Add DarkMatter Root Certificates
Categories
(CA Program :: CA Certificate Root Program, task)
Tracking
(Not tracked)
People
(Reporter: scott.rea, Assigned: kathleen.a.wilson)
Details
(Whiteboard: [ca-denied] Comment #96)
Attachments
(25 files, 1 obsolete file)
275.14 KB,
application/pdf
|
scott.rea
:
review+
|
Details |
1.23 MB,
application/pdf
|
scott.rea
:
review+
|
Details |
90.71 KB,
application/pdf
|
scott.rea
:
review+
|
Details |
216.40 KB,
application/pdf
|
Details | |
163.00 KB,
application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
|
Details | |
357.02 KB,
application/pdf
|
Details | |
1.53 MB,
application/vnd.openxmlformats-officedocument.wordprocessingml.document
|
scott.rea
:
feedback-
|
Details |
1.01 MB,
application/pdf
|
Details | |
640.12 KB,
application/pdf
|
Details | |
1.21 MB,
application/pdf
|
Details | |
1.05 MB,
application/pdf
|
Details | |
1.11 MB,
application/pdf
|
Details | |
669.65 KB,
application/pdf
|
Details | |
1.09 MB,
application/pdf
|
Details | |
1.16 MB,
application/pdf
|
Details | |
677.11 KB,
application/pdf
|
Details | |
274.20 KB,
application/pdf
|
Details | |
1.24 MB,
application/pdf
|
Details | |
668.76 KB,
application/pdf
|
Details | |
250.26 KB,
application/pdf
|
Details | |
1.09 MB,
application/pdf
|
scott.rea
:
review+
|
Details |
145.85 KB,
application/pdf
|
Details | |
190.58 KB,
application/pdf
|
Details | |
2.12 MB,
application/pdf
|
Details | |
1.01 MB,
application/pdf
|
Details |
Assignee | ||
Comment 5•7 years ago
|
||
Assignee | ||
Comment 9•7 years ago
|
||
Assignee | ||
Updated•7 years ago
|
Reporter | ||
Comment 10•7 years ago
|
||
Reporter | ||
Comment 11•7 years ago
|
||
Assignee | ||
Comment 12•7 years ago
|
||
Reporter | ||
Comment 13•7 years ago
|
||
Reporter | ||
Comment 14•7 years ago
|
||
Reporter | ||
Comment 15•7 years ago
|
||
Reporter | ||
Comment 16•7 years ago
|
||
Reporter | ||
Comment 17•7 years ago
|
||
Reporter | ||
Comment 18•7 years ago
|
||
Reporter | ||
Comment 19•7 years ago
|
||
Reporter | ||
Comment 20•7 years ago
|
||
Reporter | ||
Comment 21•7 years ago
|
||
Reporter | ||
Comment 22•7 years ago
|
||
Reporter | ||
Comment 23•7 years ago
|
||
Reporter | ||
Comment 24•7 years ago
|
||
Reporter | ||
Comment 25•7 years ago
|
||
Reporter | ||
Comment 26•7 years ago
|
||
Reporter | ||
Comment 27•7 years ago
|
||
Assignee | ||
Comment 28•7 years ago
|
||
Comment 29•7 years ago
|
||
Comment 30•7 years ago
|
||
Reporter | ||
Comment 31•7 years ago
|
||
Comment 32•7 years ago
|
||
Reporter | ||
Comment 33•7 years ago
|
||
Comment 34•7 years ago
|
||
Comment 35•7 years ago
|
||
Reporter | ||
Comment 36•7 years ago
|
||
Comment 37•7 years ago
|
||
Comment 38•7 years ago
|
||
Reporter | ||
Comment 39•7 years ago
|
||
Comment 40•7 years ago
|
||
Reporter | ||
Comment 41•7 years ago
|
||
Comment 42•7 years ago
|
||
Reporter | ||
Comment 43•7 years ago
|
||
Comment 44•7 years ago
|
||
Reporter | ||
Comment 45•7 years ago
|
||
Comment 46•7 years ago
|
||
Comment 47•7 years ago
|
||
Reporter | ||
Comment 48•7 years ago
|
||
Comment 49•7 years ago
|
||
Comment 50•7 years ago
|
||
Reporter | ||
Comment 51•7 years ago
|
||
Comment 52•7 years ago
|
||
Reporter | ||
Comment 53•7 years ago
|
||
Comment 54•7 years ago
|
||
Reporter | ||
Comment 55•7 years ago
|
||
Comment 56•7 years ago
|
||
Reporter | ||
Comment 57•7 years ago
|
||
Comment 58•7 years ago
|
||
Reporter | ||
Comment 59•7 years ago
|
||
Comment 60•7 years ago
|
||
Reporter | ||
Comment 61•7 years ago
|
||
Reporter | ||
Comment 62•7 years ago
|
||
Comment 63•7 years ago
|
||
Reporter | ||
