W dniu czwartek, 17 stycznia 2019 21:12:58 UTC+1 użytkownik Wayne Thayer 
napisał:
> Hello Piotr,
> 
> On Thu, Jan 17, 2019 at 6:23 AM Grabowski Piotr <piotr.grabow...@kir.pl>
> wrote:
> 
> > Hello Wayne,
> >
> >
> >
> > I am very sorry for the  delay. Please find below our answers to Ryan's
> > questions. Regarding the question why we didn't report this misissuance
> > of this 1 certificate as separate incident in my opinion it is still the
> > same incident. I can create new incident if you want me to. Taking into
> > account my email and Ryan's response I assumed it is not required to
> > create separate incident for  misissuance of this 1 certificate.
> >
> >
> > I am not so concerned about creating a new bug and/or a new email thread.
> My concern is that you did not report the new misissuance even though you
> appear to have known about it. Why was it not reported as part of the
> existing incident, and what is being done to ensure that future
> misissuances - either in relation to existing or new incidents - are
> promptly reported?
> 
> So our comments in blue:
> >
> >
> > I don't think it's reasonable to push the problem to your CA software
> > vendor.
> >
> > - We are not pushing the problem to CA software vendor. I have just tried
> > to explain how it happened.
> >
> >
> >
> > If Verizon does not provide this support, what steps will your CA take?
> >
> > - We are almost sure that Verizon will provide at least policy field
> > validation for maximum field size which can be sufficient to eliminate
> > the last gap in our policy templates which in turn led us to misissuance
> > of this certificate. If Verizon will not provide this feature we will be 
> > considering
> > usage of another UniCERT component - ARM plug-in - which analyzes
> > requests but this means custom development for us. It would be a big
> > change in many processes and the challange to preserve current security
> > state as well so this should be an absolute last resort.
> >
> >
> > If you know what those steps are, is there reason not to take them now? If
> > you do not know what those steps are, when will you know?
> >
> > The main reason why we are not taking these steps now (changing processes
> > and custom development) is absolute conviction that the cost and the risk of
> > implementing them is much, much higher that the risk related with waiting
> > for that feature being delivered by vendor.  Just to recall, now we have
> > the only gap which in the worst case can give us specific field in
> > certificate longer than RFC specifies. Of course we are practicing due care
> > and have put as much counter-measures as we can (procedure, labels above
> > the fields).
> >
> >
> >
> > Your software is producing invalid and improper certificates. The
> > responsibility for that ultimately falls on the CA, and understanding what
> > steps the CA is taking to prevent that is critical. It appears that the
> > steps, today, rely on human factors. As the past year of incident reports
> > have shown, relying solely on human factors is not a reasonable practice.
> >
> > -I agree entirely with you, that's why we will keep exerting pressure on
> > Verizon to deliver:
> >
> > o   Policy field size validation – in our opinion it is simple change 
> > request and should be delivered ASAP.
> >
> > o   native x509lint or zlint feature
> >
> >
> >
> When can we expect an update from you on Verizon's response to your
> request? If I was the customer, I would expect a prompt response from
> Verizon.

I have response from Verizon that they will send us a patch containing some
pre-issuance linting features on 03/02. By the way I kindly inform you that  
I’m out of the office from 28/01 to 07/02 and will be responding to my emails 
when I return on 11/02. 

Regards
Piotr Grabowski

> > Regards ,
> >
> >
> > Piotr Grabowski
> > Linia biznesowa podpis elektroniczny
> > Krajowa Izba Rozliczeniowa S.A.
> > ul. rtm. W. Pileckiego 65
> > 02-781 Warszawa
> >
> > Tel. +48 22 545 56 76
> >
> > Tel. +48 507 024 083
> >
> >
> >

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to