For the ETSI audits performed at TC TrustCenter we get 50 to 80 pages audit
reports.
Seems to be different from WebTrust.
Bernd
Bernd Kirsig Tel.: +49 (0)40 / 80 80 26-2 51
Sr. Princ. IT Security Officer Fax.: +49 (0)40 / 80 80 26-1 26
TC TrustCenter GmbH – Now part of Symantec
Sonninstraße 24-28 mailto: kir...@trustcenter.de
D-20097 Hamburg http://www.trustcenter.de
Geschaeftsfuehrung/Managing Directors:
Austin McCabe, Norman Osumi
AG Hamburg, HRB 96168
>
> Should have a criteria not be fulfilled, this is usually
> noted in that report. I recall to have seen such a
> shortcoming in a audit report, but I don't recall who it was.
>
> --
> Regards
>
> Signer: Eddy Nigg, StartCom Ltd.
> XMPP: star...@startcom.org
> Blog: http://blog.startcom.org/
> Twitter: http://twitter.com/eddy_nigg
>
Does this matter? Mozilla doesn't do anything about sub-CAs which do
not comply with its guidelines (in practice, they do, because they
violate their own CPS). As long as you ignore even formally documented
non-compliance, you don't really have to care about what auditors do or
don't.
It's also not very interesting to look at business processes. Mozilla
could demand that all certificates issued by CAs in the root program are
published in due course, just as domain names under gTLDs are published
and available in bulk form. This would help with detection of certain
process failures and is much easier to do than judging an audit. It
would also implicitly cover the RA side, which is currently completely
out of scope as far as I can tell based on the two-page audit reports.
--
Florian Weimer <fwe...@bfk.de>
BFK edv-consulting GmbH http://www.bfk.de/
Kriegsstraße 100 tel: +49-721-96201-1
D-76133 Karlsruhe fax: +49-721-96201-99
If you have such information, why don't you inform Mozilla or the list
about it?
> Mozilla
> could demand that all certificates issued by CAs in the root program are
> published in due course, just as domain names under gTLDs are published
> and available in bulk form.
Mozilla requested all cross-signed CAs and might also request all sub
CAs in the future. This is equal to what you refer as gTLD. However
requesting all issued certificates will probably not work, that's like
requesting all domains of a registrar.
> On 09/23/2011 10:07 AM, From Florian Weimer:
>> Does this matter? Mozilla doesn't do anything about sub-CAs which do
>> not comply with its guidelines (in practice, they do, because they
>> violate their own CPS).
>
> If you have such information, why don't you inform Mozilla or the list
> about it?
I was told that sub-CAs were out of scope.
>> Mozilla could demand that all certificates issued by CAs in the root
>> program are published in due course, just as domain names under gTLDs
>> are published and available in bulk form.
>
> Mozilla requested all cross-signed CAs and might also request all sub
> CAs in the future. This is equal to what you refer as gTLD. However
> requesting all issued certificates will probably not work, that's like
> requesting all domains of a registrar.
ICANN's gTLD contracts require that the registry publishes the domain
names it creates (in bulk form), and that the registrar responsible is
readily identifiable over WHOIS. (Bulk WHOIS access is only a
theoretical option, only about one in ten registrars makes a convincing
effort at compliance, and decent coverage is neither administratively
nor financially feasible.)
Contrast this with the allegedly secure system of browser CAs, where the
CAs themselves operate under pseudonyms, do not publish the certificates
they issue, and do not identify the responsible registrar (which would
translate to the acting RA, I think).
If certificate data were available in bulk form, those who care
(operators of high-value service mostly, but also others) could download
it and analyze it for suspicious activity, just as they do with domain
names today.
Intermediate CA certificates are not included with NSS, but compliance
to the Mozilla CA Policy (and their own policies) applies in full
extended for the entire PKI. Therefore, if you have such information,
you should contact Kathleen or post to the list.
> (Bulk WHOIS access is only a
> theoretical option, only about one in ten registrars makes a convincing
> effort at compliance, and decent coverage is neither administratively
> nor financially feasible.)
Yeah, just wanted to ask about where I can retrieve all domains of a
particular TLD. So it's my understanding that this basically doesn't exist.
> Contrast this with the allegedly secure system of browser CAs, where the
> CAs themselves operate under pseudonyms
Which CA? I know some which have some real crap in their subject name,
but I believe this will be a thing of the past very soon when the basic
requirements guidelines will be adopted by the software vendors. Also
the Mozilla CA policy might have something to say about this.
> If certificate data were available in bulk form, those who care
> (operators of high-value service mostly, but also others) could download
> it and analyze it for suspicious activity, just as they do with domain
> names today.
You can check revocation of a certificate, similar in the way you can
check the WHOIS records if a particular domain if you know its name. But
you have not provided evidence that domain names can be obtained from
domain name registrars. Also WHOIS lookups are severally limited with
many registrars.
As such, domain name registrars and certificate authorities are
different animals, I'm not sure if it's correct to make the equation you
do. I believe that due to competition and privacy concerns, CA will
probably not agree to disclose their entire customer base.
It also shouldn't be your task to measure the performances of CAs I
guess in such a way, even though many different groups and entities are
searching the net for certificates for various purposes and from time to
time questionable certificates are discovered.
> On 09/23/2011 12:22 PM, From Florian Weimer:
>> If you have such information, why don't you inform Mozilla or the
>> list about it?
>> I was told that sub-CAs were out of scope.
>
> Intermediate CA certificates are not included with NSS, but compliance
> to the Mozilla CA Policy (and their own policies) applies in full
> extended for the entire PKI. Therefore, if you have such information,
> you should contact Kathleen or post to the list.
Uhm. Current Webtrust audits only cover internal RAs and do not extend
to sub-CAs. If Mozilla no longer wants to ignore sub-CAs and external
RAs, the Webtrust audits do not provide sufficient value. If a cut-off
date has been set for new policies, I have missed it.
>> (Bulk WHOIS access is only a
>> theoretical option, only about one in ten registrars makes a convincing
>> effort at compliance, and decent coverage is neither administratively
>> nor financially feasible.)
>
> Yeah, just wanted to ask about where I can retrieve all domains of a
> particular TLD. So it's my understanding that this basically doesn't
> exist.
It's called "zone file access program" and exists for the majority of
gTLDs (the "g" is important, ccTLDs are different).
>> Contrast this with the allegedly secure system of browser CAs, where the
>> CAs themselves operate under pseudonyms
>
> Which CA?
"Equifax Secure CA", "AddTrust Low-Value Services Root", and a couple of
others.
>> If certificate data were available in bulk form, those who care
>> (operators of high-value service mostly, but also others) could download
>> it and analyze it for suspicious activity, just as they do with domain
>> names today.
>
> You can check revocation of a certificate, similar in the way you can
> check the WHOIS records if a particular domain if you know its
> name. But you have not provided evidence that domain names can be
> obtained from domain name registrars.
You participate in the zone file access program (which is offered by
most gTLDs, per ICANN requirements), which gives you the entire list.
For the subset you're interested in, you query the TLD WHOIS server and
potentially follow referrals.
> Also WHOIS lookups are severally limited with many registrars.
True, but at least *some* data is published.
> As such, domain name registrars and certificate authorities are
> different animals, I'm not sure if it's correct to make the equation
> you do. I believe that due to competition and privacy concerns, CA
> will probably not agree to disclose their entire customer base.
But they have to, otherwise it is impossible to detect fraudulent
certificates before much damage is done. Of course this will hurt
business, but that's inevitable.
Compliance to the Mozilla CA Policy doesn't stop at the CA root. Rest be
assured that we recognized this both here and at the CAB Forum.
> It's called "zone file access program" and exists for the majority of
> gTLDs (the "g" is important, ccTLDs are different).
There is always something to learn - can you teach me how to do that?
> "Equifax Secure CA", "AddTrust Low-Value Services Root", and a couple of
> others.
Yeah, but those are harmless... there is worse, but I don't want to
embarrass anybody.
> But they have to, otherwise it is impossible to detect fraudulent
> certificates before much damage is done.
Well, there shouldn't be any to start with and it would be an entirely
different approach to the compliance audits we have today. But who
knows, maybe things will change :-)