Apologies, autocompleted to the wrong list :) On Thu, Apr 27, 2017 at 10:51 AM, Ryan Sleevi <ryan.sle...@gmail.com> wrote:
> (Wearing a Google Hat, if only to share what has transpired) > > Symantec has recently shared in https://www.symantec.com/ > connect/blogs/symantec-ca-proposal , as well as > https://groups.google.com/d/msg/mozilla.dev.security.policy/LRvzF2ZPyeM/ > OpvBXviOAQAJ , a plan for what they believe is an appropriate resolution > to the many grave and serious security issues they've introduced into the > Web Ecosystem. While the community should certainly judge Symantec's > proposal on its merits, as to whether or not it demonstrates a basic > understanding of the issues and whether or not it provides any meaningful > steps that were not already expected of them, as a trusted CA, it is useful > to understand what has transpired over the past two weeks. > > As noted in https://groups.google.com/a/chromium.org/d/msg/blink- > dev/eUAKwjihhBs/IIvNKEdHDQAJ , at the beginning of this month, the Chrome > team met with Symantec's leadership to personally discuss and explains the > issues and concerns raised, despite having been in communication with > Symantec over these issues for months. As the number of issues that > Symantec has had was so great, we were unable to provide our perspective of > the many failures and the concerns that they signaled, and thus, a second > meeting was scheduled, as mentioned in https://groups.google.com/a/ > chromium.org/d/msg/blink-dev/eUAKwjihhBs/PodHs8n5BAAJ > > In both of these meetings, and in the following e-mail exchanges, we > stressed to Symantec the nature of the issues: issues with the > infrastructure, issues with oversight, and issues with audits. These issues > involved not just RAs, but Symantec's employees, whether those responsible > for issuing certificates or those who are tasked with overseeing the > security and compliance of the process itself. > > In particular, during these discussions, we explained our perspective of > audits to Symantec. For example, we discussed the ways in which audits were > insufficient to demonstrate security - that is, a clean audit does not > demonstrate that an organization takes security seriously or that they have > meaningfully addressed concerns. We discussed the ways in which audits were > able to be 'gamed' by an organization, such as through limiting the scope > of the audit to only a subset of the activities, such as validation > activities, as a way of avoiding disclosure of the more fundamental > security failures. We stressed that, more than clean audits, we value the > transparency and timeliness of an organization in responding to issues in a > way that fully resolves the issue. > > We shared with Symantec how their competitors - organizations such as > GoDaddy and DigiCert - have provided excellent examples for fully > responding to issues in a responsible, timely, and complete manner, even > when it may be disruptive to their customers. While an incident happening > is not ideal, by responding in a way that is beyond reproach, these CAs > have demonstrated an awareness of the security and ecosystem implications. > More importantly, it demonstrates how their competitors have respected the > Baseline Requirements, particularly around the requirement to revoke > certificates that the CA is made aware of not having been issued in > accordance with their CP/CPS, even if no misleading information is present. > We shared this with the hope of encouraging Symantec to take a thoughtful > approach in their proposal and to understand what is expected of them. > > We shared how Google has responded to past CA failures - organizations > like DigiNotar, which downplayed the security implications to their > customers and found themselves summarily and permanently revoked, > organizations like WoSign, which mislead the web community while actively > and knowingly engaging in prohibited behaviours, and the seriousness of > issuing or failing to supervise subordinate CAs, which places all users - > not just their customers - at risk. > > We highlighted the clear and undisputed evidence that Symantec's issues - > https://wiki.mozilla.org/CA:Symantec_Issues - extend well beyond the RA > certificates, and raise concerns about the conduct of their employees, the > security of their infrastructure, their awareness of what they have issued, > and their ability to effectively supervise it. > > Following these meetings, we offered Symantec advice on how to make an > effective proposal that could objectively and meaningfully address the > concerns raised, while minimizing the impact to their customers. This was > done with the hope that they would use the opportunity to step up and raise > to the level expected of them, and as clearly demonstrated through the > incident responses of DigiCert, GoDaddy, and GlobalSign in the past month. > By providing a meaningful proposal, particularly one that complied with the > Baseline Requirements and the obligations upon all CAs, they would be able > to demonstrate their understanding and awareness of these issues. > > Below is an excerpt of that message, shared with Symantec's CEO and CTO, > sent on April 18. I've removed a few pieces from this, as it appears that > Symantec shared information and plans with Google that were, unfortunately, > not part of their public statements recently released. Out of respect for > that disclosure - proposals that were key and a bare minimum of next steps, > and thus are deeply surprising to not see mentioned by Symantec - I've > removed some aspects that detail those