Re: AC Camerfirma's CP & CPS disclosure

2018-10-31 Thread Wayne Thayer via dev-security-policy
Camerfirma has delivered point-in-time audits as required by Mozilla in
response to the annual audit statements we received in July containing
multiple qualifications. The new audit statements along with the history of
this issue can be found at
https://bugzilla.mozilla.org/show_bug.cgi?id=1478933

In my opinion, Camerfirma has completed their remediation of this issue.
Please comment here or in the bug if you have any concerns.

- Wayne

On Thu, Sep 27, 2018 at 12:42 AM Ramiro Muñoz 
wrote:

> Hi Wayne
>
> All problems have already been resolved from our side and we wait for the
> PIT audit planned for the next week.
> We will be able to provide the PIT before October 31th.
>
> Best regards
> Ramiro Muñoz Muñoz
> AC Camerfirma SA.
> CTO, Exploitation Manager, CISA.
> +34 619 746 291 · rami...@camerfirma.com.
> https://www.linkedin.com/in/ramirom.
> 
> Este mensaje, y en su caso, cualquier fichero anexo al mismo, puede
> contener
> información CONFIDENCIAL, siendo para uso exclusivo del destinatario,
> quedando prohibida su divulgación copia o distribución a terceros. Si Vd.
> ha
> recibido este mensaje erróneamente, se ruega lo notifique al remitente y
> proceda a su borrado.
> De conformidad con lo establecido en el Reglamento UE 2016/679 de 27 de
> abril de 2016 General de Protección de Datos, se le informa que la empresa
> AC CAMERFIRMA, S.A. tratará la información que nos facilita con el
> exclusivo
> fin de cumplir con las obligaciones derivadas de la relación comercial o
> contractual adquirida con usted y que sus datos no podrán ser objeto de
> otro
> tratamiento ni de cesión a terceros salvo en los casos en que exista una
> obligación legal.
> Usted tiene derecho a obtener confirmación acerca del tratamiento de sus
> datos personales, y a ejercer sus derechos de acceso, rectificación,
> supresión, limitación y portabilidad en el tratamiento, dirigiéndose a AC
> CAMERFIRMA, S.A., mediante comunicación escrita remitida a la dirección C/
> Ribera del Loira 12 (28042) Madrid, o a la dirección electrónica
> jurid...@camerfirma.com o a través de la web de incidencias disponible en
> la
> página web http://webcrm.camerfirma.com/incidencias/incidencias.php
>
> [EN]
> This message, and if applicable, any file attached to it, may contain
> CONFIDENTIAL information for the exclusive use of the recipient, being
> prohibited its disclosure copy or distribution to third parties. If you
> have
> received this message incorrectly, please notify the sender and proceed
> with
> its deletion.
> In accordance with the provisions of the EU Regulation 2016/679 of April
> 27,
> 2016 General Data Protection, you are informed that the company AC
> CAMERFIRMA, S.A. will treat the information you provide us with the sole
> purpose of complying with the obligations derived from the commercial or
> contractual relationship acquired with you and that your data will not be
> subject to another treatment or assignment to third parties except in cases
> where there is an legal obligation.
> You have the right to obtain confirmation about your personal data
> treatement, and to exercise your rights of access, rectification, deletion,
> limitation and portability, contacting AC CAMERFIRMA, SA, by written
> communication sent to the address C / Ribera del Loira 12 (28042) Madrid,
> or
> to the legal address jurid...@camerfirma.com or through the website
> http://webcrm.camerfirma.com/incidencias/incidencias.php
>
>
> -Mensaje original-
> De: dev-security-policy
> [mailto:dev-security-policy-boun...@lists.mozilla.org] En nombre de Wayne
> Thayer via dev-security-policy
> Enviado el: jueves, 27 de septiembre de 2018 0:38
> Para: Ramiro Muñoz Muñoz 
> CC: mozilla-dev-security-policy
> 
> Asunto: Re: AC Camerfirma's CP & CPS disclosure
>
> Hello Ramiro,
>
> On Tue, Sep 4, 2018 at 3:13 PM Wayne Thayer  wrote:
>
> > Thank you for this response Ramiro. I have copied this to the bug [1]
> > and have described Mozilla's expectations for point-in-time audits
> > that confirm that these issues have been resolved.
> >
> > [1] https://bugzilla.mozilla.org/show_bug.cgi?id=1478933
> >
> > On Tue, Sep 4, 2018 at 5:47 AM ramirommunoz--- via dev-security-policy
> > < dev-security-policy@lists.mozilla.org> wrote:
> >
> >>
> >> 7- List of steps your CA is taking to resolve the situation and
> >> ensure such issuance will not be repeated in the future, accompanied
> >> with a timeline of when your CA expects to accomplish these things.
> >>
> >> AC Camerfirma has made changes in the CP/CPS to fix the
> >> inconsistences found by the auditor and will disseminate the
> >> documents and the new procedures to avoid news problems in a future.
> >> AC Camerfirma is working on correcting the imbalances detected and
> >> the effective processes to ensure that the information offered by the
> >> OCSP and the CRL is the same.
> >> 2018-07-14 -> Qualified Audit Report
> >> 2018-09-17 -> CPS & CP's new versions will 

