Re: DarkMatter Concerns

2019-03-07 Thread James Burton via dev-security-policy
Benjamin, There is one theme in all of your responses and it's perfectly clear that you feel strongly that this discussion as a whole is an attack not only on DarkMatter's operations but on the United Arab Emirates sovereignty right to able to have a root included in the Mozilla root store and

Re: DarkMatter Concerns

2019-03-07 Thread Matt Palmer via dev-security-policy
On Thu, Mar 07, 2019 at 05:17:07AM +, Benjamin Gabriel via dev-security-policy wrote: > On Wednesday, March 6, 2019 7:51 PM, Ryan Sleevi wrote:> > >DarkMatter response to the serial number issue has demonstrated > >that DarkMatter did not do the expected due diligence to investigate >

Re: DarkMatter Concerns

2019-03-07 Thread Cynthia Revström via dev-security-policy
Exactly what I was thinking On 2019-03-07 09:21, Georg Koppen via dev-security-policy wrote: Benjamin Gabriel via dev-security-policy: Dear Ryan, A fair and transparent public discussion requires full disclosure of each participant's motivations and ultimate agenda. It would be neat if you

Re: DarkMatter Concerns

2019-03-07 Thread Cynthia Revström via dev-security-policy
On 2019-03-07 06:14, Benjamin Gabriel via dev-security-policy wrote: Until such time as we have been formally advised by your employer (Google), that you no longer represent their views in CABForum, or in this Mozilla-dev-security-policy forum, we will proceed on the basis that all of your

Re: DarkMatter Concerns

2019-03-07 Thread Georg Koppen via dev-security-policy
Benjamin Gabriel via dev-security-policy: > Dear Ryan, > > A fair and transparent public discussion requires full disclosure of each > participant's motivations and ultimate agenda. It would be neat if you could tone down your rhetoric a bit and refrain from ad-hominem attacks. That would help

RE: DarkMatter Concerns

2019-03-07 Thread Benjamin Gabriel via dev-security-policy
Part 1 of 2: Dear Ryan, A fair and transparent public discussion requires full disclosure of each participant's motivations and ultimate agenda. Whether in CABForum, or Mozilla-dev-security-policy, I represent the viewpoints of my employer DarkMatter and passionately believe in our

RE: DarkMatter Concerns

2019-03-07 Thread Benjamin Gabriel via dev-security-policy
Part 2 of 2 On Wednesday, March 6, 2019 7:51 PM, Ryan Sleevi wrote:> >DarkMatter response to the serial number issue has demonstrated >that DarkMatter did not do the expected due diligence to investigate >and understand the issue. Your statement as Google's representative is quite

RE: DarkMatter Concerns

2019-03-07 Thread Benjamin Gabriel via dev-security-policy
Dear Ryan, A fair and transparent public discussion requires full disclosure of each participant's motivations and ultimate agenda. Whether in CABForum, or Mozilla-dev-security-policy, I represent the viewpoints of my employer DarkMatter and passionately believe in our unflagging efforts to

Re: DarkMatter Concerns

2019-03-06 Thread Kathleen Wilson via dev-security-policy
All, Thank you to those of you that have been providing thoughtful and constructive input into this discussion. I have been carefully reading and contemplating all of the messages posted in the mozilla.dev.security.policy forum. As the owner of Mozilla’s CA Certificates Module[1] and in an

Re: DarkMatter Concerns

2019-03-06 Thread Ryan Sleevi via dev-security-policy
(Writing in a personal capacity) Benjamin, I've focused only on the substantive new information added to this discussion relevant to trust. I hope the past messages have highlighted why much of the message may be fundamentally misunderstanding the purpose of a root store and the root store

Re: DarkMatter Concerns

2019-03-06 Thread nadim--- via dev-security-policy
On Tuesday, March 5, 2019 at 7:18:39 PM UTC+1, Ryan Sleevi wrote: > On Tue, Mar 5, 2019 at 12:11 PM Matthew Hardeman via dev-security-policy < > dev-security-policy@lists.mozilla.org> wrote: > > By comparison, the discussion around DarkMatter has been more similar to > the discussion of Symantec

RE: DarkMatter Concerns

2019-03-06 Thread Benjamin Gabriel via dev-security-policy
Dear Selena, On Wednesday, 6 March 2019 02:58:19 UTC+4, Selena Deckelmann wrote: > > I think what you've quoted are accurate statements. That is, recent articles > raised questions that I, and others, felt were important to bring to this > public forum to discuss. > While we welcome and are

Re: DarkMatter Concerns

2019-03-05 Thread westmail24--- via dev-security-policy
It seems to me that the acceptance of this root can cause great damage to Mozilla to the future and cause great discussions in the Linux community. Is Mozilla ready to do all this and lose the support of a large number of users in the future? In my opinion these are the main issues.

Re: DarkMatter Concerns

2019-03-05 Thread andrewtipton.finearts--- via dev-security-policy
On Friday, February 22, 2019 at 2:21:24 PM UTC-7, Wayne Thayer wrote: > The recent Reuters report on DarkMatter [1] has prompted numerous questions > about their root inclusion request [2]. The questions that are being raised > are equally applicable to their current status as a subordinate CA

Re: DarkMatter Concerns

2019-03-05 Thread Selena Deckelmann via dev-security-policy
Hi! Just wanted to briefly comment in response to Benjamin Gabriel's statement. On Tuesday, March 5, 2019 at 7:07:51 AM UTC-8, Benjamin Gabriel wrote: > Marshal Erwin, director of trust and security for Mozilla, said the Reuters > Jan. 30 report had raised concerns inside the company that

Re: DarkMatter Concerns

2019-03-05 Thread Ryan Sleevi via dev-security-policy
On Tue, Mar 5, 2019 at 1:58 PM Matthew Hardeman wrote: > I suppose my initial response to the concern as presented is that it would > seem to be a fairly trivial (just paperwork, really) matter for DarkMatter > (or indeed any other applicant) to separate the CA into a fully separate > legal

Re: DarkMatter Concerns

2019-03-05 Thread Jakob Bohm via dev-security-policy
On 05/03/2019 16:11, Benjamin Gabriel wrote: Message Body (2 of 2) [... continued ..] Dear Wayne > ... Yours sincerely, Benjamin Gabriel General Counsel DarkMatter Group As an outside member of this community (not employed by Mozilla or any public CA), I would like to state the

Re: DarkMatter Concerns

2019-03-05 Thread Matthew Hardeman via dev-security-policy
On Tue, Mar 5, 2019 at 12:18 PM Ryan Sleevi wrote: > > I believe you may have misunderstood the details of these incidents and > their relationship to what's currently under discussion. > > In the Sectigo + NSO Group, these were entities that shared common > investment ownership, but otherwise

Re: DarkMatter Concerns

2019-03-05 Thread Ryan Sleevi via dev-security-policy
On Tue, Mar 5, 2019 at 12:11 PM Matthew Hardeman via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > Objections to DarkMatter on the sole basis of the actions of a sibling > business with common owners is dangerous turf to get into, if we care about > historic precedent.

Re: DarkMatter Concerns

2019-03-05 Thread Matthew Hardeman via dev-security-policy
On Tue, Mar 5, 2019 at 11:10 AM Matthew Hardeman wrote: > > This means there are two recent precedents for which this category of > issues has not resulted in delegation of trust and one proposal that the > same category of behaviors should. I am not suggesting that a position > against

Re: DarkMatter Concerns

2019-03-05 Thread Matthew Hardeman via dev-security-policy
On Tue, Mar 5, 2019 at 8:16 AM Alex Gaynor via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > > You're right, there is no test. That's why some of us believe we should > look at proxies: such as honesty, considering root membership is ultimately > about trust. DM has made

Re: DarkMatter Concerns

2019-03-05 Thread Jonathan Rudenberg via dev-security-policy
Hi Scott, On Tue, Mar 5, 2019, at 09:02, Scott Rea via dev-security-policy wrote: > > • DM has resolved all technical and policy issues raised in the UAE and > DM Roots submission process on Mozilla list: see > https://bugzilla.mozilla.org/show_bug.cgi?id=1427262 > > • Since the

Re: DarkMatter Concerns

2019-03-05 Thread lmelinte--- via dev-security-policy
I am a non technical person by far and read most of this article. What I am wondering, is why is there no public CA authority independent of nations elected by nations such as NATO but global? ___ dev-security-policy mailing list

RE: DarkMatter Concerns

2019-03-05 Thread Benjamin Gabriel via dev-security-policy
Message Body (2 of 2) [... continued ..] Dear Wayne Furthermore, it is unfortunate that Mozilla have chosen to reference categorically misleading articles (and which continue to be recycled on slow-news days, on an annual basis since 2016) to support the allegation of “credible evidence”,

RE: DarkMatter Concerns

2019-03-05 Thread Benjamin Gabriel via dev-security-policy
Message body (1 of 2) Mozilla CA Certificate Policy Module Owner Dear Wayne, I am writing to provide an official response to the public discussion that you have initiated, on mozilla.dev.security.policy, in accordance with Article 7,1 of the Mozilla Root Store Policy, on the inclusion of

Re: DarkMatter Concerns

2019-03-05 Thread Alex Gaynor via dev-security-policy
On Tue, Mar 5, 2019 at 9:01 AM Scott Rea via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > I have addressed most if not all of the various technical comments in this > list in respect to DarkMatter’s Roots submission and it might be helpful if > I summarize here the raised

Re: DarkMatter Concerns

2019-03-05 Thread Scott Rea via dev-security-policy
I have addressed most if not all of the various technical comments in this list in respect to DarkMatter’s Roots submission and it might be helpful if I summarize here the raised Compliance Concerns and Risk of Misuse Concerns: 1. Compliance Questions have been raised about DarkMatter’s

Re: DarkMatter Concerns

2019-03-04 Thread Matthew Hardeman via dev-security-policy
My perspective is that of an end user and also that of a software developer involved in a non-web-browser space in which various devices and manufacturers generally defer to the Mozilla root program's trust store. As such, I'm quite certain that my opinions don't -- and should not -- have the

Re: DarkMatter Concerns

2019-03-04 Thread Wayne Thayer via dev-security-policy
On Mon, Mar 4, 2019 at 9:04 AM Matthew Hardeman via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > On Sun, Mar 3, 2019 at 6:13 PM Ryan Sleevi wrote: > > > > > It is not clear how this follows. As my previous messages tried to > > capture, the program is, and has always

Re: DarkMatter Concerns

2019-03-04 Thread Ryan Sleevi via dev-security-policy
On Mon, Mar 4, 2019 at 11:03 AM Matthew Hardeman wrote: > > > On Sun, Mar 3, 2019 at 6:13 PM Ryan Sleevi wrote: > >> >> It is not clear how this follows. As my previous messages tried to >> capture, the program is, and has always been, inherently subjective and >> precisely designed to support

Re: DarkMatter Concerns

2019-03-04 Thread Matthew Hardeman via dev-security-policy
On Sun, Mar 3, 2019 at 6:13 PM Ryan Sleevi wrote: > > It is not clear how this follows. As my previous messages tried to > capture, the program is, and has always been, inherently subjective and > precisely designed to support discretionary decisions. These do not seem to > inherently conflict

Re: DarkMatter Concerns

2019-03-04 Thread Wayne Thayer via dev-security-policy
On Mon, Mar 4, 2019 at 3:29 AM Buschart, Rufus via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > Writing with my personal hat on: > > > > -Ursprüngliche Nachricht- > > Von: dev-security-policy > Im Auftrag von Matthew Hardeman via dev-security-policy > > On Sun,

Re: DarkMatter Concerns

2019-03-03 Thread Ryan Sleevi via dev-security-policy
On Sun, Mar 3, 2019 at 5:54 PM Matthew Hardeman via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > On Sun, Mar 3, 2019 at 2:17 PM bxward85--- via dev-security-policy < > dev-security-policy@lists.mozilla.org> wrote: > > > > > Insane that this is even being debated. If the

Re: DarkMatter Concerns

2019-03-03 Thread Matthew Hardeman via dev-security-policy
On Sun, Mar 3, 2019 at 2:17 PM bxward85--- via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > > Insane that this is even being debated. If the floodgates are opened here > you will NOT be able to get things back under control. > While I can appreciate the passion of

Re: DarkMatter Concerns

2019-03-03 Thread bxward85--- via dev-security-policy
On Friday, February 22, 2019 at 2:21:24 PM UTC-7, Wayne Thayer wrote: > The recent Reuters report on DarkMatter [1] has prompted numerous questions > about their root inclusion request [2]. The questions that are being raised > are equally applicable to their current status as a subordinate CA

Re: DarkMatter Concerns

2019-03-01 Thread ravenise005--- via dev-security-policy
I have removed these malicious certificates from firefox and Windows machine and contacted various Anti-Virus companies requesting they mark these certificates as malicious in their scans. I suggest others do the same! Thank you for bringing this to my attention.

