Re: Clarifications on ETSI terminology and scheme

2018-11-02 Thread Ryan Sleevi via dev-security-policy
On Fri, Nov 2, 2018 at 1:31 PM clemens.wanko--- via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> II. Assessment and certification statements:
> - ETSI requires the auditing of the past period as well as of the current
> operations status:
> o In chapter 7.9 of the ETSI EN 319 403, it is clearly stated that the
> operation records shall be audited (that will be detailed within a future
> updated version of ETSI EN 319 403. On top of that it is planned to make
> the ETSI TS 319 403-2 binding in order to have an even better definition
> what is required to be audits for the past period).
>

However, as has been privately noted in the past, a CAB may achieve this
requirement by examining a single operational record or issued certificate,
without regard to any other actions. Or they may not consider any
certificates at all, and merely consider other operational aspects; for
example, that the policy management authority met to review the policy
documentation. While you may argue that a well-behaved CAB would not
undertake such a limited examination, I hope you can provide a citation if
this is, in fact, not permitted within the scheme.

I do not believe that having 119 403-2 binding will, in and of itself,
improve this situation. This is perhaps a difference in fundamental
approach with regards to the framework used by ISO/IEC 17065 and the
necessary and desired output. More work would be needed to resolve this in
a satisfactory way.

However, independent of whatever normative requirements may existing within
the framing of 119 403-2, 319 403, or more broadly, ISO/IEC 17065, we must
separately assess whether or not the result is meeting that of community
expectations. As we've seen, there are auditors who have found ways to
achieve the necessary transparency and assurance despite 319 403 not
formally requiring this. Similarly, in the context of WebTrust, we've seen
there are auditors who meet not just the letter, but the spirit, and there
are auditors that ostensibly fail to meet both.

With regards to past activities - or those of assessing for future - I hope
we can agree that repeated failures by a TSP demonstrate a failure of the
CAB to appropriately review and supervise. As the CAB and Supervisory Body
(in the context of qualified services, as that is the only place it
operates ex ante) both serve to review those changes, output which is
non-conforming demonstrates not just a failure by the TSP, but also that of
the CAB.


> Let’s keep in mind - please! - we are all pulling the same rope for more
> security more confidence and reliability. We should take extra care to pull
> in the same direction - all together - and invest our precious energy in
> improving the ecosystem rather than blaming each other with the high risk
> of damaging it.


While this is a compelling call, within the context of CABs, a CAB that
does not "pull their weight" is in fact a CAB that "drags everyone down";
whether you prefer to think of that, in the context of this metaphor, as
pulling in the opposite direction or, perhaps more clearly compared,
'getting in the way,' the role of CABs in the CA ecosystem is not one of
receiving participation stickers for showing up. They perform a necessary
and critical function, and the failure to adhere to those expectations is
reason to have meaningful discussion and take steps to correct the issue.

In the CA and auditor ecosystem, those steps include matters like
distrusting CAs or disqualifying auditors. It is not acceptable, nor has it
ever been, to suggest that there are no consequences for misissuance or
dereliction of duty, whether on behalf of the CA or the auditor. When an
entity poses or introduces risk to the ecosystem, the ecosystem
appropriately responds by cutting that risk out. That is not to say there
are not opportunities to improve, but it would be irresponsible to suggest
that we ignore the active damage being caused in the name of comity and
camaraderie - to do so is foolishness.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Clarifications on ETSI terminology and scheme

2018-11-02 Thread clemens.wanko--- via dev-security-policy
Dear all, 
on behalf of ACAB’c we like to comment on that as follows:

We would like to clarify the following normative points defined by the EA and 
by the ISO/IEC 17065/ETSI/eIDAS:

I.  Accreditation of CAB:
- The eIDAS/ETSI accredited CAB in Europe are in general all accredited 
according ISO/IEC 17065 in conjunction with ETSI EN 319 403. It is not possible 
to be purely accredited according to ETSI EN 319 403 as that is a supplementary 
standard refining the ISO/IEC 17065 especially for the conformity assessment of 
trust services. This is clearly indicated in the introduction of the ETSI EN 
319 403. The CAB is accredited against ISO/IEC 17065. The ETSI EN 319 403 
however is incorporated in the accreditation to address the specific 
requirements for assessment of trust services – even if it might not be 
explicitly listed in a accreditation certificate.
- In general NAB can accredit organizations against the ISO norms as listed 
here: 
http://www.european-accreditation.org/what-is-accreditation#2
- The EA statement where ETSI EN 319 403 is defined as supporting norm for 
accreditation according ISO/IEC 17065 of CAB assessing TSP can be found here: 
http://www.european-accreditation.org/information/etsistandard-en-319-403-published-to-provide-requirements-for-conformity-assessmentbodies-assessing-trust-service-providers-tsps

II. Assessment and certification statements: 
- ETSI requires the auditing of the past period as well as of the current 
operations status: 
o In chapter 7.9 of the ETSI EN 319 403, it is clearly stated that the 
operation records shall be audited (that will be detailed within a future 
updated version of ETSI EN 319 403. On top of that it is planned to make the 
ETSI TS 319 403-2 binding in order to have an even better definition what is 
required to be audits for the past period).
- ETSI covers aspects of the future operations of the TSP as there are 
obligations for TSP to inform the CAB (according ETSI EN 319 403, chapter 7.10) 
in case of any planned changes of the operations before implementation is done 
and the supervisory body accordingly (see eIDAS Article 24, Para 2 a). 
- If the TSP is performing changes without informing the CAB, the CAB may 
withdraw the certificate according to chapter 7.11 of ISO/IEC 17065.


Looking at the discussion in general we see that there is a lot of energy 
invested by the different players in the ecosystem. This results in threats and 
postings and answers to those and answers to the answers…

That high attention in general is definitely to be judged positive. We need 
that!

We however urgently like to advertise for a discussion leading to
- balanced judgements (the world is NOT black and white!),
- an improvement of processes (like incident detection and processing),
- more security and assurance for all players in the ecosystem.

Let’s keep in mind - please! - we are all pulling the same rope for more 
security more confidence and reliability. We should take extra care to pull in 
the same direction - all together - and invest our precious energy in improving 
the ecosystem rather than blaming each other with the high risk of damaging it.

We - the ETSI and WebTrust auditors - will sit together in December in Berlin 
to take up that point for further improvements and as discussed in Shanghai we 
certainly should interface in a dedicated CA/B-Forum workinggroup to the 
browsers and the CAs.

Best regards
Clemens, ACAB'c
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Clarifications on ETSI terminology and scheme

2018-10-31 Thread Ryan Sleevi via dev-security-policy
On Wed, Oct 31, 2018 at 4:05 PM Dimitris Zacharopoulos 
wrote:

> > For example, when we talk about expectations of CAs, we don't talk about
> > what they 'could' do, we talk about what they MUST do, because at the end
> > of the day, that's the bar they're being held to. It's certainly true
> that
> > a given TSP may go above and beyond some bar, but that doesn't mean we
> can
> > say "CAs do X", because they aren't required to. The same logic applies
> in
> > the discussion of CABs - it does not make sense to discuss how they
> 'could'
> > interpret it, but rather, what they MUST do.
>
> ISO 17065 and ETSI EN 319 403 include normative requirements for CABs
> just as the Baseline Requirements and ETSI EN 319 411-1 do for TSPs. I
> don't understand why you think it is any different for CABs. For
> example, the baseline requirements mandate that "The CA SHALL maintain a
> continuous 24x7 ability to respond internally to a high-priority
> Certificate Problem Report, and where appropriate, forward such a
> complaint to law enforcement authorities, and/or revoke a Certificate
> that is the subject of such a complaint".
>
> It doesn't specify exactly how a CA shall respond internally to such a
> request. It must have a process and the CAB will evaluate it.
>
> Similarly for CABs, under 7.13.1 of 17065 "The certification body shall
> have a documented process to receive, evaluate and make decisions on
> complaints and appeals. The certification body shall record and track
> complaints and appeals, as well as actions undertaken to resolve them".
>
> It doesn't specify exactly how the CAB shall fulfill this requirement
> but each competent CAB must demonstrate to their NAB that they have a
> documented process that fulfills this criteria, is effective and efficient.
>
> Even in the introduction section of 17065, you see the same use of words
> SHALL, SHOULD, MAY, CAN as described in RFC2119.
>

We've now so fully drifted from the original discussion that it's clear to
see we're talking about very different things, and thus confusion is
understandable.

For context, this particular discussion began in
https://groups.google.com/d/msg/mozilla.dev.security.policy/Q9whve-HJfM/niS5Y2f0AQAJ
, and in particular, the discussion about "If the CAB" does X. The point of
my criticism to this statement has been that the CAB is not required to do
X, they may do X, but they aren't mandated to do X.

I believe you interpreted my remark of "no notification will be made to
relying parties" is that it's impossible to notify RPs, and so you raised
an example of how a CAB might hypothetically do so. I was not trying to
state that - merely, that CABs do not have a normative requirement to
notify RPs of this change, and so as a matter of "Can you rely on this",
the answer is "No". Yes, some CABs may, but if a CAB doesn't, or if they
make mistakes, they've not violated any requirements.

And that's just as equally applicable to CAs. When a CA MUST "have a
process", we cannot make assumptions or rely on what that process does or
how it might result. When a CAB MUST "have a process", we cannot make
assumptions or rely on what they do in that process. I would hope we're in
violent agreement there.

> It's the same way that when we talk about the BRs, it's pointless to talk
> > about how some CAs may go above and beyond in their CPS, when discussing
> > the CA ecosystem or a particular (different) CA's misissuance. What
> matters
> > is the baseline expectations here.
>
> Some baseline expectations are not overly prescriptive in the BRs for
> CAs nor in the "BRs for CABs" (i.e. ISO 17065 and ETSI EN 319 403).
> Information Security Management Systems can have significantly different
> implementations but must maintain specific principles. This is where
> illustrative controls and recommended practices come in so that the
> auditors can evaluate if the principles are met but it's always subject
> to the opinion of the CAB (when auditing TSPs), and to the NAB (when
> assessing CABs).
>

My attempt to explain-by-analogy, to hopefully get us talking about the
same thing, has unfortunately lead to even more divergence. I hope that,
with the above clarifications to what we're originally talking about, we
can get back on the same page.

That said, because it contains some confusion, it at least bears
highlighting. As mentioned during the recent CABForum, illustrative
controls do not serve the purpose you are describing, neither do
recommended practices. They have no 'force' to ensure that things must be
'equivalent-or-better'. They're not even hints. They're just that -
illustrative.

One cannot and should not make any assumptions that the existence of
illustrative examples means that you will get the same results. It's
entirely valid to wholly ignore those illustrative controls and recommended
practices, end up with something completely opposite, and yet have fully
fulfilled the requirements.

This is why prescriptive controls are more 

Re: Clarifications on ETSI terminology and scheme

2018-10-31 Thread Dimitris Zacharopoulos via dev-security-policy



On 31/10/2018 8:00 μμ, Ryan Sleevi via dev-security-policy wrote:

[...]

Dimitris, I'm sorry, but I don't believe this is a correct correction.

EN 319 403 incorporates ISO/IEC 17065; much like the discussion about EN
319 411-2 incorporating, but being separate from, EN 319 411-1, the
structure of EN 319 403 is that it incorporates normatively the structure
of ISO/IEC 17065, and, at some places, extends.

Your description of the system is logically incompatible, given the
incompatibilities in 319 403 and 17065.

You're correct that any applicable national legislation applies, with
respect to the context of eIDAS. However, one can be assessed solely
against the scheme of EN 319 403 and 319 411-1, without going for

qualified.

I have to disappoint you and insist that your statement "As the scheme
used in eIDAS for CABs is ETSI EN 319 403, the CAB must perform their
assessments in concordance with this scheme, and the NAB is tasked with
assessing their qualification and certification under any local
legislation (if appropriate) or, lacking such, under the framework for
the NAB applying the principles of ISO/IEC 17065 in evaluating the CAB
against EN 319 403"

and specifically the use of "or" in your statement, is incorrect. NABs
*always* assess qualification of CABs applying ISO/IEC 17065 AND ETSI EN
319 403 AND any applicable legislation. Only Austria is an exception (if
I recall correctly) because they don't apply ETSI EN 319 403 for CAB
accreditation.

Then, each CAB is accredited for specific standards (e.g. ETSI EN 319
411-1, 411-2, 421, eIDAS regulation and so on).

ISO 17065 and ETSI EN 319 403 apply only to CABs and ETSI EN 319 411-1,
411-2 apply only for TSPs. 411-2 incorporates 411-1 and 401 but does not
incorporate 403 or 17065. They are completely unrelated.


I'm afraid you're still misunderstanding, and I believe, mistating.

It is not ISO/IEC 17065 AND EN 319 403 that a CAB is assessed against.
They're assessed against EN 319 403, which *incorporates* ISO/IEC 17065.
This is the same way that when a TSP is assessed against ETSI EN 319 411-2,
they're not also (as in, separate audit report) assessed against EN 319
411-1; EN 319 411-2 *incorporates* EN 319 411-1.

Now, the CAB may ALSO be accredited for ISO/IEC 17065 (e.g. in the context
of application of other schemes), but I can't find supporting evidence to
support your claim that *both* are required in the context of EN 319 403.
Could you provide further details that you believe would demonstrate this?



I would prefer to let some auditor reply to this but I quickly went 
through 
https://ec.europa.eu/futurium/en/system/files/ged/list_of_eidas_accredited_cabs-2018-07-27.pdf 
and checked out some CAB accreditation letters and it looks like they 
are accredited to both "(ISO/IEC 17065 + ETSI EN 319 493 + eIDAS 
Art.3.18 scope of accreditation)".


I think it is also clearly stated in ETSI EN 319 403 that lists ISO 
17065 as a Normative reference and also:


"ISO/IEC 17065 [1] is an international standard which specifies general 
requirements for conformity assessment bodies (CABs) performing 
certification of products, processes, or services. These requirements 
are not focussed on any specific application domain where CABs work. In 
the present document the general requirements are *supplemented* to 
provide additional dedicated requirements for CABs performing 
certification of Trust Service Providers (TSPs) and the trust services 
they provide towards defined criteria against which they claim conformance."


"The present document also *incorporates* many requirements relating to 
the audit of a TSP's management system, as defined in ISO/IEC 17021 
[i.12] and in ISO/IEC 27006 [i.11]. These requirements are incorporated 
by including text to derived from these documents in the present 
document, as well indirectly through references to requirements of 
ISO/IEC 17021 [i.12]."


So, in my understanding, ISO 17065 must be fully covered and some 
elements if ISO 17021 are incorporated. ETSI EN 319 403 supplements 17065.



I don't think this is a valid criticism, particularly in the context of

the

specific case we're speaking about. I'm speaking about what's required -
you're speaking about what's possible. Many things are possible, but what
matters for expectations is what is required. 7.11.3 simply defers to the
scheme to specify, which EN 319 403 does not as it relates to this
discussion.


ISO 17065 sets the base and 7.11.3 describes the principles that need to
be followed. It is very likely that different CABs will choose to
implement this principle in a different way but at the end of the day,
their implementation must satisfy the principle and they are evaluated
by the NAB that ensures the principles are met.


Yes, which does not mean it provides any baseline assurance for relying
parties, which matters.

For example, when we talk about expectations of CAs, we don't talk about
what they 'could' do, we talk about what they MUST do, 

Re: Clarifications on ETSI terminology and scheme

2018-10-31 Thread Ryan Sleevi via dev-security-policy
On Wed, Oct 31, 2018 at 12:55 PM Dimitris Zacharopoulos via
dev-security-policy  wrote:

>
>
> On 31/10/2018 4:47 μμ, Ryan Sleevi via dev-security-policy wrote:
> > There's a lot of nitpicking in this, and I feel that if you want to
> > continue this discussion, it would be better off in a separate thread on
> > terminology. I disagree with some of the claims you've made, so have
> > corrected them for the discussion.
> >
> > I would much rather keep this focused on the discussion of TUVIT as
> > auditors; if you feel that the nitpicking is relevant to that discussion
> > (which I don't believe anything you've said rises to that level), we
> should
> > certainly hash it out here. This is why I haven't forked this thread yet
> -
> > to make sure I've not misread your concern. However, if there's more
> > broadly a disagreement, but without impact to this discussion, we should
> > spin that out.
>
> Indeed, my comments were more related to the ETSI terminology so I
> created a new thread. More answers in-line.
>
> >
> > On Wed, Oct 31, 2018 at 7:11 AM Dimitris Zacharopoulos  >
> > wrote:
> >
> >> On 30/10/2018 6:28 μμ, Ryan Sleevi via dev-security-policy wrote:
> >>> This establishes who the CAB is and who the NAB is. As the scheme used
> in
> >>> eIDAS for CABs is ETSI EN 319 403, the CAB must perform their
> assessments
> >>> in concordance with this scheme, and the NAB is tasked with assessing
> >> their
> >>> qualification and certification under any local legislation (if
> >>> appropriate) or, lacking such, under the framework for the NAB applying
> >> the
> >>> principles of ISO/IEC 17065 in evaluating the CAB against EN 319 403.
> The
> >>> NAB is the singular national entity recognized for issuing
> certifications
> >>> against ISO/IEC 17065 through the MLA/BLA and the EU Regulation No
> >> 765/2008
> >>> (as appropriate), which is then recognized trans-nationally.
> >> Some clarifications/corrections because I saw some wrong usage of terms
> >> being repeated.
> >>
> >> A CAB MUST perform their assessments applying ISO/IEC 17065 AND ETSI EN
> >> 319 403 AND any applicable legislation (for EU CABs this includes
> >> European and National legislation).
> >>
> > Dimitris, I'm sorry, but I don't believe this is a correct correction.
> >
> > EN 319 403 incorporates ISO/IEC 17065; much like the discussion about EN
> > 319 411-2 incorporating, but being separate from, EN 319 411-1, the
> > structure of EN 319 403 is that it incorporates normatively the structure
> > of ISO/IEC 17065, and, at some places, extends.
> >
> > Your description of the system is logically incompatible, given the
> > incompatibilities in 319 403 and 17065.
> >
> > You're correct that any applicable national legislation applies, with
> > respect to the context of eIDAS. However, one can be assessed solely
> > against the scheme of EN 319 403 and 319 411-1, without going for
> qualified.
>
> I have to disappoint you and insist that your statement "As the scheme
> used in eIDAS for CABs is ETSI EN 319 403, the CAB must perform their
> assessments in concordance with this scheme, and the NAB is tasked with
> assessing their qualification and certification under any local
> legislation (if appropriate) or, lacking such, under the framework for
> the NAB applying the principles of ISO/IEC 17065 in evaluating the CAB
> against EN 319 403"
>
> and specifically the use of "or" in your statement, is incorrect. NABs
> *always* assess qualification of CABs applying ISO/IEC 17065 AND ETSI EN
> 319 403 AND any applicable legislation. Only Austria is an exception (if
> I recall correctly) because they don't apply ETSI EN 319 403 for CAB
> accreditation.
>
> Then, each CAB is accredited for specific standards (e.g. ETSI EN 319
> 411-1, 411-2, 421, eIDAS regulation and so on).
>
> ISO 17065 and ETSI EN 319 403 apply only to CABs and ETSI EN 319 411-1,
> 411-2 apply only for TSPs. 411-2 incorporates 411-1 and 401 but does not
> incorporate 403 or 17065. They are completely unrelated.
>

I'm afraid you're still misunderstanding, and I believe, mistating.

It is not ISO/IEC 17065 AND EN 319 403 that a CAB is assessed against.
They're assessed against EN 319 403, which *incorporates* ISO/IEC 17065.
This is the same way that when a TSP is assessed against ETSI EN 319 411-2,
they're not also (as in, separate audit report) assessed against EN 319
411-1; EN 319 411-2 *incorporates* EN 319 411-1.

Now, the CAB may ALSO be accredited for ISO/IEC 17065 (e.g. in the context
of application of other schemes), but I can't find supporting evidence to
support your claim that *both* are required in the context of EN 319 403.
Could you provide further details that you believe would demonstrate this?


> > I don't think this is a valid criticism, particularly in the context of
> the
> > specific case we're speaking about. I'm speaking about what's required -
> > you're speaking about what's possible. Many things are possible, but what
> > matters for expectations is