Re: Clarifications on ETSI terminology and scheme

2018-10-31 Thread Ryan Sleevi via dev-security-policy
On Wed, Oct 31, 2018 at 4:05 PM Dimitris Zacharopoulos 
wrote:

> > For example, when we talk about expectations of CAs, we don't talk about
> > what they 'could' do, we talk about what they MUST do, because at the end
> > of the day, that's the bar they're being held to. It's certainly true
> that
> > a given TSP may go above and beyond some bar, but that doesn't mean we
> can
> > say "CAs do X", because they aren't required to. The same logic applies
> in
> > the discussion of CABs - it does not make sense to discuss how they
> 'could'
> > interpret it, but rather, what they MUST do.
>
> ISO 17065 and ETSI EN 319 403 include normative requirements for CABs
> just as the Baseline Requirements and ETSI EN 319 411-1 do for TSPs. I
> don't understand why you think it is any different for CABs. For
> example, the baseline requirements mandate that "The CA SHALL maintain a
> continuous 24x7 ability to respond internally to a high-priority
> Certificate Problem Report, and where appropriate, forward such a
> complaint to law enforcement authorities, and/or revoke a Certificate
> that is the subject of such a complaint".
>
> It doesn't specify exactly how a CA shall respond internally to such a
> request. It must have a process and the CAB will evaluate it.
>
> Similarly for CABs, under 7.13.1 of 17065 "The certification body shall
> have a documented process to receive, evaluate and make decisions on
> complaints and appeals. The certification body shall record and track
> complaints and appeals, as well as actions undertaken to resolve them".
>
> It doesn't specify exactly how the CAB shall fulfill this requirement
> but each competent CAB must demonstrate to their NAB that they have a
> documented process that fulfills this criteria, is effective and efficient.
>
> Even in the introduction section of 17065, you see the same use of words
> SHALL, SHOULD, MAY, CAN as described in RFC2119.
>

We've now so fully drifted from the original discussion that it's clear to
see we're talking about very different things, and thus confusion is
understandable.

For context, this particular discussion began in
https://groups.google.com/d/msg/mozilla.dev.security.policy/Q9whve-HJfM/niS5Y2f0AQAJ
, and in particular, the discussion about "If the CAB" does X. The point of
my criticism to this statement has been that the CAB is not required to do
X, they may do X, but they aren't mandated to do X.

I believe you interpreted my remark of "no notification will be made to
relying parties" is that it's impossible to notify RPs, and so you raised
an example of how a CAB might hypothetically do so. I was not trying to
state that - merely, that CABs do not have a normative requirement to
notify RPs of this change, and so as a matter of "Can you rely on this",
the answer is "No". Yes, some CABs may, but if a CAB doesn't, or if they
make mistakes, they've not violated any requirements.

And that's just as equally applicable to CAs. When a CA MUST "have a
process", we cannot make assumptions or rely on what that process does or
how it might result. When a CAB MUST "have a process", we cannot make
assumptions or rely on what they do in that process. I would hope we're in
violent agreement there.

> It's the same way that when we talk about the BRs, it's pointless to talk
> > about how some CAs may go above and beyond in their CPS, when discussing
> > the CA ecosystem or a particular (different) CA's misissuance. What
> matters
> > is the baseline expectations here.
>
> Some baseline expectations are not overly prescriptive in the BRs for
> CAs nor in the "BRs for CABs" (i.e. ISO 17065 and ETSI EN 319 403).
> Information Security Management Systems can have significantly different
> implementations but must maintain specific principles. This is where
> illustrative controls and recommended practices come in so that the
> auditors can evaluate if the principles are met but it's always subject
> to the opinion of the CAB (when auditing TSPs), and to the NAB (when
> assessing CABs).
>

My attempt to explain-by-analogy, to hopefully get us talking about the
same thing, has unfortunately lead to even more divergence. I hope that,
with the above clarifications to what we're originally talking about, we
can get back on the same page.

That said, because it contains some confusion, it at least bears
highlighting. As mentioned during the recent CABForum, illustrative
controls do not serve the purpose you are describing, neither do
recommended practices. They have no 'force' to ensure that things must be
'equivalent-or-better'. They're not even hints. They're just that -
illustrative.

One cannot and should not make any assumptions that the existence of
illustrative examples means that you will get the same results. It's
entirely valid to wholly ignore those illustrative controls and recommended
practices, end up with something completely opposite, and yet have fully
fulfilled the requirements.

This is why prescriptive controls are more 

Re: Clarifications on ETSI terminology and scheme

2018-10-31 Thread Dimitris Zacharopoulos via dev-security-policy



On 31/10/2018 8:00 μμ, Ryan Sleevi via dev-security-policy wrote:

[...]

Dimitris, I'm sorry, but I don't believe this is a correct correction.

EN 319 403 incorporates ISO/IEC 17065; much like the discussion about EN
319 411-2 incorporating, but being separate from, EN 319 411-1, the
structure of EN 319 403 is that it incorporates normatively the structure
of ISO/IEC 17065, and, at some places, extends.

Your description of the system is logically incompatible, given the
incompatibilities in 319 403 and 17065.

You're correct that any applicable national legislation applies, with
respect to the context of eIDAS. However, one can be assessed solely
against the scheme of EN 319 403 and 319 411-1, without going for

qualified.

I have to disappoint you and insist that your statement "As the scheme
used in eIDAS for CABs is ETSI EN 319 403, the CAB must perform their
assessments in concordance with this scheme, and the NAB is tasked with
assessing their qualification and certification under any local
legislation (if appropriate) or, lacking such, under the framework for
the NAB applying the principles of ISO/IEC 17065 in evaluating the CAB
against EN 319 403"

and specifically the use of "or" in your statement, is incorrect. NABs
*always* assess qualification of CABs applying ISO/IEC 17065 AND ETSI EN
319 403 AND any applicable legislation. Only Austria is an exception (if
I recall correctly) because they don't apply ETSI EN 319 403 for CAB
accreditation.

Then, each CAB is accredited for specific standards (e.g. ETSI EN 319
411-1, 411-2, 421, eIDAS regulation and so on).

ISO 17065 and ETSI EN 319 403 apply only to CABs and ETSI EN 319 411-1,
411-2 apply only for TSPs. 411-2 incorporates 411-1 and 401 but does not
incorporate 403 or 17065. They are completely unrelated.


I'm afraid you're still misunderstanding, and I believe, mistating.

It is not ISO/IEC 17065 AND EN 319 403 that a CAB is assessed against.
They're assessed against EN 319 403, which *incorporates* ISO/IEC 17065.
This is the same way that when a TSP is assessed against ETSI EN 319 411-2,
they're not also (as in, separate audit report) assessed against EN 319
411-1; EN 319 411-2 *incorporates* EN 319 411-1.

Now, the CAB may ALSO be accredited for ISO/IEC 17065 (e.g. in the context
of application of other schemes), but I can't find supporting evidence to
support your claim that *both* are required in the context of EN 319 403.
Could you provide further details that you believe would demonstrate this?



I would prefer to let some auditor reply to this but I quickly went 
through 
https://ec.europa.eu/futurium/en/system/files/ged/list_of_eidas_accredited_cabs-2018-07-27.pdf 
and checked out some CAB accreditation letters and it looks like they 
are accredited to both "(ISO/IEC 17065 + ETSI EN 319 493 + eIDAS 
Art.3.18 scope of accreditation)".


I think it is also clearly stated in ETSI EN 319 403 that lists ISO 
17065 as a Normative reference and also:


"ISO/IEC 17065 [1] is an international standard which specifies general 
requirements for conformity assessment bodies (CABs) performing 
certification of products, processes, or services. These requirements 
are not focussed on any specific application domain where CABs work. In 
the present document the general requirements are *supplemented* to 
provide additional dedicated requirements for CABs performing 
certification of Trust Service Providers (TSPs) and the trust services 
they provide towards defined criteria against which they claim conformance."


"The present document also *incorporates* many requirements relating to 
the audit of a TSP's management system, as defined in ISO/IEC 17021 
[i.12] and in ISO/IEC 27006 [i.11]. These requirements are incorporated 
by including text to derived from these documents in the present 
document, as well indirectly through references to requirements of 
ISO/IEC 17021 [i.12]."


So, in my understanding, ISO 17065 must be fully covered and some 
elements if ISO 17021 are incorporated. ETSI EN 319 403 supplements 17065.



I don't think this is a valid criticism, particularly in the context of

the

specific case we're speaking about. I'm speaking about what's required -
you're speaking about what's possible. Many things are possible, but what
matters for expectations is what is required. 7.11.3 simply defers to the
scheme to specify, which EN 319 403 does not as it relates to this
discussion.


ISO 17065 sets the base and 7.11.3 describes the principles that need to
be followed. It is very likely that different CABs will choose to
implement this principle in a different way but at the end of the day,
their implementation must satisfy the principle and they are evaluated
by the NAB that ensures the principles are met.


Yes, which does not mean it provides any baseline assurance for relying
parties, which matters.

