Le mardi 30 octobre 2018 18:28:50 UTC+1, Ryan Sleevi a écrit :
> On Tue, Oct 30, 2018 at 1:10 PM Erwann Abalea via dev-security-policy <
> [email protected]> wrote:
> 
> > In fact, for the Relying Party, these certificates are definitely
> > considered as Qualified certificates for website authentication, regardless
> > of the content of the QCStatement extension.
> > Grab the German TL, find the T-Systems TSP, this specific service, you'll
> > see it's declared as a CA/QC type, status granted, with a Sie equal to
> > ForWebSiteAuthentication. There is no ambiguity (yet).

Sorry, I was reading the TL too fast; this certificate is Qualified, but not a 
QWAC.

> On what basis do you believe this claim is to be made? By virtue of
> asserting qcStatement-1? If qcStatement was mis-encoded, or qcStatement-1
> was absent, do you believe the same?

qcStatement-1 is not mandatory, by law, if the policyId is QCP or QCP+, or if 
there's a matching Qualification stating that the certificate is Qualified. 
Implementing decision 2015/1505 defines the common EU rules, and I haven't 
found the specific German rules (they're asserted in the German TL).
2015/1505 can be found at 
https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32015D1505

My mistake was that I looked at the Sie and didn't check if there was a 
QualificationsExtension node.

> I'm not sure the ambiguity can be as easily resolved as you suggest, given
> the description within EN 319 412-5

The weight taken by EN 319412-5 is important for the EN 319412-2 certification, 
but not for the Qualified status and usage of the certificate (because that's a 
legal issue).

> > Are we going to also revoke all the certificates which contain encoded
> > DEFAULT values (in the ASN.1 sense), invalid PrintableString attributes,
> > invalid hostnames,
> 
> Yes. This has already been the process now for several years, as shown
> through both https://wiki.mozilla.org/CA/Incident_Dashboard and the
> https://wiki.mozilla.org/CA/Closed_Incidents
> 
> It is interesting that you chose those examples, as several are explicitly
> called out in the Root Policy at
> https://github.com/mozilla/pkipolicy/blob/master/rootstore/policy.md#52-forbidden-and-required-practices

Fine. I'm waiting for the revocation of certificates containing an underscore 
in a SAN:dnsName.

> > and reject audits performed by auditors who missed such certificates?
> >
> 
> Yes. In general, the failure to detect such issues has called into question
> the competency of the auditor, as has the failure to disclose such issues.
> Both are relevant here, combined with the approach to revocation and
> overall testing methodology. Further, as detailed, the misleading remarks
> regarding what was examined are equally reason to question the competency
> of the auditor.
> 
> This is no different than the rejection of audits from some
> WebTrust-accredited practioners due to significant oversights about ongoing
> and persistent misissuance that is critical within the scope of the audit
> scheme being used. The failure to detect such issues fundamentally calls
> into question the validity of the current audit, as well as those audits
> performed for other CAs. The response of the auditor to such issues equally
> bears calling into question the competencies of the auditor.
> 
> 
> > This esi4-qcStatement-6 QCStatement is a recent addition, has been really
> > poorly designed (a SEQUENCE OF that shall contain only 1 element, what a
> > great idea), and has seen several changes during the draft. It's an easy
> > statement, I agree, and a decent TSP shouldn't make any mistake in encoding
> > it.
> > But on the control side, there's not that much available tool to decode a
> > QCStatements extension (and no, "openssl asn1parse" and "dumpasn1" don't
> > count).
> >
> 
> Considering that even prior versions (e.g. 2.0.12) included an ASN.1 module
> as a normative inclusion (Annex B), I find this profoundly non-compelling.
> See
> https://www.etsi.org/deliver/etsi_en/319400_319499/31941205/02.01.01_60/en_31941205v020101p.pdf
> .

I was talking about draft versions. The QcType definition was SEQUENCE { qcType 
OBJECT IDENTIFIER } just before that.

> As you dig through these versions, the adopted versions do not share the
> ambiguity issues. You're correct that 2.2.0 formalized the corrigenda
> against 2.2.1 to include, textually, the normative requirement of "one and
> exactly one" method, but in either event, such encodings violate it
> entirely.

I agree, having the id-etsi-qct-web OID used for the statementId is a clear 
violation. I'm just pointing that this specific QCStatement was really stupidly 
defined from the start.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to