Re: 2018.03.12 Let's Encrypt Wildcard Certificate Encoding Issue

2018-03-12 Thread Ryan Sleevi via dev-security-policy
On Mon, Mar 12, 2018 at 11:38 PM jacob.hoffmanandrews--- via
dev-security-policy  wrote:

> On Monday, March 12, 2018 at 8:22:46 PM UTC-7, Ryan Sleevi wrote:
> > Given that Let's Encrypt has been operating a Staging Endpoint (
> > https://letsencrypt.org/docs/staging-environment/ ) for issuing
> wildcards,
> > what controls, if any, existed to examine the certificate profiles prior
> to
> > being deployed in production? Normally, that would flush these out -
> > through both manual and automated testing, preferably.
>
> We continuously run our cert-checker tool (
> https://github.com/letsencrypt/boulder/blob/master/cmd/cert-checker/main.go#L196-L261)
> in both staging and production. Unfortunately, it tests mainly the higher
> level semantic aspects of certificates rather than the lower level encoding
> aspects. Clearly we need better coverage on encoding issues. We expect to
> get that from integrating more and better linters into both our CI testing
> framework and our staging and production environments. We will also review
> the existing controls in our cert-checker tool.
>
> > Golang's ASN.1 library is somewhat lax, largely in part to both public
> and
> > enterprise CAs' storied history of misencodings.
>
> Agreed that Go's asn1 package is lax on parsing, but I don't think that it
> aims to be lax on encoding; for instance, the mis-encoding of asterisks in
> PrintableStrings was considered a bug worth fixing.
>
> > What examinations, if any,
> > will Let's Encrypt be doing for other classes of potential encoding
> issues?
> > Has this caused any changes in how Let's Encrypt will construct
> > TBSCertificates, or review of that code, beyond the introduction of
> > additional linting?
>
> We will re-review the code we use to generate TBSCertificates with an eye
> towards encoding issues, thanks for suggesting it. If there are any broad
> classes of encoding issues you think are particularly worth watching out
> for, that could help guide our analysis.


Well, you’ve already run into one of the common ones I’d seen in the past -
more commonly with older OpenSSL-based bespoke/enterprise CAs (due to
long-since fixed defaults, but nobody upgrading)

Encoding of INTEGERS is another frequent source of pain - minimum length
encoding, ensuring positive numbers - but given the Go ASN1 package’s
author’s hatred of that, I would be surprised.

Reordering of SEQUENCES has been an issue for at least two wholly
independent CA software stacks when integrating CT support; at least one I
suspect is due to using a HashMap that has non-guarantees ordering
semantics / iteration order changing between runs and releases. These seems
relevant to Go, given its map designs.

SET encodings not being sorted according to their values when encoding.
This would manifest in DNs, although I don’t believe Boulder supports
equivalent RDNs/AVAs.

Explicit encoding of DEFAULT values, most commonly basicConstraints. This
is issue most commonly crops up when folks convert ASN.1 schemas to
internal templates by hand, rather than using compilers - which is
something applicable to Go.

Not enforcing size constraints - on strings or sequences. Similar to the
above, many folks forget to convert the restrictions when converting by
hand.

Improper encoding of parameter attributes for signature and SPKI algorithms
- especially RSA. This is due to the “ANY DEFINED BY” approach and folks
hand rolling, or not closely reading the specs. This is more high-level,
but derived from the schema flexibility.

Variable encoding of string types between Subject/Issuer or
Issuer/NameConstraints. This is more quasigrayarea - there are defined
semantics for this, but few get it right. This is more high-level, but
derived from the schema flexibility.

Not realizing DNSName, URI, and rfc822Name nameConstraints have different
semantic rules - this is more high-level than encoding, but within that set.

certlint/cablint catches many of these, in a large part through using an
ASN.1 schema compiler (asn1c) rather than hand-rolling. Yet even it has had
some encoding issues in the past.

> Also, is this the correct timestamp? For example, examining
> > https://crt.sh/?id=353754255&opt=ocsp
> > Shows an issuance time of Not Before: Mar 12 22:18:30 2018 GMT and a
> > revocation time of 2018-03-12  23:58:10 UTC , but you stated your
> alerting
> > time was 2018-03-13 00:43:00 UTC. I'm curious if that's a bug in the
> > display of crt.sh, a typo in your timezone computation (considering the
> > recent daylight saving adjustments in the US), a deliberate choice to put
> > revocation somewhere between those dates (which is semantically valid,
> but
> > curious), or perhaps something else.
>
> I believe this was a timezone computation error. By my reading of the
> logs, our alerting time was 2018-03-13 23:43:00 UTC, which agrees with your
> hypothesis about the recent timezone change (DST) leading to a mistake in
> calculating UTC times.
> ___

Re: 2018.03.12 Let's Encrypt Wildcard Certificate Encoding Issue

2018-03-12 Thread jsha--- via dev-security-policy
On Monday, March 12, 2018 at 8:27:06 PM UTC-7, Ryan Sleevi wrote:
> Also, is this the correct timestamp? For example, examining
> https://crt.sh/?id=353754255&opt=ocsp
> 
> Shows an issuance time of Not Before: Mar 12 22:18:30 2018 GMT and a
> revocation time of 2018-03-12  23:58:10 UTC , but you stated your alerting
> time was 2018-03-13 00:43:00 UTC. I'm curious if that's a bug in the
> display of crt.sh, a typo in your timezone computation (considering the
> recent daylight saving adjustments in the US), a deliberate choice to put
> revocation somewhere between those dates (which is semantically valid, but
> curious), or perhaps something else.

Adding a little more detail and precision here: Let's Encrypt backdates 
certificates by one hour, so "Not Before: Mar 12 22:18:30 2018 GMT" indicates 
an issuance time of 23:18:30.

Also, you may notice that one of the certificates was actually revoked at 
23:30:33, before we became aware of the problem. This was done as part of our 
regular deployment testing, to ensure that revocation was working properly.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: 2018.03.12 Let's Encrypt Wildcard Certificate Encoding Issue

2018-03-12 Thread jacob.hoffmanandrews--- via dev-security-policy
On Monday, March 12, 2018 at 8:22:46 PM UTC-7, Ryan Sleevi wrote:
> Given that Let's Encrypt has been operating a Staging Endpoint (
> https://letsencrypt.org/docs/staging-environment/ ) for issuing wildcards,
> what controls, if any, existed to examine the certificate profiles prior to
> being deployed in production? Normally, that would flush these out -
> through both manual and automated testing, preferably.

We continuously run our cert-checker tool 
(https://github.com/letsencrypt/boulder/blob/master/cmd/cert-checker/main.go#L196-L261)
 in both staging and production. Unfortunately, it tests mainly the higher 
level semantic aspects of certificates rather than the lower level encoding 
aspects. Clearly we need better coverage on encoding issues. We expect to get 
that from integrating more and better linters into both our CI testing 
framework and our staging and production environments. We will also review the 
existing controls in our cert-checker tool.

> Golang's ASN.1 library is somewhat lax, largely in part to both public and
> enterprise CAs' storied history of misencodings.

Agreed that Go's asn1 package is lax on parsing, but I don't think that it aims 
to be lax on encoding; for instance, the mis-encoding of asterisks in 
PrintableStrings was considered a bug worth fixing.

> What examinations, if any,
> will Let's Encrypt be doing for other classes of potential encoding issues?
> Has this caused any changes in how Let's Encrypt will construct
> TBSCertificates, or review of that code, beyond the introduction of
> additional linting?

We will re-review the code we use to generate TBSCertificates with an eye 
towards encoding issues, thanks for suggesting it. If there are any broad 
classes of encoding issues you think are particularly worth watching out for, 
that could help guide our analysis.

> Also, is this the correct timestamp? For example, examining 
> https://crt.sh/?id=353754255&opt=ocsp 
> Shows an issuance time of Not Before: Mar 12 22:18:30 2018 GMT and a 
> revocation time of 2018-03-12  23:58:10 UTC , but you stated your alerting 
> time was 2018-03-13 00:43:00 UTC. I'm curious if that's a bug in the 
> display of crt.sh, a typo in your timezone computation (considering the 
> recent daylight saving adjustments in the US), a deliberate choice to put 
> revocation somewhere between those dates (which is semantically valid, but 
> curious), or perhaps something else.

I believe this was a timezone computation error. By my reading of the logs, our 
alerting time was 2018-03-13 23:43:00 UTC, which agrees with your hypothesis 
about the recent timezone change (DST) leading to a mistake in calculating UTC 
times.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: TunRootCA2 root inclusion request

2018-03-12 Thread Ryan Sleevi via dev-security-policy
On Mon, Mar 12, 2018 at 10:53 PM, taher.mestiri--- via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> I asked about fast tracks because it's taking long time to get things
> processed related to the fact that all this is running by a community and I
> think it can be great to brainstorm ways to handle maybe work overloads
> even through paid assessments for example.
>

I think very few members of this community would see the time it takes to
get a publicly trusted CA included as a problem. Indeed, it's actually
rather quite the opposite - the time to get a CA included is likely not
long enough, the time to get a CA removed is likely not fast enough, and
the time for certificates to expire is not short enough.


> I hope that you guys can give us a list of major corrections or
> verifications to do within a certain limited time to give us the
> opportunity to get our CA approved without restarting the whole process.
> I hope this is not considered as special treatment as maybe I don't know
> what kind of support you provide in such cases.
>

I shared a number of recommendations, based on the specific incidents
highlighted, and the risks they posed. Restarting the whole process is
something that has been requested of other CAs with similar deficiencies,
because in a large part, this whole ecosystem is based on trust. For a CA
to request inclusion, but not demonstrate sufficient technical
understanding on how to manage that trust, is reasonable grounds to not
trust them. Trust is not automatically granted and then slowly removed -
rather, it's slowly earned, based on the quality of character and continued
display of trustworthiness. In the case of this inclusion request, both the
practices and the policies demonstrated significant gaps from what would be
expected.

An alternative answer might be to deny inclusion for 2 or more years, since
that is often how long it can take to build an organization with both the
technical expertise and the implementation to support it, as even the
'best' CAs can attest. However, I tried to offer a more targeted set of
suggestions, based on the specific deficiencies that caused trust to be
undermined here. While these are only my suggestions, it highlights the
problematic patterns on display.

In the end, I'm not sure why the Tunisian Government feels it should run a
publicly trusted CA, so I don't know if there are other alternatives to
suggest that might offer a more expedient, more secure, more reliable basis
for trust. If that was to be shared, perhaps there are other solutions that
may work. In the absence of that, the failures at the basic and core
competencies of being a publicly trusted CA should be concerning.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: 2018.03.12 Let's Encrypt Wildcard Certificate Encoding Issue

2018-03-12 Thread Ryan Sleevi via dev-security-policy
On Mon, Mar 12, 2018 at 11:22 PM, Ryan Sleevi  wrote:

>
>
> On Mon, Mar 12, 2018 at 10:35 PM, josh--- via dev-security-policy <
> dev-security-policy@lists.mozilla.org> wrote:
>
>> During final tests for the general availability of wildcard certificate
>> support, the Let's Encrypt operations team issued six test wildcard
>> certificates under our publicly trusted root:
>>
>> https://crt.sh/?id=353759994
>> https://crt.sh/?id=353758875
>> https://crt.sh/?id=353757861
>> https://crt.sh/?id=353756805
>> https://crt.sh/?id=353755984
>> https://crt.sh/?id=353754255
>>
>> These certificates contain a subject common name that includes a  “*.”
>> label encoded as an ASN.1 PrintableString, which does not allow the
>> asterisk character, violating RFC 5280.
>>
>> We became aware of the problem on 2018-03-13 at 00:43 UTC via the linter
>> flagging in crt.sh [1].
>
>
Also, is this the correct timestamp? For example, examining
https://crt.sh/?id=353754255&opt=ocsp

Shows an issuance time of Not Before: Mar 12 22:18:30 2018 GMT and a
revocation time of 2018-03-12  23:58:10 UTC , but you stated your alerting
time was 2018-03-13 00:43:00 UTC. I'm curious if that's a bug in the
display of crt.sh, a typo in your timezone computation (considering the
recent daylight saving adjustments in the US), a deliberate choice to put
revocation somewhere between those dates (which is semantically valid, but
curious), or perhaps something else.


> All six certificates have been revoked.
>>
>> The root cause of the problem is a Go language bug [2] which has been
>> resolved in Go v1.10 [3], which we were already planning to deploy soon. We
>> will resolve the issue by upgrading to Go v1.10 before proceeding with our
>> wildcard certificate launch plans.
>>
>> We employ a robust testing infrastructure but there is always room for
>> improvement and sometimes bugs slip through our pre-production tests. We’re
>> fortunate that the PKI community has produced some great testing tools that
>> sometimes catch things we don’t. In response to this incident we are
>> planning to integrate additional tools into our testing infrastructure and
>> improve our test coverage of multiple Go versions.
>>
>> [1] https://crt.sh/
>>
>> [2] https://github.com/golang/go/commit/3b186db7b4a5cc510e71f906
>> 82732eba3df72fd3
>>
>> [3] https://golang.org/doc/go1.10#encoding/asn1
>>
>>
> Given that Let's Encrypt has been operating a Staging Endpoint (
> https://letsencrypt.org/docs/staging-environment/ ) for issuing
> wildcards, what controls, if any, existed to examine the certificate
> profiles prior to being deployed in production? Normally, that would flush
> these out - through both manual and automated testing, preferably.
>
> Given that Let's Encrypt is running on an open-source CA (Boulder), this
> offers a unique opportunity to highlight where the controls and checks are
> in place, particularly for commonNames. RFC 5280 has other restrictions in
> place that have tripped CAs up, such as the exclusively using
> PrintableString/UTF8String for DirectoryString types (except for backwards
> compatibility, which would not apply here), or length restrictions (such as
> 64 characters, per the ASN.1 schema), it would be useful to comprehensively
> review these controls.
>
> Golang's ASN.1 library is somewhat lax, largely in part to both public and
> enterprise CAs' storied history of misencodings. What examinations, if any,
> will Let's Encrypt be doing for other classes of potential encoding issues?
> Has this caused any changes in how Let's Encrypt will construct
> TBSCertificates, or review of that code, beyond the introduction of
> additional linting?
>
>
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: 2018.03.12 Let's Encrypt Wildcard Certificate Encoding Issue

2018-03-12 Thread Ryan Sleevi via dev-security-policy
On Mon, Mar 12, 2018 at 10:35 PM, josh--- via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> During final tests for the general availability of wildcard certificate
> support, the Let's Encrypt operations team issued six test wildcard
> certificates under our publicly trusted root:
>
> https://crt.sh/?id=353759994
> https://crt.sh/?id=353758875
> https://crt.sh/?id=353757861
> https://crt.sh/?id=353756805
> https://crt.sh/?id=353755984
> https://crt.sh/?id=353754255
>
> These certificates contain a subject common name that includes a  “*.”
> label encoded as an ASN.1 PrintableString, which does not allow the
> asterisk character, violating RFC 5280.
>
> We became aware of the problem on 2018-03-13 at 00:43 UTC via the linter
> flagging in crt.sh [1]. All six certificates have been revoked.
>
> The root cause of the problem is a Go language bug [2] which has been
> resolved in Go v1.10 [3], which we were already planning to deploy soon. We
> will resolve the issue by upgrading to Go v1.10 before proceeding with our
> wildcard certificate launch plans.
>
> We employ a robust testing infrastructure but there is always room for
> improvement and sometimes bugs slip through our pre-production tests. We’re
> fortunate that the PKI community has produced some great testing tools that
> sometimes catch things we don’t. In response to this incident we are
> planning to integrate additional tools into our testing infrastructure and
> improve our test coverage of multiple Go versions.
>
> [1] https://crt.sh/
>
> [2] https://github.com/golang/go/commit/3b186db7b4a5cc510e71f90682732e
> ba3df72fd3
>
> [3] https://golang.org/doc/go1.10#encoding/asn1
>
>
Given that Let's Encrypt has been operating a Staging Endpoint (
https://letsencrypt.org/docs/staging-environment/ ) for issuing wildcards,
what controls, if any, existed to examine the certificate profiles prior to
being deployed in production? Normally, that would flush these out -
through both manual and automated testing, preferably.

Given that Let's Encrypt is running on an open-source CA (Boulder), this
offers a unique opportunity to highlight where the controls and checks are
in place, particularly for commonNames. RFC 5280 has other restrictions in
place that have tripped CAs up, such as the exclusively using
PrintableString/UTF8String for DirectoryString types (except for backwards
compatibility, which would not apply here), or length restrictions (such as
64 characters, per the ASN.1 schema), it would be useful to comprehensively
review these controls.

Golang's ASN.1 library is somewhat lax, largely in part to both public and
enterprise CAs' storied history of misencodings. What examinations, if any,
will Let's Encrypt be doing for other classes of potential encoding issues?
Has this caused any changes in how Let's Encrypt will construct
TBSCertificates, or review of that code, beyond the introduction of
additional linting?
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: TunRootCA2 root inclusion request

2018-03-12 Thread Tim Hollebeek via dev-security-policy
My reaction was primarily based on the following suggestion:

"Generally speaking I would insist on the fact that for country CAs, some
kind 
of fast tracks should be established because the impact of time losing at
country level is highly expensive."

The answer is, and must be, no.

-Tim

> -Original Message-
> From: dev-security-policy [mailto:dev-security-policy-
> bounces+tim.hollebeek=digicert@lists.mozilla.org] On Behalf Of
> taher.mestiri--- via dev-security-policy
> Sent: Monday, March 12, 2018 10:54 PM
> To: mozilla-dev-security-pol...@lists.mozilla.org
> Subject: Re: TunRootCA2 root inclusion request
> 
> Dear Tim,
> 
> Not sure your penguin-related example would make the picture sharper or
> ideas clearer.
> 
> I asked about fast tracks because it's taking long time to get things
processed
> related to the fact that all this is running by a community and I think it
can be
> great to brainstorm ways to handle maybe work overloads even through paid
> assessments for example.
> 
> I don't think it's worth to answer either your comments about special
> treatment, as no one has asked for it apart of speeding the process which
is not
> special treatment but respect for users and community, or about how
special
> we feel we are, etc.
> 
> I am not a member of the government, I consider myself member of an open
> global IT community, including but not limited to mozilla, that shares
same
> values of respect and mutual help. I find your answer a bit aggressive
but,
> anyway, maybe I was wrong about something that made you answer the way
> you did... That was not my intention.
> 
> I hope that you guys can give us a list of major corrections or
verifications to do
> within a certain limited time to give us the opportunity to get our CA
approved
> without restarting the whole process.
> I hope this is not considered as special treatment as maybe I don't know
what
> kind of support you provide in such cases.
> 
> At the end, I would reiterate that I shared personal opinions and I am not
> member of the government as this is a public open discussion and I don't
want
> that my opinion impacts negaively the decision taking.
> 
> Best,
> 
> Taher.
> 
> 
> 
> On Tuesday, 13 March 2018 03:06:40 UTC+1, Tim Hollebeek  wrote:
> > Nobody is blocking any country from advancing.  There are no Mozilla
> > rules that prevent any country from having the best CA on the planet.
> > If a bunch of penguins at McMurdo station run an awesome CA, I'll ask
> > some hard questions about how they meet the OCSP requirements with
> > their limited bandwidth, but if they have good answers, I'm fine with
> > internet security now being penguins all the way down.
> >
> > If you want your certificates to be accepted everywhere on the planet,
> > you need to follow the same rules as everyone else on the planet.  No
> > fast tracks or special rules for anyone, no matter how special they
> > feel they are.
> >
> > The same rules for everyone is the only sane route forward.
> > Governments often believe they deserve special treatment, and they may
> > have the ability to force that to be true within their own country,
> > but that doesn't make it a good idea for Mozilla.
> >
> > -Tim
> >
> > > -Original Message-
> > > From: dev-security-policy [mailto:dev-security-policy-
> > > bounces+tim.hollebeek=digicert@lists.mozilla.org] On Behalf Of
> > > taher.mestiri--- via dev-security-policy
> > > Sent: Monday, March 12, 2018 7:31 PM
> > > To: mozilla-dev-security-pol...@lists.mozilla.org
> > > Subject: Re: TunRootCA2 root inclusion request
> > >
> > > Dear All,
> > >
> > > Thank you for your detailed description of your concerns with the
> > > Tunisian
> > CA.
> > >
> > > I have been one of those guys that developped IT communities for
> > > more than
> > 7
> > > years in Tunisia, starting by Tunandroid (Tunisian Android
> > > Community),
> > Google
> > > Developers Groups, organized the best Software Freedom Day in 2012,
> > > supported local Mozilla Community 2013-2014, GDG Country Champion in
> > > Tunisia 2012-2014 and represented the IT community in law projects
> > > to help developing the local ecosystem since 2013 and still.
> > >
> > > The reason why I am telling you this is to assure you that I
> > > perfectly
> > understand
> > > what a community is about: helping each others, making things better
> > > and sharing knowledge. Things have always been inclusive.
> > >
> > > The Tunisian national digital certification agency has been under
> > > pressure
> > for
> > > more then 3 years to have its CA certificates recognized by Mozilla
> > > and
> > they did
> > > all which is possible to do to have the best security standards when
> > > they
> > got
> > > audited and criticized and they have alwyas been very reactive.
> > >
> > > I would highlight that we are speaking here about a national CA
> > > which is completely different from any other type of agencies. We
> > > are speaking
> > about
> > > blocking a whole

Re: TunRootCA2 root inclusion request

2018-03-12 Thread taher.mestiri--- via dev-security-policy
Dear Tim,

Not sure your penguin-related example would make the picture sharper or ideas 
clearer.