For example, when we talk about expectations of CAs, we don't talk about
what they 'could' do, we talk about what they MUST do, 

Re: Clarifications on ETSI terminology and scheme

2018-10-31 Thread Ryan Sleevi via dev-security-policy
On Wed, Oct 31, 2018 at 12:55 PM Dimitris Zacharopoulos via
dev-security-policy  wrote:

>
>
> On 31/10/2018 4:47 μμ, Ryan Sleevi via dev-security-policy wrote:
> > There's a lot of nitpicking in this, and I feel that if you want to
> > continue this discussion, it would be better off in a separate thread on
> > terminology. I disagree with some of the claims you've made, so have
> > corrected them for the discussion.
> >
> > I would much rather keep this focused on the discussion of TUVIT as
> > auditors; if you feel that the nitpicking is relevant to that discussion
> > (which I don't believe anything you've said rises to that level), we
> should
> > certainly hash it out here. This is why I haven't forked this thread yet
> -
> > to make sure I've not misread your concern. However, if there's more
> > broadly a disagreement, but without impact to this discussion, we should
> > spin that out.
>
> Indeed, my comments were more related to the ETSI terminology so I
> created a new thread. More answers in-line.
>
> >
> > On Wed, Oct 31, 2018 at 7:11 AM Dimitris Zacharopoulos  >
> > wrote:
> >
> >> On 30/10/2018 6:28 μμ, Ryan Sleevi via dev-security-policy wrote:
> >>> This establishes who the CAB is and who the NAB is. As the scheme used
> in
> >>> eIDAS for CABs is ETSI EN 319 403, the CAB must perform their
> assessments
> >>> in concordance with this scheme, and the NAB is tasked with assessing
> >> their
> >>> qualification and certification under any local legislation (if
> >>> appropriate) or, lacking such, under the framework for the NAB applying
> >> the
> >>> principles of ISO/IEC 17065 in evaluating the CAB against EN 319 403.
> The
> >>> NAB is the singular national entity recognized for issuing
> certifications
> >>> against ISO/IEC 17065 through the MLA/BLA and the EU Regulation No
> >> 765/2008
> >>> (as appropriate), which is then recognized trans-nationally.
> >> Some clarifications/corrections because I saw some wrong usage of terms
> >> being repeated.
> >>
> >> A CAB MUST perform their assessments applying ISO/IEC 17065 AND ETSI EN
> >> 319 403 AND any applicable legislation (for EU CABs this includes
> >> European and National legislation).
> >>
> > Dimitris, I'm sorry, but I don't believe this is a correct correction.
> >
> > EN 319 403 incorporates ISO/IEC 17065; much like the discussion about EN
> > 319 411-2 incorporating, but being separate from, EN 319 411-1, the
> > structure of EN 319 403 is that it incorporates normatively the structure
> > of ISO/IEC 17065, and, at some places, extends.
> >
> > Your description of the system is logically incompatible, given the
> > incompatibilities in 319 403 and 17065.
> >
> > You're correct that any applicable national legislation applies, with
> > respect to the context of eIDAS. However, one can be assessed solely
> > against the scheme of EN 319 403 and 319 411-1, without going for
> qualified.
>
> I have to disappoint you and insist that your statement "As the scheme
> used in eIDAS for CABs is ETSI EN 319 403, the CAB must perform their
> assessments in concordance with this scheme, and the NAB is tasked with
> assessing their qualification and certification under any local
> legislation (if appropriate) or, lacking such, under the framework for
> the NAB applying the principles of ISO/IEC 17065 in evaluating the CAB
> against EN 319 403"
>
> and specifically the use of "or" in your statement, is incorrect. NABs
> *always* assess qualification of CABs applying ISO/IEC 17065 AND ETSI EN
> 319 403 AND any applicable legislation. Only Austria is an exception (if
> I recall correctly) because they don't apply ETSI EN 319 403 for CAB
> accreditation.
>
> Then, each CAB is accredited for specific standards (e.g. ETSI EN 319
> 411-1, 411-2, 421, eIDAS regulation and so on).
>
> ISO 17065 and ETSI EN 319 403 apply only to CABs and ETSI EN 319 411-1,
> 411-2 apply only for TSPs. 411-2 incorporates 411-1 and 401 but does not
> incorporate 403 or 17065. They are completely unrelated.
>

I'm afraid you're still misunderstanding, and I believe, mistating.

It is not ISO/IEC 17065 AND EN 319 403 that a CAB is assessed against.
They're assessed against EN 319 403, which *incorporates* ISO/IEC 17065.
This is the same way that when a TSP is assessed against ETSI EN 319 411-2,
they're not also (as in, separate audit report) assessed against EN 319
411-1; EN 319 411-2 *incorporates* EN 319 411-1.

Now, the CAB may ALSO be accredited for ISO/IEC 17065 (e.g. in the context
of application of other schemes), but I can't find supporting evidence to
support your claim that *both* are required in the context of EN 319 403.
Could you provide further details that you believe would demonstrate this?