Comment 64•7 years ago
|
||
Reporter | ||
Comment 65•7 years ago
|
||
Assignee | ||
Comment 66•6 years ago
|
||
Assignee | ||
Comment 67•6 years ago
|
||
Reporter | ||
Comment 68•6 years ago
|
||
Assignee | ||
Comment 69•6 years ago
|
||
Reporter | ||
Comment 70•6 years ago
|
||
Assignee | ||
Comment 71•6 years ago
|
||
Assignee | ||
Comment 72•6 years ago
|
||
Assignee | ||
Updated•6 years ago
|
Assignee | ||
Comment 73•6 years ago
|
||
Reporter | ||
Comment 74•6 years ago
|
||
Reporter | ||
Comment 75•6 years ago
|
||
Reporter | ||
Comment 76•6 years ago
|
||
Reporter | ||
Comment 77•6 years ago
|
||
Reporter | ||
Comment 78•6 years ago
|
||
Reporter | ||
Comment 79•6 years ago
|
||
Assignee | ||
Comment 80•6 years ago
|
||
Comment 81•6 years ago
|
||
I've completed a preliminary CP/CPS review and have the following questions / concerns. Would DarkMatter like to address any of these prior to the start of the public discussion?
==Meh==
- Gap from May 18 root signing to June 8 start of first audit period. Can you share the RKGC audit report?
- It’s not clear to me why we should accept both the UAE Global Root CA G4 in this request and the UAE Global Root CA G4 E2 that is requested for inclusion [1] by the UAE goverment. Can you explain the difference?
- CPS section 1.2 states “incorporates the UAENRCA CPS”. I am unable to locate that document. Should this refer to the CP and not the CPS?
- CP section 3.2.5 - there is no section 11.2.3 of the Baseline Requirements
- CP and CPS section 4.12.1 permits key escrow. The BR Self-Assessment states “DM does not provide key generation, escrow, recovery or backup facilities for TLS certificates.” and even if they did, it is not strictly against Mozilla policy.
- CPS section 7.1.2 may be missing a reference to "[UAE Digital Certificate Interoperability Guidelines]"?
- CPS section 7.3.1 typo: “RFC 6960s”
- CPS section 3.4 says that certificates may be suspended, even though section 4.9.13-16 say that suspension isn’t used.
==Bad==
- The CP was last updated on 3-January 2018, in violation of the section 3.3 requirement for annual updates.
- CP section 3.3.1 states that OV SSL certificate subscribers may re-key without re-verification for up to 39 months.
- CP section 6.3.2 lists OV certificate maximum validity period as 42 months
- CP section 3.4 appears to allow anyone in possession of a certificate’s PUBLIC key to revoke it: “Requests to revoke a certificate may be authenticated using that certificate's public key, regardless of whether or not the associated private key has been compromised.” Perhaps this means that DarkMatter uses the public key to authenticate revocation requests, but it’s not clear.
- It’s not clear to me that CP and CPS section 4.9.1 cover all the BR-required revocation reasons, such as “The CA obtains evidence that the validation of domain authorization or control for any Fully-Qualified Domain Name or IP address in the Certificate should not be relied upon.”
- The domain validations described in CPS section 3.2.2 are insufficiently specified to meet the requirements of Mozilla policy section 2.2. Specifically, the statement “or other DNS record information” and #4 (“A similar procedure”) do not provide enough information for a relying party to understand how domain validation is performed.
- Section 1.3.6.2 of the CPS uses the undefined term “Accreditation Authority” to describe entities that accredit DarkMatter. It seems reasonable to include Mozilla in this category, and the licensing terms described in this section violate Mozilla policy section 3.3.
- CPS section 1.3.2 is unclear on the topic of external RAs. The last paragraph of CPS section 3.2.2 implies that they are permitted and appears to allow DarkMatter to perform domain validations for certificates verified by delegated RAs using “…or by using other reliable means, such as performing a DNS lookup to determine whether there is a matching DNS record that points to the Delegated Third Party’s IP address or domain namespace.” This is underspecified and appears to violate the BRs.
- I do not believe that CPS section 9.8’s liability limitations comply with either BR section 9.8 or EVGL section 18.
- CPS section 3.2.2 does not clearly specify how email addresses are validated as required by Mozilla policy section 2.2(2).
- CPS section 3.2.3 describes methods used to verify an Applicant’s control of an email address, but the methods described do not appear to actually validate control of an email address.
Reporter | ||
Comment 82•6 years ago
|
||
(in reply to Wayne's comment #81)
==Meh==
[WT] Gap from May 18 root signing to June 8 start of first audit period. Can you share the RKGC audit report?
[SR] KPMG (our WT Auditors) were present for the Key Ceremonies which were performed during WT PiT pre-audit activities, however we did not request a separate RKGC audit report for just that activity alone. If Mozilla is satisfied to receive confirmation from the Principal Auditors involved in reviewing and witnessing that ceremony, they are happy to do that and I will provide the relevant contact details.
[WT]It’s not clear to me why we should accept both the UAE Global Root CA G4 in this request and the UAE Global Root CA G4 E2 that is requested for inclusion [1] by the UAE government. Can you explain the difference?
[SR] The UAE is adopting an EU-like Trust List approach for national trust. As part of the UAE deployment of a national authentication and digital signing platform, which was integrated by DarkMatter but deployed at SmartDubai Government, there were two Trust Anchors approved for issuance under the program - the National Root operated by DM which is valid for any entity participating (certificates issued come through the Federal Authority for Identity & Citizenship [ICA] subCAs), and another Root operated by Dubai for any participating Dubai Emirate entity. The desire was to give the impression that either Root should be treated as equally trusted within the system, hence when Dubai was preparing their Root Key Ceremony, they were requested to choose a name closely matching the original UAE national Root which had already been created at DM. You can see that the name differs just by the E2 designation at the end of commonName for the Dubai Root to indicate the Emirate scope for that anchor. So in short, the UAE Government recognizes both and is seeking global recognition for the same to facilitate visitors and international businesses to transact on the UAE Pass system. Any entity that has an association with specifically Emirate of Dubai, will be eligible to be provisioned by the E2 chain. But globally speaking, any entity within the UAE or internationally can be provisioned through the ICA subs that chain to the UAE Root submitted by DM.
[WT]CPS section 1.2 states “incorporates the UAENRCA CPS”. I am unable to locate that document. Should this refer to the CP and not the CPS?
[SR] This may be a language interpretation issue - the intention was to convey that there is no separate CPS for the UAENRCA but that this CPS is one and the same with the DM CPS.
[WT]CP section 3.2.5 - there is no section 11.2.3 of the Baseline Requirements
[SR] This is an incorrect reference in our CP and we will fix that - it should have referred to section 3.2.2.1 of the BRs. The CPS is clear about the processes we actually follow.
[WT]CP and CPS section 4.12.1 permits key escrow. The BR Self-Assessment states “DM does not provide key generation, escrow, recovery or backup facilities for TLS certificates.” and even if they did, it is not strictly against Mozilla policy.
[SR] DM and UAE Roots permit non-TLS certificates e.g. SMIME client encryption certificates chained to them to be escrowed as an option.
[WT]CPS section 7.1.2 may be missing a reference to "[UAE Digital Certificate Interoperability Guidelines]"?
[SR] The UAE Digital Certificate Interoperability Guidelines are a Work-In-Progress aimed more for cross-signed trust communities. The DM and UAE Roots submitted for inclusion are not cross-signed.
[WT]CPS section 7.3.1 typo: “RFC 6960s”
[SR] Typo: we will fix that - it should have the trailing "s" removed.
[WT]CPS section 3.4 says that certificates may be suspended, even though section 4.9.13-16 say that suspension isn’t used.
[SR] This may be a language interpretation issue - the intention was to convey that suspension for some classes of certs e.g. private trust certificates is permitted in future, but today, is not used by any DM operated CA.
==Bad==
[WT]The CP was last updated on 3-January 2018, in violation of the section 3.3 requirement for annual updates.
