On 10/03/2008 04:29 AM, Frank Hecker:
>

I turned your reply somewhat upside-down, because I want to comment 
first in general terms...

>
> Well, it does matter how difficult it is to implement a policy, and I
> think we have to exercise some judgment here. At one end of the spectrum
> we have situations where we have a small number of subordinate CAs, each
> of which issues lots and lots of certificates. T-Systems is apparently
> like this, as are KISA and perhaps others. Here I think it is realistic
> for us to take a closer look at the subordinates.
>

I agree that we need to think about it and provide clear guidance about 
what is acceptable one what not! Lets go...

The physical evidence gathering at the CA is a *substantial* part of an 
audit, it's one of the cornerstones of auditing. Without it, auditing 
would be very difficult and mostly meaningless. The physical 
walk-through and on-spot evidence gathering is a a *substantial* effort 
in relation of time and money to the CA. It's also the basis which 
allows Mozilla to trust those audits and have some confidence about the 
CA, being it the controls in place and general functioning.

Now, you are suggesting that we can rely on meaningless contractual 
requirements set up by the CA with no guaranties whatsoever that the 
external entities which aren't even part of the same company and don't 
share the physical infrastructure, have really done so.

How does an auditor confirm requirements set up by the CA without 
actually visiting those intermediate CAs? Either the auditor gathers 
evidence about the controls in place which govern those CAs; in which 
case the auditor has no problem confirming them. Otherwise the auditor 
hasn't done so, can't confirm conformance of the controls set up by the 
CA. It's a chicken and egg problem, either the CA has sufficient 
controls in place and set up requirements which resemble those of the 
root - in which case the auditor must confirm them, or the CA doesn't 
have those controls in place and the auditor has nothing to confirm 
either. In either case the result is the same - the sub-ordinate CAs 
were part of the audit or not, the auditor can confirm it or not.

>
> To echo what I wrote earlier, it's analogous to the case of CAs that
> out-source the RA function to others, especially in the enterprise
> environment. I doubt that, e.g., a WebTrust audit entails auditing each
> and every organization participating in RA activities; I presume what is
> done is instead to look at the overall controls in place for such
> arrangements.

Yes, but the RA doesn't control the CA infrastructure nor does the RA 
actually issue the certificates. Neither has the RA the power to move, 
remove, modify anything about the CA - it validates the subjects 
according to some criteria and the CA is obligated to assert control and 
assure the quality of the RA by various means. This is NOT the same as a 
sub-CA or cross-signed CA. See "Business Continuity Management" and 
"Physical and Environmental Security"...

Hey! An RA can make a mistake here and there (the most), the RA can't 
take the whole CA infrastructure down or compromise the CA keys. This is 
a substantial difference!

> It is not clear to me that it's realistic for us to require actual
> audits for each and every third-party subordinate CA.

No? But it's a requirement of (root) CAs, how can it be NOT a 
requirement of any participating CA? Mozilla defines the rules - that's 
the most realistic it can get. If the audit requirement can be 
circumvented by simply getting into a contractual agreement with another 
CA, than I request to skip the audit requirement altogether, why bother? 
(This should serve as an example, I don't really mean it)


> Even beyond the
> WISeKey model (the "CA in a box" appliance device), I suspect that a
> number of other CAs serving the enterprise market have enough
> subordinates that it would be unrealistic to require actual audits of
> all subordinates in these cases as well.

Who said that everything which was done to date was correct and useful 
(to the relying parties)? Just because it exists it doesn't mean it's 
the right thing to do really. "CA-in-a-box" is a risk Mozilla shouldn't 
accept without some guaranties (which auditing provides). Lets suppose 
CAs stop verifying domain control of server certificates because some 
hardware vendors decided that the enterprise market needs it, will you 
also call it unrealistic to make it a requirement? Most likely not!

Your effort to admit more CAs shouldn't come on the expense of basic 
requirements; and those are confirmed by an audit. No audit, no 
confirmation, no confidence and a higher risk.

> (Which is not to say that
> there's no auditing at all -- for example, the (root) CA could have some
> sort of random or spot auditing scheme.)
>

You know what's that worth...are you promoting CAs to be auditors now? 
Having the cats take care of the milk...

Random checking goes as far as it's convenient. There is no problem 
performing such a check around the next corner, but going all the way to 
the Falkland Islands is neither convenient nor financially attractive, 
hence it will not happen either. It's simply useless, besides that I 
question the effectiveness of such a check performed by the CA itself. 
Would you be willing to loose a good paying customer because of some 
"minor deficiencies"?

-- 
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: [EMAIL PROTECTED]
Blog:   https://blog.startcom.org
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to