Jan Schejbal
unread,Oct 23, 2013, 9:20:43 PM10/23/13You do not have permission to delete messages in this group
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to mozilla-dev-s...@lists.mozilla.org
Hi,
there have been repeated issues where CAs were claimed to be
untrustworthy due to prior misconduct not related to certificates.
Usually, this was dismissed by saying that no certificate was issued
contrary to Mozilla Policy, and thus there is no reason not to include a CA.
Examples of this were for example the discussions around CNNIC, which
was claimed to have been involved in malware distribution, internet
censorship and other attacks on users. Most of these claims were not
backed by solid evidence. A different case is Etisalat, which has
infected Blackberry devices with malware. The fact that the software was
deployed by Etisalat is uncontested, and the fact that it is malware has
been confirmed, among others, by Blackberry/RIM. Etisalat is not a Root
under the Mozilla CA program, but has a Sub-CA issued by GTE/Verizon.
The problem I see in this "no action until misconduct shown" approach
that it is retroactive: Only if a (Sub-)CA violates the policy *and* is
stupid enough to get caught, it *might* lose its certificate. Other than
that, no matter how likely it is that they will misuse their certificate
due to previous unethical behavior, everything is fine. This exposes
users to targetted attacks. The Etisalat attack was caught because they
attacked 100,000 devices in a really stupid and obvious way and some
owners got suspicious. I fully assume that even if the Etisalat CA does
violate the policy and is stupid enough to get caught, Verizon will
revoke the CA and everything will be fine again, because until then,
everyone was following policy and so "noone could have known", it's
noones fault, and Verizon is too big to fail anyways... Who might not be
fine are the dissidents affected by the spying this enabled. They might
be dead.
A CA would not allow untrustworthy individuals to handle their keys and
cert issuance process. Background checks are usually included in the
CPS, and I'm pretty sure those background checks exclude people with any
kind of serious criminal history, not just one related to the issuance
of false X.509 certifcates. So why are we limiting the "background
checks" for CAs to this?
Interestingly, the "trustworthyness" requirements are actually part of
the Mozilla policy, since we require CAs to follow the CAB Forum
Baseline Requirements. These, in turn, require that "Prior to the
engagement of any person in the Certificate Management Process, whether
as an employee, agent, or anindependent contractor of the CA, the CA
SHALL verify the identity and trustworthiness of such person." They do
not seem to have specific criteria when it is OK to make an organization
a SubCA - probably because that decision is the browser vendor's to make.
If we decided that these requirements don't apply to the CAs and Sub-CAs
themselves, we would basically be saying "no, you are not trustworthy
enough to run a part of the Certificate Management Process, but hey, do
you want to be a (Sub-)CA instead?"
On the other hand, "trustworthy" is a highly subjective thing. The
Mozilla inclusion policy calls for objective criteria. Therefore, I
would suggest to amend point 4 in the inclusion policy by adding a third
point to the examples that make us assume that a CA would cause undue
risks to users' security.This point could be, for example, worded like this:
"knowingly were involved in active attacks against internet users, e.g.
by installing software without user consent"
A lot of criticism voiced by users here was related to controversial CAs
with a questionable record in other areas, or involvement in intercept
operations, and the response to that was usually to point towards the
policy and mention that unfortunately nothing can be done because that
is not the exclusion criterion. This policy change would fix that.
We could, if we wanted to, include a clause like "have a conflict of
interest by being involved in the development or sales of software or
hardware designed to perform man-in-the-middle attacks on SSL
connections", but I left that out intentionally since such a rule would
be difficult to define precisely and controversial as per the last
discussion here.
Kind regards,
Jan
--
Please avoid sending mails, use the group instead.
If you really need to send me an e-mail, mention "FROM NG"
in the subject line, otherwise my spam filter will delete your mail.
Sorry for the inconvenience, thank the spammers...