RE: Violations of Baseline Requirements 4.9.10

2017-11-14 Thread Paul Kehrer via dev-security-policy
Hi Ben,

DN: CN=Cartão de Cidadão 001, OU=ECEstado, O=SCEE - Sistema de Certificação
Electrónica do Estado, C=PT

Downloading the issuer (https://crt.sh/?id=8949008) and then running:

openssl ocsp -issuer 8949008.crt -serial 101010101010101101010101010
-no_nonce -url http://ocsp.root.cartaodecidadao.pt/publico/ocsp -noverify

gives this response:

101010101010101101010101010: good
This Update: Nov 14 23:59:47 2017 GMT

So this does not appear to be resolved.


DN: C=PT, O=SCEE, CN=ECRaizEstado

The SCEE root for the Government of Portugal is now responding with
unknown/revoked statuses.


DN: C=PT, O=MULTICERT - Serviços de Certificação Electrónica S.A.,
OU=Accredited Certification Authority, CN=MULTICERT Certification Authority
002

Download https://crt.sh/?id=8642581 and run:

openssl ocsp -issuer 8642581.crt -serial 101010101010101101010101010
-no_nonce -url http://ocsp.multicert.com/ocsp -noverify

and

openssl ocsp -issuer 8642581.crt -serial 101010101010101101010101010
-no_nonce -url http://ocsp.multicert.com/procsp -noverify

and the responses are:

101010101010101101010101010: good
This Update: Nov 15 00:03:40 2017 GMT
Next Update: Nov 15 00:03:40 2017 GMT

101010101010101101010101010: good
This Update: Nov 15 00:03:58 2017 GMT
Next Update: Nov 15 00:03:58 2017 GMT

Not fixed.


DN: C=PT, O=MULTICERT - Serviços de Certificação Electrónica S.A.,
OU=Entidade de Certificação Credenciada, CN=MULTICERT - Entidade de
Certificação 001

(Issuer: https://crt.sh/?id=128496365)

openssl ocsp -issuer 128496365.crt -serial 1010101010101010101002101010
-no_nonce -noverify -url http://ocsp.multicert.com/ocsp

1010101010101010101002101010: good
This Update: Nov 15 00:15:45 2017 GMT
Next Update: Nov 15 00:15:45 2017 GMT

Also not fixed.

I believe Kathleen has opened bugzilla issues for these so it would
probably be good to copy this correspondence there as well.

-Paul

On November 15, 2017 at 6:50:43 AM, Ben Wilson (ben.wil...@digicert.com)
wrote:

Could someone re-check Multicert and SCEE? (See below.)  They have
indicated to us that they have now patched their OCSP responder systems.



DN: CN=Cartão de Cidadão 001, OU=ECEstado, O=SCEE - Sistema de Certificação
Electrónica do Estado, C=PT

Example cert: https://crt.sh/?id=12729446

OCSP URI: http://ocsp.root.cartaodecidadao.pt/publico/ocsp



DN: C=PT, O=MULTICERT - Serviços de Certificação Electrónica S.A.,
OU=Accredited Certification Authority, CN=MULTICERT Certification Authority
002

Example cert: https://crt.sh/?id=117934576

OCSP URI: http://ocsp.multicert.com/ocsp

OCSP URI: http://ocsp.multicert.com/procsp



DN: C=PT, O=MULTICERT - Serviços de Certificação Electrónica S.A.,
OU=Entidade de Certificação Credenciada, CN=MULTICERT - Entidade de
Certificação 001

Example cert: https://crt.sh/?id=11653177

OCSP URI: http://ocsp.multicert.com/ocsp



DigiCert/Government of Portugal, Sistema de Certificação Electrónica do
Estado (SCEE) / Electronic Certification System of the State:



DN: C=PT, O=SCEE, CN=ECRaizEstado

Example cert: https://crt.sh/?id=8322256

OCSP URI: http://ocsp.ecee.gov.pt
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: Violations of Baseline Requirements 4.9.10

2017-11-14 Thread Ben Wilson via dev-security-policy
Could someone re-check Multicert and SCEE? (See below.)  They have indicated to 
us that they have now patched their OCSP responder systems.



DN: CN=Cartão de Cidadão 001, OU=ECEstado, O=SCEE - Sistema de Certificação 
Electrónica do Estado, C=PT

Example cert: https://crt.sh/?id=12729446

OCSP URI: http://ocsp.root.cartaodecidadao.pt/publico/ocsp



DN: C=PT, O=MULTICERT - Serviços de Certificação Electrónica S.A., 
OU=Accredited Certification Authority, CN=MULTICERT Certification Authority 002

Example cert: https://crt.sh/?id=117934576

OCSP URI: http://ocsp.multicert.com/ocsp

OCSP URI: http://ocsp.multicert.com/procsp



DN: C=PT, O=MULTICERT - Serviços de Certificação Electrónica S.A., OU=Entidade 
de Certificação Credenciada, CN=MULTICERT - Entidade de Certificação 001

Example cert: https://crt.sh/?id=11653177

OCSP URI: http://ocsp.multicert.com/ocsp



DigiCert/Government of Portugal, Sistema de Certificação Electrónica do Estado 
(SCEE) / Electronic Certification System of the State:



DN: C=PT, O=SCEE, CN=ECRaizEstado

Example cert: https://crt.sh/?id=8322256

OCSP URI: http://ocsp.ecee.gov.pt



___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Forbidden Practices: Subscriber key generation

2017-11-14 Thread Doug Beattie via dev-security-policy
Hi Gerv and Kathleen,

We're working on the Mozilla CA self-assessment checklist and referenced 
requirements you have placed on CAs.  On your page of Forbidden or Problematic 
Practices [1], you state that CAs must not generate private keys for signer 
certificates.
CAs must never generate the key pairs for signer or SSL certificates. CAs may 
only generate the key pairs for SMIME encryption certificates.

The Code signing standard [2], section 10.2.4 permits CAs to generate private 
keys for code signing certificates.  Specifically:
If the CA or any Delegated Third Party is generating the Private Key on behalf 
of the Subscriber where the Private Keys will be transported to the Subscriber 
outside of the Signing Service's secure infrastructure, then the entity 
generating the Private Key MUST either transport the Private Key in hardware 
with an activation method that is equivalent to 128 bits of encryption or 
encrypt the Private Key with at least 128 bits of encryption strength. Allowed 
methods include using a 128-bit AES key to wrap the private key or storing the 
key in a PKCS 12 file encrypted with a randomly generated password of more than 
16 characters containing uppercase letters, lowercase letters, numbers, and 
symbols for transport.


The question is, if we issue Code Signing certificates via P12 files in 
compliance with the Code Signing standard, are we out of compliance with the 
Mozilla policy?  How do you recommend we respond to this checklist question?

And the same for S/MIME and SSL certificates.  If CAs generate and then 
securely distribute the keys to the subscribers using similar methods, is that 
permitted provided we implement similar security, or does that practice need to 
immediately stop?  Your guidance in this area would be appreciated.

Side question: Is there a deadline when you expect to receive self-assessments 
from all CAs?  We've found that complying with the checklist means a major 
update to our CPS (among other things...), and I suspect most other CAs will 
also need a major update.

Doug

[1] https://wiki.mozilla.org/CA/Forbidden_or_Problematic_Practices
[2] 
https://casecurity.org/wp-content/uploads/2016/09/Minimum-requirements-for-the-Issuance-and-Management-of-code-signing.pdf


Doug Beattie
Product Mangement
GMO GlobalSign, Inc.
Portsmouth, NH USA

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: .tg Certificates Issued by Let's Encrypt

2017-11-14 Thread josh--- via dev-security-policy
On Tuesday, November 14, 2017 at 8:31:34 AM UTC-8, Kathleen Wilson wrote:
> On 11/14/17 4:34 AM, douglas...@gmail.com wrote:
> > 
> > Do we believe that this issue has been resolved by the Registry and 
> > issuance an resume as normal, or are there ongoing concerns which CAs 
> > should be aware of when issuing certificates to .tg domains?
> 
> Based on information from folks that are monitoring their NS Records, we 
> believe that the .tg Registry problems were fixed on November 1, and 
> have remained fixed since then.

Let's Encrypt disabled issuance to .tg on November 1 as a protective measure. 
The block remains in place. We'd like to lift the block but we have seen no 
evidence that the problem was ever acknowledged or fixed by anyone involved in 
running the .tg registry.

Most of the issuance to .tg during the problematic period was from Let's 
Encrypt (note that validation was successfully completed, Let's Encrypt did not 
mis-issue). Since we disabled issuance to .tg on Nov 1 a lack of new suspicious 
issuance may only reflect our block, not resolution of problems.

The fact that some large companies got control of their domains back may only 
reflect customer service actions.

We are stuck in a difficult situation where we'd like to re-enable issuance to 
.tg but we just don't have confidence that the registry is secure. If anyone 
has any direct evidence we'd greatly appreciate seeing it.

Without more evidence we will simply have to re-enable .tg issuance and monitor 
it for a period of time.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Swiss Government root inclusion request

2017-11-14 Thread westmail24--- via dev-security-policy
Hello Wayne,

At me the link on the pdf file is work correctly from Google Chrome ver. 49, 
but I cannot load this file in my post...
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Swiss Government root inclusion request

2017-11-14 Thread wthayer--- via dev-security-policy
I reviewed the CP/CPS, BR self assessment, audit statement, and other 
information provided as part of this request. Overall, I found the CPS and BR 
self assessment to be lacking in detail, and in some cases the CPS references 
non-public documents.

Here are my specific comments:

- I’m also receiving a 404 periodically when loading 
http://www.pki.admin.ch/public/25-01-2017-BIT-ZertES-Certification-Confirmation-2017_Final.pdf,
 leading me to believe that the file is missing from one or more servers.
- The audit statement linked above doesn’t include the period covered nor list 
any of the sub-CAs covered as required by Mozilla policy section 3.1.4.
- The current 1.4 version of the CPS at 
https://www.bit.admin.ch/adminpki/00243/06257/index.html?lang=de dated 
2017-08-17 uses obsolete descriptions of domain authorization methods in 
section 3.2.2.4. These methods are not described at the level of detail 
required by Mozilla policy and may not comply with the current version of the 
BRs.
- The answer to the self-assessment question 1.3.2 on Delegated Third Parties 
states that “CA does not allow initial identity validation delegated to third 
parties”; however, CPS section 1.3.2 uses the [undefined] term 'Registration 
Agent' to describe what appears may be a Delegated Third Party in 1.3.2.3.
- BR 4.9.3 requires the CA to publicly disclose instructions for problem 
reporting through a readily accessible online means. Section 4.10.2 of the CPS 
states that ‘High-Priority Certificate Problem Reports can be submitted on the 
SG PKI Homepage 24x7’ but I don’t find any clear reference to problem reporting 
at https://www.bit.admin.ch/adminpki/.
- The current 1.4 version of the CPS at 
https://www.bit.admin.ch/adminpki/00243/06257/index.html?lang=de dated 
2017-08-17 does not include information about CAA as required by the latest 
version of the BRs.
- The CP/CPS doesn’t include the conformance statement required by BR section 
2.2.
- The CP/CPS doesn’t specify how it is licensed per Mozilla policy 3.3(3).
- Section 4.1.1 of the CPS describes the enrollment process but does not 
mention how suspicious certificate requests are identified.
- Section 4.2.1 of the CPS does not provide any information on high risk 
certificate requests.
- Section 4.2.2 makes 'Domain names within the range assigned to the requesting 
Registration Agent (as of 3.2.3)' a 'Condition for Approval', but section 3.2.3 
is titled ‘Authentication of individual identity’ and doesn’t appear to 
describe domain restrictions.
- Section 7.1.2.3 refers the reader to the 'Object Identifiers' document at 
https://www.bit.admin.ch/adminpki/00243/index.html?lang=de for subscriber 
certificate profiles. I believe the reference should be to the 'CA Layout and 
Policies' document at the same location.