> > I don't think this is a valid criticism, particularly in the context of
> the
> > specific case we're speaking about. I'm speaking about what's required -
> > you're speaking about what's possible. Many things are possible, but what
> > matters for expectations is 

Clarifications on ETSI terminology and scheme

2018-10-31 Thread Dimitris Zacharopoulos via dev-security-policy



On 31/10/2018 4:47 μμ, Ryan Sleevi via dev-security-policy wrote:

There's a lot of nitpicking in this, and I feel that if you want to
continue this discussion, it would be better off in a separate thread on
terminology. I disagree with some of the claims you've made, so have
corrected them for the discussion.

I would much rather keep this focused on the discussion of TUVIT as
auditors; if you feel that the nitpicking is relevant to that discussion
(which I don't believe anything you've said rises to that level), we should
certainly hash it out here. This is why I haven't forked this thread yet -
to make sure I've not misread your concern. However, if there's more
broadly a disagreement, but without impact to this discussion, we should
spin that out.


Indeed, my comments were more related to the ETSI terminology so I 
created a new thread. More answers in-line.




On Wed, Oct 31, 2018 at 7:11 AM Dimitris Zacharopoulos 
wrote:


On 30/10/2018 6:28 μμ, Ryan Sleevi via dev-security-policy wrote:

This establishes who the CAB is and who the NAB is. As the scheme used in
eIDAS for CABs is ETSI EN 319 403, the CAB must perform their assessments
in concordance with this scheme, and the NAB is tasked with assessing

their

qualification and certification under any local legislation (if
appropriate) or, lacking such, under the framework for the NAB applying

the

principles of ISO/IEC 17065 in evaluating the CAB against EN 319 403. The
NAB is the singular national entity recognized for issuing certifications
against ISO/IEC 17065 through the MLA/BLA and the EU Regulation No

765/2008

(as appropriate), which is then recognized trans-nationally.

Some clarifications/corrections because I saw some wrong usage of terms
being repeated.

A CAB MUST perform their assessments applying ISO/IEC 17065 AND ETSI EN
319 403 AND any applicable legislation (for EU CABs this includes
European and National legislation).


Dimitris, I'm sorry, but I don't believe this is a correct correction.

EN 319 403 incorporates ISO/IEC 17065; much like the discussion about EN
319 411-2 incorporating, but being separate from, EN 319 411-1, the
structure of EN 319 403 is that it incorporates normatively the structure
of ISO/IEC 17065, and, at some places, extends.

Your description of the system is logically incompatible, given the
incompatibilities in 319 403 and 17065.

You're correct that any applicable national legislation applies, with
respect to the context of eIDAS. However, one can be assessed solely
against the scheme of EN 319 403 and 319 411-1, without going for qualified.


I have to disappoint you and insist that your statement "As the scheme 
used in eIDAS for CABs is ETSI EN 319 403, the CAB must perform their 
assessments in concordance with this scheme, and the NAB is tasked with 
assessing their qualification and certification under any local 
legislation (if appropriate) or, lacking such, under the framework for 
the NAB applying the principles of ISO/IEC 17065 in evaluating the CAB 
against EN 319 403"


and specifically the use of "or" in your statement, is incorrect. NABs 
*always* assess qualification of CABs applying ISO/IEC 17065 AND ETSI EN 
319 403 AND any applicable legislation. Only Austria is an exception (if 
I recall correctly) because they don't apply ETSI EN 319 403 for CAB 
accreditation.


Then, each CAB is accredited for specific standards (e.g. ETSI EN 319 
411-1, 411-2, 421, eIDAS regulation and so on).


ISO 17065 and ETSI EN 319 403 apply only to CABs and ETSI EN 319 411-1, 
411-2 apply only for TSPs. 411-2 incorporates 411-1 and 401 but does not 
incorporate 403 or 17065. They are completely unrelated.






Also, a NAB issues "Accreditations" to CABs and not "Certifications".
Also, a CAB issues "Certifications" to TSPs and not "Accredidations".
So, T-Systems is "Certified", not "Accredited".


Fair. If you replace these words, does it change the semantic meaning of
the message at all? I don't believe so.


No, it doesn't but I know how much you like being accurate :-)




As the framework utilizes ISO/IEC 17065, the complaints process and
certification process for both TSPs and CABs bears strong similarity,

which

is why I wanted to explore how this process works in function.

Note that if either the TSP is suspended of their certification or
withdrawn, no notification will be made to relying parties.

This depends on applicable legislation and the implementation of ISO
17065 sections 4.6, 7.11.3 by each CAB. Some CABs have a public
repository where RPs can query the validity of TSP Certifications so if
a Certification is Suspended or Revoked, it will be displayed
accordingly. I don't think WT has a notification scheme for RPs either.
If the TSP publishes the seal URL or the CAB's URL to the TSP
Certificate (which is not mandatory), RPs can manually check the
validity of the TSP Certification.


I don't think this is a valid criticism, particularly in the context of the
specific case we're 

Re: Questions regarding the qualifications and competency of TUVIT

2018-10-31 Thread Ryan Sleevi via dev-security-policy
On Wed, Oct 31, 2018 at 11:43 AM Wiedenhorst, Matthias via
dev-security-policy  wrote:

> · Since January 2018, T-Systems issued EV certificates with an
> incorrect qcStatement. T-Systems was made aware of the problem in October
> 2018, i.e. for about 9 month the error was not detected/reported
> https://bugzilla.mozilla.org/show_bug.cgi?id=1498463#c3
> T-Systems fixed the error in a timely manner so that certificates now
> contain the correct qcStatement.
>

T-Systems identified a deficiency within their systems, made a change on
October 5, but did not notify their CAB and SB until October 16.

Under the requirements provided by EN 319 401, 7.9, that does not seem
consistent with meeting those requirements.


> · TUVIT performed an audit of T-Systems according to ETSI policies
> EVCP and QCP-w in the beginning of 2018. During the audit the incorrect
> coding of the qcStatement was not detected.
>

Yes. I believe this is a significant issue, given the assessment report.


> · In several emails, we answered to his complaint, explained our
> procedures and justified the classification of the encoding error as minor
> (non-critical) non-conformity.
> For non-critical non-conformities, our certification requirements foresee
> a maximum period of 3 month for remediation before the certification shall
> be withdrawn. (see also ETSI EN 319 403, section 7.6 b) Based on the
> classification as minor, we do not see a necessity for revocation.
> That’s about the relevant facts.
> Let me now reply in detail to Ryans private contribution:
>
> >I would like to suggest that consideration be given to rejecting future
> >audits from TUVIT and from that of Matthias Wiedenhorst and Dr. Anja
> >Widermann, for some period of time. I would suggest this period be at
> least
> >one year long; however, given the technical details of ETSI accreditation,
> >believe a period of three years may be more appropriate.
>
> Dr. Anja Wiedemann (please mind the correct spelling) was not part of the
> audit team. We do not understand why her name is mentioned here.
> One / three years exclusion from audit sounds like a punishment. We do not
> understand where this time frame comes from and why such a time frame is
> needed.
>

Auditor and Reviewer, as stated on
https://www.tuvit.de/fileadmin/Content/TUV_IT/zertifikate/en/AA2018072001_Audit_Attestation_E_Deutsche-Telekom-Root-CA-2_20180718_s.pdf
-
the parties tasked with ensuring that the audit is meaningfully able to
ensure the criteria were met and the testing procedures were able to meet
those requirements.

The time frame selected is one that has been consistently used in the past
regarding questions about audits. Unfortunately, there lacks suitable means
to objectively determine whether or not the auditor is sufficiently
competent in remediation of problematic audits. Past procedures have
resulted in indefinite suspensions for some auditors, or temporary
suspensions of their recognition. The choice of three years, rather than
one year, is based on the fact that we have now seen auditors who were not
accredited perform audits against the frameworks, later become accredited,
and retroactively issue reports covering their activities prior to
accreditation. This does not instill confidence in the ETSI approach to
auditor supervision, and thus the longer period is to ensure that no
in-process audits are retroactively certified upon the expiration of the
period. Three years thus aligns with both the 1 year (CA/B Forum) and 2
year (eIDAS) time periods in ensuring that such a possibility is not
technically achievable.


> >If there is a belief that a TSP has failed to meet the requirements of
> >their accreditation, EN 319 403 describes a process for which complaints
> >may be made to either the TSP or to the CAB. This complaint process is
> >further expanded upon in ISO/IEC 17065, which 319 403 incorporates. This
> >same process also applies when there have been mistakes by the CAB to
> >adhere to its scheme requirements under EN 319 403 - a complaint may be
> >made with either the CAB or the NAB regarding the CAB's accreditation.
>
> TSPs are not accredited but certified, ETSI EN 319 403 §7.13 does not make
> any additional requirements on complaint procedures but just reference
> ISO/IEC 17065. (The requirements from ISO/IEC 17065 [1], clause 7.13 shall
> apply.) In particular, no procedures for complaints to TSPs or NABs are
> defined (only to CABs).
>

4.1.2.2 (j) provides for the client (the TSP) to inform the CAB any
complaints made known to it. You're correct that procedures for complaints
directly to the TSP are not normatively specified by ISO/IEC 17065 or that
of EN 319 403; however, the countenance is made that a client (the TSP) may
have knowledge of and records of complaints outside the scope and purview
of the CAB's complaints.

With respect to the NAB process,
https://www.dakks.de/sites/default/files/71_sd_0_009_e_beschwerdeverfahren_2018_v1.0_0.pdf

Re: Questions regarding the qualifications and competency of TUVIT

2018-10-31 Thread Kurt Roeckx via dev-security-policy

On 2018-10-31 16:42, Wiedenhorst, Matthias wrote:

In several emails, we answered to his complaint, explained our procedures and 
justified the classification of the encoding error as minor (non-critical) 
non-conformity.


I think we never consider encoding errors as a minor error.


Kurt
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Questions regarding the qualifications and competency of TUVIT

2018-10-31 Thread Ryan Sleevi via dev-security-policy
There's a lot of nitpicking in this, and I feel that if you want to
continue this discussion, it would be better off in a separate thread on
terminology. I disagree with some of the claims you've made, so have
corrected them for the discussion.

I would much rather keep this focused on the discussion of TUVIT as
auditors; if you feel that the nitpicking is relevant to that discussion
(which I don't believe anything you've said rises to that level), we should
certainly hash it out here. This is why I haven't forked this thread yet -
to make sure I've not misread your concern. However, if there's more
broadly a disagreement, but without impact to this discussion, we should
spin that out.

On Wed, Oct 31, 2018 at 7:11 AM Dimitris Zacharopoulos 
wrote:

> On 30/10/2018 6:28 μμ, Ryan Sleevi via dev-security-policy wrote:
> > This establishes who the CAB is and who the NAB is. As the scheme used in
> > eIDAS for CABs is ETSI EN 319 403, the CAB must perform their assessments
> > in concordance with this scheme, and the NAB is tasked with assessing
> their
> > qualification and certification under any local legislation (if
> > appropriate) or, lacking such, under the framework for the NAB applying
> the
> > principles of ISO/IEC 17065 in evaluating the CAB against EN 319 403. The
> > NAB is the singular national entity recognized for issuing certifications
> > against ISO/IEC 17065 through the MLA/BLA and the EU Regulation No
> 765/2008
> > (as appropriate), which is then recognized trans-nationally.
>
> Some clarifications/corrections because I saw some wrong usage of terms
> being repeated.
>
> A CAB MUST perform their assessments applying ISO/IEC 17065 AND ETSI EN
> 319 403 AND any applicable legislation (for EU CABs this includes
> European and National legislation).
>

Dimitris, I'm sorry, but I don't believe this is a correct correction.

EN 319 403 incorporates ISO/IEC 17065; much like the discussion about EN
319 411-2 incorporating, but being separate from, EN 319 411-1, the
structure of EN 319 403 is that it incorporates normatively the structure
of ISO/IEC 17065, and, at some places, extends.

Your description of the system is logically incompatible, given the
incompatibilities in 319 403 and 17065.

You're correct that any applicable national legislation applies, with
respect to the context of eIDAS. However, one can be assessed solely
against the scheme of EN 319 403 and 319 411-1, without going for qualified.


> Also, a NAB issues "Accreditations" to CABs and not "Certifications".
> Also, a CAB issues "Certifications" to TSPs and not "Accredidations".
> So, T-Systems is "Certified", not "Accredited".
>

Fair. If you replace these words, does it change the semantic meaning of
the message at all? I don't believe so.


> > As the framework utilizes ISO/IEC 17065, the complaints process and
> > certification process for both TSPs and CABs bears strong similarity,
> which
> > is why I wanted to explore how this process works in function.
> >
> > Note that if either the TSP is suspended of their certification or
> > withdrawn, no notification will be made to relying parties.
>
> This depends on applicable legislation and the implementation of ISO
> 17065 sections 4.6, 7.11.3 by each CAB. Some CABs have a public
> repository where RPs can query the validity of TSP Certifications so if
> a Certification is Suspended or Revoked, it will be displayed
> accordingly. I don't think WT has a notification scheme for RPs either.


> If the TSP publishes the seal URL or the CAB's URL to the TSP
> Certificate (which is not mandatory), RPs can manually check the
> validity of the TSP Certification.
>

I don't think this is a valid criticism, particularly in the context of the
specific case we're speaking about. I'm speaking about what's required -
you're speaking about what's possible. Many things are possible, but what
matters for expectations is what is required. 7.11.3 simply defers to the
scheme to specify, which EN 319 403 does not as it relates to this
discussion.


> Note that Supervisory Bodies (only related to eIDAS) have no authority
> for TSP Certifications under ETSI EN 319 411-1, but only ETSI EN 319
> 411-2. In all cases of Certification (ETSI EN 319 411-1 or ETSI EN 319
> 411-2), the NAB is assessing the CAB. In most EU countries, the NAB IS
> NOT the Supervisory Body.
>

The NAB is still responsible for the oversight of the CAB's execution of EN
319 403, and the investigation therein. The SB suspends qualified status,
but the NAB ensures that the CAB is meeting the requirements of the
certification scheme (EN 319 403) as part of supervising the accreditation
of that CAB.


> Similarly with TSPs losing their Certification, if a CAB loses their
> Accreditation it will be displayed on the NAB's web site.
>

More concretely, the absence will be.


> I also consider the "WT seal" and "ETSI certification" very similar. A
> WT seal is similar to an ETSI certificate because they state (emphasis
> mine):
>


Re: Questions regarding the qualifications and competency of TUVIT

2018-10-31 Thread Dimitris Zacharopoulos via dev-security-policy

On 30/10/2018 6:28 μμ, Ryan Sleevi via dev-security-policy wrote:

This establishes who the CAB is and who the NAB is. As the scheme used in
eIDAS for CABs is ETSI EN 319 403, the CAB must perform their assessments
in concordance with this scheme, and the NAB is tasked with assessing their
qualification and certification under any local legislation (if
appropriate) or, lacking such, under the framework for the NAB applying the
principles of ISO/IEC 17065 in evaluating the CAB against EN 319 403. The
NAB is the singular national entity recognized for issuing certifications
against ISO/IEC 17065 through the MLA/BLA and the EU Regulation No 765/2008
(as appropriate), which is then recognized trans-nationally.


Some clarifications/corrections because I saw some wrong usage of terms 
being repeated.


A CAB MUST perform their assessments applying ISO/IEC 17065 AND ETSI EN 
319 403 AND any applicable legislation (for EU CABs this includes 
European and National legislation).


Also, a NAB issues "Accreditations" to CABs and not "Certifications".
Also, a CAB issues "Certifications" to TSPs and not "Accredidations". 
So, T-Systems is "Certified", not "Accredited".





As the framework utilizes ISO/IEC 17065, the complaints process and
certification process for both TSPs and CABs bears strong similarity, which
is why I wanted to explore how this process works in function.

Note that if either the TSP is suspended of their certification or
withdrawn, no notification will be made to relying parties.


This depends on applicable legislation and the implementation of ISO 
17065 sections 4.6, 7.11.3 by each CAB. Some CABs have a public 
repository where RPs can query the validity of TSP Certifications so if 
a Certification is Suspended or Revoked, it will be displayed 
accordingly. I don't think WT has a notification scheme for RPs either.


If the TSP publishes the seal URL or the CAB's URL to the TSP 
Certificate (which is not mandatory), RPs can manually check the 
validity of the TSP Certification.



The closest
that it comes is that if they're accredited according to EN 319 411-2
(Qualified Certificates), the suspension/withdrawing will be reported to
the Supervisory Body, which will them update the Qualified Trust List for
that country and that will flow into the EU Qualified Trust List. If
they're accredited against EN 319 411-1, the Supervisory Body will be
informed by the CAB (in theory, although note my complaint about TSP
informing the CAB was not followed, and the same can exist with CAB to SB),
but no further notification may be made. Furthermore, if certification is
later reissued, after a full audit, the certification history will not
reflect that there was a period of 'failed' certification. This similarly
exists with respect to CABs - if a CAB has their accreditation suspended,
on the advice of or decision of the NAB based on feedback from the SB - the
community will not necessarily be informed. In theory, because
certification is 'forward' looking rather than 'past' looking, a suspension
or withdraw of a CAB by a NAB may not affect its past certification of
TSPs; this is an area of process that has not been well-specified or
determined.


Note that Supervisory Bodies (only related to eIDAS) have no authority 
for TSP Certifications under ETSI EN 319 411-1, but only ETSI EN 319 
411-2. In all cases of Certification (ETSI EN 319 411-1 or ETSI EN 319 
411-2), the NAB is assessing the CAB. In most EU countries, the NAB IS 
NOT the Supervisory Body.


Similarly with TSPs losing their Certification, if a CAB loses their 
Accreditation it will be displayed on the NAB's web site.


I also consider the "WT seal" and "ETSI certification" very similar. A 
WT seal is similar to an ETSI certificate because they state (emphasis 
mine):


"An unqualified opinion from the practitioner indicates that such 
principles *are being followed* in conformity with the WebTrust for 
Certification Authorities Criteria. These principles and criteria 
reflect fundamental standards for *the establishment and on-going 
operation* of a Certification Authority organization or function."


So, if I check a WT seal today Oct 31, 2018, even though the CA has not 
been audited between their last audit and today, the WT seal represents 
that it is still valid and not withdrawn. They are both "forward 
looking" in the eyes of Relying Parties.


As far as the non-disclosure of compliance certificate 
suspension/withdrawals is concerned, CABs are only allowed to follow 
their practices as described in ISO 17065 section 7.11.3. Root Programs 
could possibly require that CAs MUST disclose any possible Certification 
suspension or revocation that occurred during their audit period.



Hope this helps.
Dimitris.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy