Thanks to iTrusChina for providing a budget document. I will take a closer
look at it. Meanwhile, do we have any additional comments or questions from
the Mozilla Community?
Ben

On Wed, Aug 18, 2021 at 1:53 AM yutian zheng <[email protected]>
wrote:

> Hi Ben,
>
> We added a document on our budget 2018-2021.
>
>
> attachment.cgi (bug1554846.bmoattachments.org)
> <https://bug1554846.bmoattachments.org/attachment.cgi?id=9236778>
>
> Regards,
> vTrus Team
>
>
> 在2021年8月13日星期五 UTC+8 上午2:17:48<[email protected]> 写道:
>
>> All,
>>
>> Here is my summary of iTrusChina's value justification. Please provide
>> any clarifications or additional comments you may have.
>>
>> *Ownership-Management Structure*
>>
>> iTrusChina (iTC) was established in 2000 as the Beijing Tianwei Chengxin
>> Electronic Commerce Service Co., Ltd. (
>> https://m.itrus.com.cn/about/history/). It was approved by the Chinese
>> Ministry of Industry and Information Technology and State Cryptography
>> Administration. The company is owned by four natural persons and one
>> partnership. Here is what I have been able to glean about the governance
>> structure from iTC's value justification -
>> https://bugzilla.mozilla.org/attachment.cgi?id=9229617:
>>
>> Board of Directors
>>
>> |
>>
>> Security Policy Administration Committee
>>
>> | | | | | |
>>
>> Compliance R&D Authentication Business O&M Product Dept.
>>
>> The Security Policy Administration Committee (SPAC) is the lead
>> department for security and compliance issues, and is responsible for the
>> overall coordination of the iTC's internal resources. It determines
>> priorities for the product and R&D departments and reviews and approves
>> rectification results. The SPAC conducts two-person review of all
>> operations performed by operating team.
>>
>> *User Base*
>>
>> iTC users account for more than half of Chinese market of personal and
>> corporate certificates (480 million). Main customers are Alibaba, Tencent,
>> JD.com, Industrial and Commercial Bank of China, Bank of China, and China
>> Construction Bank.
>>
>> *Finances - Budgeting*
>>
>> iTC originally invested $3.09 million in 2001. It invested 2 million yuan
>> in 2017 for WebTrust audits and compliance transformations of its
>> facilities. Continuous investment in fixed assets and operating expenses is
>> about US$310,000 per year.
>>
>> iTC's compliance budget includes personnel costs, audit costs,
>> infrastructure construction and renovation costs, and is determined
>> annually based on factors such as risk assessment, audit status, and
>> software improvement plans for R&D.
>>
>> With the increase in the number of certificates issued each year, iTC
>> will increase the investment in compliance each year, including the
>> investment budget for the training of personnel familiar with CABF and IETF
>> standards and legal-related training. When faced with compliance issues, if
>> the overall budget set at the beginning of the year is exceeded, it will be
>> approved by the board.
>>
>> Personnel Expense (R&D/O&M/security/verification/customer
>> service/compliance teams)
>>
>> 2018 2019 2020 2021 (5 months)
>>
>> $0.83M $1.07M $1.17M $0.68M
>>
>> R&D team consists of 66 people (incl. 18 for CA system development, 3 for
>> testing, and 6 for WebTrust business and authentication system development).
>>
>> *CA System and System Development*
>>
>> iTC operates a fully self-developed CA software system with a replica
>> test environment for development and testing to ensure compliance. iTC’s CA
>> system is designed based on CA/Browser Forum requirements and the RFCs and
>> conforms to the Specification of cryptograph and related security
>> technology for certificate authentication systems of the National
>> Cryptographic Standards Committee of China (GB/T 25056-2018 Information
>> Security Technology) and "GM/T 0037-2014 Certificate authority system test
>> specification".
>>
>> iTC designs product and system changes in accordance with privacy,
>> security, and compliance requirements. iTC uses an agile (scrum)
>> development process. Each iteration cycle is generally 1-4 weeks.
>>
>> *Compliance Team and Personnel*
>>
>> iTC’s Compliance team follows domestic and foreign compliance standards
>> and specifications, and regularly updates internal documentation. There are
>> two bilingual persons who follow changes in the CA industry requirements on
>> a daily basis. The compliance team summarizes Bugzilla CA incidents
>> quarterly and circulates an industry dynamic tracking report to relevant
>> personnel every month. iTC conducts self-inspections and trains personnel
>> to avoid similar errors. Going forward, iTC will train more compliance
>> personnel and conduct more regular training for team members of
>> authentication, R&D, and business departments.
