I can't see significant differences in terms of transparency between a
new Root and an externally-operated subCA.
At the very least, in the new Root CA case, you *know* there is no
external oversight by another CA. In the externally-operated subCA we
*assume* there is some external oversight by the signing CA, which is
"better than nothing"? I agree that more details of this oversight
process would be useful -if not necessary- to be at least shared with
the community.
My understanding is that users are protected equally by both routes:
- new Root CA, where at least a Root Store Manager performs the initial
due diligence,
- externally-operated subCA, where the issuing CA performs the due
diligence.
In both cases the community has the same amount of time to review the
applications (at least 3 weeks) and dig into the CP/CPS and audit reports.
Dimitris.
On 20/2/2022 7:07 μ.μ., Ryan Sleevi wrote:
On Fri, Feb 18, 2022 at 1:36 AM Dimitris Zacharopoulos
<[email protected]> wrote:
I believe this is not correct. The security risks to the community
are different because in the cross-signing/externally-operated
subCA model, the Subordinate is under the close supervision of the
signing (already publicly-trusted) CA, compared to the individual
Root which stands on its own.
In the event it was not clear, I very much disagree with this
position, which is why I do not think it advisable to proceed at present.
1. Root CAs have significantly less experience reviewing the
inclusion of CAs, including CP/CPS reviews.
2. Root CAs are primarily focused on their perceived risks, which are
indirect proxies for user risk, as opposed to being directly
focused on user risks
3. Root CAs do not generate the same degree of transparency,
artifacts and records as the public review process.
1. For example, we have no such record of a detailed CP/CPS
review (although, to the prior two points, it's questionable
to what extent it would be aligned with community needs)
2. We have no discussion and/or transparency as to Root CAs'
processes for conducting such reviews
3. We have no transparency into any commitments and/or
representations made
4. In practice, the risk is greater, not less, because any issues now
present two CAs to remediate, rather than one.
If we accept the conclusion that the risks are different, then
similarly, it would seem that any restrictions upon Super CAs, or any
concerns with Trust Service Lists, are unfounded, because they cannot
be reasonably held positions when delegation of subordinate signing is
seen as less risky. In all three cases, it works out the same: the
delegation of security functions to external parties. While in theory,
differences can be suggested ("Super CAs aren't as experienced", "the
TSL isn't accountable"), those arguments don't stand up under scrutiny.
At fundamental question is whether the goal of a Root Program is to
ensure a thorough supervision and vetting of all CAs in the program,
in order to protect from user risk. If that is the argument, then it
stands to reason that subordinate CAs from new entities should not be
introduced unless and until that vetting has occurred, to the same
level of detail, and with the same processes in place to ensure the
right result. To do otherwise is to effectively secure a loan of
"trust" based on collateral that is exceedingly difficult (technically
and policy) to repossess if mistakes are made, and relying on some
undocumented, opaque assurance that due dilligence has occurred. If we
were trying to develop real estate in New York, that might be the
norm, but this isn't the Big Apple.
There are cases where a CA wants to operate independently, without
any third-party supervision. This is the most common scenario
that's why option 2 is what we usually see. However, there are
cases where a company wants to operate a subCA under the guidance
and supervision of another CA, which uses option 1. CCADB includes
cases that prove that both options exist today.
While this is true, exceeding from the incident reports has been an
active discouragement for option 1, because it does not, in practice,
work. The past decade has been very much towards Option 2 as the only
option, which is exactly why unaudited sub-CAs were sunset, why
technically constrained CAs are still required to be audited by some
root programs (independent of/despite the BRs carve outs), and
overall, why cross-signing is being limited in favor of direct
integration of the root.
This is not to say that the trust impact of an externally-operated
Sub CA vs a Root CA are not similar, but it is reasonable to
assume that when an already-trusted CA member of this community
(in good standing)
- accepts the liability and reputational risks,
- places sufficient controls to monitor the operations/compliance
program of an externally-operated SubCA,
It's reasonable to state it's reasonable, but it's not actually
reasonable. The suggestion here of reputational risks is somewhat
suspect, given that certificates are undifferentiated fungible
commodities, in which reputation plays little overall effect in the
selection. The extent reputational concern is an issue is developing a
"bad reputation" that might lead to distrust, and that's precisely why
the risk is greater, because it's an activity that carries with it
profoundly high risk. For example, do we believe that it would at all
be a labor-free endeavour to contemplate removing trust in GoDaddy if
Certainly routinely violated requirements? I think the significance of
GoDaddy's extant operations in the broader Internet at large would, if
anything, suggest that Certainly would have far more opportunities to
make mistakes that are overlooked, precisely because of the desire to
avoid distrusting GoDaddy.
The second point here is that we should assume controls are
sufficient, when we have shown repeatedly, through a variety of CA
incidents, the lack of controls. To that end, GoDaddy's discussion has
failed to even detail the controls, such as those learned from other
CAs, and based on GoDaddy's past incidents regarding being unaware of
other CAs' remediations, it seems unlikely to just assume those
controls exist. However, even if controls existed, the degree of
transparency around those controls and their routine functioning
doesn't exist.
Would it be better if GoDaddy regularly engaged in Detailed Control
Reports, required those of Certainly, and made both of those publicly
available? Sure, that might be a path towards a sufficient degree of
transparency. But we won't see that within the next few weeks, and
that still fits in the broader question about what it should look like
for all CAs.
Neither of these points holds up under scrutiny, and equally, they
don't hold up with made generic across all CAs. To the extent we
cannot assume that the small CA with only 5,000 certificates is
capable and knowledgeable to fully audit new entrants, we shouldn't
assume the CA with 50 million certificates is any more, because they
are different skills than traditional issuance.
it is sufficient for the community to accept. Taking it one step
further, I would say that this scenario (operating under the
guidance/supervision of an already-trusted Root CA) is actually
MORE trustworthy than an independent Root being accepted for which
the community has no visibility about internal
operations/compliance program apart from an audit report and
self-evaluation.
I hope I have put to bed how flawed this conclusion is, but since
sometimes, the horse must be beaten to glue for the argument to stick:
by this logic, it would suggest that the ecosystem would be better
without any root review, and instead delegate to a set of Super CAs,
with each Super CA accountable to the browser. I think most folks
would recognize that as the antithesis of the direction we should go
in, but that's logically where a conclusion of MORE trustworthy takes
things.
I assume that GoDaddy and any CA that plans to cross-sign a CA
that is new to this community, performs a similar analysis/due
diligence as Ben and the community does in Root inclusion
requests. Three weeks should be sufficient for additional
review/scrutiny by any other member but if more time is needed,
people can just ask.
There is no basis for that assumption, nor data to support it.
I believe it would be unfair to delay this application more than
the current Mozilla Policy dictates on the grounds that there is a
pending Root inclusion request by Certainly. They could just as
well not have applied for a Root inclusion.
The goal is to protect users, not "fairness". Transparent, consistent
processes, aligned with the policy objectives, but that does not mean
a dispensation towards assuming inclusion, or that "If you did the
work, and got an audit, you should be trusted". This process is one of
risk management, and that cannot and should not be abdicated.
Had Certainly not applied for a Root Inclusion, I would be actively
encouraging that the request be rejected entirely, precisely for the
same reasons here: the risk of a subordinate is indistinguishable to
end users from that of a root, while the risk to the process and
policies is even greater. The march has been towards containing that
risk, and, consistent with concerns raised about delegating trust to
third-parties such as governments, not one that should be lightly
abdicated, least of all because "of a misguided goal to fairness over
security.
--
You received this message because you are subscribed to the Google Groups
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To view this discussion on the web visit
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/9afaf807-2ca1-8812-74d5-9337dfa2deba%40it.auth.gr.