Eddy Nigg (StartCom Ltd.) wrote:
> OK, so in that case KISA itself is becoming an auditor. Would KISA then 
> issue audit reports about the various CAs in question? What would be the 
> pros and cons of having each licensed CA approved instead of KISA as a 
> "wild card" CA for a whole country?

One major issue is that as a matter of policy we don't do inclusion of 
certs for subordinate CAs; we just approve and include roots. If we were 
to explicitly require evaluation and approval of subordinate CAs 
(leaving aside for the moment whether this is a good idea or not) then 
consistency would require that we do this for every CA, including 
commercial CAs. Consistency would also require that we do this for every 
subordinate CA in a root's hierarchy, no matter how far down in the 
hierarchy it was.

For example, suppose for a given root CA R we evaluate and approve all 
of R's subordinate CAs S1 to Sn, and a given subordinate Si then issues 
multiple subordinate CA certs in turn, perhaps enterprise CAs operated 
by individual companies. By the same logic that prompted us to evaluate 
all of the root's subordinates for inclusion, we'd have to evaluate and 
approve all of the enterprise CAs as well.

I personally think this is both unworkable and unnecessary, even if we 
were to restrict this to direct subordinates of roots. See also below.

> KISA is a CA authorized and commissioned by the their government, 
> however the operating CAs are not government CAs, but regular CAs with  
> commercial interests etc. So this makes it a bit tricky I think...As I 
> proposed earlier already concerning independent CAs operating under a 
> unified CA root, but which are independent companies and the sole 
> purpose of the CA root is to act as an anchor, each CA should be audited 
> explicitly on its own or each CA should be at least explicitly 
> confirmed. Thoughts?

My main thought is that our current policy does not explicitly address 
either auditing of subordinate CAs or approval of subordinate CAs. I 
have no problem with looking at overall audit-related issues as part of 
evaluating a root CA for inclusion. However to condition root approval 
on the exact details of how subordinates are audited (e.g., whether we 
prefer to see audits done by a third party vs. audits by the root CA 
itself) is IMO trying to stretch the policy too far.

Yes, we have a general provision in the policy regarding not including 
roots where it "would cause undue risks to users' security". However as 
the person who wrote the language into the policy, I can tell you that 
it was not intended to condition overall root approval on our evaluation 
and approval of every aspect of how a CA hierarchy operated; it was 
rather intended to cover egregious security problems that might occur at 
a CA (as implied by the example violations I chose). I personally don't 
think having independent subordinate CAs be audited by the root CA (as 
opposed to by a third party) is an example of an egregious security 
problem sufficient for us to invoke this policy provision.

Rather than trying to evaluate and approve an entire CA hierarchy up 
front (including all subordinate CAs), I think it is better to operate 
on an exception basis: We evaluate and approve roots, not individual 
subordinates. If it turns out later that there are security problems at 
a particular subordinate, and those problems are severe enough that we 
want to deny recognition of certificates issued by that subordinate, 
then from a technical point of view we have the ability to do so: We can 
pre-load in NSS the CA cert for that subordinate (and just that 
subordinate) and can mark it as untrusted.

Frank

-- 
Frank Hecker
[EMAIL PROTECTED]
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to