and is exactly the same kind of feedback >that would be given post-incident. On Thu, Dec 27, 2018 at 1:50 PM Jeremy Rowley via dev-security-policy <[email protected] <mailto:[email protected]> > wrote: There's a little bit of a "damned if you do, damned if you don't problem here". Wait until you have all the information? That's a paddlin'. File before you have enough information? That's a paddlin'. I'd appreciate better guidance on what Mozilla expects from these incident reports timing-wise. -----Original Message----- From: dev-security-policy <[email protected] <mailto:[email protected]> > On Behalf Of Jeremy Rowley via dev-security-policy Sent: Thursday, December 27, 2018 11:47 AM To: [email protected] <mailto:[email protected]> Cc: [email protected] <mailto:[email protected]> Subject: RE: Underscore characters The original incident report contained all of the details of the initial filing. The additional, separated reports are trickling in as I get enough info to post something in reply to the updated questions. As the questions asked have changed from the original 7 in the Mozilla incident report, getting the info back takes time. Especially during the holiday season. We’re also working to close out as many without an exception as possible. Note that the deadline has not passed yet so all of these incident reports are theoretical (and not actually incidents) until Jan 15th. I gave the community the total potential number of certificates impacted and the total number of customers so we can have a community discussion on the overall risk and get public comments into the process before the deadline passes. I’m unaware of any policy at Mozilla or Google that provides guidance on how to file expected issues before they happen. If there is, I’d gladly follow that.
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