Please note that responses to section 3 of the BR self-assessment included 
references to a “Checklist”, but I’m unable to load 
http://www.pki.admin.ch/public/83823_Checkliste-Genehm-SSL-TLS-ZertifAntr-CAs-SwissGov-PKI-160513-e_pub.pdf
 (I get a 404), so my comments do not reflect any information contained therein.

Thanks,

Wayne
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: .tg Certificates Issued by Let's Encrypt

2017-11-14 Thread Kathleen Wilson via dev-security-policy

On 11/14/17 4:34 AM, douglas.beat...@gmail.com wrote:


Do we believe that this issue has been resolved by the Registry and issuance an 
resume as normal, or are there ongoing concerns which CAs should be aware of 
when issuing certificates to .tg domains?




Based on information from folks that are monitoring their NS Records, we 
believe that the .tg Registry problems were fixed on November 1, and 
have remained fixed since then.


I have not looked into how Registries are operated and maintained, so 
here is my personal (uneducated) opinion: I think it is possible that 
the .tg Registry could be compromised again. I have no idea if all of 
the newer Registries are using good network and security protocols, 
infrastructure, etc.


I think that we will need to have much deeper investigation and 
discussions about Registries, so I have added this to my to-do list, but 
I will not be able to get to it until January.


Thanks,
Kathleen



___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: .tg Certificates Issued by Let's Encrypt

2017-11-14 Thread Kathleen Wilson via dev-security-policy

On 11/13/17 7:22 PM, Jakob Bohm wrote:


Wouldn't the .tg incident be equally relevant for the e-mail trust bit?
(In which case the first 3 options should say TLS/SSL/e-mail)



Good point. To make it easier, I removed "TLS/SSL", and changed text to 
"certificates containing .tg domains".



Updated as follows:

~~

ACTION 8: Check for issuance of certificates containing .tg domains from 
October 25 to November 2, 2017.


We believe that the .tg Registry was compromised from October 25 to 
November 1, 2017, such that a perpetrator set the Name Server (NS) 
Records for some domains to name servers controlled by them, and then 
successfully obtained certificates for those domains.


Please check the certificates containing .tg domains that chain up to 
your root certificates included in Mozilla's program to ensure that the 
certificate subscriber actually owns the domains included in their 
certificate.


Response Options:

- There are no certificates containing .tg domains that chain up to our 
root certificates included in Mozilla's program.


- There are certificates containing .tg domains that chain up to our 
root certificates included in Mozilla's program, but there were no new 
validations on .tg domains from October 25 to November 2, 2017.


- There are certificates containing .tg domains that chain up to our 
root certificates included in Mozilla's program, and we have re-verified 
the certificates that were issued for .tg domains from October 25 to 
November 2, 2017, and no problems were found.


- We have revoked certificates containing .tg domains that were issued 
between October 25 and November 2, 2017, and have sent information about 
these revoked certificates to Mozilla.


- Other - explain
~~

Thanks,
Kathleen


___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: .tg Certificates Issued by Let's Encrypt

2017-11-14 Thread douglas.beattie--- via dev-security-policy
On Monday, November 6, 2017 at 6:40:58 AM UTC-5, Ben Laurie wrote:
> On 4 November 2017 at 19:54, Kathleen Wilson via dev-security-policy <
> dev-security-policy@lists.mozilla.org> wrote:
> 
> > On 11/4/17 5:36 AM, Daniel Cater wrote:
> >
> > I think those CAs need to re-validate their recently issued SSL certs that
> > contain any *.tg domains, and possibly revoke such certs and send us the
> > info so corresponding entries can be added to OneCRL. But, as this is new
> > to me, I will appreciate thoughtful and constructive input in this.
> 
> 
> Since CT is not (yet) compulsory, it seems you probably have to contact all
> CAs, doesn't it?

Do we believe that this issue has been resolved by the Registry and issuance an 
resume as normal, or are there ongoing concerns which CAs should be aware of 
when issuing certificates to .tg domains?
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy