Re: Symantec Response D

2017-04-10 Thread Ryan Sleevi via dev-security-policy
On Mon, Apr 10, 2017 at 10:55 AM, Steve Medin via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > Issue D: Test Certificate Misissuance (April 2009 - September 2015) > > Symantec has provided complete investigation results for this issue. They > can be found at

Re: Symantec Response P

2017-04-10 Thread Ryan Sleevi via dev-security-policy
Hi Steve, Quick questions: 1) Why was Symantec unable to operate the CRL service for Unicredit? 2) Pursuant to Section 5.7.1 of the Baseline Requirements, Symantec, and all of its sub-CAs, are required to document business continuity and disaster recovery procedures. Had Unicredit been operating

Re: Symantec Response J

2017-04-10 Thread Ryan Sleevi via dev-security-policy
Hi Steve, Quick question: 1) You identified that the root cause was related to a deprecated, but not removed, interface. Your remediation was to remove that interface. a) How many deprecated, but unremoved, interfaces does Symantec have, as of 2017-04-10?

Re: Symantec Response B

2017-04-10 Thread Ryan Sleevi via dev-security-policy
Hi Steve, Some quick follow-ups: 1) You're arguing that "the issuance of this cert didn't impose risk on anyone but this specific customer" a) What factors lead you to that decision? b) What process does Symantec have in place to make such determination? c) Does such process continue to

Re: Symantec Response E

2017-04-10 Thread Ryan Sleevi via dev-security-policy
Hi Steve, Quick questions: 1) To confirm, your response states nothing about any improved procedures or testing put into place regarding this. a) Can you describe what, if anything, Symantec did, beside "fix the bug"? b) What assurances should the community have regarding Symantec's

Re: Symantec Response L

2017-04-10 Thread Ryan Sleevi via dev-security-policy
Hi Steve, Quick questions: 1) You identified that Symantec believed that it was a responsibility to ensure your customers' businesses remain interrupted. a) What is Symantec's process for determining which of these concerns (Baseline Requirements vs customer business) has priority? b) Has

Re: Symantec Response Q

2017-04-10 Thread Ryan Sleevi via dev-security-policy
Hi Steve, Quick questions: 1) What does Symantec believe is a reasonable timeframe to remedy these issues? 2) You stated 18 months, but the issues were present from the 2013/2014 audits, the 2014/2015 audits, and the 2015/2016 audits, all as noted in Issue V. In total, this period spans 30

Re: Symantec Response F

2017-04-10 Thread Ryan Sleevi via dev-security-policy
Hi Steve, Quick follow-up. 1) Your audit reports failed to identify what steps Symantec was taking to proactively resolve these issues. As further demonstrated by Issue Q, Symantec failed to remedy these issues. a) What steps, if any, did Symantec take upon receiving a qualified audit? b)

Re: Symantec Response N

2017-04-10 Thread Ryan Sleevi via dev-security-policy
Hi Steve, Quick questions: 1) What steps, specifically, has Symantec taken to ensure such clarity is provided in the future? 2) What steps, specifically, has Symantec taken to ensure appropriate review prior to the execution of such processes? These questions apply to any process involving CA

Re: Symantec Response R

2017-04-10 Thread Nick Lamb via dev-security-policy
On Monday, 10 April 2017 20:28:53 UTC+1, michael...@gmail.com wrote: > A couple points of clarification please: > > 1) Mr. Byrne clarified his post to note that the flaws in the Symantec API > would allow: retrieval of certificates that included private keys, not the > private keys alone. Was

Re: Symantec Response R

2017-04-10 Thread michaeltheller--- via dev-security-policy
A couple points of clarification please: 1) Mr. Byrne clarified his post to note that the flaws in the Symantec API would allow: retrieval of certificates that included private keys, not the private keys alone. Was this possible? 2) You say, "it's not technically feasible", which implies

Re: Symantec Response R

2017-04-10 Thread Matt Palmer via dev-security-policy
On Mon, Apr 10, 2017 at 02:57:41PM +, Steve Medin via dev-security-policy wrote: > In April 2015, security consultant Chris Byrne responsibly disclosed two > potential vulnerabilities related to our Quick Invite feature, which > enables a reseller to invite pre-selected customers to enroll

Re: Symantec Response L

2017-04-10 Thread Eric Mill via dev-security-policy
On Mon, Apr 10, 2017 at 10:56 AM, Steve Medin via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > Issue L: Cross-Signing the US Federal Bridge (February 2011 - July 2016) > > Symantec, as well as VeriSign, has participated in the FPKI since 2006, > and we take our

Symantec Response B

2017-04-10 Thread Steve Medin via dev-security-policy
Issue B: 1024-bit Certificate Issued Directly From Root (Dec 2013 - Jan 2014) The customer in question informed us of an issue in December 2013 that threatened to seriously disrupt their primary business, and they sought our assistance. The customer's non-browser implementation required a

Symantec Response H

2017-04-10 Thread Steve Medin via dev-security-policy
Issue H: SHA-1 Issuance After Deadline (January 2016) With respect to Issue H, Symantec has no additional comments regarding the perspective outlined in the summary. Please see https://cabforum.org/pipermail/public/2016-January/006519.html for further detail on Symantec's previous commentary

Symantec Response E

2017-04-10 Thread Steve Medin via dev-security-policy
Issue E: Domain Validation Vulnerability (October 2015) With respect to Issue E, Symantec has no additional comments regarding the perspective outlined in the summary. Please see

Symantec Response Q

2017-04-10 Thread Steve Medin via dev-security-policy
Issue Q: Symantec Audit Issues 2016 (December 2015 - November 2016) In our 2014-2015 audits, certain issues were identified that we promptly took action on, including addressing the test certificate incident. We continued these efforts until the Point in Time audit was conducted. We split the

Symantec Response N

2017-04-10 Thread Steve Medin via dev-security-policy
Issue N: Premature Manual Signing Using SHA-1 (July 2016) This matter represents the first time any CA attempted to follow the exception process which was developed over the course of weeks, beginning at the Bilbao CABF face-to-face meeting in May 2016, and with the input of our partners.

Symantec Response L

2017-04-10 Thread Steve Medin via dev-security-policy
Issue L: Cross-Signing the US Federal Bridge (February 2011 - July 2016) Symantec, as well as VeriSign, has participated in the FPKI since 2006, and we take our responsibility as a participant of this program very seriously. When Symantec began participating in FPKI, FPKI rules required two-way

Symantec Response P

2017-04-10 Thread Steve Medin via dev-security-policy
Issue P: UniCredit Sub CA Failing To Follow BRs (April - October 2016) We are committed to keeping our customers, partners and ecosystem informed and taking action when necessary. We recognize that there are issues we are accountable for, such as our March 2016 CA Communication response

Symantec Response V

2017-04-10 Thread Steve Medin via dev-security-policy
Issue V: RA Program Audit Issues (2013 or earlier - January 2017) Symantec has had two different programs that involve delegated third parties associated with publicly trusted TLS and subject to third-party audits: our GeoRoot program and our RA/Affiliate program. GeoRoot refers to our program

Symantec Response R

2017-04-10 Thread Steve Medin via dev-security-policy
Issue R: Insecure Issuance API (2013 or earlier - November 2016) In April 2015, security consultant Chris Byrne responsibly disclosed two potential vulnerabilities related to our Quick Invite feature, which enables a reseller to invite pre-selected customers to enroll for certificates, via

Symantec Response T

2017-04-10 Thread Steve Medin via dev-security-policy
Issue T: RA Program Misissuances (January 2010 - January 2017) Program Background: Symantec has operated an RA program designed to deliver a superior customer experience in global markets where language skills, understanding of local business requirements, and physical local presence are

Symantec Response X

2017-04-10 Thread Steve Medin via dev-security-policy
Issue X: Incomplete RA Program Remediation (February - March 2017) The only Symantec RAs capable of authorizing and issuing publicly trusted SSL/TLS certificates are: CrossCert, Certisign, Certsuperior and Certisur. Symantec continues to maintain a partner program for non-TLS certificates.

Re: Symantec Response R

2017-04-10 Thread Alex Gaynor via dev-security-policy
Hi Steve, Tiny nit-picky follow up question. You said: "it's technically not feasible. This is because Symantec does not have access to our customers' TLS server private keys.". X.509 certificates can of course be used for things besides TLS, when you say "TLS server private keys", is that