>>
>> iTC has 20 years of risk compliance experience and personnel with
>> comparable management experience and appears to have a sufficient number of
>> key personnel familiar with CABF and IETF standards.
>>
>> *Authentication Team*
>>
>> This team conducts monthly training on authentication procedures and
>> industry standards, and conducts compliance audits on internal documents,
>> certificate issuance and revocation records on a monthly basis.
>>
>> *R&D Team*
>>
>> This team integrates lint tests in the CA system for certificate issuance
>> compliance inspection. R&D team inspects CA system at design level and
>> performs unit testing and examines results of other testing processes.
>>
>> *Operation Team*
>>
>> This team operates and monitors the availability of all CA-related
>> services.
>>
>> *Monitoring and Alerting*
>>
>> iTC has continuous automatic monitoring to detect and alert on any
>> changes to the CA/RA system, and it responds to and solves the problem
>> within 24 hours after receiving the alert. iTC uses three kinds of lint
>> tests: zlint, certlint, x509lint. iTC conducts automatic inspection of CAA,
>> blacklist, and high-risk list before the issuance of the certificate. The
>> fortress machine records operations, and operation records are reviewed on
>> a monthly basis.
>>
>> *Logs and backups*
>>
>> iTC logs/backs up:
>>
>> 1. Any CA operation and maintenance process in a bastion machine log. The
>> log server backs up and archives every day and saves 2 backups, 1 remote
>> backup, and 1 different device backup.
>>
>> 2. All business logs of CA, RA, etc. are backed up to the log server in
>> real time.
>>
>> 3. regular CRL generation
>>
>> *Compliance Incidents*
>>
>> When a compliance incident occurs, the compliance team coordinates with
>> the relevant business personnel to quickly initiate the investigation
>> process within 24 hours and submit a problem report to Mozilla. The
>> certificate that needs to be revoked after the investigation will be
>> revoked within 24 hours after the incident.
>>
>> *Vulnerability Assessments*
>>
>> iTC conducts a vulnerability scan of the CA system every 3 months and a
>> penetration test every year. Based on audit results, iTC also conducts
>> vulnerability assessments of the system, physical site, operation
>> management, and takes measures to reduce operational risks.
>>
>> *Risk Assessment*
>>
>> iTC's annual risk assessment is carried out by the operation and
>> maintenance, product, development, and compliance teams. All internal and
>> external audits include risk assessments. iTC's risk control refers to BR
>> Chapter 5, including physical control, program control, personnel control,
>> audit log program and other dimensions, and meets the WT audit
>> requirements. iTC also follows the Chinese Ministry of Industry and
>> Information Technology and the State Cryptography Administration’s
>> formulated risk assessment and inspection standards.
>>
>> Risk Control Team rates the risks, evaluate the impact on the business,
>> and after the approval of the Security Policy Administration Committee,
>> decides whether to undertake the risk and formulates a corresponding
>> commitment plan.
>>
>> *Audits*
>>
>> The internal control team conducts WebTrust internal audits on a
>> quarterly basis. External audits include:
>>
>> · WebTrust audit by pwc
>>
>> · ISO9001
>>
>> · ISO27001
>>
>> After reviewing iTrusChina's value justification, I would like to examine
>> the compliance aspects of its budget a little closer, and I am wondering
>> whether iTrustChina can provide something similar (or better) to that
>> provided by TunTrust? See
>> https://bugzilla.mozilla.org/attachment.cgi?id=9228562
>>
>> Sincerely yours,
>>
>> Ben
>>
>> On Tue, Aug 10, 2021 at 9:20 AM Ben Wilson <[email protected]> wrote:
>>
>>> All,
>>> Are there any additional comments?
>>> Thanks,
>>> Ben
>>>
>>> On Sun, Jul 4, 2021 at 7:11 PM yutian zheng <[email protected]>
>>> wrote:
>>>
>>>> Hi All,
>>>>
>>>> iTrusChina submitted a document to answer a series of questions in
>>>> Quantifying Value:
>>>>
>>>> attachment.cgi (bug1554846.bmoattachments.org)
>>>> <https://bug1554846.bmoattachments.org/attachment.cgi?id=9229617>
>>>>
>>>> Regards,
>>>> vTrus team
>>>>
>>>> 在2021年4月21日星期三 UTC+8 上午2:19:41<[email protected]> 写道:
>>>>
>>>>> Hi Ryan,
>>>>> Kathleen and I discussed iTrusChina's and TunTrust's root inclusion
>>>>> applications this morning and agreed that we should extend the public
>>>>> discussion period and leave them open for discussion beyond April 30th.
>>>>> Meanwhile, I will work on follow-up questions for them regarding their
>>>>> added value to users vs. added risk.
>>>>> Thanks,
>>>>> Ben
>>>>>
>>>>> On Wed, Apr 7, 2021 at 1:52 PM Ryan Sleevi <[email protected]> wrote:
>>>>>
>>>>>> Thanks for clarifying.
>>>>>>
>>>>>> In a personal capacity, while I can understand that Mozilla may have
>>>>>> reached a level of confidence that they can handle processing these
>>>>>> requests in parallel, I don't believe it's reasonable to expect the same 
>>>>>> of
>>>>>> the community, since these public discussions may be the first time a
>>>>>> number of members of the community are examining CAs in depth. This
>>>>>> practically impacts both the quality and depth of review, as it 
>>>>>> effectively
>>>>>> requires the community make larger and larger time commitments to handle
>>>>>> all such reviews, or reduces the amount of time and effort focused on an
>>>>>> individual CA.
>>>>>>
>>>>>> Wearing a Google hat, Honestly, I don't think we'll be able to offer
>>>>>> feedback here for both CAs in a parallel (time-gated) review. We'll 
>>>>>> examine
>>>>>> the available data to help prioritize against our own stated policies, 
>>>>>> but
>>>>>> I think realistically, we may request that the CA that does not align 
>>>>>> most
>>>>>> with the priorities undergoes an additional public discussion when we're
>>>>>> ready to proceed. We see significant risk to our users from trying to
>>>>>> include CAs too quickly, and so want to make sure as much as possible 
>>>>>> that
>>>>>> all CAs receive the same level of attention and thoroughness by 
>>>>>> dedicating
>>>>>> specific time to focus on just a single CA.
>>>>>>
>>>>>> It's an entirely reasonable goal, but the effect of running these in
>>>>>> parallel does not mean both CAs undergo three weeks of review; it means
>>>>>> both CAs undergo a week and a half, or less, since these processes do not
>>>>>> linearly scale, nor should they.
>>>>>>
>>>>>> On Wed, Apr 7, 2021 at 3:39 PM Ben Wilson <[email protected]> wrote:
>>>>>>
>>>>>>> Ryan,
>>>>>>> Yes, I think it is an intentional effort to process multiple
>>>>>>> applications simultaneously. As I was moving CA applicants through the
>>>>>>> queue these two just seemed to both be ready at about the same time. It 
>>>>>>> was
>>>>>>> more efficient for me to handle these two at once.  Note that we also 
>>>>>>> have
>>>>>>> Asseco/Certum with public discussion closing next week (4/14/2021). I'll
>>>>>>> repost that to this list right now so that there is continuity on this
>>>>>>> list.  Let's see how this goes. If it presents a problem, then we can
>>>>>>> adjust.
>>>>>>> Ben
>>>>>>>
>>>>>>> On Wed, Apr 7, 2021 at 1:01 PM Ryan Sleevi <[email protected]> wrote:
>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> On Wed, Apr 7, 2021 at 2:49 PM Ben Wilson <[email protected]>
>>>>>>>> wrote:
>>>>>>>>
>>>>>>>>> This is to announce the beginning of the public discussion phase
>>>>>>>>> of the Mozilla root CA inclusion process for iTrusChina’s vTrus Root 
>>>>>>>>> CA and
>>>>>>>>> its vTrus ECC Root CA.  See
>>>>>>>>> https://wiki.mozilla.org/CA/Application_Process#Process_Overview,
>>>>>>>>> (Steps 4 through 9).
>>>>>>>>>
>>>>>>>>> These Root CAs  are operated by iTrusChina Co., Ltd.
