Thank you for the reminder Chris, we plan on replying to the root inclusion 
application tomorrow with updates on our CPS changes based on Ben's remarks.

Regards,
Leo
________________________________
From: 'Chris Clements' via CCADB Public <[email protected]>
Sent: Tuesday, April 25, 2023 8:07 AM
To: Thomas Zermeno <[email protected]>
Cc: CCADB Public <[email protected]>; Ben Wilson <[email protected]>
Subject: Re: Public Discussion of SSL.com CA Inclusion Request


All,


This is a reminder that the public discussion period on the inclusion 
application of SSL.com will close next Tuesday, on May 2, 2023.


Thank you,

Chris, on behalf of the CCADB Steering Committee

On Fri, Apr 21, 2023 at 4:37 PM Thomas Zermeno 
<[email protected]<mailto:[email protected]>> wrote:
All, We have responded to Ben's comments in Bug #1799533 at 
https://bugzilla.mozilla.org/show_bug.cgi?id=1799533#c10. Kind Regards, Tom

On Friday, 7 April 2023 at 12:14:57 UTC-5 Ben Wilson wrote:

All,

I have just completed a CP/CPS review of SSL.com's CP/CPS v. 1.16 and attached 
it to Bugzilla Bug #1799533 
(https://bugzilla.mozilla.org/show_bug.cgi?id=1799533<http://show_bug.cgi?id=1799533>).
 See https://bugzilla.mozilla.org/attachment.cgi?id=9327554 (Excel Spreadsheet).

I would like SSL.com to read through my comments and respond to them in Bug # 
1799533.

Thanks,

Ben

On Fri, Mar 31, 2023 at 2:58 PM Thomas Zermeno <[email protected]> wrote:

In response to 
https://groups.google.com/a/ccadb.org/g/public/c/mTUkK-gkHPE/m/WBaf7QUnAwAJ, 
starting from the Matthias’ last statement we would like to point to our 
actions as explained in [1], [2] and [3], which demonstrate SSL.com’s ability 
to monitor, analyze and take informed decisions, addressing particular cases in 
accordance with the BRs.

More specifically, our immediate actions demonstrate:

     i) active monitoring of industry channels such as m.d.s.p., which allowed 
capturing a case which was not reported via the required channels, as published 
in our CP/CPS section 4.9.3 per provisions of BRs section 4.9.3;

     ii) ability to respond swiftly with expedited deployment and testing of 
technical control updates (pre-issuance linting), effectively blocking any 
similar issuances;

     iii) provident care to retrospectively test against the entire corpus of 
certificates, confirming no other occurrences exist;

     iv) due diligence by promptly analyzing the technical and compliance 
aspects of the issue at hand, considering the relevant literature and the 
applicable requirements, thus leading to informed decisions instead of acting 
hastily;

     v) eagerness to test our processes and identify possible improvements by 
handling the issue as a real-world case, acting in communication with the 
subscriber and reporter (in this case, the same person).

In our opinion, completing the above-mentioned actions (analysis, decision, 
notification, revocation, retrospection and mitigation) within 26 hours, is not 
a sign of “SSL.com's lack of urgency regarding detecting, handling, and 
responding” as stated in Matthias opening statement.

It is worth explaining the rationale of our actions, and more specifically why 
we didn’t make an earlier revocation decision. Context played a decisive role 
here. If we had received a Certificate Problem Report (CPR) per section 4.9.5 
of the BRs, we would be forced to follow the exact deadlines specified in the 
CPR procedure (confirmation, revocation decision and execution within 24 hours 
of receipt of the CPR). We would have a significantly different approach (lower 
level of analysis depth, lower priority in updating preventive controls, etc.). 
Since this case was reported in a public mailing list, we considered it better 
to do a more in-depth analysis as due diligence and use this time to prioritize 
other equally important actions (preventive controls, retrospection).

Overall, we would like to state that this is not a case of a CA trying to 
escape its obligations. With [3] we made clear that, in our opinion, and in 
accordance with the expectations of the industry, a CA may not arbitrarily 
extend the period of investigation and use it as an excuse to delay revocation. 
We have also been completely transparent and tried to detail the rationale of 
our actions. As stated in [2], if the root store owners considered this a 
violation or found any value in filing an incident report, we would do so. 
However, no such request was made (for the more than two months after our 
December response, which further explained our rationale); on the contrary, [4] 
is a clear indication that our actions were considered reasonable and compliant.

As a publicly-trusted CA, we have handled numerous cases of CPRs reporting 
vulnerable or other forms of compromised keys and we have followed the 
requirements to the letter. Our annual audits confirm our compliance with these 
requirements.

However, we are using this case as a learning opportunity. Handling it as a 
real-world report, rather than as a security researcher’s exercise, allowed us 
to test our processes and draw useful conclusions which will improve our 
understanding and the maturity of our processes going forward. For example, 
this allowed us to do further research on weak keys, which is shortly presented 
in [6] and which will be used in delivering Ballot SC-59.

[1] 
https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/TlhjCJm610I/m/LmlR3tJCBAAJ

[2] https://bugzilla.mozilla.org/show_bug.cgi?id=1800753#c2

[3] https://bugzilla.mozilla.org/show_bug.cgi?id=1800753#c6

[4] https://bugzilla.mozilla.org/show_bug.cgi?id=1800753#c7

[5] https://bugzilla.mozilla.org/show_bug.cgi?id=1800753#c8

[6] https://bugzilla.mozilla.org/show_bug.cgi?id=1800753#c11


On Wednesday, 29 March 2023 at 11:43:00 UTC-5 Matthias van de Meent wrote:
On Tue, 21 Mar 2023 at 21:29, 'Chris Clements' via CCADB Public
<[email protected]> wrote:
>
> All,
>
> This email commences a six-week public discussion of SSL.com’s request to 
> include the following certificates as publicly trusted root certificates in 
> one or more CCADB Root Store Member’s program. This discussion period is 
> scheduled to close on May 2, 2023.
>
> The purpose of this public discussion process is to promote openness and 
> transparency. However, each Root Store makes its inclusion decisions 
> independently, on its own timelines, and based on its own inclusion criteria. 
> Successful completion of this public discussion process does not guarantee 
> any favorable action by any root store.
>
> Anyone with concerns or questions is urged to raise them on this CCADB Public 
> list by replying directly in this discussion thread. Likewise, a 
> representative of the applicant must promptly respond directly in the 
> discussion thread to all questions that are posted.
>
> [...]
>
> Incident Summary (Bugzilla incidents from previous 24 months): [...]
>
> - 1800753: SSL.com: Delayed revocation of certificate with weak key

In this issue I expressed my concerns about SSL.com's lack of urgency
regarding detecting, handling, and responding to reports about, and
awareness of, weak public keys in the timelines required by BRs
4.9.1.1 par.1 item (4).

The issue itself concerns the revocation timeline of a certificate
that contains a public key vulnerable to Fermat Factorization, where
the problem wasn't reported through the CA's normal certificate
problem report flow, but instead was reported on the public forum of
[email protected].

After SSL.com publicly acknowledged that there could be problems with
the certificate (and thus had become aware of the existence of the
problem), they still took more than 24 hours to revoke the certificate
without considering that timeline problematic, with their reasoning
being as follows:

> However, as the current BRs and our CP/CPS remain silent about characterizing 
> the Fermat’s factorization method as “a demonstrated or proven method that 
> can easily compute the Subscriber’s Private Key”, especially without 
> additional details about the number of rounds needed to factor the key, we 
> did not consider that the 24h revocation timeline applied. In particular, we 
> proceeded with revocation within the 5-days timeline defined in BRs 4.9.1.1 
> par.2 item (11), which says (emphasis ours):
>
> “The CA is made aware of a demonstrated or proven method that exposes the 
> Subscriber's Private Key to compromise or **if there is clear evidence that 
> the specific method used to generate the Private Key was flawed** ”.

To me, this argument doesn't hold, because the problem report nor the
certificate identified any information about what way the private key
was generated.

I find it concerning that the CA does not do due diligence and
validate the claims of a report on a potentially problematic
certificate, but instead states that Fermat Factorization is not
mentioned by name in the BR and that the CA thus doesn't have to
revoke the certificate in the 24-hour time window: according to the
first mail from SSL.com in the dev-security-policy mail, the
certificate was to be revoked "out of an abundance of caution", and
not due to the requirements agreed upon in the BR. Because the
relevant public key is factored in 1 round of Fermat's Factorization
Method, this makes it difficult to believe that SSL.com did any work
on validating the claims of the post on the forum: They acknowledged
that the certificate's public key could have problems but did not
effectively act on that suspicion.

This issue makes me wonder whether SSL.com is able to handle reports
on novel weaknesses in public keys appropriately, as they don't seem
to be able to handle knowledge about known vulnerabilities like close
primes/Fermat Factorization without waiting for a CA/B Forum ballot to
get through the approval process.


Note that I don't advocate that all CAs must run hours of Fermat's on
each certificate's public keys, but that when a CA is confronted with
the knowledge that a certificate's public key may be weak to a certain
attack, then it should do its due diligence by testing at the very
least the most trivial version of the attack to check whether the
claim that the PK is vulnerable might be true. In this case, that was
apparently too much for SSL.com.


All in all, I am concerned about SSL.com's ability to comply with the
BR in those places where the BR describes only the broad ideas without
specifics, like those in section 4.9.1.1 par.1 item (4), especially
when it concerns security, key material, and/or revocation timelines
of certificates.


Kind regards,

Matthias van de Meent

--
You received this message because you are subscribed to the Google Groups 
"CCADB Public" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/ccadb.org/d/msgid/public/5c8a49d2-914f-4019-8cd4-fd2487271ad9n%40ccadb.org<https://groups.google.com/a/ccadb.org/d/msgid/public/5c8a49d2-914f-4019-8cd4-fd2487271ad9n%40ccadb.org?utm_medium=email&utm_source=footer>.

--
You received this message because you are subscribed to the Google Groups 
"CCADB Public" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected]<mailto:[email protected]>.
To view this discussion on the web visit 
https://groups.google.com/a/ccadb.org/d/msgid/public/6a8dca06-087e-4818-b41a-5e5212271ffcn%40ccadb.org<https://groups.google.com/a/ccadb.org/d/msgid/public/6a8dca06-087e-4818-b41a-5e5212271ffcn%40ccadb.org?utm_medium=email&utm_source=footer>.

--
You received this message because you are subscribed to the Google Groups 
"CCADB Public" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected]<mailto:[email protected]>.
To view this discussion on the web visit 
https://groups.google.com/a/ccadb.org/d/msgid/public/CAAbw9mCKFij5JEgfSoQZUC7%2BOn8R_mTjo9WSTfYCzq3YU4Zmmg%40mail.gmail.com<https://groups.google.com/a/ccadb.org/d/msgid/public/CAAbw9mCKFij5JEgfSoQZUC7%2BOn8R_mTjo9WSTfYCzq3YU4Zmmg%40mail.gmail.com?utm_medium=email&utm_source=footer>.

-- 
You received this message because you are subscribed to the Google Groups 
"CCADB Public" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/ccadb.org/d/msgid/public/SA1PR13MB5039B2124DE613E2598279F2BF649%40SA1PR13MB5039.namprd13.prod.outlook.com.

Reply via email to