Re: Revoking Trust in one ANSSI Certificate

2013-12-12 Thread Jan Schejbal
Am 2013-12-11 23:59, schrieb Gervase Markham:
 Look again. It seems that it now contains 1106 certificates (!), with
 widely varying revocation dates.

Can't confirm that for any of the following CRL DPs:
http://www.icp.minefi.gouv.fr/igca.crl (1 entry)
http://www.icp.minefi.gouv.fr/ac-racine.crl (empty)
http://crl1.dgtpe.fr/AC_Racine_DGTPE.crl (empty)

These are the CRL DPs in the first, second and third sub-ca cert,
respectively (containing the revocations for the root, first SubCA and
second SubCA).

The CRL for the third Sub-CA has 1110 certificates, but there is no CRL
DP pointing to it in the fourth cert - you need to manually get it from
http://crl1.dgtpe.fr/AC_DGTPE_Signature_Authentification.crl

According to that CRL, the fourth Sub-CA is indeed revoked.

The first revoked serial is 0x0313DC, the last one is 0x031F90. That's a
range of ~3000 certificates. That's a lot of revocations, but that
doesn't need to mean much.

  432 are Key compromise
  323 are Superseded
  268 are Cessation Of Operation
   42 are Affiliation Changed
and I think the rest is without a reason extension.

Kind regards,
Jan

-- 
Please avoid sending mails, use the group instead.
If you really need to send me an e-mail, mention FROM NG
in the subject line, otherwise my spam filter will delete your mail.
Sorry for the inconvenience, thank the spammers...
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Revoking Trust in one ANSSI Certificate

2013-12-11 Thread Samuel L

Le 11/12/13 01:08, Kathleen Wilson a écrit :


Based on the list that Rob provided, there may be other domains that we
might consider including.
For example:
*.ac-martinique.fr
*.ac-creteil.fr
*.ac-orleans-tours.fr
*.education.fr
*.ac-poitiers.fr


As this list includes domains from the ministry of education (the ac- 
prefix is for academy), I feel obliged to point out the following :


http://www.education.gouv.fr/cid3/les-rectorats-et-services-departementaux-de-l-education-nationale.html

According to this page (from the french national education 
administration, which is one of the biggest, if not the biggest 
administrative body in France), there are actually 30 academies 
(regional bodies of the ministry of education), whose domains are :


*.ac-aix-marseille.fr
*.ac-amiens.fr
*.ac-besancon.fr
*.ac-bordeaux.fr
*.ac-caen.fr
*.ac-clermont.fr
*.ac-corse.fr
*.ac-creteil.fr
*.ac-dijon.fr
*.ac-grenoble.fr
*.ac-guadeloupe.fr
*.ac-guyane.fr
*.ac-lille.fr
*.ac-limoges.fr
*.ac-lyon.fr
*.ac-martinique.fr
*.ac-mayotte.fr
*.ac-montpellier.fr
*.ac-nancy-metz.fr
*.ac-nantes.fr
*.ac-nice.fr
*.ac-orleans-tours.fr
*.ac-noumea.nc
*.ac-paris.fr (and *.sorbonne.fr as well ?)
*.ac-poitiers.fr
*.ac-polynesie.pf
*.ac-reims.fr
*.ac-rennes.fr
*.ac-reunion.fr
*.ac-rouen.fr
*.ac-spm.fr
*.ac-strasbourg.fr
*.ac-toulouse.fr
*.ac-versailles.fr
*.ac-wf.wf

Or maybe they all should be put under *.education.fr ?

S.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Revoking Trust in one ANSSI Certificate

2013-12-11 Thread Brian Smith
On Wed, Dec 11, 2013 at 1:49 AM, Samuel L samuel.la...@sealweb.eu wrote:
 Le 11/12/13 01:08, Kathleen Wilson a écrit :
 Based on the list that Rob provided, there may be other domains that we
 might consider including.
 For example:
 *.ac-martinique.fr
 *.ac-creteil.fr
 *.ac-orleans-tours.fr
 *.education.fr
 *.ac-poitiers.fr

[snip]

 According to this page (from the french national education administration,
 which is one of the biggest, if not the biggest administrative body in
 France), there are actually 30 academies (regional bodies of the ministry of
 education), whose domains are :

snip

Thanks for the very helpful information. I think we should first ask
ANSSI to help those academies migrate to a different CA. My
understanding is that the French government already has used
certificates from other CAs:

Entrust: https://www.amendes.gouv.fr/portail/index.jsp?lang=en
Certplus/Certinomis:
https://www.tresor.economie.gouv.fr/autorisations-prealables-des-investissements-etrangers-en-france

So, it seems reasonable to think we could work with ANSSI to
coordinate the migration of websites that aren't serving critical
government functions to the other CAs that the French government is
already using, in a reasonably fast timeframe. I'd like us to try that
first.

Cheers,
Brian
-- 
Mozilla Networking/Crypto/Security (Necko/NSS/PSM)
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Revoking Trust in one ANSSI Certificate

2013-12-11 Thread Gervase Markham
On 10/12/13 06:20, Jan Schejbal wrote:
 The third sub-ca cert (Subject AC DGTPE Signature Authentification)
 includes a CRL DP for a CRL issued by sub-ca 2, validity 2011-09-09 to
 2014-09-13. The CRL is empty.

Look again. It seems that it now contains 1106 certificates (!), with
widely varying revocation dates.

It would be interesting to know by what process this happened. Were
these certs revoked in the past but the CRL not updated due to some
technical issue? Or have they just decided to do a blanket revocation of
every cert issued? Or something else?

 Am I correct in the assumption that this means that the only way this CA
 can deal with Sub-CA compromises effectively is asking for an emergency
 update of all software relying on the certificates?

AIUI, yes.

Gerv
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Revoking Trust in one ANSSI Certificate

2013-12-10 Thread Jan Schejbal
Am 2013-12-10 12:09, schrieb Jan Schejbal:
  5. Appears unable to operate a CA properly as per Erwann's mail (e.g.
 no valid CRLs).

I had a look at the CRLs of the certificates in the chain.

The first sub-ca cert in the chain (Subject MINEFI-AUTORITE DE
CERTIFICATION RACINE) includes a CRL DP which provides a CRL issued by
the root, valid from 2013-12-01 through 2014-01-08. This CRL contains
one certificate with a revocation date in 2008.

The second sub-ca cert (Subject AC Racine DGTPE) includes a CRL DP for a
CRL issued by sub-ca 1, validity 2013-06-04 to 2015-06-04. The CRL is empty.

The third sub-ca cert (Subject AC DGTPE Signature Authentification)
includes a CRL DP for a CRL issued by sub-ca 2, validity 2011-09-09 to
2014-09-13. The CRL is empty.

The fourth and final sub-ca cert (Subject AC DG Trésor SSL), does not
contain a CRL DP.

Thus, if I understand it correctly, the CA cannot effectively revoke the
Trésor Sub-CA without revoking other Sub-CAs. Further, any revocation
will have limited effectiveness for at least one month, since signed
CRLs valid until then already exist for the entire chain. Even then, the
CA would need to revoke the MINEFI Sub-CA - otherwise, the revocation
will have limited effectiveness for many more months.

No OCSP responders are specified in the certificates.

Am I correct in the assumption that this means that the only way this CA
can deal with Sub-CA compromises effectively is asking for an emergency
update of all software relying on the certificates?
(Even under the assumption that software does check CRLs, that is.)


By the way, CAs were informed in February 2012 that they will need to
comply with v1 of the CAB BR by July 2012. These requirements already
state that OCSP is mandatory effective January 2013. They also
explicitly prohibit CRLs with nextUpdate values more than 12 months from
the thisUpdate value. Such a CRL was issued in 2013, i.e. long after the
effective date of the BR.

The 2011 audit statement
https://bug666771.bugzilla.mozilla.org/attachment.cgi?id=661038
appears to claim that they fulfill the 1.0 BR, however, they seem to
have audited themselves?!?

Kind regards,
Jan

-- 
Please avoid sending mails, use the group instead.
If you really need to send me an e-mail, mention FROM NG
in the subject line, otherwise my spam filter will delete your mail.
Sorry for the inconvenience, thank the spammers...
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Revoking Trust in one ANSSI Certificate

2013-12-10 Thread Rob Stradling

On 10/12/13 00:48, Erwann Abalea wrote:

Le lundi 9 décembre 2013 23:15:01 UTC+1, Brian Smith a écrit :

One thing that would really help would be an attempt to document which
publicly-accessible websites are using certificates that chain (only)
to the ANSSI root. I heard the claim that most French public
government websites actually use certificates that chain to a
different CA. That has led me to wonder how much the ANSSI root is
actually used by public websites. Having a list of domains that use
certs that chain to ANSSI root is likely to have some significant
bearing on the decisions about what to do. But, it will be a while
before I would have time to compile such a list.


Working on such a list on my spare time. Unfortunately, it's not a small 
hierarchy.


Attached is a list of server identities (SAN-dNSNames, SAN-iPAddresses 
and Subject-CNs) from all the certs I can find that chain only to the 
CN = IGC/A Root and that would be trusted for server authentication by 
browsers.


I tried to send a larger file just now (with more info), but I'd 
forgotten that this list has a 40KB limit on attachments.  Hopefully it 
won't reject this .zip file...


--
Rob Stradling
Senior Research  Development Scientist
COMODO - Creating Trust Online

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Revoking Trust in one ANSSI Certificate

2013-12-10 Thread Phillip Hallam-Baker
On Mon, Dec 9, 2013 at 2:17 PM, Jan Schejbal jan.schejbal_n...@gmx.dewrote:


 I would really love to see the explanation how someone accidentally
 issues and deploys a MitM Sub-CA...


I think it will turn out to be essentially the same reason that Microsoft
got burned with the Flame attack.

Just because an organization has PKI expertise does not mean that it is
evenly shared in the organization or that everyone understands what the
constraints are.

The organization does not have managing crypto as its primary goal so the
processes that manage the CA do not include awareness of current crypto
affairs as a requirement.

I have similar concerns about DANE. The expectations that are placed on the
registries and registrars are quite interesting.

-- 
Website: http://hallambaker.com/
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Revoking Trust in one ANSSI Certificate

2013-12-10 Thread Brian Smith
On Tue, Dec 10, 2013 at 4:08 PM, Kathleen Wilson kwil...@mozilla.com wrote:
 Constrain the currently-included IGC/A root certificate to a certain set of
 domains. I think the restriction needs to be along the lines of *.gouv.fr.

I think it might help to explain the rationale for the choice of *.gouv.fr:

ANSSI is run by the French government and *.gouv.fr are government
websites. Thus, restricting ANSSI to issuing certificates under
*.gouv.fr limits the negative impact of any mis-issuance to French
government websites--i.e. they could only harm themselves if so
restricted.

Also, enabling *.gouv.fr sites that use ANSSI-issued certificates to
continue working would minimize disruption to essential government
services, like tax collecting, etc. Removing ANSSI completely may be
too disruptive to these essential services.

My personal opinion is that it is unlikely that all other browsers
would follow us if we completely removed ANSSI, but I think it would
be reasonable to expect other browsers to add constraints to
*.gouv.fr.

In case it isn't obvious, I support this proposal.

Cheers,
Brian
-- 
Mozilla Networking/Crypto/Security (Necko/NSS/PSM)
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Revoking Trust in one ANSSI Certificate

2013-12-09 Thread Tim Moses
From the information we have to date, I think the CAs that try hard to run a 
conformant operation can be justifiably upset that this behaviour is tolerated.

All the best. Tim.

 On Dec 9, 2013, at 4:19 PM, Eddy Nigg eddy_n...@startcom.org wrote:
 
 On 12/09/2013 11:12 PM, From Ryan Sleevi:
 According to https://wiki.mozilla.org/CA:Communications#January_10.2C_2013 
 (see the Responses section), this CA has indicated that they do not expect 
 to begin operating in full compliance to the Baseline Requirements and to 
 Mozilla's 2.1 Inclusion Policy until Dec 2015/January 2016.
 
 Thanks Ryan - then we probably should understand what Mozilla does or intends 
 to do in such cases. Maybe this shows that something must be done (when we 
 are assuming that by today every CA is compliant already and this should not 
 be possible according to BR AND Mozilla's requirements).
 
 -- 
 Regards
 
 Signer:  Eddy Nigg, StartCom Ltd.
 XMPP:start...@startcom.org
 Blog:   http://blog.startcom.org/
 Twitter: http://twitter.com/eddy_nigg
 
 ___
 dev-security-policy mailing list
 dev-security-policy@lists.mozilla.org
 https://lists.mozilla.org/listinfo/dev-security-policy
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Revoking Trust in one ANSSI Certificate

2013-12-09 Thread fhw843
Let's start with the basics: what is the cert subject, serial number, date info? None of the four browser notices provided any of that. Surely there is no reason to keep it secret, is there?From: Jan SchejbalSent: Monday, December 9, 2013 1:19 PMTo: mozilla-dev-security-pol...@lists.mozilla.orgReply To: jan.schejbal_n...@gmx.deSubject: Re: Revoking Trust in one ANSSI CertificateHi,could we please have the certificates/chains involved in this, and couldthe corresponding bug (I assume there is one) maybe be made public?Especially of interest would be the dates when the certificates wereissued, when they were first used for MitM, when this was reported tothe CA by Google, and when the CA revoked the certificate.From what I understood, the hierarchy was as follows:ANSSI+-Treasury Sub-CA  +-MitM-CA (installed on MitM device)+-Fake endpoint certificatesIs this assumption correct? If so:Was the "Treasury Sub-CA" revoked, or only the "MitM-CA"?Which of these certs are the ones blacklisted by Mozilla?The publicly available information about this is currently quitelimited. Having a meaningful debate on that basis is difficult.We already had a similar case once - Trustwave. The differences are thatthey admitted it before getting caught, and that since that incident,everyone remotely involved in PKI management should know that this issomething you don't do.I would really love to see the explanation how someone accidentallyissues and deploys a MitM Sub-CA...Kind regards,Jan___dev-security-policy mailing listdev-security-policy@lists.mozilla.orghttps://lists.mozilla.org/listinfo/dev-security-policy
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Revoking Trust in one ANSSI Certificate

2013-12-09 Thread fhw843
‎Brian,I was thinking it would be beneficial if ANSSI would provide a ‎host:port that would have the bad chain installed. This allows for anyone to check if their browser has been updated to un-trust the intermediate.I make this suggestion in addition to the points you raise below, and I think it's fair to ask this of any CA that behaves badly.   From: Brian SmithSent: Monday, December 9, 2013 4:15 PMTo: Eddy NiggCc: mozilla-dev-security-pol...@lists.mozilla.orgSubject: Re: Revoking Trust in one ANSSI CertificateOne thing that would really help would be an attempt to document whichpublicly-accessible websites are using certificates that chain (only)to the ANSSI root. I heard the claim that most French publicgovernment websites actually use certificates that chain to adifferent CA. That has led me to wonder how much the ANSSI root isactually used by public websites. Having a list of domains that usecerts that chain to ANSSI root is likely to have some significantbearing on the decisions about what to do. But, it will be a whilebefore I would have time to compile such a list.I think it would also help to document in this thread the ways we knowthat ANSSI is not complying with our CA program. Lack of OCSP AIA URIin the certificates is one example. Are there other ways that ANSSI isnon-compliant?Cheers,BrianOn Mon, Dec 9, 2013 at 1:18 PM, Eddy Nigg eddy_n...@startcom.org wrote: On 12/09/2013 11:12 PM, From Ryan Sleevi: According to https://wiki.mozilla.org/CA:Communications#January_10.2C_2013 (see the Responses section), this CA has indicated that they do not expect to begin operating in full compliance to the Baseline Requirements and to Mozilla's 2.1 Inclusion Policy until Dec 2015/January 2016. Thanks Ryan - then we probably should understand what Mozilla does or intends to do in such cases. Maybe this shows that something must be done (when we are assuming that by today every CA is compliant already and this should not be possible according to BR AND Mozilla's requirements). -- Regards Signer:  Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy-- Mozilla Networking/Crypto/Security (Necko/NSS/PSM)___dev-security-policy mailing listdev-security-policy@lists.mozilla.orghttps://lists.mozilla.org/listinfo/dev-security-policy
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy