Re: Facts about Comodo Resellers and RAs

2013-11-22 Thread martinwilson848
I bought Comodo EV SSL from https://cheapsslsecurity.com/comodo/evssl.html, a 
reseller of comodo ssl and other major ssl brands, but thank to their support 
team i never need to face directly to the certification authority - comodo 
itself and got solution from the re-seller's support team.
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Facts about Comodo Resellers and RAs

2009-01-23 Thread lgnt82
Having said that, neither myself nor the company I run have gained
financially from this - currently it seems that all CAs have taken
damage. Reckless behavior is ruining our businesses, the trust we try
to
build and the strengthening of Internet security at large is put into
jeopardy. It is my duty to prevent that if possible.


There is no conflict of interest even if the result of my involvement
would put a competitor out of business - it's their failure not mine.
And with it, they risk the reputation and security of Mozilla and all
relying parties which depend on it. 

Rght.

Couple of observations on all of this (having read most all of the
other original thread) as a disinterested observor (Full disclosure: I
used to resell SSL certs some time back).

1. You kid only your self if you think you have no appearance of
conflict of interest in this issue. You do, in spite of your wishing
not to. But you are not alone. The prior thread was in full dogpile
mode against Comodo by a few who seem to have some baggage against
them by the levels of reaction compared to the severity of the issue
and its corresponding triage by Comodo. IMHO

2. You would do well to reflect and consider whether or not the
complete commodization of domain validated certificates themselves,
both by their very nature (email validation of domain ownership. I
mean really now), as well as the pricing models employed by the
various competitors in the SSL field (yourself notable among them)
have not done more harm to the industry, or more specifically the
relative level of security, authority and credibility of SSL as a
security model, as perceived by users. Once one acknowledges that
being a CA is nothing more than a license to print money, subject to
independent operational audits, then you can have a meaningful
discussion on what 'security' your providing to a user. See EV
validation procedures and their corresponding pricing model, compared
to Organization Validated certs if you care to refute that statement.
Yes, I'm looking at you Verisign.

There is such a low barrier to entry for a Domain Validated
certificate even when the system works correctly. A couple of bucks to
register a domain name with GoDaddy, a couple more (or zero) dollars
to get an SSL cert, and any script kiddy worth his salt can now start
blasting out Please login to your BOA savings account to reverify
your account info, and hope for a MITM opportunity to pop up on his
monitor, DV certs have next to zero credibility on ANY website that
purports to protect personal or financial info. You know that I'm
sure. There are tons MITM attacks sucessfully carried out every year
by crooks who have VALID DV certs on their fraud sites. How do you
think RSA sells so many handheld password tokens? Which begs the
question of why Mozilla needs to suddenly go into fire drill mode over
RA auditing practices with respect to Comodo. Its a joke.

3. I was a little taken aback at the surprise and shock expressed by
the resident experts that Comodo RA resellers do DV authentication (or
at least, are supposed to as part of their resale agreements). Is this
to imply that NONE of the other CAs that have wholesale agreements
with third party resellers allow a DV cert to be sold pending CA
relegated authentication directly? Are we that naive in 2009? Thawt?
Globalsign? Verisign? RapidSSL? GoDaddy? Surely Comodo is not the only
one out there that allows their resellers to perform initial DV cert
validation subject to CA audits. I can't prove it, but I'd bet $20,
the number of primary CAs who do is greater than 1. Someone, it
appears, has never taken a look at the Certification Practice
Statements of the various CA's I guess (to the extent that you can
find them all). I seem to recall that the RSA X.509 spec allows for
this type of subservient RA model as long as proper audit controls are
in place to maintain verification compliance.

In a nutshell, does anyone who declares himself an expert in the SSL
industry REALLY think this cause irreprerable harm to the other CAs?
Should Comodo tighten up on its audit procedures? Certainly looks that
way. But since any primary CA out there who does this probably only
does sample audits (are YOU going to pay KPMG their hourly to go
through every record out in the field? Not bloody likely), the
possibility still exists for that 'rogue' cert to skate by. If total
security is paramount, should not all CAs make sure third party
resellers validate all domains internally through them? Absolutely,
but be careful about the unintended consequences of what that would do
the internal costs to the CAs, and the subsequent knock on costs to
the channel. It might even raise the prices in the street a little if
they all did it at once, somehting positive! However if the X.509 spec
doesn't call for it, whos first in line to volunteer to implement it
for DV certs? Thats what you have OV and EV certs for, no? And
afterall, as all know, money is ultimately the reason in 

Re: Facts about Comodo Resellers and RAs

2008-12-26 Thread Eddy Nigg

Comodo's CPS [1]  lists the following:

1.10.2 Web Host Reseller Partners

Through a “front-end” referred to as the “Management Area”, the Web Host 
*Reseller* Partner has access to the *RA* functionality including but 
not limited to the issuance of Secure Server Certificates  is 
obliged to *conduct validation* in accordance with the validation 
guidelines and agrees via an online process (checking the “I have 
sufficiently validated this application” checkbox when applying for a 
Certificate) that sufficient validation has taken place prior to issuing 
a certificate.


This seems to be exactly in line with my comment [2] and the published 
image [3]. If this is correct, than it is in direct conflict with 
section 4.2.7 PositiveSSL and PositiveSSL Wildcard Secure Server 
Certificates of this statement [4]:


To validate PositiveSSL and PositiveSSL Wildcard Secure Server 
Certificates, *Comodo* checks that the Subscriber has control.

and the use of generic e-mails which ordinarily are only
available to person(s) controlling the domain name administration, for 
example, webmaster@ . . ., postmaster@ . . ., admin@;



This basically means that Comodo outsources domain validation not only 
to RAs but also to resellers. In addition, domain validation is 
effectively circumvented and non-existent for such resellers. The mere 
checking of the checkbox is the only requirement for the issuance of any 
certificate. This is in my opinion insufficient and and undue risk! 
Considering the size of Comodo's reseller and RA network (which I'm sure 
makes up the biggest junk of their certificates issuance), it is 
reasonable to assume that unvalidated certificates exist currently.


Additionally I want to point out that the CPS [4] explicitly states that 
Comodo performs the validation, which however is not the case as we've 
seen with certstar. Since I was reading this document during the review 
period of Comodo this spring, I was fairly convinced that Comodo 
performs those validations.


I request to receive further information about how exactly domain 
control is validated and which controls Comodo has in place to prevent 
fraudulent or mistaken issuance. Incidentally I've found discrepancy in 
statements made by Robin as to the status of certstar in particular and 
concerning domain validation in general.



[1] 
http://www.comodo.com/repository/09_22_2006_Certification_Practice_Statement_v.3.0.pdf

[2] https://bugzilla.mozilla.org/show_bug.cgi?id=470897#c27
[3] https://bugzilla.mozilla.org/attachment.cgi?id=354425
[4] 
http://www.comodo.com/repository/PositiveSSL_addendum_to_the_Certification_Practice_Statement.pdf


--
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: start...@startcom.org
Blog:   https://blog.startcom.org

___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Facts about Comodo Resellers and RAs

2008-12-25 Thread Eddy Nigg

On 12/24/2008 05:44 PM, Eddy Nigg:

I have received also testimonials that Mozilla and Microsoft received
previously complaints and evidences about the business practices of
Comodo. I'm not aware which specific actions were taken back then.


I have to make a small correction about this statement. The complaints 
and evidences mentioned above are not recent and in severity of a lower 
extend than recent events. Thanks.


--
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: start...@startcom.org
Blog:   https://blog.startcom.org
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Facts about Comodo Resellers and RAs

2008-12-24 Thread Eddy Nigg

On 12/24/2008 08:14 PM, Paul C. Bryan:

Eddy: I personally believe you are working for the good of the PKI
infrastructure, but you have to see that being a competitor to Comodo
puts you in a perceived conflict of interest here. Is there no one you
could put your contact(s) in touch with that is in a more neutral
position to evaluate this issue and inform the community?


Paul, I have been active here for some time already. I'm providing my 
knowledge and experience to Mozilla and the community, which might be 
specially interesting, because I know more than many. I see the 
potential issues from various different sides. I have maintained my 
loyalty to Mozilla which doesn't have to be in conflict with any other 
interests I may have. And my interest is to maintain an even level of 
PKI security in the browser for the good of all of us.


Having said that, neither myself nor the company I run have gained 
financially from this - currently it seems that all CAs have taken 
damage. Reckless behavior is ruining our businesses, the trust we try to 
build and the strengthening of Internet security at large is put into 
jeopardy. It is my duty to prevent that if possible.


There is no conflict of interest even if the result of my involvement 
would put a competitor out of business - it's their failure not mine. 
And with it, they risk the reputation and security of Mozilla and all 
relying parties which depend on it.


Unfortunately many others which are in the known haven't come forward 
for unknown reasons. I'd be more than glad if they did. But would you 
prefer if I'd put a middle-man in front of myself? Would you prefer that 
I've sorted it out with Comodo directly? The personal gain could have 
been much higher perhaps.


Rest be assured, that not I'm making any final decisions at Mozilla. 
Frank Hecker who is currently responsible, knows me well enough and has 
the knowledge about this subject. He will make the ultimate decision 
about which actions to take. In this specific case I'm the messenger and 
reporter, but also others have already made their call for action here 
at dev.tech.crypto.


At last, this and other issues concerns all of us - many million users 
depend on the work we are doing here and elsewhere. I have nothing to 
hide, I openly disclose my affiliation (see my signature) upfront. I 
always did. I'm active and involved at different open source and open 
standards projects, maintain connection with major organizations 
throughout the world. I'm certain that my contributions and expertise 
are usually valued.


Thank you for your time!

--
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: start...@startcom.org
Blog:   https://blog.startcom.org
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto