The bug requesting that the existing subordinate CAs be added to OneCRL is
https://bugzilla.mozilla.org/show_bug.cgi?id=1564544

On Tue, Jul 9, 2019 at 8:31 AM Wayne Thayer <wtha...@mozilla.com> wrote:

> I would like to thank everyone for their constructive input on this
> difficult issue. I would also like to thank DarkMatter representatives for
> participating in the open, public discussion. I feel that the discussion
> has now, after more than 4 months, run its course.
>
> The question that I originally presented [1] to this community was about
> distrusting DarkMatter’s current intermediate CA certificates (6 total)
> based on credible evidence of spying activities by the company. While a
> decision to revoke trust in these intermediates would likely result in a
> denial of DarkMatter’s root inclusion request [2], the public discussion
> for that request has not yet begun. A decision not to revoke these
> intermediates does not necessarily mean that the inclusion request will be
> approved.
>
> Some of this discussion has revolved around compliance issues, the most
> prominent one being the serial number entropy violations discovered by
> Corey Bonnell. While these issues would certainly be a consideration when
> evaluating a root inclusion request, they are not sufficient to have
> triggered an investigation aimed at revoking trust in the DarkMatter
> intermediates or QuoVadis roots. Therefore, they are not relevant to the
> question at hand.
>
> Much of the discussion has been about the desire for inclusion and
> distrust decisions to be made based on objective criteria that must be
> satisfied. However, if we rigidly applied our existing criteria, we would
> deny most inclusion requests. As I stated earlier in this thread, every
> distrust decision has a substantial element of subjectivity. One can argue
> that we’re discussing a different kind of subjectivity here, but it still
> amounts to a decision being made based on a collective assessment of all
> the information at hand rather than a checklist.
>
> Some, including DarkMatter representatives [3], have declared the need to
> examine and consider the benefits of having DarkMatter as a trusted CA.
> However, last year we changed our policy to replace the weighing of
> benefits and risks with “based on the risks of such inclusion to typical
> users of our products.” [4]
>
> Perhaps the most controversial element in this discussion has been the
> consideration of “credible evidence”. The first component is the inherent
> uncertainty over what is “credible”, especially in this day and age. While
> it has been pointed out that respected news organizations are not beyond
> reproach [5], having four independent articles [6][7][8][9] from reputable
> sources published years apart does provide some indication that the
> allegations are credible. These articles are also extensively sourced.
>
> If we assume for a second that these allegations are true, then there is
> still a sincere debate over what role they should play in our decision to
> trust DarkMatter as a CA. The argument for considering these allegations is
> akin to the saying “where there’s smoke there’s fire”, while the argument
> against can be described as “innocent until proven guilty”.
>
> DarkMatter has argued [3] that their CA business has always been operated
> independently and as a separate legal entity from their security business.
> Furthermore, DarkMatter states that once a rebranding effort is completed,
> “the DarkMatter CA subsidiary will be completely and wholly separate from
> the DarkMatter Group of companies in their entirety.” However, in the same
> message, DarkMatter states that “Al Bannai is the sole beneficial
> shareholder of the DarkMatter Group.” and leaves us to assume that Mr. Al
> Bannai would remain the sole owner of the CA business. More recently,
> DarkMatter announced that they are transitioning all aspects of the
> business to DigitalTrust and confirmed that Al Bannai controls this entity.
> This ownership structure does not assure me that these companies have the
> ability to operate independently, regardless of their names and legal
> structure.
>
> Mozilla’s principles should be at the heart of this decision. “The Mozilla
> Manifesto [10] states:
>
> Individuals’ security and privacy on the internet are fundamental and must
> not be treated as optional.”
>
> And our Root Store policy states: “We will determine which CA certificates
> are included in Mozilla's root program based on the risks of such inclusion
> to typical users of our products.”
>
> In other words, our foremost responsibility is to protect individuals who
> rely on Mozilla products.  I believe this framing strongly supports a
> decision to revoke trust in DarkMatter’s intermediate certificates. While
> there are solid arguments on both sides of this decision, it is reasonable
> to conclude that continuing to place trust in DarkMatter is a significant
> risk to our users. I will be opening a bug requesting the distrust of
> DarkMatter’s subordinate CAs pending Kathleen’s concurrence. I will also
> recommend denial of the pending inclusion request, and any new requests
> from DigitalTrust.
>
> In the past, we’ve seen CAs attempt to make an end run around adverse
> trust decisions - through an acquisition, a shell company, etc. We will
> treat any such attempt as a violation of this decision and act accordingly.
> Mozilla does welcome DigitalTrust as a “managed” subordinate CA under the
> oversight of an existing trusted CA that retains control of domain
> validation and the private keys.
>
> This discussion has highlighted an opportunity to improve our review of
> new externally-operated subordinate CAs [11]. This issue [12] is part of
> the current policy update discussions.
>
> Wayne
>
> [1]
> https://groups.google.com/d/msg/mozilla.dev.security.policy/nnLVNfqgz7g/YiybcXciBQAJ
> [2] https://bugzilla.mozilla.org/show_bug.cgi?id=1427262
> [3]
> https://groups.google.com/d/msg/mozilla.dev.security.policy/nnLVNfqgz7g/mJ0EV2eoCgAJ
> [4]
> https://groups.google.com/d/msg/mozilla.dev.security.policy/58F6FgeGOz8/Zzb-r76wBQAJ
> [5]
> https://www.washingtonpost.com/blogs/erik-wemple/wp/2018/11/27/bloomberg-is-still-reporting-on-challenged-story-regarding-china-hardware-hack/
> [6]
> https://theintercept.com/2016/10/24/darkmatter-united-arab-emirates-spies-for-hire/
> [7] https://www.reuters.com/investigates/special-report/usa-spying-raven/
> [8]
> https://www.nytimes.com/2019/03/21/us/politics/government-hackers-nso-darkmatter.html
> [9] https://theintercept.com/2019/06/12/darkmatter-uae-hack-intercept/
> [10] https://www.mozilla.org/en-US/about/manifesto/
> [11]
> https://ccadb-public.secure.force.com/mozilla/IntermediateCertsSeparateAudits
> [12] https://github.com/mozilla/pkipolicy/issues/169
>
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to