Dear Mozilla Community,
Over the past couple of months, a substantial number of compliance incidents have arisen in relation to Entrust. We have summarized these recent incidents in a dedicated wiki page: https://wiki.mozilla.org/CA/Entrust_Issues. In brief, these incidents arose out of certificate mis-issuance due to a misunderstanding of the EV Guidelines, followed by numerous mistakes in incident handling (including a deliberate decision to continue mis-issuance), which have been compounded by a failure to remediate the issues in a timely fashion in line with well-established norms and root store requirements.
Our preliminary assessment of these incidents is that while they were relatively minor initially, the poor incident response has substantially aggravated them and the progress towards full remediation remains unacceptably slow. This is particularly disappointing in light of previous incidents in 2020 (#1651481 and #1648472), which arose out of similar misunderstandings of the requirements, similar poor decision-making in the initial response, and lengthy remediation periods that fell well below expectations. Entrust gave commitments in those bugs to address the root problems through process improvements, and it is concerning to see so little improvement 4 years later.
In light of these recent incidents, we are requesting that Entrust produce a detailed report of them. This report should cover in detail:
The factors and root causes that lead to the initial incidents, highlighting commonalities among the incidents and any systemic failures;
Entrust’s initial incident handling and decision-making in response to these incidents, including any internal policies or protocols used by Entrust to guide their response and an evaluation of whether their decisions and overall response complied with Entrust’s policies, their practice statement, and the requirements of the Mozilla Root Program;
A detailed timeline of the remediation process and an apportionment of delays to root causes; and
An evaluation of how these recent issues compare to the historical issues referenced above and Entrust’s compliance with its previously stated commitments.
Finally, Entrust’s report should include a detailed proposal on how it plans to address the root causes of these issues. In light of previous guarantees given by Entrust in 2020 to ensure speedy remediation in future incidents, this proposal should include:
Clear and concrete steps that Entrust proposes to take to address the root causes of these incidents and delayed remediation;
Measurable and objective criteria for Mozilla and the community to evaluate Entrust’s progress in deploying these solutions; and
A timeline for which Entrust will commit to meeting these criteria.
We strongly recommend that Entrust go beyond their existing commitment to offer systematic, automated solutions for effective remediation, like ACME ARI and that it also include clear and measurable targets for the adoption of these tools by new and existing subscribers.
This report should be submitted to Mozilla dev-security-policy mailing list for evaluation by the community and Mozilla, who will weigh whether Entrust’s report presents a credible and effective path towards re-establishing trust in Entrust’s operation. Submission should be no later than June 7, 2024.
We thank community members for their engagement on these issues and look forward to their feedback on Entrust’s report and proposed commitments.
Thanks,
Ben Wilson
Mozilla Root Program
Invalid data in State/Province Field -
https://bugzilla.mozilla.org/show_bug.cgi?id=1658792
It was initially discovered that Entrust had issued 395 OV SSL certificates to a large international organization with “NA” for the state/province information. Entrust worked on a drop-down list to prevent the error. Certificate revocation would not occur within established timeframes, so Bug #1658794 for delayed revocation was opened.
Late Revocation for Invalid State/Province Issue -
https://bugzilla.mozilla.org/show_bug.cgi?id=1658794
This is the delayed revocation bug related to Bug #1658792,
above. Entrust said that when educating large institutions about rapid
revocation, factors include who owns a certificate, where it is deployed, and
the type of system or application that requires the certificate. It also said that it was advocating
automation with such institutions to help speed up certificate replacement and to
minimize human error.
EV TLS Certificate incorrect jurisdiction -
https://bugzilla.mozilla.org/show_bug.cgi?id=1802916
Entrust mis-issued 322 EV certificates with the wrong state
and locality jurisdiction fields due to complex data entry processes. Entrust implemented
a different automated dropdown system for jurisdiction selection. Certificate revocation
would not occur within established timeframes, so Bug #1804753 for delayed
revocation was opened.
Delayed Revocation for EV TLS Certificate incorrect jurisdiction -
https://bugzilla.mozilla.org/show_bug.cgi?id=1804753
This is the delayed revocation bug related to Bug #1802916, above. Entrust listed 8 Subscribers who were pushing back on immediate certificate revocation and the reasons given (e.g. extensions granted due to end-of-year freezes). Entrust committed to “continue to develop and extend methods for automatic certificate renewal.”
Jurisdiction Locality Wrong in EV Certificate -
https://bugzilla.mozilla.org/show_bug.cgi?id=1867130
Two EV TLS Certificates were mis-issued due to human error in the Jurisdiction Locality field. (The incident revealed 340 additional accounts needing similar updates.) Entrust said it would enhance its linting processes to include possibly using an external service to validate locality data against verified country data.
SHA-256 hash algorithm used with ECC P-384 key -
https://bugzilla.mozilla.org/show_bug.cgi?id=1648472
A Mozilla policy was adopted to require hashing with SHA-384 for an ECC P-384 key. Existing CAs using SHA-256 were not re-configured when Mozilla adopted this policy. This incident revealed a serious gap in taking new requirements and implementing them. Ryan Sleevi noted that linting was just a safety net and not a systemic solution. Entrust was also criticized for the lack of detail in its incident report and its decision to not revoke the certificates.
Entrust committed to improving its monitoring and implementation of policy changes to prevent similar incidents. Ryan set forth a number of proactive systemic corrections that Entrust needed to take, rather than taking a reactive stance on matters of non-compliance.
Entrust committed to rigorous review of certificate profiles, browser policy revisions, and industry developments. As a final comment, Ryan said, “My big concern is, going forward, we see incident reports from Entrust take a more systemic, holistic response, like Comment #16, to try and cover the scenarios, and to provide sufficient detail about the situation and its failures to understand how those relate. The goal isn't to make CAs wear proverbial sackcloth, it's to try and make sure we're understanding how things go wrong, so that we can effectively collaborate on identifying solutions to avoid that going forward.”
Late Revocation due to SHA-256 hash algorithm -
https://bugzilla.mozilla.org/show_bug.cgi?id=1651481
This bug is related to Bug #1648472. Entrust issued TLS certificates using ECC P-384 keys hashed with SHA-256, contrary to Mozilla policy requiring SHA-384 for hashing. Entrust’s initial decision was to allow certificates to expire naturally without revocation, but this was revised with a decision to revoke all affected certificates. Entrust committed to: filing incident report within one business day for future incidents, filing late revocation incident reports within the required 24 hours or 5 days, as applicable, and advising Subscribers about revocation within 24 hours or 5 days, or provide an explanation if they are unable to meet such timeframes. Entrust was told it needed to align its revocation procedures more closely with the Baseline Requirements and Mozilla’s policy, especially in providing a detailed rationale for any delays in revocation on a per-subscriber basis and ensuring timely revocation in line with the Baseline Requirements.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtabu3a3FRyG4C%3DDdXDSAAMbdPVKApACYnE%2Be2tFCsdULSQ%40mail.gmail.com.
To Ben Wilson and the Mozilla Community:
I want to acknowledge your letter and the input from you and the community. We agree that we have go-forward opportunities to improve.
To that end, I want to confirm our intent to provide a full written response to you and the community prior to June 7. Until then, please contact me directly with additional questions or feedback.
Sincerely,
Chris Bailey
VP-Digital Certificates
Entrust
The CA software has a bug which encodes quotation marks in the organization field using PrintableString instead of UTF8String. This software has not been fixed at this time.
To that end, I want to confirm our intent to provide a full written response to you and the community prior to June 7.
a full written response to you and the community prior to June 7.
prior to June 7
O_______O
Date: Fri, 7 Jun 2024 12:53:10 -0700 (PDT) From: "'Bruce Morton' via dev-secur...@mozilla.org" <dev-secur...@mozilla.org> To: "dev-secur...@mozilla.org" <dev-secur...@mozilla.org> Cc: Ben Wilson <bwi...@mozilla.com> Subject: Re: Recent Entrust Compliance Incidents
On Sat, Jun 8, 2024 at 2:15 PM Mike Shaver <mike....@gmail.com> wrote:
>"It would mean that revenue from the financial disincentive that Entrust puts in place against Subscriber automation (I believe it's called "SUB-PKI-CEG-ACME")"
So for four years, while Entrust told us it was working to get its
subscribers to automate, it was using this as a revenue opportunity
thus continuing manual processes? There is no way to reconcile this
with any sort of commitment here on Entrusts part to getting
subscribers to automate.
Could Mozilla update the root store policy to make clear that
improvements like ACME shouldn't be extra cost items but instead
considered part of the service provided to customers.
> On Jun 8, 2024, at 18:16, Watson Ladd <watso...@gmail.com> wrote:
>
>
> Could Mozilla update the root store policy to make clear that
> improvements like ACME shouldn't be extra cost items but instead
> considered part of the service provided to customers.
I don’t have an opinion on this but as someone who at $dayjob has been forced to request non-acme certificates manually, let me assure you that any vendor requiring me to do that quickly gets pulled in the “vendors to migrate away from” list. Any CA preferring manual issuance over automated issuance is going to find itself out of business soon (as are vendors providing web services requiring their customers to send them certs once a year manually while promising to support acme “soon”)
I would caution against that. Effectively, Mozilla would be fiddling
with the market. The market should be the one to punish (or reward)
Entrust for the premiums on manual issuance, not Mozilla. When
subscribers get tired of paying too much for the service, the customer
will go elsewhere.
In my mind's eye, there are two things to observe. First is the
CA/Browser Standards ("what we do"), and second is the CA Operating
Procedures ("how we do it").
Apologies, I somehow managed to send white-on-white HTML from gmail mobile and I honestly have no idea how.
On Sat, Jun 8, 2024 at 9:48 PM Jeffrey Walton <nolo...@gmail.com> wrote:
> I would caution against that. Effectively, Mozilla would be fiddling
> with the market. The market should be the one to punish (or reward)
> Entrust for the premiums on manual issuance, not Mozilla. When
> subscribers get tired of paying too much for the service, the customer
> will go elsewhere.
Hey, uh, yeah…Mozilla sort of exists to “fiddle with the market” in ways that it feels protect the web’s users from the direction that The Market might otherwise take. It’s sort of “their thing”.
But that rather jarring dissonance aside, nobody is objecting to premiums on manual issuance. It is precisely the opposite: it is an objection to charging Subscribers *extra* for using *automated* tools that make the web safer (and which indeed should be cheaper for the CA to operate than a manual process, but you know how it is with rent seeking).
The CA’s primary responsibility is to the web’s users, not to its customers. They all know this. It can require that they not always optimize for short-term business outcomes, but if they are not comfortable with that *very* explicit tension, then this is not an appropriate business for them.
> In my mind's eye, there are two things to observe. First is the
> CA/Browser Standards ("what we do"), and second is the CA Operating
> Procedures ("how we do it").
I guess that is a way that these things could have evolved in a parallel universe, but you have perhaps noticed that the BRs already have many directions as to how things must be done. The BRs are in fact growing more such directions over time as it becomes increasingly clear that not all CAs can be trusted to do the things that are best for the health of the WebPKI; see the active discussion about linting practices in the SCWG, for example.
On Jun 8, 2024, at 23:53, Mike Shaver <mike....@gmail.com> wrote:The CA’s primary responsibility is to the web’s users, not to its customers.
That is an interesting view, possibly not shared by its shareholders or the legal framework of the countries they operate in.
All,
This is to acknowledge that we have received Entrust's June 7 Report regarding its non-compliance issues and associated remediation plans. Mozilla will thoroughly review the report and provide comments, requests for clarifications, and verify that the requested items have been and will be addressed in accordance with the request for the Report and the Action Items listed in Bugzilla Bug #1901270.
Our review process will include:
We will follow up with specific comments and requests for clarifications as needed.
Thank you for your attention to these important matters.
Ben
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/ebea97dc-1871-4588-93b7-8fd97f50ec0cn%40mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaY7Bx30Ck4ZKRP4dKTBfmEqxLKiV6FZPvPN31AbLxWcZA%40mail.gmail.com.
Does this mean that the window has closed for feedback to Mozilla on the report and its responsiveness to the request?
Will requests for clarification be in this thread, the listed bug, or elsewhere?
Preferably here, but if the requests for clarification are structured in markdown in Bugzilla as replies to Comment 1, then that would be acceptable, too. Otherwise, general comments and critiques should be made here.
For efficiency, it is requested that comments and requests for clarification be collected into as few emails/posts as possible and not be posted in piecemeal fashion.
So far, we have received substantive comments and questions on Entrust’s June 7 Report from Amir, Wayne, and Watson.
Are others planning to submit comments or to request clarification and additional information from Entrust?
Thanks,Ben
You received this message because you are subscribed to the Google Groups "dev-security-policy@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-policy+unsub...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/ebea97dc-1871-4588-93b7-8fd97f50ec0cn%40mozilla.org.
--
You received this message because you are subscribed to the Google Groups "dev-security-policy@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-policy+unsub...@mozilla.org.
All,So far, we have received substantive comments and questions on Entrust’s June 7 Report from Amir, Wayne, and Watson.
Are others planning to submit comments or to request clarification and additional information from Entrust?
Thanks,Ben
The Executive Summary claims that the report provides a “detailed overview of concrete, measurable steps”, but the Action Items included in the report are often neither detailed, nor measurable.
A single example, from "2.1.4 Improvement Plan": “Establish cross-functional change control board: Complete”. There is no detail as to what this board will decide, how they will be selected, or how their effectiveness can be measured. This Action Item is, as described, basically just "we made a list of some people".
The Mozilla Root Store Policy itself does not itself admit to any option for delayed revocation. It references the BRs, which require (SHALL and MUST language) revocation within 5 days. Provisions for delayed revocation only come from Mozilla's "Responding To An Incident" page at https://wiki.mozilla.org/CA/Responding_To_An_Incident#Revocation . Mozilla grants generous latitude to CAs in that CAs are permitted to weigh the impact of revocation against the impact of further delaying revocation, but it also makes clear what is expected from a CA when it decides that the circumstances are "exceptional", such as when used in "critical infrastructure".
In https://bugzilla.mozilla.org/show_bug.cgi?id=1886532#c35 , Ngook Kong clarifies Entrust's position on these expectations:
Our interpretation is any delayed revocation will comply with the Mozilla revocation policy at https://wiki.mozilla.org/CA/Responding_To_An_Incident#Revocation
Unfortunately, Entrust has systematically failed to comply with the policy to which they refer.
Requirement: "The decision and rationale for delaying revocation will be disclosed in the form of a preliminary incident report immediately; preferably before the BR-mandated revocation deadline. The rationale must include detailed and substantiated explanations for why the situation is exceptional. Responses similar to “we do not deem this non-compliant certificate to be a security risk” are not acceptable. When revocation is delayed at the request of specific Subscribers, the rationale must be provided on a per-Subscriber basis."
Entrust's delayed revocation incidents have consistently failed to meet this expectation. In two of the three delayed revocation incidents that Entrust chose to include in their report, no per-subscriber information whatsoever was provided, with the exception of a comment that listed four out of more than 100 affected subscribers. When rationales are provided (https://bugzilla.mozilla.org/show_bug.cgi?id=1886532#c32), they are insufficiently detailed: they do not contain enough information to determine whether the proposed action items are likely to meaningfully affect the risk of future delayed-revocation incidents.
This item has been present, in substantially identical form, since 2019, so it was well known to Entrust when they made their commitments in 2020 to avoid delayed revocation and adhere to the BRs and root program expectations. It is alarming that a CA that boasts of its long experience in the web PKI and involvement in the community is still consistently unable or unwilling to adhere to those requirements.
Requirement: "Your CA will work with your auditor (and supervisory body, as appropriate) and the Root Store(s) that your CA participates in to ensure your analysis of the risk and plan of remediation is acceptable."
To the best of my ability to determine, no Root Stores were consulted with regards to the risk analysis or plan of remediation; Ben Wilson's comment at https://bugzilla.mozilla.org/show_bug.cgi?id=1890898#c19 seems to indicate that Mozilla's root program representatives were not consulted. There has also not been any indication of auditor involvement. If indeed Entrust worked with their auditor with respect to the decisions not to revoke captured in bugs 1890898 and 1890685, it is difficult to understand how their later analysis came to a different conclusion.
Ngook Kong states in https://bugzilla.mozilla.org/show_bug.cgi?id=1886532#c51:
"Yes, we are equipped to perform a wide scale revocation if needed and necessary. [...] We have the technical capability to revoke within the required timelines."
But note also https://bugzilla.mozilla.org/show_bug.cgi?id=1898848#c1 in which Entrust pleads that they lack the resources to meet their commitment to the BRs:
"In addition, the authority to launch and conduct formal investigations, confirm incidents, initiate incident reporting processes, and trigger revocation events is held by a small number of individuals within the compliance team. These same individuals were responsible for helping to respond to incidents, communicating with impacted subscribers, responding to questions from the Bugzilla community, and drafting and submitting incident reports, in addition to other day-to-day responsibilities."
The former comment comes after the latter one, so perhaps the resources available have been increased. However, there is no mention in section 2.5 of the report of any action items related to increasing the resources available for investigating or responding appropriately to misissuance events, or how it can be measured that the level of investment is appropriate on an ongoing basis. I don't feel that CAs should generally have to share staffing levels or budgeting processes with root programs, but if those staffing levels are the cause of incidents, then I think they become relevant to evaluation of the CA's ability to operate correctly (and therefore the risk posed by continuing to trust certificates that they issue).
In 2020, Entrust made the following commitments to Ryan Sleevi (then a peer of the Mozilla root program module): https://bugzilla.mozilla.org/show_bug.cgi?id=1651481#c6
[1] We will not the make the decision not to revoke.
[2] We will plan to revoke within the 24 hours or 5 days as applicable for the incident.
[3] We will provide notice to our customers of our obligations to revoke and recommend action within 24 hours or 5 days based on the BR requirements.
[4] We will recommend to our customers to implement automation of certificate management.
[5] We will increase our ability for correct implementation and testing to ensure that certificate profiles will meet the latest CA/Browser Forum or root program requirements.
[6] We will monitor the Mozilla incidents and the discussion list to discover problems which other CAs have experienced and how they were resolved. This will allow us to review and react if required to our own implementation. This will also help to minimize the number of miss-issued certificates, which will reduce the risk of late revocation.
[7] We will manage and update our pre-issuance and post-issuance linting to discover or prevent the problem early.
(I have added the numbers for easier reference.)
These commitments have been repeatedly broken, and in some cases appear repeated again in the report 4 years later:
In 2.5.4 (Improvement Plan), we see
We intend to revoke and replace certificates that do not meet TLS Baseline
Requirements or certificate-specific guidelines.We will plan to do so within the prescribed revocation periods [2]
We will work with our subscribers to ensure awareness and minimize
delayed revocation requests [3]
Driving customer adoption of automation [4]
Of specific note, there is an action item "Launch communication and education to subscribers on requirements for public trust certificates" with a target completion of 2024-07-31. Why is that only being undertaken now, four years after Entrust made commitment [3]?
In 2.4.4 (Improvement Plan), we have as action items:
Run pkilint against all CRLs [7]
Update automated test to cover the added requirement [5]
which are a near-identical repetition of the indicated commitments, and are indicated in the report as "completed". How can we believe that Entrust has made this improvement, when they committed to doing so already 4 years ago? In the same bug 1651481, Bruce Morton states: "We have put in practices to close out non-conformance and late revocation issues." If they indeed kept commitments [5] and [7], then they should provide substantial detail on why they believed that the previous efforts were appropriate, why it was reasonable for the incidents in 2.4.2 to have occurred with good-faith implementations of [5] and [7], and how their approach is different in 2024 such that the community can have faith that there has been a systematic remedy for this systematic fault.
More than 8000 of the affected certificates in bug 1886532 are indicated to be delayed due to limitations of subscriber process, but none of the action items in the report provide measurable concrete ways to eliminate those limitations. Indeed, I don't think it is reasonable to hold Entrust accountable for making its subscribers improve internal processes, and I am surprised that Entrust has proposed that they be evaluated on efforts to that end. I think it is very reasonable to hold Entrust accountable for ensuring that the BRs are upheld regardless of whether a given subscriber has chosen to invest in changes to help them replace certificates more promptly; that is to say, hold Entrust accountable for revoking, as they have said explicitly that they have the technical capability to do.
In https://bugzilla.mozilla.org/show_bug.cgi?id=1886532#c1, Paul van Brouwsershaven says:
The revocation for customers is in most cases manual and complex, involving multiple internal parties to ensure that the change does not create an adverse impact on web services and back-end processing.
As a result, we have moved these customers into delayed revocation, particularly where their operations are critical to the web ecosystem
Entrust has stated that in 2020 (and presumably for the intervening four years), they felt that their processes were sufficient to meet the commitments made in 1651481. This is an assertion that they were not aware that the "revocation for customers is in most cases manual and complex", because those Subscriber limitations are still used as an excuse for delayed revocation today. Entrust has made no commitments that would limit the extent to which one of their Subscribers' operational limitations would be allowed to inflict harm on the integrity of the web PKI. Indeed, they continue to knowingly issue web PKI certificates to Subscribers who have regulatory or policy limitations that require as much as 90 days for a certificate replacement to be completed, which is entirely inconsistent with their 2020 commitments, and with a belief that the aforementioned (but unspecified) processes were an appropriate means for meeting those commitments–even over a four year time span.
In https://bugzilla.mozilla.org/show_bug.cgi?id=1886532#c36 , Ngook Kong says
No delayed revocation options were offered.
Later in that bug, Ngook posts a sample email that was sent to a subscriber regarding a certificate that was misissued, but part of it is redacted:
Subject:URGENT ACTION REQUIRED: EV Revocation May be Required
Message Group: System Interruptions
Message Expiry Date: 3/30/24
We are writing to inform you about a recent issue that affected some of the EV digital certificates issued by Entrust. We apologize for any inconvenience this may have caused you and we are committed to ensuring the security and integrity of your online transactions.
Summary:
Entrust discovered that some Extended Validation (EV) TLS certificates (EV Multi-Domain SSL, QWAC eIDAS, QWAC PSD2) were missing a specific component required by the EV Guidelines. This component links the certificate to the Certificate Policy (CP) and the Certification Practice Statement (CPS) of the issuer.
Entrust has taken steps to address the issue and prevent it from happening again. Any of the specified certificate types issued after 21:40 UTC today, Mar 18, 2024 are not affected. Entrust is required to revoke affected certificates as soon as possible, which will occur on Saturday, March 23, 2024 at 21:00 UTC
ACTION REQUIRED:
Certificates issued after September 11th, 17:40 UTC, 2023, to March 18th, 21:40 UTC, 2024, will need to be replaced by issuing a new certificate and revoking the old certificate(s) shortly thereafter. We will assist you with this process and ensure a smooth transition.
Steps: [REDACTED]
Thank you,
Entrust Certificates Services
Later, it was revealed by a member of the community that what was redacted was an instruction to the Subscriber to revoke along a 30-day timeline, and Entrust was asked why they redacted that portion: https://bugzilla.mozilla.org/show_bug.cgi?id=1886532#c40
Perform a REISSUE, and select "Revoke within 30 days" so your production certificate maintains validity, providing sufficient time to perform the replacement
Ngook Kong responded
The letter we shared is an example of what was sent from us directly to a subscriber and was not posted in the public domain. We were being transparent by sharing the message. The redacted section provides specific instructions to our subscribers on how to revoke and reissue certificates.
and uploaded a PDF copy of the email (https://bug1886532.bmoattachments.org/attachment.cgi?id=9406229). It is very difficult to believe that this section was omitted due to any sensitivity of the material contained; the PDF was provided promptly when it was revealed that the contents were known to the community member, and Entrust's website contains related instructions on renewal for their product already (https://www.entrust.com/knowledgebase/ssl/how-to-renew-your-entrust-certificate-using-self-service as an example). It is also very difficult to believe that this was anything but an attempt to conceal elements of Entrust's subscriber communication that contradict Entrust's position that they prioritized prompt revocation and conveyed proper urgency to their subscribers. I actually don't think the email is that bad, because their software seems to be such that 30 days is the appropriate window to be selected here, but I think that the fact that they tried to conceal it is very concerning.
Similarly concerning is their repeated uncooperative responses to requests for per-subscriber detail and rationale, which is a crystal-clear requirement of the Mozilla incident response policy for delayed revocation.
In conclusion, I do not feel that Entrust has demonstrated satisfactory commitment or investment in addressing systemic issues with Subscriber management and revocation policy/process. Neither their historical behaviour nor their inadequate response to the community are appropriate for a CA that chooses to issue public web PKI certificates. I strongly recommend that Entrust-issued certificates issued after June 7, 2024, not be trusted by Mozilla products.
Mike
Please respond to comments you may have on our report or action items here. We will track our progress against the action items list in Bugzilla under bug 1901270.
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/ebea97dc-1871-4588-93b7-8fd97f50ec0cn%40mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CADQzZqsKSw-3ho8%3Deh373K9iJF9-Vq-Ww4agkwk-vLeucZZMpg%40mail.gmail.com.
I missed that they tried to conceal the part of the email where 30 day revocation was granted. How on earth is this acceptable?
I’ll have to go double check everything in your correspondence here, but if this is all true then this is deeply unsettling and concerning.
To me, it seems that Entrust has forgotten why we are all here. The purpose of the WebPKI is to enable end-users to trust that they are communicating with the correct website. This trust relies on the CAs that make up the WebPKI to be transparent and live up to their promises while adhering to ecosystem norms, requirements, and best practices. Root programs act as the arbitrators of who is worthy of that trust by enforcing these norms, rules, and best practices on behalf of the end-users they serve.
As I review the various incidents at hand, the bugs tracking them, the incident responses, and the associated timelines, a few key elements stand out to me:
Lack of Transparency and Accountability: Entrust’s incident reports and responses lacked transparency and failed to acknowledge where the fault lay.
Failure to Meet Previous Commitments: Despite previous commitments made in 2020 to avoid delayed revocations and adhere to BRs, Entrust continued to face similar issues.
Inadequate Root Cause Analysis: The root cause analyses provided by Entrust were often superficial and did not address systemic failures.
Insufficient Remediation Plans: Entrust's remediation plans were vague, lacking concrete, measurable steps, and often repeated previous commitments without acknowledging how they had previously failed to live up to these commitments.
Lack of Organizational Self-awareness: Entrust's responses indicated a lack of self-awareness about the depth of their issues. They did not show a comprehensive understanding of the systemic problems leading to repeated incidents.
Belief in Exemption from Norms: Entrust has demonstrated through their actions and responses that they believe the norms, policies, and requirements do not equally apply to them.
Slow Response Times: Looking at similar incidents, the timeline associated with Entrust's responses was slow relative to other similar-sized organizations and smaller CAs.
In Entrust’s responses to these incidents, they have leaned on their long history in this industry and the impact they have had. In that vein, I can't help but see parallels to the recent Microsoft CSRB review of STORM-0558, where the reviewers said that “Microsoft’s security culture was inadequate and requires an overhaul, particularly in light of the company’s centrality in the technology ecosystem and the level of trust customers place in the company to protect their data and operations.”
The immediate technical non-conformities we are discussing here, when looked at in isolation, are not major issues. I even understand why Entrust is hesitant to require their customers, who are largely Enterprise customers who are notoriously hard to deal with on such matters, to replace their certificates as a result of Entrust’s operational non-compliance. However, when we consider them as a body of issues, especially over time, and the way Entrust has responded to them, they reach a significant level. We need to be asking ourselves: is this the kind of behavior we want to establish as the norm for the WebPKI?
More broadly, the pattern of non-compliance demonstrated by Entrust, combined with the fact that other, smaller CAs with fewer resources have managed to respond significantly faster and more proactively, makes me ask the question: when we see systemic issues, do we wait until they are catastrophic before we, as the custodians of the WebPKI, respond?
In the end, the answers to these questions will need to be provided by the root programs. However, if I were at Entrust, I would have been doing some serious soul-searching over the past quarter about the cultural and organizational issues that led to this point.
I would also like to encourage other CAs who are watching this transpire to review their practices and ensure their incident response procedures are transparent, proactive, focused on root cause analysis, and more broadly in line with the expected norms of our community.
Ryan Hurst
To the Community -
We wanted to let you know that we have been monitoring this conversation. We appreciate your feedback here and plan to share a response next week.
Best regards, Bruce.
Amir, we will respond to the comments from the community, but I want to make it clear that Entrust was absolutely NOT trying to "conceal" anything related to how we do revocation and are disturbed that you would attribute "malicious" motives to any of our actions. The "30 day revocation" option is a standard option for subscribers in our system that allows them to replace certificates safely before revoking. In normal course, a subscriber would just leave them in this "bucket”, and they would automatically be revoked. When we posted the letter originally, we shared it as an example of what was sent from us directly to a subscriber and was not posted in the public domain. We were being transparent by sharing the message. The redacted section provides specific instructions to our subscribers on how to revoke and reissue certificates.
“Revoke within 30 days” was one of two options in the tool. Certificates placed in this status were reissued within 30 days of when they were placed in this status; we revoked them sooner if their extension time was reached, or if the subscriber confirmed they had reissued.
Prior to April 4, 2024, customer could only select "Revoke immediately" or "Revoke in 30 days". The default for use in the instructions on March 18 2024 was "Revoke in 30 days". Recognizing, this may have been perceived by customers that they then had 30 days vs the 5 day timeline that was communicated, Entrust implemented a change to add "Revoke in 3 days" as the default moving forward to be called out in the event of future mis-issuance.
These updated instructions with the use of the ‘3 day’ revocation button were used when communicating with subscribers for Bug 1897630.
“Complete the Reissue and select "Revoke in 3 days" so your production certificate maintains validity and provides you with sufficient time to perform the replacement. Note: This does NOT mean your certificate will be valid for another 3 days. It is just a mechanism to not immediately revoke your certificate during the replacement process.”
The full communication can be review in the attached.
Amir, we will respond to the comments from the community, but I want to make it clear that Entrust was absolutely NOT trying to "conceal" anything related to how we do revocation
The redacted section provides specific instructions to our subscribers on how to revoke and reissue certificates.
I'd just like to point out that we now have a situation where Entrust is in the position of seemingly valuing the opinion of other Root Programs over Mozilla: https://bugzilla.mozilla.org/show_bug.cgi?id=1890898#c42In Comment #37, it was hinted at (and made slightly more explicit in #39) that the opinion of the Mozilla RP is that the attempt to re-characterize these certs was not going to be looked kindly upon, and only once a Google RP member explicitly said that it was the Google RP opinion that the certs remained mis-issued was any movement made on re-confirming the mis-issuance and taking action to revoke them.Also, if we're in a position where Entrust is finally able to commit to revoking certs within a 5 day period (setting aside that these certs technically need a delayed revocation bug as the mis-issuance was known as far back as 2024-04-10), why are other incidents not able to be resolved in this amount of time? Is it because Google showed up?
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/f3cebe9b-fa25-4b11-ba3d-b7f3f6e0f719n%40mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CADQzZqtK5V6A1_vGBCKFBZFnqx6izBKRcFJF2aVsWnHjWAAjOQ%40mail.gmail.com.
Part of me wants to commend Entrust for this response. If we can believe its sincerity—and this is a if given their recent history and how this has played out—it took 13 compliance incidents and 107 days for their leadership to recognize, at least publicly, the systemic issues that have happened under their watch, and that does not even count the fact that this has been a problem since at least 2020.
The disappointing thing is that here we are, 30% into the year, and what we have is a commitment to restructure a part of Entrust and fund it to do better without concrete actions to address the specific issues. Meanwhile, they are still trusted and exposing the internet to their continued management challenges. I can’t help but think this response is too little, too late. With that said, it does indicate some level of recognition of how bad things have gotten, which is a step in the right direction.
With all that said, it’s difficult to imagine ISRG or Sectigo, for example, showing the same level of disregard for the processes at play or taking this long to get to this point. While this organizational change might help address that, at the same time as of three days ago, it appears that Entrust was still suggesting that EV certs issued in violation of their CPS weren’t actually misissued. This raises questions about whether they have truly internalized the gravity of the situation or if this public gesture is just that—a gesture.
Beyond that, the thing that I can’t help but ask myself is how long is too long. I’ve not yet gone back and looked at the average response time for other incidents, but just from looking at this thread and the associated bugs since March 6th, there are still missing responses/updates that were promised, and those that were provided were shallow. In my experience as an engineering leader, my first priority in a situation like this would be to ensure that we never missed a promised or obligated response, the second would be to make sure we had done everything possible to address the identified issues immediately. It’s unfortunate that at this point, we are not even there yet. Entrust has had every opportunity to do the right thing, but even with the world watching, they didn’t seem to prioritize it. As a result, today’s response might be better categorized as performative.
Ryan Hurst
Let's take a step back from this report. I don't think this report deserves to be taken seriously for one reason alone: You've historically proven to the community that we should not trust any statements made by Entrust. Let's look at how you've proven this:
First - Four years ago, you made a couple of promises in comment 6 of 1651481:
We will not the make the decision not to revoke.
We will plan to revoke within the 24 hours or 5 days as applicable for the incident.
None of these promises have been realized in the past four years. Why is this time going to be different? How are we even supposed to measure your commitment to your current action items?
Second - In this report, you're claiming that a lot of these issues stem from organizational structure. Meanwhile, 3 months ago, Entrust was claiming that:
This issue has been prioritized at the highest levels within Entrust. We have hundreds of people across Entrust working on remediation—including our senior leadership as well as teams from Customer Support, Operations, Sales, Legal, Compliance, and Product Management, and we have been working hand in hand with executives at Global 2000 companies who are impacted. Our colleagues are working around the clock to support our customers, meet CA/B Forum expectations, and expedite revocation and re-issuance of affected
So putting these two together, what Entrust seems to be doing is pressing shuffle on the same playlist that's led to all of this.
Third - As you were sending out this Entrust Report Final-ForRealThisTime.pdf, we had Entrust continue to make nonsensical arguments. Even after it was pointed out by both Chrome, and Mozilla, that what you're doing is not okay.
To be very clear here, this comment by Entrust was made on 2024-06-19 while we received this new report from Entrust on 2024-06-21. Entrust has not even bothered covering this incident in this report.
Fourth - As evidenced in your recent incident responses, you don't really care about 1) what the community says 2) what Mozilla says. Time and time again, I've only seen Entrust change their tune on matters when Ryan Dickson (Specifically, Chrome Root Program) chimes in.
Fifth - Some of your action items make absolutely no sense for a well-established CA:
Expand use of linters post-issuance for all certificate types
Expand use of linters pre-issuance for all certificate types
Implement process during incident review to stop issuing certificates when a mis-issuance event has been confirmed
Are you claiming you didn't have the linting in place already? Did we learn nothing from all these previous incidents:
You've had issues with, arguably one of the easiest parts of being a CA, linting. Your issues with linting go back at least six years. Seriously, how do you have so much difficulty with properly implementing pre, and post issuance linting?
Beyond that, "Implement process during incident review to stop issuing certificates when a mis-issuance event has been confirmed"
At Let's Encrypt, and Google Trust Services we used the wording of "suspected". As a CA Engineer, I was empowered to stop issuance at any time if I suspected mis-issuance was happening. I've used that power both correctly, and incorrectly in the past in those CAs and it wasn't a big deal. Why are you waiting until a mis-issuance event has been confirmed? Which seems to take at least 24 hours at Entrust.
Beyond the language used there being problematic, I'm extremely shocked that this isn't done yet? This was one of the main problems in Entrust's response to the cpsUri incident. How has it taken you nearly five months to address this?
Sixth - Is this report now happening under the new leadership of compliance? How about the report prior to this? The tone of these two reports are so significantly different that it seems like something changed between these two. What changed between these two incident reports that caused such a significant change in the tone of the report?
Moving beyond the tone of these reports - does the new leadership of compliance see the substance of this current report as a satisfactory response to how much Entrust has dropped the ball recently?
In conclusion - there were so many things you could've done that would've been significantly better than this bag of words in the format of a pdf. I'll list a couple:
Immediately revoke all the certificates that you're still in the process of revoking nearly three months later.
Reduce the lifetime of your certificates to 180 days until the end of 2024, and then to 90 days once 2025 starts.
Sunset the ability for non-automated certificate issuance to take place.
These are all actions that are externally verifiable, and actually show a meaningful change by Entrust.
To the community: Entrust, using their own words in this report, admits that they're unable to properly meet the requirements of being a CA due to their organizational limitations, and have created certain action items that are impossible to measure from the outside looking in. To me this sounds like a ship that's sinking, and instead of us being allowed to use lifeboats to get to safety, we're being told to wait while they move people around to balance the ship. I do not see any compelling reason to 1) Trust Entrust's claims here, given their past history of not being truthful and not sticking to their promises 2) Assume the risk on the entire WebPKI ecosystem while Entrust tries to figure out their organizational deficiencies.
My suggestion here would be to distrust Entrust, and let them re-apply for inclusion in the future once they've asserted that they've fixed the deficiencies that have led Entrust and the community down this path.
Quick preliminary question:Is this now the final report? The final report that was due two weeks ago.
Can you explain how this document is going to reconcile the recent response we got from Entrust over this bug? https://bugzilla.mozilla.org/show_bug.cgi?id=1890685#c46
>>Note: During our investigation of this issue, we noted that a subset of 1,975 EV certificates were also issued without the Entrust EV policy identifier (OID), based on our interpretation of the ballot update.
>This is also a miscount, presumably due to the original figure being 1963 + 6 certs on a test site that are being double-counted.
On reading further in 2.1.1 Entrust have outright stated they still stand by their incorrect analysis as previously noted in this reply. This speaks volumes as to the decisions that will occur going forward. Within 2.1.3 there is a mention of Entrust continuing to issue certificates and advocate their position, but I am seeing no reflection as to the root cause of what causes them to advocate for their incorrect positions to this day. Not a single line of 2.1.4 addresses this either.
Regarding ACME, I previously stated this question and will repeat it now: Can you make any guarantees that ACME will be a requirement for subscribers going forward, and that they will not be charged extra for using these systems?
Looking into 4.3 Appendix 3: Success Measures I won't address each individually. I am curious how you intend to get the WebTrust annual audit results to result in 0 qualifications in the space of a year. I would suggest an element for Communication is added to address how often a question has to be restated or followed up on due to a lack of clarity and transparency. Otherwise the list presents a minimal standard for any complying CA, if this is not kept by any CA it would be further cause for concern.
Once again in evaluating against what was requested I am struck at how the systemic failures are not being addressed. We have commitments to committees and boards, but the decisions are what truly matter. There is no mention of what policies caused these initial issues and how they were not adhered to. The 2020 commitments are only highlighted due to every comment noting it specifically, no attempt seems to exist to evaluate against historical issues.
On the 2020 commitments I am deeply troubled about this statement in particular:
"Knowledge of 2020 commitments was similarly confined to a small number of business unit employees, without broader leadership team/organizational awareness."
This should have came up in audits which cover incidents on bugzilla. What happened? Did the auditor only address this with the same small number of business unit employees and somehow no note of these commitments made it into any report that went further up the chain? What confidence can we have in any bugzilla-specific commitments outside of this report going forward?
As a final note I will highlight this section:
"As part of our response process to the Mozilla community, Entrust assigned a group of three senior leaders, as well as an external consultant, to review each incident to validate and expand root cause analysis."Can we please have a breakdown on Entrust's end of what their original opinion was at the start of each incident, and how these personnel would evaluate the situation if it were to happen today? I sincerely hope that #1890898 is not an example going forward.
Missing the point
> As a global CA we must walk a tightrope in balancing the requirements of the root programs and subscriber needs, especially for critical infrastructure.
This is a very worrying sentence. It seems that both Entrust and many of their subscribers (even more worryingly subscribers responsible for critical infrastructure) completely misunderstand what the purpose of the requirements of the root programs are. These rules, requirements, guidelines, policies, &c are here to keep us safe. And I don't mean us as in relying parties, I mean us as in everyone. That there is a need to balance these requirements against the needs of Entrust subscribers makes me worry about what those subscribers are doing. Why are so many organizations running critical infrastructure not prioritizing following safety regulation?
Refusal to learn, bug 1890898
It's important to seize the opportunity to learn from your incidents. Why is Entrust so stubbornly clinging to their analysis in #1890898 that the certificates weren't miss-issued?
I don't understand this explanation, are senior leadership the ones making the decision to delay revocation or not revoke?
But those decisions are communicated to the community via Bugzilla, and is that not done through the business unit employees that have knowledge of the 2020 commitments? It's the same person posting: "We will not the make the decision not to revoke." in 1651481, that this year posted: "we decided to not revoke due to exceptional conditions listed in this report." in 1890898.
Let's take a step back from this report. I don't think this report deserves to be taken seriously for one reason alone: You've historically proven to the community that we should not trust any statements made by Entrust. Let's look at how you've proven this:
First - Four years ago, you made a couple of promises in comment 6 of 1651481:
We will not the make the decision not to revoke.
We will plan to revoke within the 24 hours or 5 days as applicable for the incident.
None of these promises have been realized in the past four years. Why is this time going to be different? How are we even supposed to measure your commitment to your current action items?
Second - In this report, you're claiming that a lot of these issues stem from organizational structure. Meanwhile, 3 months ago, Entrust was claiming that:
This issue has been prioritized at the highest levels within Entrust. We have hundreds of people across Entrust working on remediation—including our senior leadership as well as teams from Customer Support, Operations, Sales, Legal, Compliance, and Product Management, and we have been working hand in hand with executives at Global 2000 companies who are impacted. Our colleagues are working around the clock to support our customers, meet CA/B Forum expectations, and expedite revocation and re-issuance of affected
So putting these two together, what Entrust seems to be doing is pressing shuffle on the same playlist that's led to all of this.
Third - As you were sending out this Entrust Report Final-ForRealThisTime.pdf, we had Entrust continue to make nonsensical arguments. Even after it was pointed out by both Chrome, and Mozilla, that what you're doing is not okay.
To be very clear here, this comment by Entrust was made on 2024-06-19 while we received this new report from Entrust on 2024-06-21. Entrust has not even bothered covering this incident in this report.
Fourth - As evidenced in your recent incident responses, you don't really care about 1) what the community says 2) what Mozilla says. Time and time again, I've only seen Entrust change their tune on matters when Ryan Dickson (Specifically, Chrome Root Program) chimes in.
Fifth - Some of your action items make absolutely no sense for a well-established CA:
Expand use of linters post-issuance for all certificate types
Expand use of linters pre-issuance for all certificate types
Implement process during incident review to stop issuing certificates when a mis-issuance event has been confirmed
Are you claiming you didn't have the linting in place already? Did we learn nothing from all these previous incidents:
You've had issues with, arguably one of the easiest parts of being a CA, linting. Your issues with linting go back at least six years. Seriously, how do you have so much difficulty with properly implementing pre, and post issuance linting?
Beyond that, "Implement process during incident review to stop issuing certificates when a mis-issuance event has been confirmed"
At Let's Encrypt, and Google Trust Services we used the wording of "suspected". As a CA Engineer, I was empowered to stop issuance at any time if I suspected mis-issuance was happening. I've used that power both correctly, and incorrectly in the past in those CAs and it wasn't a big deal. Why are you waiting until a mis-issuance event has been confirmed? Which seems to take at least 24 hours at Entrust.
Beyond the language used there being problematic, I'm extremely shocked that this isn't done yet? This was one of the main problems in Entrust's response to the cpsUri incident. How has it taken you nearly five months to address this?
Sixth - Is this report now happening under the new leadership of compliance? How about the report prior to this? The tone of these two reports are so significantly different that it seems like something changed between these two. What changed between these two incident reports that caused such a significant change in the tone of the report?
Some final thoughts on this after re-reading the updated report:First, a deliverable due date is a deliverable due date. If I was asked to answer 7 questions by my management team by a given deliverable date, and provided a report that barely answered two of them, I'd be thinking long and hard about what got me to that point (and the future of my continued employment), and why an updated report took an additional two weeks to create. I would argue that Entrust should be judged based on the initial report primarily, as the due date was very clear, as well as the guidelines for assembling the report. The second report should have been what we saw the first time, but this theme of "Entrust doing closer to the right thing late" seems to be a recurring trend with this series of events. This even goes as far back as 2020, when there was allegedly a promise that this wouldn't happen again (or at least not at the scale it did in 2020) and yet here we are.Two, as Amir noted, there's numerous inconsistencies with the report(s) compared to incidents.This issue has been prioritized at the highest levels within Entrust. We have hundreds of people across Entrust working on remediation—including our senior leadership as well as teams from Customer Support, Operations, Sales, Legal, Compliance, and Product Management, and we have been working hand in hand with executives at Global 2000 companies who are impacted. Our colleagues are working around the clock to support our customers, meet CA/B Forum expectations, and expedite revocation and re-issuance of affectedfollowed by saying [paraphrased]: "The work we were doing previously wasn't good enough so we tossed it all out". Is the goal in this updated response simply to make it seem like enough changes have been made to kick the can down the road again for a few more years until Entrust makes some relatively simple mistake that could have been caught by linting and then we end up in this same boat again?
I'm not going to quote and cite individual missteps extensively, but if I'm misrepresenting something I'm happy to dig up the things that I used as inputs, and make corrections. Instead, I'm trying to summarize some themes that continue to concern me even after Entrust's updated report and responses.
In summary, while I think Entrust was wise to reuse the Navex guide to Compliance Program assessment, I don't feel they have done so in a way that sufficiently allays concerns about their willingness and indeed ability to operate within the BRs and MRSP, consistently and in good faith. Looking critically at how Entrust has described its actions and decisions shows, in my opinion, not only a company that has been unable to meet the expectations to which CAs must be held, but indeed a company that either doesn't understand or doesn't accept what those expectations are.
Entrust continues to be mistaken about their responsibilities in the WebPKI and MRSP. They say that the subscriber cannot be held responsible for operational limitations on certificate deployment. On the contrary, only the subscriber can be responsible for their own operations, within the CA/root-program/Subscriber/relying-party dynamic of WebPKI. Only the subscriber can ultimately make changes to their own operations, and they will bear the cost. Entrust as a security vendor can take on some responsibility for enabling better Subscriber operations, but their degree of success with that should not bear positively or negatively on the evaluation of Entrust as a CA.
They also describe being in "tension" between WebPKI and critical systems but omit that this tension is entirely of their own continuous creation, versus reducing, since 2020, the cases in which they encourage or permit subscribers to use web PKI certificates in circumstances incompatible with the operational properties of the web PKI.
Entrust's action items for delayed revocation often have elements of encouraging subscribers to adopt automation. I think that is a fine thing for them to do, but IMO it should not be considered to be a remediation for a delayed revocation incident, because it's not up to subscribers to decide on delayed revocation. To treat it as remediation is to say that subscriber choices to invest (or not) in improvements to their certificate management operations are allowed to prevent a CA from upholding the requirements. The message needs to be "you might want to improve your operations so you don't have an outage the next time we need to revoke one of your certificates, which we will do on time", not "please improve your operations so that we are able to revoke the certificate we chose to issue you".
The Improvement Plan says that they will "work with our subscribers to ensure awareness and minimize delayed revocation requests". This language echoes the 2020 commitments, but does not give any meaningful description of a future state they’re seeking. I don't care how many delayed revocation requests they get. That's a function of whether they choose to issue and reissue Web PKI certificates into environments that they know "cannot" actually tolerate immediate revocation in spite of the subscriber's legal commitment to the contrary. Entrust can't solve this problem by reducing the number of times they get asked for exceptions. They have to ensure that they have appropriately narrow exception criteria regardless of how many requests they get . Are we to believe that if Entrust gets more requests in the future, they will permit more exceptions? It's hard to understand why that is relevant to their improvement except that it might cause fewer customers to be disappointed or frustrated; that would be an improvement to Entrust's experience as a vendor, but not material to how Entrust or its Subscribers interact with the web PKI.
When Entrust decides that it must delay revocation due to intolerable impact on the web ecosystem (paging the Definitions & Glossary WG), proper remediation actions would include an enforced timeline for the subscriber being able to tolerate prompt revocation, possibly by being moved off of web PKI certificates. After that timeline, delayed revocation should no longer be permitted; if Entrust doesn't want to be in that situation, then they should not re-issue to that subscriber.
As recently as June 21, presumably with the knowledge that Entrust was admitting that its practices had been deficient in the updated report, a representative of Entrust was still defending their previous decisions to delay revocation. "If the strict enforcement of rules begins to take priority over the facilitation of safe and smooth internet transactions, it brings discredit on the entire ecosystem. Entrust has been trying to avoid that, by showing a nuanced understanding of the complex issues faced by subscribers." I disagree with most of that, but that hardly matters. It's a sign that Entrust has not actually accepted that their behaviour was inappropriate.
Notably, there is no commitment from Entrust to avoid future issuance to systems that will not tolerate prompt revocation. They have stated, "for the record", their position that any CA should be free to issue certificates to subscribers who they know will not be able to tolerate the BRs being upheld, in terms of prompt revocation. This would give CAs license to knowingly create situations where they will need "exceptional" delays to revocation. That must be held to be incompatible with the CA then delaying revocation due to the situation they helped create, or else we find ourselves in a situation that risks rendering meaningless the BR's timelines and subscriber commitments. (It would also put conformant, good-faith CAs at a commercial disadvantage relative to those who give more weight to customer convenience. While I do not think that financial considerations for CAs should hold much weight in policy making here, incentives are real and we should be careful about creating incentives for undesirable behaviour.)
Entrust claims that they "generally recommend that subscribers have a backup CA", but I can't find that recommendation anywhere in Entrust's public materials. And again, Entrust opposes making this an industry standard, though IMO it would be a valuable partial mitigation against misuse of web PKI certificates in contexts which cannot tolerate web PKI revocation rules and timelines.
The "Policy Updates" section of the improvement plan says that they are "considering ways to increase visibility of the CA’s right to revoke certificates on short notice beyond our contract language", but to be frank their Subscriber Agreement itself really does not make that clear. Customers would have to read the BRs directly to get that information. (I consulted https://www.entrust.com/sites/default/files/documentation/licensingandagreements/sept-2020-entrust-site-launch/ecs-subscription-agreement-sep-10-2020.pdf.)
Entrust has told us that they've made many organizational changes, including of "leadership" and "staffing". Unfortunately, they have not really detailed what was wrong with the old leadership and staffing, and how the new leadership and staffing plans will improve on them, in spite of very specific requests for that information from the community. This is a basic and essential element of leading effective change in any context. They have described operational error, but haven't explained why a leadership change this time will be more successful than the promises made in 2020. I recognize that talking about errors by company leaders can be awkward, but if Entrust doesn't want to tell us why we should believe that the new leadership is better, then they probably shouldn't expect us to count the change in their favour. (Entrust has stated that this context for the leadership changes was in the June 7 report, and seemingly on that basis refused to restate it when asked, but if so it is very well-hidden.) While I have certainly expressed my frustration with Entrust very directly at times, I would personally be happy to help with such an assessment in a blameless, learning-oriented process.
On the topic of leadership, I want to emphasize that I am not concerned here with individual performance, be it by individuals or leaders, and I do not feel that the Mozilla community should be either. A problem of this magnitude and duration, and reluctance to address in a deep and transparent way, must be a systematic problem and not an individual one. Entrust has created a system that in turn created forces that directed people to act in certain ways. When someone is agreeing to a delayed revocation without writing down the reason, they are doing that for one of two reasons: either they are making an error out of misunderstanding or incompetence (rare, very easy to resolve), or they are doing what they believe Entrust wants them to do (almost universally the case, difficult to remedy). Incentives are very powerful, and if Entrust's employees believe that Entrust wants them to put customer convenience ahead of the integrity of the web PKI, then those employees will do so. If a member of CA business unit staff was not escalating to senior leadership their difficulties with staffing, or investment in linting, or seeing customers successfully adapt their operations to be tolerant of prompt revocation, that's because they believed that practically Entrust did not want them to escalate that way. It's very common for organizations to loudly say "we want to uphold some value", while communicating in a much stronger way that they wish to compromise on that value. That stronger communication to the individuals who ultimately implement the company's operations comes through organizational actions and even explicit policies (such as related to performance evaluation or budgeting). A change in leadership is only effective to the extent that it changes the context in which individual humans and their tools will make decisions and take action. There has been disappointingly little evidence that Entrust actually understands what led (at a truly "root cause" level) to the sustained, unacceptable behaviour.
Similarly, they promise to "review procedures" and "synchronize with compliance team" but we haven't established that they even know what the procedures should be. Surely, these procedures have been reviewed before, and that has not remedied the situation. In a recent bug, Entrust said that while they were going to revoke the certificates, they didn't agree with the analysis of the root programs. How will they be analyzing similar situations in the future, given that disagreement?
The updated report says that "Entrust has the technical capability to meet the 24-hour and 5-day revocation requirements", but does not describe what they think is required of that capability, and importantly does not describe non-technical capability that might be required to perform such revocations (such as executive willingness to lose a customer). Even very recently we have seen confusion in Entrust's determination of certificates affected by an incident, and mismatched lists provided.
If I were in their situation and wished to demonstrate a better alignment with root program and community expectations, I would do this: go back over the cpsURI cert list and say how each would be decided today. I might have to reach out to customers to get more information about how the certificates are used and what the operational context is, but it would let me demonstrate the concrete differences in decision-making that these changes cause. This would also give me a basis to work from for informing subscribers who were granted delayed revocation this time that they would not be in the future. IMO, Entrust doing this would be a valuable contribution to the CA community's understanding of what "exceptional" cases are, and possibly help move towards helpful clarifications of the wording.
Entrust has said that between 2020 and 2024, they believed that their "existing policies and procedures would be sufficient to support [their] commitments". This is an extremely worrying perspective to take, because it means that the people who were operating the relevant systems thought that everything was OK for four years; as we know from cpsUri and friends, there was no material improvement in handling revocation delay requests. Materially, according to Entrust's explanation, over those four years on the heels of a major incident about excessive delays in revocation, Entrust never wrote down a policy on how to adjudicate delay requests. In 2020, Entrust had been a public CA for twenty years. They had participated in CABF since its inception. They were told by root programs, and agreed, that they were making incorrect decisions about delays, and committed to doing better, but never wrote a policy. I'm honestly disappointed that auditors don't require that policy to be concrete and published, but even beyond that: imagine operating a security and compliance company for twenty years and then getting rinsed because of a failure to decide something correctly, and after that still not writing down how to make the decisions in the future, or not capturing customer communication related to something as critical as revocation and certificate correctness. It's very hard not to interpret that as Entrust being flawed in a fundamental way that needs more than moving the org around.
I would honestly rather that Entrust was lying about not having a policy, and instead choosing not to disclose it because of content that would not reflect well on them. Similarly, I would prefer to believe that they simply chose to be untruthful about the customer justifications for delays not being captured (and in fact we know that some were, because they were later provided as cherry-picked examples). The alternative is to believe some really unfortunate things about a CA whose certificates, by their own account, are used in very important systems.
A concern that has been raised repeatedly and ignored by Entrust is their different behaviour with respect to the Mozilla and Chrome root programs. We have seen them act promptly upon Chrome's team entering a discussion, when that team is saying the same thing that Mozilla has been saying previously. This continues to be unaddressed in the updated report, even though it was called out explicitly in response to the initial report, and repeatedly in incident bugs.
In spite of frequent reminders of the Mozilla incident response requirements, they continued to not meet those requirements even after recommitting on June 1, 2024. They have not provided the required per-subscriber detail: first claiming that it wasn’t captured, then sharing some unattributed and hiding behind confidentiality that they control. AFAIK they have not gone back to subscribers to get that information and capture it properly. There has been no elaboration on expected harm, just vague industry categorizations and claims of subscriber slowness. This refusal to cooperate fulsomely with the Mozilla incident response policy makes oversight by the root program and community more difficult, because it becomes impossible to identify cases in which Entrust's analysis of the risk tradeoff is out of alignment with that of the community. (To be sure, either side or both might be "wrong" here! But we have to see the gap in order to even start figuring that out.)
There are a lot of CAs and very few full-time staff allocated to Mozilla's program, which makes it very important that the community be able to assist in that analysis. Even when I was overseeing the program, we needed community assistance, and that was with many fewer CAs, with Chrome's direct assistance with the shared program, and to be frank without an actor behaving in as challenging a manner as Entrust has been. This lack of transparency also makes it impossible for other CAs to learn from or teach Entrust about how to better handle similar situations in the future.
Similarly, they say that the redaction of a portion of an email to customers (said portion detailing revocation procedures), was "absolutely not" them trying to "conceal" anything about revocation. But of course they did literally conceal things, and they have not responded when asked to explain what their other motivation for redaction might be.
In short I do not believe that Entrust has operated in good faith through these incidents, with respect to Mozilla and its policies. If Entrust's behaviour became the norm for trusted certificate authorities, I think it would be disastrous for the program and the web.
I genuinely worry that it would be irresponsible to trust future Entrust-issued certificates without concrete evidence that improvements have been made, and not just planned. They have not even detailed the plans or success criteria for these initiatives, generally, and there is no way for root programs or the community to evaluate whether the efforts are even pointed in the right direction without much more detail.
If a new CA using a cross-signed root had Entrust's track record and applied to add their own root to the Mozilla root store today, I believe very strongly that we would first require them to demonstrate improved competence and alignment. Entrust has no more inherent right to operate a CA business than such a newcomer, and I think that we should be very careful not to overweight the duration of Entrust's inclusion as a root, or the size of its business, as justifying even more patience or risk tolerance. To permit Entrust to continue to issue certificates as it has been to date would be to subject the web PKI and Mozilla's users to substantial risk.
Mike
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CABqVa39KCFVyaMWOfMR%3Dc%3DskCK8byzjmX6unva0RCLe8Z_5uWA%40mail.gmail.com.
I don't know what the calculus will be for Google's trust of Entrust-issued BIMI certificates, but I am pretty sure that they won't be announcing that policy on MDSP—you could ask in a Google forum of some kind, but I think most likely you just have to wait for the announcement if/when it comes.(I personally think Entrust will not keep the BIMI business around by itself even if the root somehow stays trusted, but it's possible they were completely compliant with all BIMI-related requirements!)Mike
On Thu, Jun 27, 2024 at 4:51 PM Kurt Seifried <ku...@seifried.org> wrote:
We've never had a situation like this, partly due to the fact there are only two VMC sellers, Entrust and Digicert (as I understand it everyone else selling these is a reseller). But I can't see why the issues at Entrust would be restricted to their web cert business and not the VMC business (which are virtually identical products/processes). And thus I can't imagine why the rest of Google wouldn't remove their trust in Entrust as well.
On Thu, Jun 27, 2024 at 2:47 PM Mike Shaver <mike....@gmail.com> wrote:
AFAIK, BIMI certs are not related to the browser root stores in any way, and aren’t signed by server certificate roots.Mike
On Thu, Jun 27, 2024 at 4:31 PM 'Kurt Seifried' via dev-security-policy@mozilla.org <dev-security-policy@mozilla.org> wrote:
--Also do we know what is happening with their VMC root cert? CN = Entrust Verified Mark Root Certification Authority - VMCR1 which is used for Verified Mark Certificates aka BIMI logos, and is currently supported in Gmail? Do we know if Gmail be removing support for Entrust based VMC certificates and thus BIMI logos done via Entrust? Seeing as how your choices for buying a BIMI/VMC cert are Entrust (or a reseller) and Digicert the removal of trust in CN = Entrust Verified Mark Root Certification Authority - VMCR1 will basically break most BIMI logos in any email platform that supports BIMI and decides to remove Entrust..Example:$ while openssl x509 -noout -text; do :; done < certchain.pemAnd for additional context on who uses Entrust: https://bimiradar.com/glob#logos--Kurt Seifried (He/Him)
ku...@seifried.org
You received this message because you are subscribed to the Google Groups "dev-security-policy@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-policy+unsub...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CABqVa39KCFVyaMWOfMR%3Dc%3DskCK8byzjmX6unva0RCLe8Z_5uWA%40mail.gmail.com.
Further to the latest report making no mention of that incident, in #1890898 there is a statement of intent of there being a second amended final report:> Yes, we will amend the final incident report to reflect that we did our analysisIs there any intent on there being a final report or is this cycle going to continue? If a judgment on Entrust's ability to make concrete statements will be made, there needs to be a final statement at some point.
While you’re addressing comments, I’d appreciate an answer to my question here: what was the motivation behind redacting that portion of the email to customers, if not to conceal information related to redaction procedures?You want to make it clear that you aren’t concealing anything, but you haven’t given us any reason to believe otherwise.Mike
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/b4dcb651-aec5-4f2e-8325-9aafa2f9ea58n%40mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CACsn0cnV%2B3b3XM8Xi8r8b5w%2BP3oQ%2BAer_vt8HmZdLyw7QMV5Pw%40mail.gmail.com.
Claves, thank you for the question, as I re-read the blog post it seems we could have been clearer.
We are committed to operating under the CA/Browser Forum Baseline Requirements, and completing the improvement plans we’ve communicated to this community. We hope this demonstrates that we are approaching this arrangement with due rigor, and our commitment to improve our compliance and incident handling.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/8b89eed0-98f9-4aff-9133-443d048aea29n%40mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/471e40fe-85b0-4306-85a4-7916695a2f66n%40mozilla.org.
Hi Nick,
Thanks
for passing on the customer email, we’re following up directly there, and as
always, we’d recommend that customers directly reach out to their account team
to discuss their specific needs.
That said, we think it would be helpful to share the different certificate licensing
models we offer and the details of each. Entrust broadly offers two models for
certificate purchase. The handling of active certificates, including
revocation, differs based on the model chosen by the customer.
The first model is what we call “unit based” and is what most would consider the historically traditional approach for certificate offers, where a customer purchases a certificate for a specific term, that certificate is paid for up front, and their license is valid through the expiration date of the certificate. After initial issuance only limited changes are permitted to the details of the certificate.
The second model is what we call “subscription” or “pooling”, and this approach allows a customer to have up to a pre-defined number of certificates issued and active at any given time during the period of the subscription. This approach allows customers the flexibility to issue and change certificates as often as necessary as their needs change, including, for example, revoking a no-longer needed certificate and issuing a new one with new organization information or domains, with no additional charges. At the time of renewal, customers can increase or decrease the number of certificates that are available under their subscription. If at any time a customer chooses to fully stop their subscription, then the license period ends, and under the terms of the agreement we reserve the right to revoke any unexpired certificates.
So, depending on the model selected by the customer up front, the approach differs on how unexpired certificates are handled upon termination, and both are addressed in our Certificate and Signing Services Terms of Use. In addition, it is common that terms may be custom negotiated, so the best course of action, for any individual customer with questions, is to contact their account representatives directly to discuss.
We hope this provides some more context to the question here on what our standard options and practices are. And we have an extensive customer communications and outreach program underway to ensure that customers understand their options and to provide uninterrupted support for their publicly trusted TLS certificates.
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/cf625cfc-6355-4e9d-b4c7-37f47a938f9fn%40mozilla.org.
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CACsn0cnU6nDKQ%3DyEONsACzZi9LCgjdgQdXdO2AM%2BxTS51utUwA%40mail.gmail.com.