next steps. > > Following that message, one final meeting with Symantec's leadership was > held last Friday, 4/21. In that meeting, Symantec provided a proposal very > similar to the one they gave to Mozilla this week, although containing some > aspects that appear to have been removed from the version publicly shared. > Following that meeting, Google shared our concerns that, while there are > some aspects of their proposal that would be positive improvements to > Symantec's current operations, we were left with many questions as to how > that would substantively or meaningfully respond to the totality of the > issues, and that it was vital that we continue any such discussions > publicly. > > It's worth noting that this proposal minimizes any impact to Symantec > customers, existing or new. It provides a graceful transition path that > does not negatively impact existing customers who have special needs - such > as those of pinning or certain roots. It does not prohibit Symantec from > continuing to use and operate its existing infrastructure for non-Web > cases, but eliminates the security risk from doing so. It provides a path > for Symantec to operate beyond reproach, and to meaningfully demonstrate > their commitment to the ecosystem security by being a leader and a role > model in responsibly addressing the many security issues they have > introduced. It would have seen them take a role in leadership - moving to > shorter lived certificates to resolve the problems identified - while also > allowing them a path to continue with EV recognition for new certificates. > > Message sent 4/18: > > To address the immediate concerns regarding Symantec’s current >> infrastructure and validation processes, you could consider partnering with >> one or more existing CAs. These CAs would operate subordinate CAs on >> their infrastructure using their validation processes, thereby removing >> Symantec infrastructure and validation processes from the equation. To >> ensure minimal impact to your existing customers, particularly those who >> have chosen Symantec for the ubiquity of your root keying material, your >> team would cross-sign these third-party CAs. In effect, they would be >> third-party operated sub-CAs. However, Symantec would still handle the >> business relationship with your customers and Subscriber/Applicants, and >> could relay requests on their behalf to these third parties, whether by >> programmatic or procedural means. >> From your customers’ perspective, they would still see a set of >> certificates chaining to Symantec’s root certificates, even though all the >> validation, verification, and operation is performed by a third party. Once >> *[Removed] >> *happens, you could then take possession of the key material and >> operations of those sub-CAs, pursuant to the normal processes related to >> the transfer or acquisition of CAs. Alternatively, you could arrange for >> the existing CA to cease issuance from that CA, maintaining the certificate >> repository and audit logs, as required, for the necessary period of time, >> and transition new issuance to *[Removed]* > > >> If done appropriately, this would mitigate our primary concerns related >> to new certificates, and as a result, address the same set of concerns >> being proposed by 9-month certificates and the removal of EV for new >> certificates. This doesn’t address the set of existing certificates out >> there, but allows an easier path forward for renewal/replacement. > > >> From a code side, we would be able to implement a distrusting of the >> existing Symantec roots, unless the certificate chained through one of >> these new sub-CAs, or through the previously identified, >> independently-operated sub-CAs in the GeoRoot program. This would >> meaningfully address the uncertainty regarding the existing and past >> issuance practices, while offering a solution for the future. > > >> In discussing what criteria we’d want to see met for such a plan to be >> viable, we think the following would be minimally necessary: >> >> - These sub-CAs must be operated by a non-affiliated organization >> that operates roots currently trusted in the Android and Chrome OS trust >> stores, and have been trusted for a period of at least two years. >> - The non-affiliated organization must accept full responsibility for >> the operation of these sub-CAs and agree that any misissuance from these >> sub-CAs will be treated as if it was misissuance from any of the other CAs >> the organization operates. Similarly, any misissuance from the other CAs >> the organization operates will be treated as if it was misissuance from >> these sub-CAs. Because the basis for trust in these intermediates will be >> based on chaining to the existing Symantec root certificates, rather than >> to a different organization’s CA certificates, Symantec must also accept >> responsibility for the operation of these sub-CAs and agree that any >> misissuance from these sub-CAs will be treated as if it was misissuance >> from any of the other CAs that Symantec operates. >> - Symantec and its affiliates must not participate in any of the >> information verification roles permitted under the Baseline Requirements, >> such as Delegated Third Parties, including that of Enterprise RAs, or as >> Validation Specialists. That is, the non-affiliated organization bears >> full >> responsibility to perform all information verification controls related to >> the issuance of the certificates. Symantec and its affiliates may, >> however, >> seek to collect and aggregate all of the information as part of the >> Certificate Request process in order to expedite and simplify the >> verification process. >> - These sub-CAs must not be used to certify any Symantec-operated or >> -controlled CAs, but may themselves be certified by existing >> Symantec-operated or -controlled CAs. That is, they can be cross-signed by >> the existing infrastructure, but they must not cross-sign any of the >> existing infrastructure or certificates. >> - The non-affiliated organization may not reuse any previously >> obtained documents and data that was collected by Symantec. That is, any >> verifications must be done anew, although Symantec may expedite and >> simplify the verification process by collecting the appropriate data and >> documents as part of the Certificate Request, provided they are verified >> by >> the operating organization. >> - No Delegated Third Parties shall be used to perform the information >> verification functions of domain verification (Section 3.2.2.4 of the >> Baseline Requirements) or IP address verification (Section 3.2.2.5 of the >> Baseline Requirements) >> - The Certificate Policy and Certification Practice Statements >> (CP/CPS) for the sub-CAs may use Symantec’s domains for purposes of CAA >> verification, as they are operating on behalf of Symantec. >> - Within ninety (90) days of the first certificate being issued by >> any of these sub-CAs, the operating organization shall provide a Period of >> Time audit report according to the “Trust Service Principles and Criteria >> for Certification Authorities” and the “WebTrust Principles and Criteria >> for Certification Authorities - SSL Baseline with Network Security.” If >> Symantec desires for these sub-CAs to be recognized as capable of issuing >> EV certificates, Symantec shall also provide a “WebTrust Principles and >> Criteria for Certification Authorities - Extended Validation SSL.” All >> audits shall use the current version of the criteria appropriate for the >> audit engagement date. The period of time must include the moment of the >> Key Generation Ceremony, must not exceed one hundred and twenty (120) days >> in duration, and must not be less than thirty (30) days in duration. Note >> that ninety (90) days represents when the report shall be provided, not >> the >> end of the period of time. >> - The audit report scope must include all Principles and Criteria and >> include all locations in which the key material exists. If a Principle or >> Criteria is excluded from the scope due to the non-performance of that >> function, the audit report and management’s assertion letter must attest >> that no organizations, including the operating organization, performed >> that >> role or function for the Period of Time under audit. >> - An unbroken sequence of such audit reports shall be posted publicly >> and provided to Google no greater than ninety (90) days after the >> conclusion of the audit period. For the first year following the issuance >> of the first certificate, the audit period shall not exceed ninety (90) >> days. For the second year, the audit period shall not exceed six (6) >> months. For third and subsequent years, the audit period shall not exceed >> twelve (12) months. >> - Any and all subordinate CAs certified by these sub-CAs must be >> covered by the same CP/CPS, management’s assertion, and audit reports as >> the sub-CA itself. That is, any sub-CAs beneath these sub-CAs must be part >> of the same infrastructure and operation of the non-affiliated >> organization. >> - In order to be trusted, issued certificates must be “CT Qualified”, >> as defined in the Certificate Transparency in Chrome Policy >> <https://www.chromium.org/Home/chromium-security/certificate-transparency> >> . >> - In order to be trusted, subscriber certificates, including those of >> technically constrained subordinate CAs, must have validity periods of no >> greater than three hundred and ninety-seven (397) days. This is an >> unambiguous way of clarifying thirteen (13) month validity. >> >> The goal of these controls is to try to meaningfully signal that the new >> certificates issued will not suffer from the same flawed processes, >> controls, and infrastructure, and as a result, are fully deserving of the >> trust, including that of EV certificates. As audits are not perfect, and >> consistent with our overall goals for the ecosystem, having such >> certificates as valid for thirteen months represents an acceptable >> balancing of the concerns. > > >> Upon *[Removed]*, Symantec can reapply to have new root certificates >> trusted, much in the way that organizations such as CNNIC have done >> <https://bugzilla.mozilla.org/show_bug.cgi?id=1312957> or as StartCom plans >> to do >> <https://groups.google.com/d/msg/mozilla.dev.security.policy/jDRxCN9qoQI/aNKZ0932GQAJ>. >> Subject to the appropriate review, this can serve to re-establish trust by >> eliminating uncertainty and providing greater transparency. Trust in these >> new root certificates is contingent upon them not cross-signing any of the >> existing infrastructure or certificates, but they may be cross-signed by >> such existing infrastructure or certificates. > > >> Hopefully, this provides a meaningful suggestion about ways in which >> Symantec can minimize any disruptions, due to a lack of trust when using >> Chrome. These suggestions are meant to provide further guidance about the >> set of concerns we discussed, and to illustrate ways in which they can be >> meaningfully and objectively addressed, in a way that can be consistently >> applied to all CAs. > > > -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto