Thank you for the reminder Chris, we plan on replying to the root inclusion application tomorrow with updates on our CPS changes based on Ben's remarks.
Regards, Leo ________________________________ From: 'Chris Clements' via CCADB Public <[email protected]> Sent: Tuesday, April 25, 2023 8:07 AM To: Thomas Zermeno <[email protected]> Cc: CCADB Public <[email protected]>; Ben Wilson <[email protected]> Subject: Re: Public Discussion of SSL.com CA Inclusion Request All, This is a reminder that the public discussion period on the inclusion application of SSL.com will close next Tuesday, on May 2, 2023. Thank you, Chris, on behalf of the CCADB Steering Committee On Fri, Apr 21, 2023 at 4:37 PM Thomas Zermeno <[email protected]<mailto:[email protected]>> wrote: All, We have responded to Ben's comments in Bug #1799533 at https://bugzilla.mozilla.org/show_bug.cgi?id=1799533#c10. Kind Regards, Tom On Friday, 7 April 2023 at 12:14:57 UTC-5 Ben Wilson wrote: All, I have just completed a CP/CPS review of SSL.com's CP/CPS v. 1.16 and attached it to Bugzilla Bug #1799533 (https://bugzilla.mozilla.org/show_bug.cgi?id=1799533<http://show_bug.cgi?id=1799533>). See https://bugzilla.mozilla.org/attachment.cgi?id=9327554 (Excel Spreadsheet). I would like SSL.com to read through my comments and respond to them in Bug # 1799533. Thanks, Ben On Fri, Mar 31, 2023 at 2:58 PM Thomas Zermeno <[email protected]> wrote: In response to https://groups.google.com/a/ccadb.org/g/public/c/mTUkK-gkHPE/m/WBaf7QUnAwAJ, starting from the Matthias’ last statement we would like to point to our actions as explained in [1], [2] and [3], which demonstrate SSL.com’s ability to monitor, analyze and take informed decisions, addressing particular cases in accordance with the BRs. More specifically, our immediate actions demonstrate: i) active monitoring of industry channels such as m.d.s.p., which allowed capturing a case which was not reported via the required channels, as published in our CP/CPS section 4.9.3 per provisions of BRs section 4.9.3; ii) ability to respond swiftly with expedited deployment and testing of technical control updates (pre-issuance linting), effectively blocking any similar issuances; iii) provident care to retrospectively test against the entire corpus of certificates, confirming no other occurrences exist; iv) due diligence by promptly analyzing the technical and compliance aspects of the issue at hand, considering the relevant literature and the applicable requirements, thus leading to informed decisions instead of acting hastily; v) eagerness to test our processes and identify possible improvements by handling the issue as a real-world case, acting in communication with the subscriber and reporter (in this case, the same person). In our opinion, completing the above-mentioned actions (analysis, decision, notification, revocation, retrospection and mitigation) within 26 hours, is not a sign of “SSL.com's lack of urgency regarding detecting, handling, and responding” as stated in Matthias opening statement. It is worth explaining the rationale of our actions, and more specifically why we didn’t make an earlier revocation decision. Context played a decisive role here. If we had received a Certificate Problem Report (CPR) per section 4.9.5 of the BRs, we would be forced to follow the exact deadlines specified in the CPR procedure (confirmation, revocation decision and execution within 24 hours of receipt of the CPR). We would have a significantly different approach (lower level of analysis depth, lower priority in updating preventive controls, etc.). Since this case was reported in a public mailing list, we considered it better to do a more in-depth analysis as due diligence and use this time to prioritize other equally important actions (preventive controls, retrospection). Overall, we would like to state that this is not a case of a CA trying to escape its obligations. With [3] we made clear that, in our opinion, and in accordance with the expectations of the industry, a CA may not arbitrarily extend the period of investigation and use it as an excuse to delay revocation. We have also been completely transparent and tried to detail the rationale of our actions. As stated in [2], if the root store owners considered this a violation or found any value in filing an incident report, we would do so. However, no such request was made (for the more than two months after our December response, which further explained our rationale); on the contrary, [4] is a clear indication that our actions were considered reasonable and compliant. As a publicly-trusted CA, we have handled numerous cases of CPRs reporting vulnerable or other forms of compromised keys and we have followed the requirements to the letter. Our annual audits confirm our compliance with these requirements. However, we are using this case as a learning opportunity. Handling it as a real-world report, rather than as a security researcher’s exercise, allowed us to test our processes and draw useful conclusions which will improve our understanding and the maturity of our processes going forward. For example, this allowed us to do further research on weak keys, which is shortly presented in [6] and which will be used in delivering Ballot SC-59. [1] https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/TlhjCJm610I/m/LmlR3tJCBAAJ [2] https://bugzilla.mozilla.org/show_bug.cgi?id=1800753#c2 [3] https://bugzilla.mozilla.org/show_bug.cgi?id=1800753#c6 [4] https://bugzilla.mozilla.org/show_bug.cgi?id=1800753#c7 [5] https://bugzilla.mozilla.org/show_bug.cgi?id=1800753#c8 [6] https://bugzilla.mozilla.org/show_bug.cgi?id=1800753#c11 On Wednesday, 29 March 2023 at 11:43:00 UTC-5 Matthias van de Meent wrote: On Tue, 21 Mar 2023 at 21:29, 'Chris Clements' via CCADB Public <[email protected]> wrote: > > All, > > This email commences a six-week public discussion of SSL.com’s request to > include the following certificates as publicly trusted root certificates in > one or more CCADB Root Store Member’s program. This discussion period is > scheduled to close on May 2, 2023. > > The purpose of this public discussion process is to promote openness and > transparency. However, each Root Store makes its inclusion decisions > independently, on its own timelines, and based on its own inclusion criteria. > Successful completion of this public discussion process does not guarantee > any favorable action by any root store. > > Anyone with concerns or questions is urged to raise them on this CCADB Public > list by replying directly in this discussion thread. Likewise, a > representative of the applicant must promptly respond directly in the > discussion thread to all questions that are posted. > > [...] > > Incident Summary (Bugzilla incidents from previous 24 months): [...] > > - 1800753: SSL.com: Delayed revocation of certificate with weak key In this issue I expressed my concerns about SSL.com's lack of urgency regarding detecting, handling, and responding to reports about, and awareness of, weak public keys in the timelines required by BRs 4.9.1.1 par.1 item (4). The issue itself concerns the revocation timeline of a certificate that contains a public key vulnerable to Fermat Factorization, where the problem wasn't reported through the CA's normal certificate problem report flow, but instead was reported on the public forum of [email protected]. After SSL.com publicly acknowledged that there could be problems with the certificate (and thus had become aware of the existence of the problem), they still took more than 24 hours to revoke the certificate without considering that timeline problematic, with their reasoning being as follows: > However, as the current BRs and our CP/CPS remain silent about characterizing > the Fermat’s factorization method as “a demonstrated or proven method that > can easily compute the Subscriber’s Private Key”, especially without > additional details about the number of rounds needed to factor the key, we > did not consider that the 24h revocation timeline applied. In particular, we > proceeded with revocation within the 5-days timeline defined in BRs 4.9.1.1 > par.2 item (11), which says (emphasis ours): > > “The CA is made aware of a demonstrated or proven method that exposes the > Subscriber's Private Key to compromise or **if there is clear evidence that > the specific method used to generate the Private Key was flawed** ”. To me, this argument doesn't hold, because the problem report nor the certificate identified any information about what way the private key was generated. I find it concerning that the CA does not do due diligence and validate the claims of a report on a potentially problematic certificate, but instead states that Fermat Factorization is not mentioned by name in the BR and that the CA thus doesn't have to revoke the certificate in the 24-hour time window: according to the first mail from SSL.com in the dev-security-policy mail, the certificate was to be revoked "out of an abundance of caution", and not due to the requirements agreed upon in the BR. Because the relevant public key is factored in 1 round of Fermat's Factorization Method, this makes it difficult to believe that SSL.com did any work on validating the claims of the post on the forum: They acknowledged that the certificate's public key could have problems but did not effectively act on that suspicion. This issue makes me wonder whether SSL.com is able to handle reports on novel weaknesses in public keys appropriately, as they don't seem to be able to handle knowledge about known vulnerabilities like close primes/Fermat Factorization without waiting for a CA/B Forum ballot to get through the approval process. Note that I don't advocate that all CAs must run hours of Fermat's on each certificate's public keys, but that when a CA is confronted with the knowledge that a certificate's public key may be weak to a certain attack, then it should do its due diligence by testing at the very least the most trivial version of the attack to check whether the claim that the PK is vulnerable might be true. In this case, that was apparently too much for SSL.com. All in all, I am concerned about SSL.com's ability to comply with the BR in those places where the BR describes only the broad ideas without specifics, like those in section 4.9.1.1 par.1 item (4), especially when it concerns security, key material, and/or revocation timelines of certificates. Kind regards, Matthias van de Meent -- You received this message because you are subscribed to the Google Groups "CCADB Public" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/5c8a49d2-914f-4019-8cd4-fd2487271ad9n%40ccadb.org<https://groups.google.com/a/ccadb.org/d/msgid/public/5c8a49d2-914f-4019-8cd4-fd2487271ad9n%40ccadb.org?utm_medium=email&utm_source=footer>. -- You received this message because you are subscribed to the Google Groups "CCADB Public" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]<mailto:[email protected]>. To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/6a8dca06-087e-4818-b41a-5e5212271ffcn%40ccadb.org<https://groups.google.com/a/ccadb.org/d/msgid/public/6a8dca06-087e-4818-b41a-5e5212271ffcn%40ccadb.org?utm_medium=email&utm_source=footer>. -- You received this message because you are subscribed to the Google Groups "CCADB Public" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]<mailto:[email protected]>. To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/CAAbw9mCKFij5JEgfSoQZUC7%2BOn8R_mTjo9WSTfYCzq3YU4Zmmg%40mail.gmail.com<https://groups.google.com/a/ccadb.org/d/msgid/public/CAAbw9mCKFij5JEgfSoQZUC7%2BOn8R_mTjo9WSTfYCzq3YU4Zmmg%40mail.gmail.com?utm_medium=email&utm_source=footer>. -- You received this message because you are subscribed to the Google Groups "CCADB Public" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/SA1PR13MB5039B2124DE613E2598279F2BF649%40SA1PR13MB5039.namprd13.prod.outlook.com.