>>>>>>>>>
>>>>>>>>> This current CA inclusion application has been tracked in the
>>>>>>>>> CCADB and in Bugzilla–
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> https://ccadb-public.secure.force.com/mozilla/PrintViewForCase?CaseNumber=00000431
>>>>>>>>>
>>>>>>>>> https://bugzilla.mozilla.org/show_bug.cgi?id=1554846
>>>>>>>>>
>>>>>>>>> These new root CA certificates are valid from 2018 to 2043, and
>>>>>>>>> they are proposed for inclusion with the websites bit and EV enabled.
>>>>>>>>>
>>>>>>>>> Mozilla is considering approving iTrusChina’s request. This email
>>>>>>>>> begins the 3-week comment period, after which, if no concerns are 
>>>>>>>>> raised,
>>>>>>>>> we will close the discussion and the request may proceed to the 
>>>>>>>>> approval
>>>>>>>>> phase (Step 10).
>>>>>>>>>
>>>>>>>>> *Root Certificate Information:*
>>>>>>>>>
>>>>>>>>> *vTrus Root CA *(RSA)
>>>>>>>>>
>>>>>>>>>     crt.sh -
>>>>>>>>>
>>>>>>>>> https://crt.sh/?q=8A71DE6559336F426C26E53880D00D88A18DA4C6A91F0DCB6194E206C5C96387
>>>>>>>>>
>>>>>>>>> Download –
>>>>>>>>>
>>>>>>>>> http://wtca-cafiles.itrus.com.cn/ca/vTrusRootCA.cer
>>>>>>>>>
>>>>>>>>> *vTrus ECC Root CA *(ECC)
>>>>>>>>>
>>>>>>>>>     crt.sh –
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> https://crt.sh/?q=30FBBA2C32238E2A98547AF97931E550428B9B3F1C8EEB6633DCFA86C5B27DD3
>>>>>>>>>
>>>>>>>>> http://wtca-cafiles.itrus.com.cn/ca/vTrusECCRootCA.cer
>>>>>>>>>
>>>>>>>>> *CP/CPS:*
>>>>>>>>>
>>>>>>>>> iTrusChina’s current CPS is v.1.4.4 / Dec. 19, 2020
>>>>>>>>>
>>>>>>>>> https://www.itrus.com.cn/uploads/soft/201223/2-201223110436.pdf
>>>>>>>>>
>>>>>>>>> Repository location:
>>>>>>>>>
>>>>>>>>> https://www.itrus.com.cn/repository
>>>>>>>>>
>>>>>>>>> *iTrusChina's 2021 BR Self-Assessment* (PDF) is located here:
>>>>>>>>>
>>>>>>>>> https://bugzilla.mozilla.org/attachment.cgi?id=9209938
>>>>>>>>>
>>>>>>>>> *Audits:*
>>>>>>>>>
>>>>>>>>> iTrusChina’s WebTrust auditor is PricewaterhouseCoopers Zhong Tian
>>>>>>>>> LLP, and the most recent audit reports are dated March 24, 2021. These
>>>>>>>>> audit reports may be downloaded by clicking on the WebTrust seals at 
>>>>>>>>> the
>>>>>>>>> bottom of iTrusChina’s repository page
>>>>>>>>> <https://www.itrus.com.cn/repository/>.
>>>>>>>>>
>>>>>>>>> *Incidents: *
>>>>>>>>>
>>>>>>>>> I was not able to find any incidents involving iTrusChina, no
>>>>>>>>> misissuances were found under the iTrusChina root CAs, and the 
>>>>>>>>> issuing CAs
>>>>>>>>> appeared to be properly formatted.
>>>>>>>>>
>>>>>>>>> Thus, this email begins a three-week public discussion period,
>>>>>>>>> which I’m scheduling to close on or about 30-April-2021.
>>>>>>>>>
>>>>>>>>> A representative of iTrusChina must promptly respond directly in
>>>>>>>>> the discussion thread to all questions that are posted.
>>>>>>>>>
>>>>>>>>
>>>>>>>> Ben,
>>>>>>>>
>>>>>>>> I'm not used to parallel discussions for adding CAs. May I request
>>>>>>>> that you put this discussion on hold until the conclusion of TunTrust? 
>>>>>>>> Or
>>>>>>>> is this an intentional attempt to parallelize more, despite the limited
>>>>>>>> resources?
>>>>>>>>
>>>>>>>

-- 
You received this message because you are subscribed to the Google Groups 
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaasiS84aMHBw-qbsTDxko%3DahU-DjrhV84-v_HGpt1pchw%40mail.gmail.com.

Reply via email to