On 20/03/2018 18:49, Ryan Sleevi wrote:
> On Tue, Mar 20, 2018 at 1:30 PM, Jakob Bohm via dev-security-policy <
>
dev-secur...@lists.mozilla.org> wrote:
>>
>> Are you suggesting that the BRs be modified so a CA that has ceased
>>> issuance can obtain a clean audit report without meeting all current BR
>>> requirements?
>>>
>>>
>> I am suggesting that we consider what policy should be applied to the
>> (required!) capability of keeping revocation running for max cert
>> lifetime after a CA ceases to operate.
>>
>
> The BRs already cover this. The point is that once a CA stops auditing,
> there's an issue about ensuring conformance.
>
Actually, they don't. They have an empty placeholder section for wind
down procedures. Surely one could blindly apply the full BRs to the
situation, which I am arguing against.
>
>> For starters, a wind-down CA will not issue any more certificates (and
>> should probably be audited to that fact), and will thus not be
>> meaningfully subject to the various requirements associated with that
>> activity (such as validation procedures, contents of newly issued
>> certificates etc.). This alone should significantly reduce the scope of
>> requirements and audits.
>>
>
> I strongly disagree with this framing. The notion of a "wind-down CA" is
> not a concept that is part of the PKI. It remains a functional CA, with the
> full capability of issuance, and thus all appropriate policies, procedures,
> and protections apply.
>
While the notion may not be in the BRs directly, there seems to be a
common policy expectation that any accepted CA has procedures (listed in
their CPS under 5.8) for the wind-down process.
>
>> Secondly, a wind-down CA (as opposed to a wind-down root key from an
>> otherwise active CA) is likely to be operating from a prepaid
>> contingency fond, set up before the wind down based on the bare-bones
>> cost of safely doing the wind down procedures by a qualified but not
>> stellar skeleton crew. Thus maybe it shouldn't be required to engage
>> in time consuming administrative procedures such as responding to
>> quarterly Mozilla surveys or diligently watching m.d.s.p for new
>> requirements.
>>
>
> I strongly disagree with this. If we believe these services are meaningful
> for Mozilla users, it's absolutely relevant. Consider that the proposal
> here fails to consider OCSP nonces, for example, as a prime example of why
> this suggestion is inherently and fundamentally flawed.
>
These services are meaningful because the CA was meaningful before the
wind down, and not all end entity certificates will be instantly
replaced once an orderly wind down (as opposed to a chaotic disaster) is
decided.
This is about the orderly and graceful shutdown of a previously vetted
and accepted CA, as the last part of that accepted use. It is not about
a catastrophically failed CA such as Diginotar(NL) or allowing in a
nearly useless new CA.
>
>> From the perspective of keeping Mozilla users safe, there are simply a
>> lot less that could go wrong,
>
>
> This is not true.
>
Note the fundamental requirement (stated above) that there should be
auditing that the issuance has been stopped, possibly even disabled.
Provided there is good auditing and other assurance that no new
certificates are issued (except, perhaps, scheduled reissue of OCSP
certs etc.), many of the things that have gone wrong with real world
operational CAs in the Mozilla store simply can't happen. For example,
if they can't issue, they can't misissue.
>
>> Also, some ad hoc leniency may be used as a temporary substitute for a
>> formal policy.
>>
>
> I do not think these suggestions are good nor do they ensure the safety of
> users, nor offer the reliability or assurance.
>
> CAs can make contingency plans to deprecate in an orderly fashion without
> any of the issues Jakob raises. The failure to do so, and the resulting
> distrust, is wholly in line with keeping users safe by default.
>
How would they do this, in practice? Remember that this is about the
scenario where the entire CA operation (not just some old roots) are
deprecated. Most CA-related economic activity ends, vetting specialists
and issuance systems are laid off / shut down. If the CA is not a
subsidiary of a continuing company, there will be no ongoing income to
fund the wind down. There should however be a planned amount to fund
the shutdown set aside in some kind of legally protected fund or trust,
based on the expected cost of running things in the wind down period.
Because such a wind down plan (preferably spelled out in the CPS before
the wind down) will need to be planned before it becomes a reality, the
funding for the plan may have to be deposited in a secure account or
trust before it happens. This in turn means that the funding cannot
take into account any requirements enacted later, hence my suggestion
that a wind down CA should typically be subject only to the root program
policies (including the BRs) that were in effect when they were still an
active CA organization.
From my skimming of the BRs, the skeleton close out crew could be as
small as 2 or 3 people (to satisfy the requirement that HSM access
requires this) who work in a small office next to the secured server
room while the rest of the building has been rented out to a different
use. Or maybe the HSM has been moved to a cage in a 3rd party data
center where only the required 2 people access is allowed in, while day
to day revocation management is done from a small rented office, so the
building that housed the full CA staff with vetting specialists,
marketing teams etc. has been put back on the real estate market.
Now I don't know which is the precise situation of Turktrust, but their
slowness in responding to the routine questionaire indicates that the
manpower has probably already been reduced to the minimum needed to keep
OCSP etc. running and handling the possibility of revocation requests
for the last 10+ certificates (which may represent servers accessed by
many more Mozilla users).
P.S.
Since Turktrust never participated in CT, the list of certificates on
crt.sh probably only reflects those that were discovered through various
forms of telemetry, thus there might be more than the 10 known
certificates still in existence (and issued with proper procedures and
audits, accepted by Mozilla at the time).