On 29/1/2019 4:56 μ.μ., Ryan Sleevi wrote:


On Tue, Jan 29, 2019 at 2:18 AM Dimitris Zacharopoulos <[email protected] <mailto:[email protected]>> wrote:



    On 28/1/2019 8:48 μ.μ., Ryan Sleevi via Public wrote:


    On Thu, Jan 24, 2019 at 2:30 PM Dimitris Zacharopoulos (HARICA)
    via Public <[email protected] <mailto:[email protected]>> wrote:



        On 24/1/2019 8:16 μ.μ., Wayne Thayer via Public wrote:
        On today's call we discussed a number of changes to the
        bylaws aimed at clarifying the rules for membership. The
        proposal for section 2.1(a)(1) resulting from today's
        discussion is:

            Certificate Issuer: The member organization operates a
            certification authority that has a publicly-available
            audit report or attestation statement that meets the
            following requirements:
            * Is based on the full, current version of the WebTrust
            for CAs, ETSI EN 319 411-1 , or ETSI EN 319 411-2 audit
            criteria

    Using the example reports for discussion (
    http://www.webtrust.org/practitioner-qualifications/docs/item85808.pdf )

    If a CA does not escrow CA keys, does not provide subscriber key
    generation services, or suspension services, does that count as
    being based on the "full, current version"? (Page 11, paragraph 2)

    I think so, yes. Based on the exact CA operations, the exact audit
    scope is determined. The Forum has set the WebTrust for CAs and
    ETSI EN 319 411-1 as an absolute minimum that includes attestation
    of the existence of reasonable organizational and technical
    controls. If you recall, I had proposed that for the SCWG we
    should also require WebTrust for CAs Baseline and NetSec because
    they are already included in ETSI EN 319 411-1 and are more
    suitable for SSL/TLS Certificates. If a CA obtains a WebTrust for
    CAs or ETSI EN 319 411-1 audit report, it means that the core CA
    services are there and are operational.


I don't believe this is a correct understanding. By highlighting that it's acceptable to carve out the scope, you're seemingly acknowledging that it's acceptable to take subsets of the audit criteria. For example, if I provided an audit for the physical security controls of my data center against the WebTrust for CAs criteria, is that sufficient for membership as a CA?

This isn't theoretical; at least one CA member provides such audits, as they use such a third-party datacenter. If the datacenter provided just their report, would they qualify? If they don't, then what is the property that we're trying to achieve, and why, so that we can do it?

Would this WebTrust for CAs audit report be sufficient for acceptance in a Root Program? I don't think so.  All these years, CA/B Forum Members have been accepted by providing WebTrust for CAs and ETSI reports that include core PKI procedures. What you describe is probably an exception and we can decide how to handle this exception if in fact we ever receive an application for participation in a WG with a WebTrust for CAs audit report scoping just the physical security of a Datacenter. I'm hope that CA had other WebTrust for CAs reports for their other operations.

    Root programs have audit requirements exceptions and this applies
    equally to Microsoft and Mozilla. I don't disagree to being more
    inclusive but I believe the Forum must have objective and specific
    requirements based on some international standards and not just
    government regulations.


Then by this goal, I don't believe our current membership criteria meet this. For example, a qualified auditor is determined by... government regulations in the case of ETSI. Does that mean we should exclude ETSI audits from the scope? Or should we allow CABs that are not accredited by the NABs?

This doesn't make a lot of sense. NABs are not Supervisory Bodies. It's different. I was referring to government audit schemes for CAs where a certain government unit audits a CA under national criteria.


I realize it may seem like I'm being difficult, but I think there's a core piece missing, which is trying to understand why it's important for some members to exclude some other CAs that have had long-standing operations. This is particularly relevant for the discussion of the S/MIME charter, in which there is significant and extant set of 'trusted' certificates, in a variety of software, that does not meet the criteria for participation. They would be excluded from participating in engaging or drafting the new criteria, by virtue of the Forum membership criteria, and I think that's something we should be thinking very carefully about and articulating what properties we expect of CAs and why.

IMHO we need audit requirements that have undergone enough scrutiny and quality assurance. International standards like ISO, WebTrust and ETSI have such a process which provides better assurance for the audit outcome. That's my personal view. We can always listen to other schemes and we would welcome input from governments (as Interested Parties) if they choose to participate. If these schemes became so useful and comparable with existing international schemes, then the S/MIME Working Group could decide to add those schemes in the criteria for Membership and possibly in the produced Guidelines.


            * Covers a period of at least 60 days

    I'm curious for feedback from the ETSI folks, but perhaps a more
    inclusive definition would be
    - "Reports on the operational effectiveness of controls for a
    historic period of at least 60 days"

    The context being that ETSI is a certification scheme, but as
    part of that certification, the CAB "may" ("should") examine the
    historic evidence for some period of time. 7.9 of 319 403 only
    requires "since the previous audit"

    I am not representing ETSI or ACAB'c but if there are concerns
    with this requirement we can solve this issue using the language
    proposed by Wayne "Covers a period of at least 60 days". I would
    use "Covers a period of operations of at least 60 days".


I'm not sure what this is a response to. I was pointing out the issues with the language proposed by Wayne and why it's insufficient, so it's not clear to me how you've resolved that.

This was in response to an audit that covers at least 60 days of operations. You argued that the ETSI scheme doesn't specifically mandate a minimum audit period before issuing an audit report. In practice, CABs use 60-90 days but it's not written in ETSI EN 319 403. Wayne's proposal attempts to add this in the requirements so it's clear that we are always talking about a period-of-time audit report for WebTrust and ETSI.

I hope it's clearer now.
Dimitris.
_______________________________________________
Public mailing list
[email protected]
https://cabforum.org/mailman/listinfo/public

Reply via email to