Dear all, Still posting on behalf of TÜViT.
On Wed, Oct 31, 2018 at 11:43 AM Wiedenhorst, Matthias via dev-security-policy <[email protected]<mailto:[email protected]>> wrote: · Since January 2018, T-Systems issued EV certificates with an incorrect qcStatement. T-Systems was made aware of the problem in October 2018, i.e. for about 9 month the error was not detected/reported https://bugzilla.mozilla.org/show_bug.cgi?id=1498463#c3 T-Systems fixed the error in a timely manner so that certificates now contain the correct qcStatement. T-Systems identified a deficiency within their systems, made a change on October 5, but did not notify their CAB and SB until October 16. Under the requirements provided by EN 319 401, 7.9, that does not seem consistent with meeting those requirements. · TUVIT performed an audit of T-Systems according to ETSI policies EVCP and QCP-w in the beginning of 2018. During the audit the incorrect coding of the qcStatement was not detected. Yes. I believe this is a significant issue, given the assessment report. · In several emails, we answered to his complaint, explained our procedures and justified the classification of the encoding error as minor (non-critical) non-conformity. For non-critical non-conformities, our certification requirements foresee a maximum period of 3 month for remediation before the certification shall be withdrawn. (see also ETSI EN 319 403, section 7.6 b) Based on the classification as minor, we do not see a necessity for revocation. That’s about the relevant facts. Let me now reply in detail to Ryans private contribution: >I would like to suggest that consideration be given to rejecting future >audits from TUVIT and from that of Matthias Wiedenhorst and Dr. Anja >Widermann, for some period of time. I would suggest this period be at least >one year long; however, given the technical details of ETSI accreditation, >believe a period of three years may be more appropriate. Dr. Anja Wiedemann (please mind the correct spelling) was not part of the audit team. We do not understand why her name is mentioned here. One / three years exclusion from audit sounds like a punishment. We do not understand where this time frame comes from and why such a time frame is needed. Auditor and Reviewer, as stated on https://www.tuvit.de/fileadmin/Content/TUV_IT/zertifikate/en/AA2018072001_Audit_Attestation_E_Deutsche-Telekom-Root-CA-2_20180718_s.pdf - the parties tasked with ensuring that the audit is meaningfully able to ensure the criteria were met and the testing procedures were able to meet those requirements. Auditors and reviewers need to be distinguished: ISO/IEC 17065 §7.5.1 forbids that the person(s) performing the review is involved in the audit process. The time frame selected is one that has been consistently used in the past regarding questions about audits. Unfortunately, there lacks suitable means to objectively determine whether or not the auditor is sufficiently competent in remediation of problematic audits. Past procedures have resulted in indefinite suspensions for some auditors, or temporary suspensions of their recognition. The choice of three years, rather than one year, is based on the fact that we have now seen auditors who were not accredited perform audits against the frameworks, later become accredited, and retroactively issue reports covering their activities prior to accreditation. This does not instill confidence in the ETSI approach to auditor supervision, and thus the longer period is to ensure that no in-process audits are retroactively certified upon the expiration of the period. Three years thus aligns with both the 1 year (CA/B Forum) and 2 year (eIDAS) time periods in ensuring that such a possibility is not technically achievable. >If there is a belief that a TSP has failed to meet the requirements of >their accreditation, EN 319 403 describes a process for which complaints >may be made to either the TSP or to the CAB. This complaint process is >further expanded upon in ISO/IEC 17065, which 319 403 incorporates. This >same process also applies when there have been mistakes by the CAB to >adhere to its scheme requirements under EN 319 403 - a complaint may be >made with either the CAB or the NAB regarding the CAB's accreditation. TSPs are not accredited but certified, ETSI EN 319 403 §7.13 does not make any additional requirements on complaint procedures but just reference ISO/IEC 17065. (The requirements from ISO/IEC 17065 [1], clause 7.13 shall apply.) In particular, no procedures for complaints to TSPs or NABs are defined (only to CABs). 4.1.2.2 (j) provides for the client (the TSP) to inform the CAB any complaints made known to it. You're correct that procedures for complaints directly to the TSP are not normatively specified by ISO/IEC 17065 or that of EN 319 403; however, the countenance is made that a client (the TSP) may have knowledge of and records of complaints outside the scope and purview of the CAB's complaints. With respect to the NAB process, https://www.dakks.de/sites/default/files/71_sd_0_009_e_beschwerdeverfahren_20111118_v1.0_0.pdf and in the context of ISO/IEC 17011 https://www.dakks.de/en/content/dakks-successfully-evaluated-ea >Issue A) As part of their initial response to my complaint, TUVIT, by way >of Matthias Wiedenhorst (Head of Certification Division TSP) stated "As a >very first, quick cross check with our audit evidence record, I can only >say that we did check issued certificates from within the declared period >and that they did contain the proper qcStatement-6.3 / id-etsi-qcs-QcType >3". However, this statement was in direct conflict with the TSP's own >investigation and incident report, provided at >https://bugzilla.mozilla.org/show_bug.cgi?id=1498463#c3 , which states the >mistake was introduced during the development of support - that is, no such >properly issued certificates were issued. We do not understand why the important fact that Matthias was not in office and replied what he remembered from an audit that was month ago is not mentioned here. In addition, he replied that he would verify and come back as soon as possible (when he is in office again). That actually happened, see below. Wrong or misleading information - which was only corrected upon specific questioning and a request for proof or evidence of the claim - has been used to disqualify CAs in the past. This statement was made after the TSP had themselves already investigated and confirmed this was not possible. The same standard being applied to CA incident reports is being proposed here - that incomplete and improper investigations raise serious questions. Let’s stay with present case (not with the past): In his email, Matthias said that he is not in his office and will begin to investigate the situation as soon as possible. We think that it is clear, that further information contained in the email cannot be based on the result of the investigation. Back in his office after looking into the audit logs and verifying the qcStatement he gave the proper answer. We do not agree at all that core competencies are missing. As you described, back in his office Matthias accessed the audit logs, did the manual check and found the wrong encoding. IT is obvious, that he has the competency to read ASN.1. In addition, it is not correct, that TUVIT does not use any tools for certificate checking but the currently available lint tools do not support the checking of the qcStatement. I disagree with this claim as to core competency - the problem had already been highlighted and identified by external members of the community. I also disagree that an acceptable response is that the tools did not support checking the qcStatement; it is expected that the auditor should be checking for conformity as part of their core competencies. To that extent, the extension of such tools to check was something the auditor could have performed. Alternatively, the auditor could have devised testing procedures to evaluate compliance against the specified module. At no point was the auditor prevented from examining nor absolved of the expectations simply because someone else had not written the tool for them yet. As said before, we are using tools in the audit process. The sentence about lint tools should be seen as additional information and nothing else. Considering the significance of misencoding of profiles - which has lead to critical misissuance and security risk (see, for example, Turktrust) - the question about whether or not TUVIT's testing procedures are adequate to ensure compliance are extremely relevant and appropriate. TUVIT could, for example, attempt to resolve these concerns by providing documentation about their approach to assessing compliance with the relevant certificate profiles, including methodologies for sampling (not normatively specified by the relevant documents), their testing and training procedures, and other evidence that would feel suitable to highlight that this was, indeed, a 'one off' approach. Let’s stay with the present case: We have not seen any security breach due to the miscoding of the qcStatement and have not seen any arguments how certificates with wrong qcStatement could be used to breach the security in future. That is the reason why believe the non-conformity is a non-critical non-conformity with respect to the performed assessment. In addition, a correct qcStatement is not required by the Baseline Requirements (but by ETSI EN 319 412-5). Having this in mind, we expect that Browser Ecosystem should not be directly affected. This is no different than the "Incident Reports" requested of CAs that fail to adhere to the requirements - understanding how 100% total and complete misissuance could be failed to be detected by the auditor IS a very real, and very pressing, question. It does not have the ease of explaining away via, say, statistical sampling issues, as this was 100%. It does not have the ease of explaining away as confusion, given that precise ASN.1 modules were given. It does not have the ease of explaining away as not significant, given this was a mandatory field with respects to the profile asserted. I reject the premise that this is 'minor' for exactly that reason, and there does not seem a reasonable explanation that has been offered, other than: 1) TUVIT's assessment methodologies are fundamentally flawed and do not meet the level of assurance expected of the community This is an exaggerated conclusion based on the only fact that a wrong coded qcStatement was not detected. 2) TUVIT's and T-Systems' incident handling approach does not meet the level of expectations of the community. This includes both the oversight of revocation, but also the approach to auditing for when such a critical non-conformity has been found. A resolution of "They promise to fix it" does not provide a reasonable level of assurance, given that at fundamental question is what other issues TUVIT failed to consider or assess. The lack of introspection, by TUVIT, as to its auditing process and procedures is concerning. How one single person (with his private hat on) can speak for the community? We explained before why we believe that the wrong qcStatement coding is a non-critical nonconformity (the security of ecosystems is not affected). Where did you copy "They promise to fix it" from? We have not used this expression. With respect to confidentiality and the disclosure of non-conformities, we've seen auditors make such disclosures - e.g. https://bug1425805.bmoattachments.org/attachment.cgi?id=9013271 Currently, there is no requirement for disclosing such kind of information. If there is no requirement, the confidentiality requirement from ISO/IEC 17065 is binding for us. As said before, we offer to support the establishment of rules with in the CAB/Forum for making such kind of incidents public in an adequate form. >Furthermore, the complaint process established under EN 319 403 refers to >that of ISO/IEC 17065:2012. Under ISO/IEC 17065:2012, the requirement is >put forward within 7.13.5 and 7.13.6 that the complaint resolution process >be independent from those from those involved in the audit or those who >have consulted with or been employed by the subject of the audit. Matthias >Wiedenhorst's involvement in, and resolution of, this complaint, calls into >question whether TUVIT has acted according to this, given that they are >represented as Lead Auditor for T-Systems' audit. At this point, the only >objective means of resolving whether or not the process was followed is to >lodge a complaint such that the NAB may themselves investigate the handling >of this complaint. Wrong again. Please have another look at 7.13.5, it talks about the <<decision>> to resolve the dispute and not of the process of resolving itself. The decision shall be made by an independent person. It is more than natural that for resolution process itself, concerned auditors needs to be involved. As I stated - the only information that has been provided has been by the Lead Auditor. Whether or not this complaint was formally resolved by TUVIT's management - which I intentionally CC'd in such messages - has not been forthcoming to date. As a consequence, the only way to determine objectively is to request an independent evaluation of the complaint resolution process to ensure that independence has been maintained. Why not asking TUVIT, if the complaint is formally resolved? We never said anything like that in our statements. Best regards Matthias Wiedenhorst ______________________________________________________________________________________________________________________ Sitz der Gesellschaft/Headquarter: TÜV Informationstechnik GmbH * Langemarckstr. 20 * 45141 Essen, Germany Registergericht/Register Court: Amtsgericht/Local Court Essen * HRB 11687 * USt.-IdNr./VAT No.: DE 176132277 * Steuer-Nr./Tax No.: 111/57062251 Geschäftsführung/Management Board: Dirk Kretzschmar TÜV NORD GROUP Expertise for your Success Please visit our website: www.tuv-nord.com<http://www.tuv-nord.com> Besuchen Sie unseren Internetauftritt: www.tuev-nord.de<http://www.tuev-nord.de> _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

