Re: CAs and external entities (resellers, outsourcing)

2009-01-12 Thread wolfgang . pietrus
On Dec 31 2008, 12:27 am, Frank Hecker hec...@mozillafoundation.org
wrote:
 Eddy Nigg wrote:
  I edited the Problematic Practices page and added
 https://wiki.mozilla.org/CA:Problematic_Practices#Delegation_of_Domai...

  It might need some improvement. Frank, can you review? This will affect
  obviously only future inclusion requests and is not a resolution to the
  current issue and other CAs which might be affected.

 I'm not totally happy with that language, but I'm supposed to be on
 vacation with my family and don't have time to rewrite it right now.

 I will say however that as a general matter I think it is good CA
 practice to have standard procedures and associated IT systems for
 verifying domain ownership/control and email account ownership/control,
 and to have resellers either use the CA's own systems or use CA-approved
 equivalents. (For example, reseller A might use the CA's own instances
 of such systems, while reseller B might run the same software but on its
 own systems.)

 One reason I say this is good CA practice as opposed to a mandatory
 requirement, is because of cases like enterprise PKIs where the
 enterprises might act as RAs and do verification based on their own
 internal systems (e.g., HR databases).

 Frank

 --
 Frank Hecker
 hec...@mozillafoundation.org

Frank,

The Comodo topic has once again sparked a fierce discussion about the
validity of certificates, how appropriate levels of security and trust
should look like and what to do to establish them.

Since we expect this discussion to have some impact on the
evaluation of requests for Root integration (the current schedule
appears not to be valid anymore)  we wonder whether you can tell us
something about your plans to work on that topic and what does that
mean for all pending requests for integration?!

Kind regards

Wolfgang Pietrus

___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: CAs and external entities (resellers, outsourcing)

2009-01-12 Thread wolfgang . pietrus
On Jan 12, 10:45 am, Eddy Nigg eddy_n...@startcom.org wrote:
 On 01/12/2009 11:27 AM, wolfgang.piet...@t-systems.com:



  Frank,

  The Comodo topic has once again sparked a fierce discussion about the
  validity of certificates, how appropriate levels of security and trust
  should look like and what to do to establish them.

  Since we expect this discussion to have some impact on the
  evaluation of requests for Root integration (the current schedule
  appears not to be valid anymore)  we wonder whether you can tell us
  something about your plans to work on that topic and what does that
  mean for all pending requests for integration?!

 Wolfgang, does your CA rely on RAs? It was my understanding IIRC that it
 is not the case. If the issues raised previously were addressed by you
 and the bug updated accordingly, than I don't think there should be any
 delay in continuing the schedule including the inclusion request of your CA.

Eddy, no we don't rely on external RAs (for services under the root we
made our request for).
Still we see that this discussion potentially will result in some work
to change policies. If this is so, will requests be processed anyway
during that time?

 Frank, is there any reason why no inclusions (and relevant comments
 periods) aren't processed according to schedule? Is there any resolution
 pending which prevents us from doing so?

 --
 Regards

 Signer: Eddy Nigg, StartCom Ltd.
 Jabber: start...@startcom.org
 Blog:  https://blog.startcom.org

Regards

Wolfgang Pietrus

___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Deutsche Telekom/T-Systems CA request

2008-07-22 Thread wolfgang . pietrus
Eddy, Frank,

See the comments of T-Systems (WP as an Acronym of my Name Wolfgang
Pietrus) in the text below.


On Jul 20, 1:37 am, Eddy Nigg [EMAIL PROTECTED] wrote:
 I started to review this inclusion request by reading parts of the
 German version of the CP and CPS, which I understand is the only legal
 document. The English version seems to be a draft only and perhaps not
 legally binding.

 Nevertheless I read mostly the English version which is easier to
 understand. Similar to Kathleen's comment 
 athttps://bugzilla.mozilla.org/show_bug.cgi?id=378882#c46I had difficulty
 to come to positive conclusion concerning their handling of sub
 ordination CAs and about the validation methods this CA requires. Some
 has been answered in the bug, however the CP/CPS is not clear at all in
 that respect and basically the concerns raised by Kathleen haven't been
 addressed.

 Subordinate CAs may be external to T-Systems and as I understand not
 part and covered by the audit performed by EY.

WP: Yes, subordinate CAs may be external to T-Systems. Nevertheless
they are part of the audit in that way, that the auditor did prove our
process to register and issue subordinate CAs. Still this is common
business among  trustcenter service providers.


Instead we are referred
 to contractual obligations without defining what those obligations
 are. Those obligations are not clearly defined anywhere as far as I
 could see. This is a problem which has been pointed out here previously
 and athttp://wiki.mozilla.org/CA:Problematic_Practices

WP: It is true, that the CP does not maintain a detailed list of
obligations for external SubCAs (besides the obligation that they must
comply to all rules within the CP). We didn't see any sense about
that, since we have made the experience that every enterprise (our
customers) is doing the job of building and running a PKI a little bit
different. We have to evaluate those circumstances for every request
just like the Webtrust auditors.
EY will perform ra-audits on a yearly basis. If they don't accept our
subCAs, we will loose the certfication and can and should be removed
from the Root store. Until then we think to be be compliant to this
standard. If Mozilla wants to define its own criteria for subCAs, we
are ready to modify our CP, CPS and in common our modus of operandi to
comply to them.



 Apparently subordinated CAs maintain their own sets of subordinated CA
 certificates - despite the illustrations and descriptions and comments
 telling us otherwise, or the term of root CAs is interpreted differently
 in the CPS and are actually subordinated CAs. Anyway, that's what I
 found out after visiting the suggested URL in comment 52 of bug 
 378882:https://www.pki.dfn.de/

WP: It is true: Those images and the text don't show explicitly the
possibilities of an hierarchical CA structure. Nevertheless the
certificate profile in chapter 7.1.1.2 shows PathLenConstraint = 5,
which should make this clear.


 I couldn't find any clear regulation in respect of the issuing and
 maintaining of subordinated CAs which are themselves subordinated to the
 T-Systems root.

 Validation of email addresses and domain names aren't clearly defined
 (or I might have simply missed the relevant sections).

WP: The CP mentions the requirement, that all data that are part of a
certificate have to be validated by a RA and that those date have to
enable a unique identification. How this can be accomplished, should
be defined be the CPS of the Subordinated CAs that issue user
certifates or other entity certificates. If someone comes up with a
method for evaluating certificate requests, that applies to most of
the enterprises of at least Germany and can be considered feasible, we
will be glad to define this method as mandatory. Until then we prefer
to discuss this issue with our customers directly and evaluate their
methods.

Instead CP/CPS of
 the subordinated CAs are governing and regulating those aspects
 according to 
 commenthttps://bugzilla.mozilla.org/show_bug.cgi?id=378882#c52and domain
 ownership is commented with:

 Checking for the ownership of the domain is part of the legal process
 to come to a contract with those customers (It`s no big deal to examine
 the ownership of the domain via the responsible NIC)

 The legal processes are nowhere defined as far as I could find in the
 CP/CPS nor are alternative minimum requirements concerning validations
 clearly published.

WP: see our previous comments...

I haven't seen any CP/CPS of sub CAs which regulates
 those aspects nor were they examined by Mozilla so far. Nor could I find
 how IP address handled, which domain names are acceptable or anything
 with relevance in that respect (hostnames, wild cards, IP addresses,
 FQDN etc).

WP: We consider those issues not to be part of the Root CP or CPS. In
our opinion the Root defines the policies, but not the methods for the
SubCAs.

The same applies for email address verification. Neither have
 I found how