I asked about fast tracks because it's taking long time to get things processed 
related to the fact that all this is running by a community and I think it can 
be great to brainstorm ways to handle maybe work overloads even through paid 
assessments for example.

I don't think it's worth to answer either your comments about special 
treatment, as no one has asked for it apart of speeding the process which is 
not special treatment but respect for users and community, or about how special 
we feel we are, etc.

I am not a member of the government, I consider myself member of an open global 
IT community, including but not limited to mozilla, that shares same values of 
respect and mutual help. I find your answer a bit aggressive but, anyway, maybe 
I was wrong about something that made you answer the way you did... That was 
not my intention.

I hope that you guys can give us a list of major corrections or verifications 
to do within a certain limited time to give us the opportunity to get our CA 
approved without restarting the whole process. 
I hope this is not considered as special treatment as maybe I don't know what 
kind of support you provide in such cases. 

At the end, I would reiterate that I shared personal opinions and I am not 
member of the government as this is a public open discussion and I don't want 
that my opinion impacts negaively the decision taking.

Best,

Taher.



On Tuesday, 13 March 2018 03:06:40 UTC+1, Tim Hollebeek  wrote:
> Nobody is blocking any country from advancing.  There are no Mozilla rules 
> that prevent any country from having the best CA on the planet.  If a bunch
> of penguins at McMurdo station run an awesome CA, I'll ask some hard
> questions about how they meet the OCSP requirements with their limited
> bandwidth, but if they have good answers, I'm fine with internet security 
> now being penguins all the way down.
> 
> If you want your certificates to be accepted everywhere on the planet, you
> need to follow the same rules as everyone else on the planet.  No fast
> tracks
> or special rules for anyone, no matter how special they feel they are.
> 
> The same rules for everyone is the only sane route forward.  Governments
> often believe they deserve special treatment, and they may have the ability
> to force that to be true within their own country, but that doesn't make it
> a good idea for Mozilla.
> 
> -Tim
> 
> > -Original Message-
> > From: dev-security-policy [mailto:dev-security-policy-
> > bounces+tim.hollebeek=digicert@lists.mozilla.org] On Behalf Of
> > taher.mestiri--- via dev-security-policy
> > Sent: Monday, March 12, 2018 7:31 PM
> > To: mozilla-dev-security-pol...@lists.mozilla.org
> > Subject: Re: TunRootCA2 root inclusion request
> > 
> > Dear All,
> > 
> > Thank you for your detailed description of your concerns with the Tunisian
> CA.
> > 
> > I have been one of those guys that developped IT communities for more than
> 7
> > years in Tunisia, starting by Tunandroid (Tunisian Android Community),
> Google
> > Developers Groups, organized the best Software Freedom Day in 2012,
> > supported local Mozilla Community 2013-2014, GDG Country Champion in
> > Tunisia 2012-2014 and represented the IT community in law projects to help
> > developing the local ecosystem since 2013 and still.
> > 
> > The reason why I am telling you this is to assure you that I perfectly
> understand
> > what a community is about: helping each others, making things better and
> > sharing knowledge. Things have always been inclusive.
> > 
> > The Tunisian national digital certification agency has been under pressure
> for
> > more then 3 years to have its CA certificates recognized by Mozilla and
> they did
> > all which is possible to do to have the best security standards when they
> got
> > audited and criticized and they have alwyas been very reactive.
> > 
> > I would highlight that we are speaking here about a national CA which is
> > completely different from any other type of agencies. We are speaking
> about
> > blocking a whole country from advancing.
> > 
> > It's already unacceptable to have such long process for country CA, if we
> have
> > to fail and restart we have to fail quickly because time is very valuable.
> We
> > can't afford restarting the process if the Tunisian CA gets rejected but
> instead I
> > think anything can be corrected and updated this is how I.T. works.
> > 
> > Generally speaking I would insist on the fact that for country CAs, some
> kind of
> > fast tracks should be established because the impact of time losing at
> country
> > level is highly expensive.
> > 
> > I have no doubt about your support and hope you can help my country move
> > forward and I am sure that the team in our national digital certification
> agency
> > will do its best to assure you about how seriously we are working to make
> > users globally trusting

2018.03.12 Let's Encrypt Wildcard Certificate Encoding Issue

2018-03-12 Thread josh--- via dev-security-policy
During final tests for the general availability of wildcard certificate 
support, the Let's Encrypt operations team issued six test wildcard 
certificates under our publicly trusted root:

https://crt.sh/?id=353759994
https://crt.sh/?id=353758875
https://crt.sh/?id=353757861
https://crt.sh/?id=353756805
https://crt.sh/?id=353755984
https://crt.sh/?id=353754255

These certificates contain a subject common name that includes a  “*.” label 
encoded as an ASN.1 PrintableString, which does not allow the asterisk 
character, violating RFC 5280.

We became aware of the problem on 2018-03-13 at 00:43 UTC via the linter 
flagging in crt.sh [1]. All six certificates have been revoked.

The root cause of the problem is a Go language bug [2] which has been resolved 
in Go v1.10 [3], which we were already planning to deploy soon. We will resolve 
the issue by upgrading to Go v1.10 before proceeding with our wildcard 
certificate launch plans.

We employ a robust testing infrastructure but there is always room for 
improvement and sometimes bugs slip through our pre-production tests. We’re 
fortunate that the PKI community has produced some great testing tools that 
sometimes catch things we don’t. In response to this incident we are planning 
to integrate additional tools into our testing infrastructure and improve our 
test coverage of multiple Go versions.

[1] https://crt.sh/

[2] https://github.com/golang/go/commit/3b186db7b4a5cc510e71f90682732eba3df72fd3

[3] https://golang.org/doc/go1.10#encoding/asn1
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: TunRootCA2 root inclusion request

2018-03-12 Thread Tim Hollebeek via dev-security-policy
Nobody is blocking any country from advancing.  There are no Mozilla rules 
that prevent any country from having the best CA on the planet.  If a bunch
of penguins at McMurdo station run an awesome CA, I'll ask some hard
questions about how they meet the OCSP requirements with their limited
bandwidth, but if they have good answers, I'm fine with internet security 
now being penguins all the way down.

If you want your certificates to be accepted everywhere on the planet, you
need to follow the same rules as everyone else on the planet.  No fast
tracks
or special rules for anyone, no matter how special they feel they are.

The same rules for everyone is the only sane route forward.  Governments
often believe they deserve special treatment, and they may have the ability
to force that to be true within their own country, but that doesn't make it
a good idea for Mozilla.

-Tim

> -Original Message-
> From: dev-security-policy [mailto:dev-security-policy-
> bounces+tim.hollebeek=digicert@lists.mozilla.org] On Behalf Of
> taher.mestiri--- via dev-security-policy
> Sent: Monday, March 12, 2018 7:31 PM
> To: mozilla-dev-security-pol...@lists.mozilla.org
> Subject: Re: TunRootCA2 root inclusion request
> 
> Dear All,
> 
> Thank you for your detailed description of your concerns with the Tunisian
CA.
> 
> I have been one of those guys that developped IT communities for more than
7
> years in Tunisia, starting by Tunandroid (Tunisian Android Community),
Google
> Developers Groups, organized the best Software Freedom Day in 2012,
> supported local Mozilla Community 2013-2014, GDG Country Champion in
> Tunisia 2012-2014 and represented the IT community in law projects to help
> developing the local ecosystem since 2013 and still.
> 
> The reason why I am telling you this is to assure you that I perfectly
understand
> what a community is about: helping each others, making things better and
> sharing knowledge. Things have always been inclusive.
> 
> The Tunisian national digital certification agency has been under pressure
for
> more then 3 years to have its CA certificates recognized by Mozilla and
they did
> all which is possible to do to have the best security standards when they
got
> audited and criticized and they have alwyas been very reactive.
> 
> I would highlight that we are speaking here about a national CA which is
> completely different from any other type of agencies. We are speaking
about
> blocking a whole country from advancing.
> 
> It's already unacceptable to have such long process for country CA, if we
have
> to fail and restart we have to fail quickly because time is very valuable.
We
> can't afford restarting the process if the Tunisian CA gets rejected but
instead I
> think anything can be corrected and updated this is how I.T. works.
> 
> Generally speaking I would insist on the fact that for country CAs, some
kind of
> fast tracks should be established because the impact of time losing at
country
> level is highly expensive.
> 
> I have no doubt about your support and hope you can help my country move
> forward and I am sure that the team in our national digital certification
agency
> will do its best to assure you about how seriously we are working to make
> users globally trusting our CA protected.
> 
> Best regards,
> 
> Taher Mestiri
> 
> 
> 
> On Monday, 12 March 2018 15:59:55 UTC+1, Ryan Sleevi  wrote:
> > These responses demonstrate why the request is troubling. They attempt
> > to paint it as "other people do it"
> >
> > The risk of removing an included CA must balance the ecosystem
> > disruption to those non-erroneous certs, while the risk to ecosystem
> > inclusion needs to balance both the aggregate harm to the ecosystem
> > (through lowered
> > standards) and the risk to the ecosystem of rejecting the request (of
> > which, until inclusion is accepted, is low)
> >
> > The pattern of issues - particularly for a new CA - is equally
problematic.
> > A CA, especially in light of the public discussions, should not be
> > having these issues in 2018, and yet, here we are.
> >
> > We are in agreement on the objective facts - namely, that there is a
> > prolonged pattern of issues - and the criteria - namely, that CAs
> > should adhere to the policy in requesting inclusion. A strict
> > adherence to those objectives would be to fully deny the request. It
> > sounds like where we disagree, then, is not in the objective facts and
> > criteria, but rather, where the evaluation of that leaves relative to
risk.
> >
> > The position I am advocating is that, even if these individual matters
> > might be seen as less risky, especially, as has been mentioned, this
> > CA is "only" intended for .tn for the most case, the existence of such
> > a pattern (and the means of acknowledging-but-not-resolving-completely
> > these issues) is indicative that there will continue to be serious
> > issues, and that the risk is not simply limited to .tn, but threatens
> > global Internet stability an

Re: TunRootCA2 root inclusion request

2018-03-12 Thread taher.mestiri--- via dev-security-policy
Dear All,

Thank you for your detailed description of your concerns with the Tunisian CA.

I have been one of those guys that developped IT communities for more than 7 
years in Tunisia, starting by Tunandroid (Tunisian Android Community), Google 
Developers Groups, organized the best Software Freedom Day in 2012, supported 
local Mozilla Community 2013-2014, GDG Country Champion in Tunisia 2012-2014 
and represented the IT community in law projects to help developing the local 
ecosystem since 2013 and still.

The reason why I am telling you this is to assure you that I perfectly 
understand what a community is about: helping each others, making things better 
and sharing knowledge. Things have always been inclusive.

The Tunisian national digital certification agency has been under pressure for 
more then 3 years to have its CA certificates recognized by Mozilla and they 
did all which is possible to do to have the best security standards when they 
got audited and criticized and they have alwyas been very reactive. 

I would highlight that we are speaking here about a national CA which is 
completely different from any other type of agencies. We are speaking about 
blocking a whole country from advancing.

It's already unacceptable to have such long process for country CA, if we have 
to fail and restart we have to fail quickly because time is very valuable. We 
can't afford restarting the process if the Tunisian CA gets rejected but 
instead I think anything can be corrected and updated this is how I.T. works. 

Generally speaking I would insist on the fact that for country CAs, some kind 
of fast tracks should be established because the impact of time losing at 
country level is highly expensive.

I have no doubt about your support and hope you can help my country move 
forward and I am sure that the team in our national digital certification 
agency will do its best to assure you about how seriously we are working to 
make users globally trusting our CA protected.

Best regards, 

Taher Mestiri



On Monday, 12 March 2018 15:59:55 UTC+1, Ryan Sleevi  wrote:
> These responses demonstrate why the request is troubling. They attempt to
> paint it as "other people do it"
> 
> The risk of removing an included CA must balance the ecosystem disruption
> to those non-erroneous certs, while the risk to ecosystem inclusion needs
> to balance both the aggregate harm to the ecosystem (through lowered
> standards) and the risk to the ecosystem of rejecting the request (of
> which, until inclusion is accepted, is low)
> 
> The pattern of issues - particularly for a new CA - is equally problematic.
> A CA, especially in light of the public discussions, should not be having
> these issues in 2018, and yet, here we are.
> 
> We are in agreement on the objective facts - namely, that there is a
> prolonged pattern of issues - and the criteria - namely, that CAs should
> adhere to the policy in requesting inclusion. A strict adherence to those
> objectives would be to fully deny the request. It sounds like where we
> disagree, then, is not in the objective facts and criteria, but rather,
> where the evaluation of that leaves relative to risk.
> 
> The position I am advocating is that, even if these individual matters
> might be seen as less risky, especially, as has been mentioned, this CA is
> "only" intended for .tn for the most case, the existence of such a pattern
> (and the means of acknowledging-but-not-resolving-completely these issues)
> is indicative that there will continue to be serious issues, and that the
> risk is not simply limited to .tn, but threatens global Internet stability
> and security. Given that the number of certificates being issued are, from
> your own descriptions, aimed to be measured in the hundreds, further
> highlights that the risk is rather substantial.
> 
> On Mon, Mar 12, 2018 at 2:14 AM, Anis via dev-security-policy <
> dev-security-policy@lists.mozilla.org> wrote:
> 
> > Hi Ryan
> > I am so sorry but is the same error.
> > CN NAME NOT INCLUDE IN THE SAN
> > Local IP ADRESS
> > Policy not upto date 
> > Is clear for me and i understand.
> > All this error became from approuved authority. Is the risk no.
> > Then The ecosystem is not protected!
> > ANIS
> > ___
> > dev-security-policy mailing list
> > dev-security-policy@lists.mozilla.org
> > https://lists.mozilla.org/listinfo/dev-security-policy
> >

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: DigiCert .onion certificates without Tor Service Descriptor Hash extension

2018-03-12 Thread Alex Cohn via dev-security-policy
Thanks, Jeremy.

I also found a certificate [1] with both 16-character.onion and
56-character.onion addresses [2] listed in the SAN. The v3 address is
not included in the 2.23.140.1.31 extension, which seems to violate
the same rule as below. However, v3 addresses include the service's
entire public key in the address itself, so there's nothing to be
gained by embedding a hash of that key in a certificate.

I'm not sure what, if anything, needs to happen in this case. Thoughts?

Alex

[1] https://crt.sh/?id=351449246
[2] https://gitweb.torproject.org/torspec.git/tree/rend-spec-v3.txt

On Mon, Mar 12, 2018 at 7:28 PM, Jeremy Rowley via dev-security-policy
 wrote:
> Thanks Alex. Sorry for the delayed response. I've been traveling today.
> We're reaching out to each of the customers and getting their cert replaced.
>
>
> Looking into this, we did not correctly implement the ballot:
> 1. We didn't add a check to our backend system too verify the cert included
> a descriptor prior to issuance.
> 2. On the front end, we missed requiring a Tor descriptor prior to
> processing the order.
> 3. The validation team received insufficient training on the Tor descriptor
> requirement.
>
> In reality, the issue was too much reliance on the human component of
> asserting the Tor descriptors instead of having a technical control in
> place. We're working on putting those technical controls in place.
>
> Jeremy
>
> -Original Message-
> From: dev-security-policy
> 
> On Behalf Of Alex Cohn via dev-security-policy
> Sent: Sunday, March 11, 2018 9:37 PM
> To: dev-security-policy@lists.mozilla.org
> Subject: DigiCert .onion certificates without Tor Service Descriptor Hash
> extension
>
> In the EV Guidelines [1], Appendix F states "The CA MUST include the CAB
> Forum Tor Service Descriptor Hash extension in the TBSCertificate convey
> hashes of keys related to .onion addresses." This language was added in
> Ballot 201 [2], which had an effective date of 8 July 2017.
>
> The following certificates (and precertificates if the corresponding
> certificate is not in a public CT log) were issued by DigiCert after 8 July
> for .onion domains, but lack the necessary extension:
> https://crt.sh/?q=240277340 (revoked 26 October 2017)
> https://crt.sh/?q=261570255
> https://crt.sh/?q=261570338
> https://crt.sh/?q=261570380
> https://crt.sh/?q=261570384
> https://crt.sh/?q=261579788
> https://crt.sh/?q=261601212
> https://crt.sh/?q=261601280
> https://crt.sh/?q=261601281
> https://crt.sh/?q=261601284
> https://crt.sh/?q=261988060
> https://crt.sh/?q=326491168
> https://crt.sh/?q=326830043
> https://crt.sh/?q=328308725
> https://crt.sh/?q=328961187
> https://crt.sh/?q=329559222
> https://crt.sh/?q=330180704
> https://crt.sh/?q=351449233 (revoked 10 March 2018 after initial email to
> DigiCert)
>
> This was previously discussed on m.d.s.p about a year ago [3].
>
> [1]
> https://cabforum.org/wp-content/uploads/CA-Browser-Forum-EV-Guidelines-v1.6.
> 8.pdf
> [2] https://cabforum.org/2017/06/08/2427/
> [3]
> https://groups.google.com/d/msg/mozilla.dev.security.policy/6pBLHJBFNts/ZtNI
> D_xfAgAJ
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: DigiCert .onion certificates without Tor Service Descriptor Hash extension

2018-03-12 Thread Jeremy Rowley via dev-security-policy
Thanks Alex. Sorry for the delayed response. I've been traveling today.
We're reaching out to each of the customers and getting their cert replaced.


Looking into this, we did not correctly implement the ballot:
1. We didn't add a check to our backend system too verify the cert included
a descriptor prior to issuance. 
2. On the front end, we missed requiring a Tor descriptor prior to
processing the order. 
3. The validation team received insufficient training on the Tor descriptor
requirement. 

In reality, the issue was too much reliance on the human component of
asserting the Tor descriptors instead of having a technical control in
place. We're working on putting those technical controls in place.  

Jeremy

-Original Message-
From: dev-security-policy

On Behalf Of Alex Cohn via dev-security-policy
Sent: Sunday, March 11, 2018 9:37 PM
To: dev-security-policy@lists.mozilla.org
Subject: DigiCert .onion certificates without Tor Service Descriptor Hash
extension

In the EV Guidelines [1], Appendix F states "The CA MUST include the CAB
Forum Tor Service Descriptor Hash extension in the TBSCertificate convey
hashes of keys related to .onion addresses." This language was added in
Ballot 201 [2], which had an effective date of 8 July 2017.

The following certificates (and precertificates if the corresponding
certificate is not in a public CT log) were issued by DigiCert after 8 July
for .onion domains, but lack the necessary extension:
https://crt.sh/?q=240277340 (revoked 26 October 2017)
https://crt.sh/?q=261570255
https://crt.sh/?q=261570338
https://crt.sh/?q=261570380
https://crt.sh/?q=261570384
https://crt.sh/?q=261579788
https://crt.sh/?q=261601212
https://crt.sh/?q=261601280
https://crt.sh/?q=261601281
https://crt.sh/?q=261601284
https://crt.sh/?q=261988060
https://crt.sh/?q=326491168
https://crt.sh/?q=326830043
https://crt.sh/?q=328308725
https://crt.sh/?q=328961187
https://crt.sh/?q=329559222
https://crt.sh/?q=330180704
https://crt.sh/?q=351449233 (revoked 10 March 2018 after initial email to
DigiCert)

This was previously discussed on m.d.s.p about a year ago [3].

[1]
https://cabforum.org/wp-content/uploads/CA-Browser-Forum-EV-Guidelines-v1.6.
8.pdf
[2] https://cabforum.org/2017/06/08/2427/
[3]
https://groups.google.com/d/msg/mozilla.dev.security.policy/6pBLHJBFNts/ZtNI
D_xfAgAJ
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Mozilla Security Blog re Symantec TLS Certs

2018-03-12 Thread Kathleen Wilson via dev-security-policy

All,

Wayne and I have posted a Mozilla Security Blog regarding the current 
plan for distrusting the Symantec TLS certs.


https://blog.mozilla.org/security/2018/03/12/distrust-symantec-tls-certificates/

Kathleen

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: Following up on Trustico: reseller practices and accountability

2018-03-12 Thread Tim Hollebeek via dev-security-policy
You might be interested in the following blog post:

https://www.digicert.com/blog/keeping-subscribers-safe-partner-best-practice
s/

We are continuing to look into whether there are any additional partners or
resellers that are misbehaving.  This may indeed be an area where stricter
requirements are necessary, though it's a complicated problem.

-Tim

> -Original Message-
> From: dev-security-policy [mailto:dev-security-policy-
> bounces+tim.hollebeek=digicert@lists.mozilla.org] On Behalf Of Eric
Mill
> via dev-security-policy
> Sent: Sunday, March 11, 2018 1:16 PM
> To: mozilla-dev-security-pol...@lists.mozilla.org
> Subject: Re: Following up on Trustico: reseller practices and
accountability
> 
> Though I'm not a GlobalSign customer, I'm told that GlobalSign sent the
> following email to its partner ecosystem:
> 
> Dear Partner,
> 
> In reaction to current events related to the private key exposure and mass
> revocation by Trustico/Digicert, GlobalSign is reaching out to its trusted
> Partners and Resellers to survey how they approach customer private key
and
> CSR generation. The most secure method is to generate the keys on the
server
> and then use the CSR when requesting the certificate. If you do generate
> private keys for any of your customers outside of the web server
environment
> where the certificate will be hosted, we request that you stop this
practice
> immediately.
> 
> We ask that all Partners and Resellers complete the following short
> questionnaire as soon as possible or by: Friday, March 16, 2018.
> 
> Compliance questionnaire : [REDACTED]
> Note: Only one questionnaire needs to be completed per company.
> 
> Thank you in advance for your cooperation and attention to this important
> topic.
> 
> Kind regards,
> GlobalSign Security and Compliance
> 
> 
> So it's nice to see that at least one CA is taking action on this topic
without
> being ordered to (that I'm aware of). Obviously not all resellers are like
Trustico
> and perform only a straight certificate pass-through, as Ryan Sleevi
pointed
> out, and key escrow is a necessary part of acting as a host, or CDN, or
other
> authorized representative.
> 
> But surely there is still some way to responsibly look through the
ecosystem for
> resellers that do not perform an authorized function that requires key
escrow.
> Are any other CAs willing to do something like GlobalSign has done?
> 
> Also, it would be very helpful if GlobalSign could share some information
> relating to the responses they get, even if they are aggregated or
anonymized.
> 
> -- Eric
> 
> On Sun, Mar 4, 2018 at 4:04 PM, Eric Mill  wrote:
> 
> > Last week, Trustico (a reseller, formerly for Symantec and now for
> > Comodo) sent 23,000 private keys to DigiCert, to force their
> > revocation. This showed that Trustico had been storing customer keys
> > generated through one or more CSR/key generation forms on their website.
> >
> > Though Trustico disagrees, this appears to be a clear case of routine
> > key compromise for subscribers who obtained their key from Trustico.
> > The security of Trustico's systems, which are not audited or
> > accountable to root program requirements, were storing large amounts
> > of key material whose compromise could have led to the subsequent
> > compromise of connections to tens of thousands of online services.
> >
> > It was also noted that Trustico was exposing key material to
> > interception by a number of third parties through client-side
> > JavaScript embeds, and that Trustico's website had functionality that
> > allowed remote code execution as root on one of their web servers.
> >
> > These m.d.s.p threads document/link to those things:
> >
> > * https://groups.google.com/d/topic/mozilla.dev.security.
> > policy/wxX4Yv0E3Mk/discussion
> > * https://groups.google.com/d/topic/mozilla.dev.security.
> > policy/BLvabFwcJqo/discussion
> >
> > As part of the second thread, Comodo noted:
> >
> > We also asked Trustico to cease offering any tools to generate and/or
> > retain customer private keys.  They have complied with this request
> > and have confirmed that they do not intend to offer any such tools
> > again in the future.
> >
> >
> > That is good to hear, but a "we won't do it again" response, if
> > accepted by Comodo as sufficient, seems disproportionate to the
> > severity of the issue, given Trustico's unfamiliarity with norms
> > around private key management, and with basic security practices.
> >
> > It's also clear from the experience that rules of the road for
> > resellers are unclear, and that accountability is limited. It seems
> > possible, or likely, that other resellers may also be mishandling
> > customer keys
> >
> > So, what would useful next steps be to improve security and
> > accountability for resellers?
> >
> > One thought: Mozilla could ask CAs to obtain a written response from
> > all contracted resellers about if/how they interact with customer key
> > material, including the level of iso

Re: AC Camerfirma Chambers of Commerce and Global Chambersign 2016 Root Inclusion Request

2018-03-12 Thread ramirommunoz--- via dev-security-policy
Hi Wayne
Here my answers to the ==Meh== questions.

1 * Camerfirma has had a number of recent compliance issues as listed below:
Resolved:
  * Non-BR-compliant OCSP responders:
   
https://bugzilla.mozilla.org/show_bug.cgi?id=1426233
  * CAA checking failure:
  
https://bugzilla.mozilla.org/show_bug.cgi?id=1420871
  * Duplicate SANs and without localityName or 
stateOrProvinceName:
   
https://bugzilla.mozilla.org/show_bug.cgi?id=1357067
  * Invalid DNS Names:
   
https://bugzilla.mozilla.org/show_bug.cgi?id=1390977 (just resolved today)

Still Open:
  * Non-printable characters in OU field:
  
https://bugzilla.mozilla.org/show_bug.cgi?id=1431164 (this issue was reported 
by Camerfirma)

RMM --> We are working on the "still open" bug to close it as soon as possible.


2 * CPS [5] section 1.2.1.1 appears to exempt test certificates from BR 
requirements.

RMM --> AC Camerfirma do not issue SSL test certificates anymore. AC Camerfirma 
will clarify this issue in the next CPS version

3 * Section 3.1.8.2.2 of the CPS implies that CAA checking is done manually. 
While this isn’t forbidden, it is easily susceptible to errors.

RMM --> See https://bugzilla.mozilla.org/show_bug.cgi?id=1390977. 
At the moment a non-technical check over the CAA value is done by the RA 
Operator before issue any certificate. 
We plan to have the CAA technical control in March 2018,

4 * CPS section 1.2.1.4.1.3 states that the GCSR2016 “is only used for the 
purpose of carrying out the accreditation processes with different browsers.” 
We recently decided to relax the requirements for inclusion, but this statement 
does imply that there is no value to Mozilla users in enabling the websites 
trust bit for this root.

RMM --> We use this Root as a possible contingency. We would like to keep it as 
it. If the community considers it's a risk, AC Camerfirma has no objection to 
leave it out of the scope.

5 * CPS section 1.5.5 indicates that delegated RAs are permitted, but it does 
not clearly indicate that domain validation functions may not be delegated.

RMM -> AC Camerfirma will clarify this issue in the next CPS version. Since it 
was stated by BR AC Camerfirma has always performed domain validation.

6 * CPS section 2.5.3 states that “Camerfirma currently offers the OCSP service 
free-of-charge but reserves the right to invoice for these services.” If OCSP 
service were to be blocked for all but paying users, I believe that would be a 
BR violation.

RMM -> AC Camerfirma will correct this issue in the next CPS version. 
Nevertheless AC Camerfirma never ever has charged for OCSP access.

BR
Ramiro
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: TunRootCA2 root inclusion request

2018-03-12 Thread Ryan Sleevi via dev-security-policy
These responses demonstrate why the request is troubling. They attempt to
paint it as "other people do it"

The risk of removing an included CA must balance the ecosystem disruption
to those non-erroneous certs, while the risk to ecosystem inclusion needs
to balance both the aggregate harm to the ecosystem (through lowered
standards) and the risk to the ecosystem of rejecting the request (of
which, until inclusion is accepted, is low)

The pattern of issues - particularly for a new CA - is equally problematic.
A CA, especially in light of the public discussions, should not be having
these issues in 2018, and yet, here we are.

We are in agreement on the objective facts - namely, that there is a
prolonged pattern of issues - and the criteria - namely, that CAs should
adhere to the policy in requesting inclusion. A strict adherence to those
objectives would be to fully deny the request. It sounds like where we
disagree, then, is not in the objective facts and criteria, but rather,
where the evaluation of that leaves relative to risk.

The position I am advocating is that, even if these individual matters
might be seen as less risky, especially, as has been mentioned, this CA is
"only" intended for .tn for the most case, the existence of such a pattern
(and the means of acknowledging-but-not-resolving-completely these issues)
is indicative that there will continue to be serious issues, and that the
risk is not simply limited to .tn, but threatens global Internet stability
and security. Given that the number of certificates being issued are, from
your own descriptions, aimed to be measured in the hundreds, further
highlights that the risk is rather substantial.

On Mon, Mar 12, 2018 at 2:14 AM, Anis via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> Hi Ryan
> I am so sorry but is the same error.
> CN NAME NOT INCLUDE IN THE SAN
> Local IP ADRESS
> Policy not upto date 
> Is clear for me and i understand.
> All this error became from approuved authority. Is the risk no.
> Then The ecosystem is not protected!
> ANIS
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: TunRootCA2 root inclusion request

2018-03-12 Thread Anis via dev-security-policy
Hi Ryan
I am so sorry but is the same error.
CN NAME NOT INCLUDE IN THE SAN
Local IP ADRESS
Policy not upto date 
Is clear for me and i understand.
All this error became from approuved authority. Is the risk no.
Then The ecosystem is not protected!
ANIS
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: AC Camerfirma Chambers of Commerce and Global Chambersign 2016 Root Inclusion Request

2018-03-12 Thread Ramiro Muñoz via dev-security-policy
> 1 * The inclusion request references a much older CPS [3] that doesn't
> list the 2016 versions of these roots or comply with current policies.
> I only reviewed the newer CPS [5], but this CPS (section 1.2.1)
> doesn't cover the older roots that are currently included. I believe
> this is a compliance issue with the currently included AC Camerfirma roots.
>
> RMM -> EIDAS regulation has been an important milestone that took us
> to consider to setup a new hierarchy (2016) and writing a new CPS
> apart from the other hierarchies and CPS, even more when our final
> target is to distribute certificates only from the 2016 hierarchy.
> This request to incorporate the new 2016 roots affects only to eIDAS
> CPS (1.2.1). However, the CPS –no eIDAS (3.2.7) are still valid for
> the hierarchies (2003 and 2008).
>
> Roots from the older hierarchies are currently included in the Mozilla
> CA program, but the CPS that applies to these roots does not comply with 
> Mozilla policy (it hasn't been revised since 2015) - is that correct? If so, 
> how and when do you intend to correct the problem?

RMM -> Certainly we have focused on the eIDAS CPS roots 2016 that is affecting 
this bug.
Although the CPS version of the root (2003 and 2008) is dated 2015, procedures 
and controls used to issue SSL certificates are the same for all roots and 
fulfill the BR requirements as indicated by our WEBTRUST CA,BR,EVaudit 
reports.
We are currently working on both DPC to fulfill the requirement of adaptation 
to the RFC3647 structure required by CABFORUM.  We plan to publish them next 
April. In any case we will publish them before 2018-05-31 limit required by 
CABFORUM providing a solution to this issue. Although we would like wait for 
the April RFC3647 adapted version, If the community consider that a version 
should be publish immediately, AC Camerfirma have no objection to do that.

Regards
Ramiro

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


SwissSign: Cert issued with a to long validity period

2018-03-12 Thread reinhard.dietrich--- via dev-security-policy
to whom it may concern

Last week we have reported a Bug on 
https://bugzilla.mozilla.org/show_bug.cgi?id=1443731 about a certificate we 
issued with a to long validity period.

We are now asked to publish the same incident report also on this 
mozilla.dev.security.policy forum:

Topic 1: How your CA first became aware of the problem (e.g. via a problem 
report submitted to your Problem Reporting Mechanism, a discussion in 
mozilla.dev.security.policy, a Bugzilla bug, or internal self-audit), and the 
time and date.

On the evening of 6th March 2018 our CABLint post-issue test system alerted us 
to this problem.  We also received emails from an external source

Topic 2: A timeline of the actions your CA took in response. A timeline is a 
date-and-time-stamped sequence of all relevant events. This may include events 
before the incident was reported, such as when a particular requirement became 
applicable, or a document changed, or a bug was introduced, or an audit was 
done.

2018-03-06 15:49 UTC The certificate was issued
2018-03-07 06:00 UTC We started an investigation
2018-03-07 07:00 UTC We contacted the customer in order to replace the 
certificate and revoke the mis-issued one
2018-03-07 12:36 UTC The certificate was revoked


Topic  3: Whether your CA has stopped, or has not yet stopped, issuing 
certificates with the problem. A statement that you have will be considered a 
pledge to the community; a statement that you have not requires an explanation.

We identified the source of the problem as incorrect use of a rarely used 
reissue option available only to SwissSign support employees.  We immediately 
prohibited any use of this functionality until the option is fixed (ETA 17th 
March 2018).
 

Topic 4: A summary of the problematic certificates. For each problem: number of 
certs, and the date the first and last certs with that problem were issued.

https://crt.sh/?id=348592796&opt=zlint,cablint

Topic 5: The complete certificate data for the problematic certificates. The 
recommended way to provide this is to ensure each certificate is logged to CT 
and then list the fingerprints or crt.sh IDs, either in the report or as an 
attached spreadsheet, with one list per distinct problem.

See https://crt.sh/?id=348592796&opt=zlint,cablint

Topic 6: Explanation about how and why the mistakes were made or bugs 
introduced, and how they avoided detection until now.

The support option in question was not in scope during the initial work to 
implement ballot 193 - it was planned to be implemented by 17th March 2018.  
During the interim period support staff were trained to use the functionality 
with caution and in accordance with the requirements.



Topic 7: List of steps your CA is taking to resolve the situation and ensure 
such issuance will not be repeated in the future, accompanied with a timeline 
of when your CA expects to accomplish these things.

Immediate action: We have prohibited any use of the problematic reissue 
functionality until it is technically constrained to 825 days for SSL 
certificates 7th March 2018: The fixes for the reissue functionality have been 
rolled out to our test environment 17th March 2018: The fixes for the reissue 
functionality will be rolled out in production



___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy