Thanks Rob. I came to the same conclusion.
I am a contractor supporting the Federal PKI and do not speak on their behalf, but would like to help clear up some misconceptions around the Federal PKI.
1) The Symantec Cross Cert has not been revoked.
The Federal PKI is an identity federation based on mutual trust of people. Multiple federal and non-federal organizations coming together based on common identity assurances for the benefit of G2G, C2G, and B2G digital transactions. Every affiliate within the Federal PKI adheres to the Federal Bridge CP which is based off NIST and international standards and other federal laws around identity management and information security to establish trusted operations and the criteria for a level of assurance. Multiple federal mandates and laws exist for the use of the Federal Bridge to accept commercial PKI credentials for electronic authentication and digital signature (mentioned below). Participating PKIs enter into a legal agreement (MOA) with the federal government to establish that trust and define the requirements around mutual recognition (Application for cross certification,
https://www.idmanagement.gov/IDM/servlet/fileField?entityId=ka0t0000000TNS6AAO&field=File__Body__s). This is evidenced through the exchange of certificates between organizational PKIs (In this case between the Federal Bridge and the Symantec CA) after a passing audit report. The FPKI audit requirements are based on a direct CP to CPS analysis with annual core requirements which provides improved assurance that affiliates continue to operate according to the Federal Bridge CP (
https://www.idmanagement.gov/IDM/servlet/fileField?entityId=ka0t0000000TNYYAA4&field=File__Body__s). Without the exchange, there is no mutual trust. Symantec is a valued partner within the Federal PKI supporting nine non-federal organizations with 33 operational CAs under the Federal PKI non-federal issuer program. To revoke the Symantec certificate, the certificates issued by organizations under Symantec would no longer be trusted by federal relying parties. Symantec is resolving the issue with the Federal PKI Policy Authority, but the risk to revoking the certificate is still uncertain.
2) It is not acceptable for CAs trusted by the Mozilla Program to cross-sign with the Federal Bridge (From Richard Barnes) There is a fundamental and growing philosophical difference between the Federal PKI (based on strong assurance of people identities for general use) and the PKI industry (assurance of device identities for specific uses). The Federal PKI continues to work to update our requirements to meet Mozilla program acceptance, but it is a difficult path. The Federal PKI is a heavily regulated environment governed by its members, federal regulations, and operated according to NIST and international standards. The Federal PKI is composed of:
- 19 affiliates
- 254 CAs
- 71 issuing partners
- 93 federal agencies
- >five million users
- >22 million active certificates issued to both people and devices
This does not include the federal relying party and commercial applications which accept FPKI certificates for authentication or other purposes. It is important to the Federal PKI that theses certificates are trusted to meet multiple federal drivers around electronic authentication/digital signature (Digital Signature and Electronic Authentication Act, Electronic Signatures in Global and National Commerce Act, and Government Paperwork Elimination Act) as well as PKI interoperability (E-Government Act) and strong authentication (Homeland Security Presidential Directive-12, White House Cybersecurity Strategy and Implementation Plan, and White House Cybersecurity National Action Plan) requirements. In some cases it is not a simple process to update the Federal PKI Certificate Policies, but we are very close to meeting the last two Mozilla requirements for our application which include incorporating CAB Forum BR and Mozilla CP requirements and publicly posting CP, CPS, and audit letters for the Shared Service Providers. Even small changes have a lasting impact to both federal budget and operational practices and must be understand.
If you're interested in a closer look, I've attached a white paper of the FPKI Infrastructure and Architecture (
https://www.idmanagement.gov/IDM/s/document_detail?Id=kA0t0000000KyroCAC).
Ken
> The Federal PKI has a tool to help identify trust paths,
FPKI-graph.fpki-lab.gov<
https://urldefense.proofpoint.com/v2/url?u=http-3A__fpki-2Dgraph.fpki-2Dlab.gov&d=CwIC-g&c=19TEyCb-E0do3cLmFgm9ItTXlbGQ5gmhRAlAtE256go&r=v6QfMBgWaMWhsB_PpBwwzxPtUwSffCWXSAR0gp0RFbY&m=DlNVTZg70U3he7Kt-304vEDqF9fDGX8jfPq5RnStn50&s=pqUpzJZnt7pQ1HsJr6dBrqifrxrdjl-iFkah0G685TY&e= >.
>
> I can do a true-up between the Mozilla CA list and FPKI trust paths to help identify which path may be causing the issue.
Hi Kenneth. It would be great if you could do that, especially if there are any trust paths that are not yet known to CT / crt.sh.
I've just run some analysis on the crt.sh DB. It's the following 2 cross-certificates that are of interest:
https://urldefense.proofpoint.com/v2/url?u=https-3A__crt.sh_-3Fid-3D9114292&d=CwIC-g&c=19TEyCb-E0do3cLmFgm9ItTXlbGQ5gmhRAlAtE256go&r=v6QfMBgWaMWhsB_PpBwwzxPtUwSffCWXSAR0gp0RFbY&m=DlNVTZg70U3he7Kt-304vEDqF9fDGX8jfPq5RnStn50&s=diEBbsWTZ7Zo0d_TwT8WGR-3EwDoH469HqxCqlif53k&e=
Issuer: IdenTrust ACES CA 1
Subject: Federal Bridge CA 2013
OneCRL: Already revoked.
Salesforce: Not yet disclosed.
https://urldefense.proofpoint.com/v2/url?u=https-3A__crt.sh_-3Fid-3D12638543&d=CwIC-g&c=19TEyCb-E0do3cLmFgm9ItTXlbGQ5gmhRAlAtE256go&r=v6QfMBgWaMWhsB_PpBwwzxPtUwSffCWXSAR0gp0RFbY&m=DlNVTZg70U3he7Kt-304vEDqF9fDGX8jfPq5RnStn50&s=JB_38bUAYT_Hl4B58oExVy_P8sXMISQGtZhyoyoSx2U&e=
Issuer: VeriSign Class 3 SSP Intermediate CA - G2
Subject: Federal Bridge CA 2013
OneCRL: Not yet revoked.
Salesforce: Not yet disclosed.
If/when both of these intermediates are disclosed to Salesforce as "revoked", crt.sh should (once Mozilla have updated the CSV reports) detect the FPKI trust paths as "revoked".
Richard Barnes wrote on 23rd:
"It should be clear by this point that it is not acceptable for CAs trusted by the Mozilla program to cross-sign the Federal Bridge"
That Symantec cross-cert has not yet even been revoked via CRL!
> Kenneth Myers
> Supporting the GSA Federal PKI Management Authority Protiviti |
> Government Solutions | Manager Alexandria | +1
>
571-366-6120<tel:+1%20571-366-6120> |
> Kennet...@Protiviti.com<mailto:
Kennet...@Protiviti.com>
> Connect:
> LinkedIn<
https://urldefense.proofpoint.com/v2/url?u=https-3A__www.link
> edin.com_in_kennethmy&d=CwIC-g&c=19TEyCb-E0do3cLmFgm9ItTXlbGQ5gmhRAlAt
> E256go&r=v6QfMBgWaMWhsB_PpBwwzxPtUwSffCWXSAR0gp0RFbY&m=DlNVTZg70U3he7K
> t-304vEDqF9fDGX8jfPq5RnStn50&s=yxnEOhIxqEJxYCndopgWxHD8FxhHFsjtBlvztmv
> whhM&e= > | Thought Leadership:
>
mozilla-dev-s...@lists.mozilla.org<mailto:
mozilla-dev-secur
>
ity-p...@lists.mozilla.org>; Kathleen Wilson
>
mozilla-dev-s...@lists.mozilla.org<mailto:
mozilla-dev-secur
>
ity-p...@lists.mozilla.org>; Kathleen Wilson
>
konklone.com<
https://urldefense.proofpoint.com/v2/url?u=http-3A__konkl
>
one.com&d=CwIC-g&c=19TEyCb-E0do3cLmFgm9ItTXlbGQ5gmhRAlAtE256go&r=v6QfM
> BgWaMWhsB_PpBwwzxPtUwSffCWXSAR0gp0RFbY&m=DlNVTZg70U3he7Kt-304vEDqF9fDG
> X8jfPq5RnStn50&s=c1rqzKNHVjlgTVwNLW7gmcTVRl_FBL23W8HwCSj5YQ4&e= > |
> @konklone
> NOTICE: Protiviti is a global consulting and internal audit firm composed of experts specializing in risk and advisory services. Protiviti is not licensed or registered as a public accounting firm and does not issue opinions on financial statements or offer attestation services. This electronic mail message is intended exclusively for the individual or entity to which it is addressed. This message, together with any attachment, may contain confidential and privileged information. Any views, opinions or conclusions expressed in this message are those of the individual sender and do not necessarily reflect the views of Protiviti Inc. or its affiliates. Any unauthorized review, use, printing, copying, retention, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email message to the sender and delete all copies of this message. Thank you.
> _______________________________________________
> dev-security-policy mailing list
>
dev-secur...@lists.mozilla.org
>
https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.mozilla.org
> _listinfo_dev-2Dsecurity-2Dpolicy&d=CwIC-g&c=19TEyCb-E0do3cLmFgm9ItTXl
> bGQ5gmhRAlAtE256go&r=v6QfMBgWaMWhsB_PpBwwzxPtUwSffCWXSAR0gp0RFbY&m=DlN
> VTZg70U3he7Kt-304vEDqF9fDGX8jfPq5RnStn50&s=Us3UaVYVbznpkZ1j73y7EA6kkrF
> wQVLbqsrIXxgTQFs&e=