Re: DarkMatter Concerns

2019-03-21 Thread Nex via dev-security-policy
On 2/24/19 11:08 AM, Nex wrote:
> On 2/23/19 11:07 AM, Scott Rea via dev-security-policy wrote:
>> G’day Wayne et al,
>>
>> In response to your post overnight (included below), I want to assure you 
>> that DarkMatter’s work is solely focused on defensive cyber security, secure 
>> communications and digital transformation. We have never, nor will we ever, 
>> operate or manage non-defensive cyber activities against any nationality.
>>
>> Furthermore, in the spirit of transparency, we have published all our public 
>> trust TLS certificates to appropriate CT log facilities (including even all 
>> our OV certificates) before this was even a requirement.  We have been 
>> entirely transparent in our operations and with our clients as we consider 
>> this a vital component of establishing and maintaining trust.
>>
>> We have used FIPS certified HSMs as our source of randomness in creating our 
>> Authority certificates, so we have opened an investigation based on Corey 
>> Bonnell’s earlier post regarding serial numbers and will produce a 
>> corresponding bug report on the findings.
>>
>> I trust this answers your concerns and we can continue the Root inclusion 
>> onboarding process.
> 
> For clarity, are you rejecting all of the following articles and blog
> posts as false and fabricated?
> 
> 1. https://www.reuters.com/investigates/special-report/usa-spying-raven/
> 2.
> https://theintercept.com/2016/10/24/darkmatter-united-arab-emirates-spies-for-hire/
> 3.
> https://www.evilsocket.net/2016/07/27/How-The-United-Arab-Emirates-Intelligence-Tried-to-Hire-me-to-Spy-on-its-People/

The New York Times just published another investigative report that
mentions DarkMatter at length, with additional testimonies going on the
record:

4.
https://www.nytimes.com/2019/03/21/us/politics/government-hackers-nso-darkmatter.html
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Pre-Incident Report - Buypass certificates noncompliant with BR 7.1

2019-03-21 Thread Mads Egil Henriksveen via dev-security-policy



We are aware that Buypass is on the list of CAs that have been noncompliant 
with BR 7.1. We will send an Incident Report within the next few days.



Regards

Mads

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Questions about Mozilla Root Store Policy 5.1

2019-03-21 Thread tadahiko.ito.public--- via dev-security-policy
Hi I have few questions about Mozilla Root Store Policy 5.1

Mozilla Root Store Policy 5.1 only permits following algorithms for ECC.

> 5.1 Algorithms
> 
> Root certificates in our root program, and __any certificate__ which 
> chains up to them,  __MUST__ use __only__ algorithms and key sizes from the 
> following set:
> 
> RSA keys whose modulus size in bits is divisible by 8, and is at least 
> 2048.
> Digest algorithms: SHA-1 (see below), SHA-256, SHA-384, or SHA-512.
> ECDSA keys using one of the following curve-hash pairs:
> P-256 with SHA-256
> P-384 with SHA-384


I am wondering the above is for validation path only, or also for usage of EE 
certificate.
#I thought it might be also for EE cert, since RFC5480 does not require 
anything on key usage(I descrive detail at the bottom of this text).

As far as I understand,  ECDSA public key just show a point on elliptic curve. 
that point can also be used (plain)ECDH or ECIES.
So, if 5.1's description is also for end entity cert, EE cert's key-usage must 
contain digitalSignature, can contain nonRepudiation, and  must not contain key 
agreement, key encipherment, etc. to comply 5.1.

(question.1)
So far I guess, that statement of 5.1 include requirement for key-usage of any 
EE certs, not limit to server certificates. is it correct?

(question.2)
In addition, if CA issue ECC certificate without appropriate key-usage, reason 
to revoke can be non-compliance with Mozilla's root program?


RFC 5480 does not seems to require anything for key-usage #since, RFC 2119 
state  MAY is "truely optional"
> RFC 5480ECC SubjectPublicKeyInfo Format   March 2009
>
>If the keyUsage extension is present in an End Entity (EE)
>certificate that indicates id-ecPublicKey in SubjectPublicKeyInfo,
>then any combination of the following values MAY be present:
>
>  digitalSignature;
>  nonRepudiation; and
>  keyAgreement.

Regards Tadahiko Ito
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy