Bug#718434: ca-certificates: should CAcert.org be included?

2014-03-14 Thread Thomas R. Koll

Am 14.03.2014 um 10:54 schrieb Klaus Ethgen :


> > In a nutshell, if you want CACert to be re-added you must prove
> > CACert and its infrastructure is trustworthy.
> > Something CACert has attempted but even their internal audits have failed.
> 
> Well, CAcert is not more or less trustworth as every other CA in the
> package. In fact, I would trust them much more that such suspect CAs as
> TURKTRUST or Verisign.


Those certificates packaged by and copied over from Mozilla do fullfil their
policy which can be found here: 
http://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/

In the inclusion section your can find a lot of ways to get accepted by Mozilla,
but CACert has failed to fullfil any of those. And to quote from their policy:
"The burden is on the CA to prove that it has met the above requirements.“

But who knows, with CACert’s move from Australia to Germany we could
see some more action behind the efforts for an audit.

Personally I don’t have the CACert root certificate in my trusted certs folder,
instead for every website and service that uses a CACert certificate I check
and accept that cert. 

ciao, tom



signature.asc
Description: Message signed with OpenPGP using GPGMail


Bug#718434: ca-certificates: should CAcert.org be included?

2014-03-13 Thread Thomas R. Koll

Am 13.03.2014 um 17:21 schrieb Christoph Anton Mitterer :

> I doubt that the removal of CAcert was a good decision…


I wish you would have read the whole the bug report, especially the history
of how the CACert root certificate came into ca-certificates.

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718434#20 and
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718434#30

In a nutshell, if you want CACert to be re-added you must prove
CACert and its infrastructure is trustworthy.
Something CACert has attempted but even their internal audits have failed.

ca-certificates didn’t have much of a policy until recently, but giving that
a good, secure policy can take quite some work, relying on Mozilla
is a sensible policy. Plus that SPI root cert, but they run debian 
infrastructure.

Please do not reason against the removal, instead you have to
prove (every year in my eyes) that CACert is trustworthy.
Inverting the burden of proof, as it has happended far to often
in these CACert discussions, is unacceptable when talking about security.
A small question to be added and a few people supporting the
request just won’t pull any longer.

Please stop dragging other CAs around for comparison, every CA has to
prove trustworthiness on their own.

ciao, tom


PS: Lastly, this is not an opinion poll. If your only contrib is a +/-1,
close your mail programm.



smime.p7s
Description: S/MIME cryptographic signature


Bug#718434: ca-certificates: should CAcert.org be included?

2013-09-16 Thread Thomas R . Koll

Am 16.09.2013 um 11:46 schrieb "Thijs Kinkhorst" :

> On Sun, September 15, 2013 01:16, Thomas R. Koll wrote:
>> But I just found one request that was official (msg #20), Venzuela's
>> Suscerte
>> and I also see that in #37 you've referred them to Mozilla.
>> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609942#20
>> 
>> It is a double standard that you are applying just for SPI and CACert.
> 
> I think you're confusing two things here. The inclusion process of the
> past, which was just that CA's needed advocating votes from project
> members. The current process is to just rely on what Mozilla does. So this
> explains how the certificates got here, but it's not really relevant. The
> question is to now judge whether CAcert and SPI should remain here, and
> they need not be tied together.


So we can agree then that the inclusion process of the past, simple advocating
without proper checks or an audit, was wrong?
As well as the reasonable condition that the root certificate's issuer or
representatives should request inclusion, not some user.

On them being tied together, it wasn't my intention to say "if one goes the
other has to go as well", I merely pointed that they did get
into ca-certificates in a bundle and that the whole, very sensitive thing
happened without much thought.

I haven't read through mozilla's proceedings[0] yet but found this list of 
pending requests:
http://www.mozilla.org/projects/security/certs/pending/index.html
And SUSCERTE is on hold there.


> CAcert is a bit of a special case because it's the only real community CA,
> and in that sense very different from the other CA's, and in that sense
> also close at heart to the way Debian operates.
> 
> I fully agree that CAcert has been less than stellar in the past on the
> trustworthiness area.
> 
> Nonetheless, I do not perceive the current situation to have any sign of
> there being a real threat or risk to the model. I would be inclined to
> keep the status quo, as to give this sympathetic community effort, which
> can't "just" get itself audited, a chance. As said, I don't think we would
> gain significant added security in Debian by dropping it, even though
> there probably would be enough concerns when it would be newly added. I
> know, it's more an inclination than a fact-based reasoning. But this is
> precisely because CAcert is special and it is a fact that it operates very
> differently from commercial CA's.


First of all: **Security needs facts**, drop every gut-feeling you have in the 
matter.

Secondly: Yes, CACert is something special, as a community even more, but still
they need to keep their private keys safe. And CACert must be able to give 
everyone,
who distributes and vouches (and ca-certifactes is doing that) for their
root certifcates, give a strong assurance that they are safe to do so.
Distributing root certificates has no clear laws like selling a car does.
If you were to build and operate, or even sell, a community-designed car
you'd have to bow to the same laws as a commercial car manufacturer has.[1]



>> And madduck was happy to comply. We know nothing about SPI, how they
>> create their root certifactes, who can issue new ones and they didn't
>> even ask for it.
> 
> Why do you think we know nothing about it? SPI is an association very
> closely associated with Debian. We know a lot about SPI and its workings.

sorry, that "know nothing about SPI, how" was victim of my wild copyediting
and should read something like "We know nothing about how SPI creates…"

Do you know about how they create, store and secure their root certificates?
Did they ever ran an internal or external audit to ensure this security?
It is good that SPI was thinking about not issuing certificates itself,
this would take the burden of an audit from their shoulders.
I couldn't find any information on any audit, but maybe someone higher up
Debian or SPI can tell us.

I know it will look quite idiotic to remove the one root certificate that
has signed the certificates for Debian, but still they should comply
to the same strict rules like anyone else.
You think, the SPI root certificate is distributed on a lot of servers,
likely for debian's package servers as well.
Are you really saying that you don't bother about wether one could get their
hands on SPI root, create a fake debian certificate and mess with
seriously dangerous things? It would be a large operation but the less weak 
points
in this chain, the more secure the system is.

And that's without thinking about the endless number of other applications
relying on the trust ca-certificates has into the root certificates.
Many applications I come accross won't accept self-signed certifi

Bug#718434: ca-certificates: should CAcert.org be included?

2013-09-15 Thread Thomas R. Koll
This already went to Michael only, sorry I kept the rest of you out
by mistake.

 
Yes Michael, facts, that's the one thing this whole issue is missing.

Just read the request to add CACert into mozilla-firefox
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=309564
Yes, this is was a request to do the one thing that
Mozilla itself didn't want. It is like asking Dad(ian)
for ice-cream after Mom(zilla) said no :D

In the very last mail of that discussion madduck turning the
burden of proof upside down.
You shouldn't argue why not to include or remove CACert,
it is CACert who has to proof rock-solid why it
should be considered for inclusion.

Another important aspect, which you find mentioned in the
long mozilla bugreport by mozilla staff and confirmed
by auditor Ian Grigg: Requests for inclusion should *only*
come from officals of the CA.
madduck may be a longtime assurer and have a feel for how good
CACert is, but simply can't have the insight a CACert board member
or auditor has.

But I just found one request that was official (msg #20), Venzuela's Suscerte
and I also see that in #37 you've referred them to Mozilla.
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609942#20

It is a double standard that you are applying just for SPI and CACert.
Oh SPI, how did that get in? By a simple question from Mike Hommey[1]:
   "Now, realistically, adding CACert should be enough for Lenny. Maybe SPI,
could be worth, too."
And madduck was happy to comply. We know nothing about SPI, how they create
their root certifactes, who can issue new ones and they didn't even ask for it.

Remember, we are talking root certificates here, they print passports,
not fake passports but the real ones.
They can print you one for google.com if they feel like it and it would be a 
real one.

I can research a little more if you feel you need more facts before
removing the CACert and SPI root certificates.

KDE years ago took a policy not to include unless an audit or big browser say 
it's okay.
https://bugs.kde.org/show_bug.cgi?id=74290#c16

ciao, tom

[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=309564#129


Am 14.09.2013 um 23:41 schrieb Michael Shuler :

> On 09/14/2013 12:15 PM, Thomas R. Koll wrote:
> 
> <..lots!..>
> 
> I appreciate you adding some good details and your thoughts to this bug
> report, Thomas.


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#718434: ca-certificates: should CAcert.org be included?

2013-09-14 Thread Thomas R. Koll
Hi,

I recently had to read into CACert, wether they are a good
and practical thing to use for https ssl certificates,
with browers red warning messages and what not.
During my research I just stumbled across this bugreport
and like to contribute my ¢2.1

I don't think the other discussion on -legal about the
CACert wanna-be license is the way here.
Instead lets' focus to Ansgar's original question:

   Should CACert.org be included?

If we go back to when it was included into ca-certificates,
in 2003[0], no one asked about the security of the CACert organization itself.
David Ross hadn't yet started his Checklist (aka DRC, I only found a draft[1])
CACert probably didn't know what an audit is and even if, they didn't
expect to still work on it.

Instead that bug 213086 turned into a popularity vote
just like the mozilla bug report did over the years
(as critized by CACert's own auditor).
Btw, that mozilla bug was just recently closed, invalid, after 10 years.
The inclusion in 2003 didn't follow any procedings to check CACert's security.
The certificate of a CA only a few months old was added without a thought!
By distributing, trusting the CACert root certificates you are taking 
responsibility.

On to the audit: CACert tried often, ran internal ones and
in 2008 newly created root certifcates did fail[2]. root certificates!
Not something community-specific like the assurers (who could be anybody).
For the lower standard of Mozilla, they failed to complete, let alone keep the 
schedule.
I wouldn't call them a greedy bunch of capitalists like some do with WebTrust.
And for sure Mozilla's has an idea what an organization of volunteers is.

You must admire someone like Ian Grigg[3] for still working on the audit.
Possibly against people who scream: "We don't need this, it costs money."
10 grand/year for auditing CACert, hey that's what wikipedia can
raise in an hour, and what less than what FreeBSD's Security Officer
raised for his summer of code[4].

Speaking of: FreeBSD did remove[5] CACert's certifcates on grounds of their
Security Officer not taking the risk of distributing an unaudited CA
and Debian should ask the same questions.

Looking at the ca-certificates package, mozilla-sanctioned certificates
make up most of the bunch, CACert is one of two exceptions,
next to spi-inc.org (which I never heard of until now).
It smells like double standard for those two exceptions.


I sincerely do hope CACert does complete the audit, the sooner the better.
Removing their root certificates from ca-certificates,
one of the few places where they are actually distributed,
would put pressure on them to get their act together and pass that audit.


ciao, tom


[0] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=213086
[1] http://rossde.com/CA_review/
[2] first paragraph http://wiki.cacert.org/AuditToDo
[3] https://bugzilla.mozilla.org/show_bug.cgi?id=215243#c158
[4] Even People who want to work on making things more secure do get this sort 
of funding
http://people.freebsd.org/~cperciva/funding.html
[5] http://www.freshports.org/security/ca-roots/

PS: Sorry for sending from a mac.


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org