Re: DarkMatter Concerns

2019-03-01 Thread Ryan Sleevi via dev-security-policy
On Thu, Feb 28, 2019 at 7:31 PM Matthew Hardeman wrote: > Regarding program policy as it now stands, it is not unreasonable to > arrive at a position that the root program would be better positioned to > supervise and sanction DarkMatter as a member Root CA than as a trusted > SubCA. For

Re: DarkMatter Concerns

2019-02-28 Thread Matthew Hardeman via dev-security-policy
I wanted to take a few moments to say that I believe that Ryan Sleevi's extensive write-up is one of the most meticulously supported and researched documents that I've seen discuss this particular aspect of trust delegation decisions as pertains to the various root programs. It is an incredible

Re: DarkMatter Concerns

2019-02-28 Thread Ryan Sleevi via dev-security-policy
(Writing in a personal capacity) I want to preemptively apologize for the length of this message. Despite multiple rounds of editing, there's still much to be said, and I'd prefer to say it in public, in the spirit of those past discussions, so that they can be both referred to and (hopefully)

Re: DarkMatter Concerns

2019-02-27 Thread Matthew Hardeman via dev-security-policy
While I was going to respond to the below, Nick Lamb has beaten me to it. I concur in full with the remarks in that reply. We should not be picking national favorites as a root program. There's a whole world out there which must be supported. What we should be doing is ensuring that we know the

Re: DarkMatter Concerns

2019-02-27 Thread Nick Lamb via dev-security-policy
On Wed, 27 Feb 2019 09:30:45 -0500 Alex Gaynor via dev-security-policy wrote: > Finally, I think there's a point that is very much being stepped > around here. The United States Government, including its intelligence > services, operate under the rule of law, it is governed by both > domestic

Re: DarkMatter Concerns

2019-02-27 Thread Alex Gaynor via dev-security-policy
(Writing in my personal capacity) On Tue, Feb 26, 2019 at 7:31 PM Matthew Hardeman via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: [...] > All of Google, Amazon, and Microsoft are in the program. All of these have > or had significant business with at least the US DOD

Re: DarkMatter Concerns

2019-02-27 Thread Scott Rea via dev-security-policy
G’day Folks, I want to thank Ryan for sharing the relevant discussion history regarding the change that precipitated the current language for serialNumber entropy in the BRs. Based on this background, it is clear to DM what is required for expected compliance with this control and that this

Re: DarkMatter Concerns

2019-02-27 Thread tomasshredder--- via dev-security-policy
> (Sorry for continuing this off-topic thread.) > > Hello Tomas, > > I hope this is indeed not your current implementation and that it wasn’t in > use anymore when ballot 164 became effective, because that’s not safe: I tried to say so in my original post, but I see I was not very clear.

Re: DarkMatter Concerns

2019-02-27 Thread Peter Gutmann via dev-security-policy
tomasshredder--- via dev-security-policy writes: >We still get asked by customers to implement sequential serial numbers from >time to time, but it's getting more and more rare. Another reason for using random data, from the point of view of a software toolkit provider, is that it's the only

Re: DarkMatter Concerns

2019-02-27 Thread Thijs Alkemade via dev-security-policy
On 27 Feb 2019, at 09:07, tomasshredder--- via dev-security-policy mailto:dev-security-policy@lists.mozilla.org>> wrote: On Wednesday, February 27, 2019 at 3:27:05 AM UTC+1, Peter Gutmann wrote: Mike Kushner via dev-security-policy mailto:dev-security-policy@lists.mozilla.org>> writes:

Re: DarkMatter Concerns

2019-02-27 Thread tomasshredder--- via dev-security-policy
On Wednesday, February 27, 2019 at 3:27:05 AM UTC+1, Peter Gutmann wrote: > Mike Kushner via dev-security-policy > writes: > > >EJBCA was possible the first (certainly one of the first) CA products to use > >random serial numbers. > > Random serial numbers have been in use for a long, long

Re: DarkMatter Concerns

2019-02-26 Thread Ryan Sleevi via dev-security-policy
As Matthew highlights, this is not a new or novel interpretation. It was introduced in Ballot 164 - https://cabforum.org/2016/03/31/ballot-164/ The first discussion of this in the CA/B Forum as a Ballot was https://cabforum.org/pipermail/public/2016-February/006893.html . This discussion

Re: DarkMatter Concerns

2019-02-26 Thread Matthew Hardeman via dev-security-policy
The issue I see with that interpretation is that the very same matter has previously been discussed on this list and resolved quite vocally in the favor of the other position: that making careful choices about the CSPRNG output to conform it to mask out the high order bit makes the output of at

Re: DarkMatter Concerns

2019-02-26 Thread Scott Rea via dev-security-policy
G’day Wayne et al, I am not sure why members of the group keep making the claim that these certificates are misused under the BRs. Corey pointed to the following paragraph in Section 7.1 of the BRs as the source of the control that DM is accused of not complying with: “Effective September 30,

Re: DarkMatter Concerns

2019-02-26 Thread Peter Gutmann via dev-security-policy
Mike Kushner via dev-security-policy writes: >EJBCA was possible the first (certainly one of the first) CA products to use >random serial numbers. Random serial numbers have been in use for a long, long time, principally to hide the number of certs a CA was (or wasn't) issuing. Here's the

Re: DarkMatter Concerns

2019-02-26 Thread Matthew Hardeman via dev-security-policy
I'd like to take a moment to point out that determination of the beneficial ownership of business of various sorts (including CAs) can, in quite a number of jurisdictions, be difficult to impossible (short of initiating adverse legal proceedings) to determine. What does this mean for Mozilla's

Re: DarkMatter Concerns

2019-02-26 Thread hackurx--- via dev-security-policy
Le mardi 26 février 2019 16:35:11 UTC+1, Hanno Böck a écrit : > This statement repeats the claim that you wrote here previously, > specifically: > "I want to assure you that DarkMatter's work is solely focused on > defensive cyber security, secure communications and digital > transformation." > >

Re: DarkMatter Concerns

2019-02-26 Thread Matthew Finkel via dev-security-policy
On Sat, Feb 23, 2019 at 06:51:11AM -0800, alex.gaynor--- via dev-security-policy wrote: > (Writing in my personal capacity) I'm writing in my personal capacity, as much as possible, as well (I am a Tor/Tor Browser developer). > > One of the things that I think is important is to tease out

Re: DarkMatter Concerns

2019-02-26 Thread Richard Salz via dev-security-policy
Thanks for the clarification. ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy

Re: DarkMatter Concerns

2019-02-26 Thread Wayne Thayer via dev-security-policy
Scott, On Tue, Feb 26, 2019 at 3:21 AM Scott Rea via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > G’day folks, > > we appreciate the many suggestions made on the list to strengthen the > entropy of random serialNumbers. > > One challenge we face currently is that our

Re: DarkMatter Concerns

2019-02-26 Thread Hanno Böck via dev-security-policy
This statement repeats the claim that you wrote here previously, specifically: "I want to assure you that DarkMatter's work is solely focused on defensive cyber security, secure communications and digital transformation." The statement does not comment on the Reuters article, but it is in stark

Re: DarkMatter Concerns

2019-02-26 Thread Paul Wouters via dev-security-policy
On Tue, 26 Feb 2019, Rob Stradling via dev-security-policy wrote: Hi Scott. It seems that the m.d.s.p list server stripped the attachment, but (for the benefit of everyone reading this) I note that you've also attached it to https://bugzilla.mozilla.org/show_bug.cgi?id=1427262. Direct link:

Re: DarkMatter Concerns

2019-02-26 Thread Jonathan Rudenberg via dev-security-policy
On Tue, Feb 26, 2019, at 10:06, Scott Rea via dev-security-policy wrote: > G’day Folks, > > DarkMatter CEO (Karim Sabbagh), has provided an official response to > Mozilla on the recent media article about the UAE that referenced > security and intelligence matters. Per Wayne’s request to

Re: DarkMatter Concerns

2019-02-26 Thread Rob Stradling via dev-security-policy
Hi Scott. It seems that the m.d.s.p list server stripped the attachment, but (for the benefit of everyone reading this) I note that you've also attached it to https://bugzilla.mozilla.org/show_bug.cgi?id=1427262. Direct link: https://bug1427262.bmoattachments.org/attachment.cgi?id=9046699 On

Re: DarkMatter Concerns

2019-02-26 Thread Richard Salz via dev-security-policy
So then every cert signed by the keys intended for the trust store will be CT logged? ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy

Re: DarkMatter Concerns

2019-02-26 Thread Mike Kushner via dev-security-policy
Hi, Since EJBCA as a product was mentioned we thought we could chime in with some background and updates. EJBCA was possible the first (certainly one of the first) CA products to use random serial numbers. From the very beginning, 64 bit random serial numbers, from a CSPRNG, were used. This

Re: DarkMatter Concerns

2019-02-26 Thread Scott Rea via dev-security-policy
G’day Folks, DarkMatter CEO (Karim Sabbagh), has provided an official response to Mozilla on the recent media article about the UAE that referenced security and intelligence matters. Per Wayne’s request to potentially share this on the list, I am attaching a copy of that letter to this post.

Re: DarkMatter Concerns

2019-02-26 Thread Scott Rea via dev-security-policy
store or copy the information in any medium and for whatever purpose. Any unauthorized use is strictly prohibited. From: Richard Salz Date: Tuesday, February 26, 2019 at 5:31 PM To: Scott Rea Cc: Subject: Re: DarkMatter Concerns So then every cert signed by the keys intended for the

Re: DarkMatter Concerns

2019-02-26 Thread Scott Rea via dev-security-policy
G’day Rich, DM has submitted Roots intended for Public Trust to Mozilla and other browser operators, but we also operate private trust PKIs under separate anchors. These private PKIs also issue certificates to secure TLS in closed environments, but Private Roots are not in public CT Logs and

Re: DarkMatter Concerns

2019-02-26 Thread Scott Rea via dev-security-policy
G’day folks, we appreciate the many suggestions made on the list to strengthen the entropy of random serialNumbers. One challenge we face currently is that our platform (which does support higher entropy) but only supports this at a global level. So if we make a global change, then ALL our

RE: DarkMatter Concerns

2019-02-25 Thread Jeremy Rowley via dev-security-policy
: dev-security-policy On Behalf Of Jeremy Rowley via dev-security-policy Sent: Monday, February 25, 2019 1:43 PM To: Buschart, Rufus ; mozilla-dev-security-policy Subject: RE: DarkMatter Concerns Hi all, Sorry for the delayed response. Been traveling and haven't had a chance to properly format

RE: DarkMatter Concerns

2019-02-25 Thread Jeremy Rowley via dev-security-policy
If DarkMatter is issuing from a CA that chains to a Quovadis root trusted by Mozilla, the issuance is in scope of the Mozilla policy. But that also means the cert is publicly trusted. Thus, I read it as "all TLS certs issued from the public ICA are publicly logged", which matches what Scott told

RE: DarkMatter Concerns

2019-02-25 Thread Jeremy Rowley via dev-security-policy
. Jeremy -Original Message- From: dev-security-policy On Behalf Of Rob Stradling via dev-security-policy Sent: Monday, February 25, 2019 9:53 AM To: Nick Lamb ; dev-security-policy@lists.mozilla.org Cc: Kurt Roeckx Subject: Re: DarkMatter Concerns On 25/02/2019 16:17, Nick Lamb via dev

Re: DarkMatter Concerns

2019-02-25 Thread Matthew Hardeman via dev-security-policy
On Mon, Feb 25, 2019 at 12:15 PM Richard Salz wrote: > You miss the point of my question. > > What types of certs would they issue that would NOT expect to be trusted > by the public? > >> >>> I get the question in principle. If it is a certificate not intended for public trust, I suppose I

Re: DarkMatter Concerns

2019-02-25 Thread Matthew Hardeman via dev-security-policy
The answer to the question of what certificates they intend to CT log or not may be interesting as a point of curiosity, but the in-product CT logging requirements of certain internet browsers (Chrome, Safari) would seem to ultimately force them to CT log the certificates that are intended to be

Re: DarkMatter Concerns

2019-02-25 Thread rich.salz--- via dev-security-policy
Apart from the concerns others have already raised, I am bothered by the wording of one of the Dark Matter commitments, which says that "TLS certs intended for public trust" will be logged. What does public trust mean? Does it include certificates intended only for use within their country?

Re: DarkMatter Concerns

2019-02-25 Thread Rob Stradling via dev-security-policy
On 25/02/2019 16:17, Nick Lamb via dev-security-policy wrote: > On Sat, 23 Feb 2019 10:16:27 +0100 > Kurt Roeckx via dev-security-policy > wrote: >> I would also like to have a comment from the current root owner >> (digicert?) on what they plan to do with it. > > Two other things would be

Re: DarkMatter Concerns

2019-02-25 Thread Nick Lamb via dev-security-policy
On Sat, 23 Feb 2019 10:16:27 +0100 Kurt Roeckx via dev-security-policy wrote: > I would also like to have a comment from the current root owner > (digicert?) on what they plan to do with it. Two other things would be interesting from Digicert on this topic 1. To what extent does DarkMatter

Re: DarkMatter Concerns

2019-02-25 Thread Tim Shirley via dev-security-policy
There are other ways to achieve a guarantee of non-collision besides re-generating. For example, we incorporate the timestamp of issuance into the serial number alongside the random bits. You could also incorporate a sequential value into your serial number. Both methods serve to guarantee

Re: DarkMatter Concerns

2019-02-25 Thread Jakob Bohm via dev-security-policy
On 25/02/2019 11:42, Scott Rea wrote: G’day Paul, I cannot speak for other CAs, I can only surmise what another CA that is as risk intolerant as we are might do. For us, we will collision test since there is some probability of a collision and the test is the only way to completely mitigate

Re: DarkMatter Concerns

2019-02-25 Thread Scott Rea via dev-security-policy
G’day Paul, I cannot speak for other CAs, I can only surmise what another CA that is as risk intolerant as we are might do. For us, we will collision test since there is some probability of a collision and the test is the only way to completely mitigate that risk. There is a limitation in our

Re: DarkMatter Concerns

2019-02-25 Thread Paul Kehrer via dev-security-policy
Hi Scott, Comments inline. On February 25, 2019 at 4:58:00 PM, Scott Rea via dev-security-policy ( dev-security-policy@lists.mozilla.org) wrote: G’day Corey, To follow up on this thread, we have confirmed with the developers of the platform that the approach used to include 64-bit output from

Re: DarkMatter Concerns

2019-02-25 Thread Scott Rea via dev-security-policy
G’day Corey, To follow up on this thread, we have confirmed with the developers of the platform that the approach used to include 64-bit output from a CSPRNG in the serialNumber is to generate the required output and then test it to see if it can be a valid serialNumber. If it is not a valid

Re: DarkMatter Concerns

2019-02-24 Thread Peter Gutmann via dev-security-policy
Matt Palmer via dev-security-policy writes: >Imagine if a CA said "we generate a 64-bit serial by getting values from the >CSPRNG repeatedly until the value is one greater than the previously issued >certificate, and use that as the serial number.". Well, something pretty close to that works

Re: DarkMatter Concerns

2019-02-24 Thread Matt Palmer via dev-security-policy
On Mon, Feb 25, 2019 at 02:11:40AM +, Scott Rea via dev-security-policy wrote: > My anticipation is that what happens is that CSPRNG process is repeated > until a positive INTEGER is returned. In which case a 64-bit output from > a CSPRNG is contained in the serialNumber as is required.

Re: DarkMatter Concerns

2019-02-24 Thread Scott Rea via dev-security-policy
G’day Corey, I can see your point – perhaps the more accurate way explicitly allowed under 5280 would have been to encode the constraint as type uniformResourceIdentifier rather than the type dNSName that was used. I don’t recall if we actually tried that in our tests at the time with QV, but

Re: DarkMatter Concerns

2019-02-24 Thread Scott Rea via dev-security-policy
G’day Corey, I am not sure if the phrase “…outputting 64 random bits from the CSPRNG and then coercing the most significant bit to 0” is actually an accurate representation of what is happening under the covers – we have asked for clarification from the developers so we can all have an

Re: DarkMatter Concerns

2019-02-24 Thread Corey Bonnell via dev-security-policy
On Sunday, February 24, 2019 at 8:05:10 PM UTC-5, Scott Rea wrote: > G’day Corey, > > In respect to the previously issued constrained intermediates – can you > clarify where in RFC5280 Section 4.2.1.10 that the prohibition against a > leading period is specified for the name constraints? > I

Re: DarkMatter Concerns

2019-02-24 Thread Corey Bonnell via dev-security-policy
On Sunday, February 24, 2019 at 7:39:34 PM UTC-5, Scott Rea wrote: > G’day Corey, > > I did not check your math, but is it possible that you are interpreting the > serial number conversion output as an unsigned integer representation? If so, > then I can understand your potential concern

Re: DarkMatter Concerns

2019-02-24 Thread Scott Rea via dev-security-policy
G’day Corey, In respect to the previously issued constrained intermediates – can you clarify where in RFC5280 Section 4.2.1.10 that the prohibition against a leading period is specified for the name constraints? I see in the RFC the specific sentence: “When the constraint begins with a

Re: DarkMatter Concerns

2019-02-24 Thread Scott Rea via dev-security-policy
G’day Corey, I did not check your math, but is it possible that you are interpreting the serial number conversion output as an unsigned integer representation? If so, then I can understand your potential concern regarding the findings of your analysis. DarkMatter uses an EJBCA platform with

Re: DarkMatter Concerns

2019-02-24 Thread Corey Bonnell via dev-security-policy
On Friday, February 22, 2019 at 4:28:30 PM UTC-5, Corey Bonnell wrote: > Hello, > Section 7.1 of the Baseline Requirements states that, "Effective September > 30, 2016, CAs SHALL generate non-sequential Certificate serial numbers > greater than zero (0) containing at least 64 bits of output from

Re: DarkMatter Concerns

2019-02-24 Thread eve.shime--- via dev-security-policy
This certificate already infested all major browsers. Removing it breaks a lot of pages and gives you Invalid certificate error. TOR, Chrome, Firefox... all infested. ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org

Re: DarkMatter Concerns

2019-02-24 Thread namedcesar--- via dev-security-policy
Op zaterdag 23 februari 2019 20:38:51 UTC schreef Todd Troxell: > IDK this seems like an obvious one to me. Let them find another way. We don't > have to make it easy. > > -Todd It should also be noted DarkMatter has very strong ties with the UAE government and operates the UAE national PKI

Re: DarkMatter Concerns

2019-02-24 Thread cwbussard--- via dev-security-policy
This seems like an absolute no-brainer to me. DarkMatter's past behavior and line of business are fundamentally incompatible with the level of trust reposed in CA's. This is not even a close call. I believe Mozilla should: 1. Deny the root inclusion request; 2. Add the intermediate CA

Re: DarkMatter Concerns

2019-02-24 Thread Nex via dev-security-policy
On 2/23/19 11:07 AM, Scott Rea via dev-security-policy wrote: > G’day Wayne et al, > > In response to your post overnight (included below), I want to assure you > that DarkMatter’s work is solely focused on defensive cyber security, secure > communications and digital transformation. We have

Re: DarkMatter Concerns

2019-02-23 Thread Scott Rea via dev-security-policy
G’day Kurt, DarkMatter has several business units that focus on a broad range of cyber security activities. The Trust Services BU is responsible for the DarkMatter CA and primarily focused on enabling secure communications and digital transformation. We utilize the services of other DM BU’s

Re: DarkMatter Concerns

2019-02-23 Thread Todd Troxell via dev-security-policy
IDK this seems like an obvious one to me. Let them find another way. We don't have to make it easy. -Todd ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy

Re: DarkMatter Concerns

2019-02-23 Thread alex.gaynor--- via dev-security-policy
(Writing in my personal capacity) One of the things that I think is important is to tease out factual predicates that could be grounds for exclusion. It's clear to me that there is a tremendous level of unease with DarkMatter, largely (though not exclusively!) as a result of the Reuter's

Re: DarkMatter Concerns

2019-02-23 Thread Kurt Roeckx via dev-security-policy
On Sat, Feb 23, 2019 at 02:07:38PM +0400, Scott Rea via dev-security-policy wrote: > G’day Wayne et al, > > In response to your post overnight (included below), I want to assure you > that DarkMatter’s work is solely focused on defensive cyber security, secure > communications and digital

Re: DarkMatter Concerns

2019-02-23 Thread ferenn.gnoll--- via dev-security-policy
On Friday, February 22, 2019 at 10:21:24 PM UTC+1, Wayne Thayer wrote: > We are not aware of direct evidence of misused > certificates in this case. However, the evidence does strongly suggest that > misuse is likely to occur, if it has not already. So, basing the trust of a CA on "suggestion"

Re: DarkMatter Concerns

2019-02-23 Thread Scott Rea via dev-security-policy
G’day Wayne et al, In response to your post overnight (included below), I want to assure you that DarkMatter’s work is solely focused on defensive cyber security, secure communications and digital transformation. We have never, nor will we ever, operate or manage non-defensive cyber

Re: DarkMatter Concerns

2019-02-23 Thread Kurt Roeckx via dev-security-policy
On Fri, Feb 22, 2019 at 03:45:39PM -0800, cooperq--- via dev-security-policy wrote: > On Friday, February 22, 2019 at 2:37:20 PM UTC-8, Jonathan Rudenberg wrote: > > With regards to the broader question, I believe that DarkMatter's alleged > > involvement with hacking campaigns is incompatible

Re: DarkMatter Concerns

2019-02-22 Thread rjarrrpcgp--- via dev-security-policy
On Friday, February 22, 2019 at 6:51:52 PM UTC-5, coo...@gmail.com wrote: > On Friday, February 22, 2019 at 2:37:20 PM UTC-8, Jonathan Rudenberg wrote: > > With regards to the broader question, I believe that DarkMatter's alleged > > involvement with hacking campaigns is incompatible with

<    1   2   3   >