[SR] 3.3 of Mozilla Root Policy says : "CPs and CPSes MUST be reviewed and updated as necessary at least once every year, as required by the Baseline Requirements." Our understanding is that annual review of both the CP and CPS is the minimum requirement, and is the practice followed by DM as indicated in 9.12.1 of CP and CPS. But either document is only required to be "updated as necessary", so if there are no updates required in a given 12 month period, a review will be performed, but it may not produce a new document.
[WT]CP section 3.3.1 states that OV SSL certificate subscribers may re-key without re-verification for up to 39 months.
[SR] In the CP, OV TLS could refer to private trust organizationally validated certificates, or the standard OV public trust certificates. We have not restricted the private trust OV certs we issue under other Roots covered by this CP (not submitted to Mozilla) in the same way that BRs require for public trust OV and hence the CP reads this way. However, our SOPs related to public trust issuance of OV TLS were updated 6 Aug 2017 to honor freshness of Identity data and the 825 day limits. Final paragraph of CP 1.0 says "The UAE National PKI conforms to the current version of the guidelines adopted by the Certification Authority/Browser Forum (“CAB Forum”) when issuing publicly trusted certificates, including the Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates (“Baseline Requirements”) and the Guidelines for Extended Validation Certificates (“EV Guidelines”) both of which are published at https://www.cabforum.org. With regard to SSL/TLS Server Certificates or Code Signing Certificates, if any inconsistency exists between this CP and the Baseline Requirements or the EV Guidelines, then the EV Guidelines take precedence for EV Certificates and the Baseline Requirements take precedence for publicly trusted SSL certificates."
[WT]CP section 6.3.2 lists OV certificate maximum validity period as 42 months
[SR] Same response as for CP 3.3.1 directly above
[WT]CP section 3.4 appears to allow anyone in possession of a certificate’s PUBLIC key to revoke it: “Requests to revoke a certificate may be authenticated using that certificate's public key, regardless of whether or not the associated private key has been compromised.” Perhaps this means that DarkMatter uses the public key to authenticate revocation requests, but it’s not clear.
[SR] This may be a language interpretation issue - the intention was to convey that CA or RA may authenticate a signed revocation request with the corresponding public key.
[WT]It’s not clear to me that CP and CPS section 4.9.1 cover all the BR-required revocation reasons, such as “The CA obtains evidence that the validation of domain authorization or control for any Fully-Qualified Domain Name or IP address in the Certificate should not be relied upon.”
[SR] 4th bullet point says: "The certificate was not issued in accordance with the CP, CPS, or applicable industry standards." All public trust certificates are issued in accordance with BRs and/or EV. In our SOPs we mention the relevant sections used to validate Domains and we note the method used for every validation in our checklists as validated by our WT Audit.
[WT]The domain validations described in CPS section 3.2.2 are insufficiently specified to meet the requirements of Mozilla policy section 2.2. Specifically, the statement “or other DNS record information” and #4 (“A similar procedure”) do not provide enough information for a relying party to understand how domain validation is performed.
[SR] Per BR requirements our SOPs require us to specify which method was used for each validation and this is recorded in the validation checklist data. To date the following methods have been used by DM : 3.2.2.4.7 (this is our almost exclusively the method used), 3.2.2.4.9 (a couple of domains); however these additional methods are also permitted: 3.2.2.4.2, 3.2.2.4.3, 3.2.2.4.4, 3.2.2.8. DM does NOT allow use of 3.2.2.5 (4) ("any other method") to fulfill the requirements of method 3.2.2.4.8 (IP Address). For clarity, DM can update next version of CPS with the definitive list. NOTE: Long time ago we have also used 3.2.2.4.5 Domain Authorization Document. But those validations are no longer valid. They have either been re-validated or no more in use, and that method is obviously no longer used.
[WT]Section 1.3.6.2 of the CPS uses the undefined term “Accreditation Authority” to describe entities that accredit DarkMatter. It seems reasonable to include Mozilla in this category, and the licensing terms described in this section violate Mozilla policy section 3.3.
[SR] 1.3.6.2 is titled "IGTF" which is the Interoperable Global Trust Federation that governs accreditation of CAs issuing credentials trusted within the supercomputing and research and education industries where DM is currently accredited. Language used in this section are designed for distribution in that community. DM's application for inclusion in Mozilla is associated instead with section 1.3.6.1 CA and Browser Forum where no specific licensing is mentioned which we understand is entirely acceptable under Mozilla policy section 3.3.
[WT]CPS section 1.3.2 is unclear on the topic of external RAs. The last paragraph of CPS section 3.2.2 implies that they are permitted and appears to allow DarkMatter to perform domain validations for certificates verified by delegated RAs using “…or by using other reliable means, such as performing a DNS lookup to determine whether there is a matching DNS record that points to the Delegated Third Party’s IP address or domain namespace.” This is underspecified and appears to violate the BRs.
[SR] DM does not currently have any external RAs and has only used our own RA services to issue certificates. External RAs are permitted in future, but only after they are audited as meeting the necessary controls by our Web Trust Auditors.
[WT]I do not believe that CPS section 9.8’s liability limitations comply with either BR section 9.8 or EVGL section 18.
[SR] We believe our statements are in compliance with BRs which is also the requirements in the EVGs except with an amount qualification. I have submitted this to our Legal and Risk teams to evaluate and advise - thank you for bringing this to our attention
[WT]CPS section 3.2.2 does not clearly specify how email addresses are validated as required by Mozilla policy section 2.2(2).
[SR] We agree, none of the methods described are specific for the email validation process, but rather refer to Identity validation which can include verification of control of a claimed email address. We do however define this in our SOPs where we specify a suitably random value challenge is sent to the email address which must be received in the responding confirmation. We can provide more transparency in the next version of our CPS by describing this process there, rather than only detailing it in our SOPs.
[WT]CPS section 3.2.3 describes methods used to verify an Applicant’s control of an email address, but the methods described do not appear to actually validate control of an email address.
[SR] Same response for 3.2.2 directly above.
Comment 83•6 years ago
|
||
Note, Bugzilla supports markdown, if it makes it easier. Prefixing a line with >
is sufficient to indicate it's a reply (e.g. as done by this)
But globally speaking, any entity within the UAE or internationally can be provisioned through the ICA subs that chain to the UAE Root submitted by DM.
To confirm: Those ICA subs are also operated by DM?
I ask because of this policy regarding Super-CAs: https://wiki.mozilla.org/CA/Subordinate_CA_Checklist#Super-CAs
[WT]CP and CPS section 4.12.1 permits key escrow. The BR Self-Assessment states “DM does not provide key generation, escrow, recovery or backup facilities for TLS certificates.” and even if they did, it is not strictly against Mozilla policy.
[SR] DM and UAE Roots permit non-TLS certificates e.g. SMIME client encryption certificates chained to them to be escrowed as an option.
One way to resolve this concern is to make it explicit within the CP/CPS, both in the context of subscriber certificates and the issuing CA certificates that are not technically constrained.
[WT]CPS section 3.4 says that certificates may be suspended, even though section 4.9.13-16 say that suspension isn’t used.
[SR] This may be a language interpretation issue - the intention was to convey that suspension for some classes of certs e.g. private trust certificates is permitted in future, but today, is not used by any DM operated CA.
I'm not sure how to interpret this reply. Is the expectation that privately trusted roots would use the same CPS as publicly trusted roots?
One way to resolve this is to ensure your CPSes are separate for the functional hierarchies and trust communities they will participate in; i.e. ensure that your publicly trusted CPS does not state any actions that may be taken by privately trusted (see also, above)
==Bad==
[WT]The CP was last updated on 3-January 2018, in violation of the section 3.3 requirement for annual updates.
[SR] 3.3 of Mozilla Root Policy says : "CPs and CPSes MUST be reviewed and updated as necessary at least once every year, as required by the Baseline Requirements." Our understanding is that annual review of both the CP and CPS is the minimum requirement, and is the practice followed by DM as indicated in 9.12.1 of CP and CPS. But either document is only required to be "updated as necessary", so if there are no updates required in a given 12 month period, a review will be performed, but it may not produce a new document.
https://wiki.mozilla.org/CA/BR_Self-Assessment captures this, but more importantly https://github.com/mozilla/pkipolicy/blob/master/rootstore/policy.md#33-cps-and-cpses (Section 3.3 of Mozilla policy; alt link ) clearly states, in the sentence immediately following what you quoted,
"CAs MUST indicate that this has happened by incrementing the version number and adding a dated changelog entry, even if no other changes are made to the document."
[WT]CP section 3.3.1 states that OV SSL certificate subscribers may re-key without re-verification for up to 39 months.
[SR] In the CP, OV TLS could refer to private trust organizationally validated certificates, or the standard OV public trust certificates. We have not restricted the private trust OV certs we issue under other Roots covered by this CP (not submitted to Mozilla) in the same way that BRs require for public trust OV and hence the CP reads this way. However, our SOPs related to public trust issuance of OV TLS were updated 6 Aug 2017 to honor freshness of Identity data and the 825 day limits. Final paragraph of CP 1.0 says "The UAE National PKI conforms to the current version of the guidelines adopted by the Certification Authority/Browser Forum (“CAB Forum”) when issuing publicly trusted certificates, including the Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates (“Baseline Requirements”) and the Guidelines for Extended Validation Certificates (“EV Guidelines”) both of which are published at https://www.cabforum.org. With regard to SSL/TLS Server Certificates or Code Signing Certificates, if any inconsistency exists between this CP and the Baseline Requirements or the EV Guidelines, then the EV Guidelines take precedence for EV Certificates and the Baseline Requirements take precedence for publicly trusted SSL certificates."
As noted elsewhere, given that the inclusion of private trust operations prevent the community and relying parties from being able to distinguish the separation of responsibility and activities - quoted text notwithstanding - splitting them out is strongly advised.
The reasons for this were discussed during the Mozilla policy discussion about changelogs on CP/CPSes, and are similar to why the Mozilla peers perform detailed review of CP/CPSes, rather than relying on broad statements about "complying with the BRs".
[WT]CP section 3.4 appears to allow anyone in possession of a certificate’s PUBLIC key to revoke it: “Requests to revoke a certificate may be authenticated using that certificate's public key, regardless of whether or not the associated private key has been compromised.” Perhaps this means that DarkMatter uses the public key to authenticate revocation requests, but it’s not clear.
[SR] This may be a language interpretation issue - the intention was to convey that CA or RA may authenticate a signed revocation request with the corresponding public key.
Are there plans to update and/or resolve this?
[WT]It’s not clear to me that CP and CPS section 4.9.1 cover all the BR-required revocation reasons, such as “The CA obtains evidence that the validation of domain authorization or control for any Fully-Qualified Domain Name or IP address in the Certificate should not be relied upon.”
[SR] 4th bullet point says: "The certificate was not issued in accordance with the CP, CPS, or applicable industry standards." All public trust certificates are issued in accordance with BRs and/or EV. In our SOPs we mention the relevant sections used to validate Domains and we note the method used for every validation in our checklists as validated by our WT Audit.
Are there plans to update the language to resolve this?
[WT]The domain validations described in CPS section 3.2.2 are insufficiently specified to meet the requirements of Mozilla policy section 2.2. Specifically, the statement “or other DNS record information” and #4 (“A similar procedure”) do not provide enough information for a relying party to understand how domain validation is performed.
[SR] Per BR requirements our SOPs require us to specify which method was used for each validation and this is recorded in the validation checklist data. To date the following methods have been used by DM : 3.2.2.4.7 (this is our almost exclusively the method used), 3.2.2.4.9 (a couple of domains); however these additional methods are also permitted: 3.2.2.4.2, 3.2.2.4.3, 3.2.2.4.4, 3.2.2.8. DM does NOT allow use of 3.2.2.5 (4) ("any other method") to fulfill the requirements of method 3.2.2.4.8 (IP Address). For clarity, DM can update next version of CPS with the definitive list. NOTE: Long time ago we have also used 3.2.2.4.5 Domain Authorization Document. But those validations are no longer valid. They have either been re-validated or no more in use, and that method is obviously no longer used.
Can you provide a timeline for updating to resolve this?
[WT]CPS section 1.3.2 is unclear on the topic of external RAs. The last paragraph of CPS section 3.2.2 implies that they are permitted and appears to allow DarkMatter to perform domain validations for certificates verified by delegated RAs using “…or by using other reliable means, such as performing a DNS lookup to determine whether there is a matching DNS record that points to the Delegated Third Party’s IP address or domain namespace.” This is underspecified and appears to violate the BRs.
[SR] DM does not currently have any external RAs and has only used our own RA services to issue certificates. External RAs are permitted in future, but only after they are audited as meeting the necessary controls by our Web Trust Auditors.
What audit criteria has DM determined to be sufficient evidence of meeting the necessary controls, and where is this documented? Given that CAs have been distrusted over issues regarding their supervision of RAs, will your CP/CPS also detail in sufficient detail the process for reviewing and approving RAs and determining that they comply with the applicable policies?
[WT]CPS section 3.2.2 does not clearly specify how email addresses are validated as required by Mozilla policy section 2.2(2).
[SR] We agree, none of the methods described are specific for the email validation process, but rather refer to Identity validation which can include verification of control of a claimed email address. We do however define this in our SOPs where we specify a suitably random value challenge is sent to the email address which must be received in the responding confirmation. We can provide more transparency in the next version of our CPS by describing this process there, rather than only detailing it in our SOPs.
When will an update be provided? Similar to the note in the BR self assessment
"5) If you intend to submit your self-assessment with statements such as "will add/update in our next version of CP/CPS", indicate when you plan to provide the updated documents."
Reporter | ||
Comment 84•6 years ago
|
||
(In reply to Ryan Sleevi from comment #83)
Note, Bugzilla supports markdown, if it makes it easier. Prefixing a line with
>
is sufficient to indicate it's a reply (e.g. as done by this)But globally speaking, any entity within the UAE or internationally can be provisioned through the ICA subs that chain to the UAE Root submitted by DM.
To confirm: Those ICA subs are also operated by DM?
[SR] Yes, this is correct Ryan, those subs are operated by DM
I ask because of this policy regarding Super-CAs: https://wiki.mozilla.org/CA/Subordinate_CA_Checklist#Super-CAs
[WT]CP and CPS section 4.12.1 permits key escrow. The BR Self-Assessment states “DM does not provide key generation, escrow, recovery or backup facilities for TLS certificates.” and even if they did, it is not strictly against Mozilla policy.
[SR] DM and UAE Roots permit non-TLS certificates e.g. SMIME client encryption certificates chained to them to be escrowed as an option.
One way to resolve this concern is to make it explicit within the CP/CPS, both in the context of subscriber certificates and the issuing CA certificates that are not technically constrained.
[SR] This is a good suggestion Ryan, we will Update CPS with appropriate language
[WT]CPS section 3.4 says that certificates may be suspended, even though section 4.9.13-16 say that suspension isn’t used.
[SR] This may be a language interpretation issue - the intention was to convey that suspension for some classes of certs e.g. private trust certificates is permitted in future, but today, is not used by any DM operated CA.
I'm not sure how to interpret this reply. Is the expectation that privately trusted roots would use the same CPS as publicly trusted roots?
One way to resolve this is to ensure your CPSes are separate for the functional hierarchies and trust communities they will participate in; i.e. ensure that your publicly trusted CPS does not state any actions that may be taken by privately trusted (see also, above)
[SR] This is also a good recommendation, but of course to split out the CPS into Private Trust version and Public Trust version will take us some time. Initially we will update the existing CPS with the changes we have outlined, and we will seek to do that and publish it within the next month. Subsequently, splitting the CPS into separate versions will be a longer exercise.
To answer you first question related to the above, yes, the same CPS is used. DM has issued far more private trust certificates into enterprise scenarios than the public trust, and that is where we focused first.
==Bad==
[WT]The CP was last updated on 3-January 2018, in violation of the section 3.3 requirement for annual updates.
[SR] 3.3 of Mozilla Root Policy says : "CPs and CPSes MUST be reviewed and updated as necessary at least once every year, as required by the Baseline Requirements." Our understanding is that annual review of both the CP and CPS is the minimum requirement, and is the practice followed by DM as indicated in 9.12.1 of CP and CPS. But either document is only required to be "updated as necessary", so if there are no updates required in a given 12 month period, a review will be performed, but it may not produce a new document.
https://wiki.mozilla.org/CA/BR_Self-Assessment captures this, but more importantly https://github.com/mozilla/pkipolicy/blob/master/rootstore/policy.md#33-cps-and-cpses (Section 3.3 of Mozilla policy; alt link ) clearly states, in the sentence immediately following what you quoted,
"CAs MUST indicate that this has happened by incrementing the version number and adding a dated changelog entry, even if no other changes are made to the document."
[WT]CP section 3.3.1 states that OV SSL certificate subscribers may re-key without re-verification for up to 39 months.
[SR] In the CP, OV TLS could refer to private trust organizationally validated certificates, or the standard OV public trust certificates. We have not restricted the private trust OV certs we issue under other Roots covered by this CP (not submitted to Mozilla) in the same way that BRs require for public trust OV and hence the CP reads this way. However, our SOPs related to public trust issuance of OV TLS were updated 6 Aug 2017 to honor freshness of Identity data and the 825 day limits. Final paragraph of CP 1.0 says "The UAE National PKI conforms to the current version of the guidelines adopted by the Certification Authority/Browser Forum (“CAB Forum”) when issuing publicly trusted certificates, including the Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates (“Baseline Requirements”) and the Guidelines for Extended Validation Certificates (“EV Guidelines”) both of which are published at https://www.cabforum.org. With regard to SSL/TLS Server Certificates or Code Signing Certificates, if any inconsistency exists between this CP and the Baseline Requirements or the EV Guidelines, then the EV Guidelines take precedence for EV Certificates and the Baseline Requirements take precedence for publicly trusted SSL certificates."
As noted elsewhere, given that the inclusion of private trust operations prevent the community and relying parties from being able to distinguish the separation of responsibility and activities - quoted text notwithstanding - splitting them out is strongly advised.
The reasons for this were discussed during the Mozilla policy discussion about changelogs on CP/CPSes, and are similar to why the Mozilla peers perform detailed review of CP/CPSes, rather than relying on broad statements about "complying with the BRs".
[SR] This is a sound recommendation and we will begin that work after we first publish an update to the existing CPS to clarify the requested items
[WT]CP section 3.4 appears to allow anyone in possession of a certificate’s PUBLIC key to revoke it: “Requests to revoke a certificate may be authenticated using that certificate's public key, regardless of whether or not the associated private key has been compromised.” Perhaps this means that DarkMatter uses the public key to authenticate revocation requests, but it’s not clear.
[SR] This may be a language interpretation issue - the intention was to convey that CA or RA may authenticate a signed revocation request with the corresponding public key.
Are there plans to update and/or resolve this?
[SR] We will seek to address this in an updated CPS which we will publish within the next month
[WT]It’s not clear to me that CP and CPS section 4.9.1 cover all the BR-required revocation reasons, such as “The CA obtains evidence that the validation of domain authorization or control for any Fully-Qualified Domain Name or IP address in the Certificate should not be relied upon.”
[SR] 4th bullet point says: "The certificate was not issued in accordance with the CP, CPS, or applicable industry standards." All public trust certificates are issued in accordance with BRs and/or EV. In our SOPs we mention the relevant sections used to validate Domains and we note the method used for every validation in our checklists as validated by our WT Audit.
Are there plans to update the language to resolve this?
[SR] We will seek to address this in an updated CPS which we will publish within the next month
[WT]The domain validations described in CPS section 3.2.2 are insufficiently specified to meet the requirements of Mozilla policy section 2.2. Specifically, the statement “or other DNS record information” and #4 (“A similar procedure”) do not provide enough information for a relying party to understand how domain validation is performed.
[SR] Per BR requirements our SOPs require us to specify which method was used for each validation and this is recorded in the validation checklist data. To date the following methods have been used by DM : 3.2.2.4.7 (this is our almost exclusively the method used), 3.2.2.4.9 (a couple of domains); however these additional methods are also permitted: 3.2.2.4.2, 3.2.2.4.3, 3.2.2.4.4, 3.2.2.8. DM does NOT allow use of 3.2.2.5 (4) ("any other method") to fulfill the requirements of method 3.2.2.4.8 (IP Address). For clarity, DM can update next version of CPS with the definitive list. NOTE: Long time ago we have also used 3.2.2.4.5 Domain Authorization Document. But those validations are no longer valid. They have either been re-validated or no more in use, and that method is obviously no longer used.
Can you provide a timeline for updating to resolve this?
[SR] We will seek to address this in an updated CPS which we will publish within the next month
[WT]CPS section 1.3.2 is unclear on the topic of external RAs. The last paragraph of CPS section 3.2.2 implies that they are permitted and appears to allow DarkMatter to perform domain validations for certificates verified by delegated RAs using “…or by using other reliable means, such as performing a DNS lookup to determine whether there is a matching DNS record that points to the Delegated Third Party’s IP address or domain namespace.” This is underspecified and appears to violate the BRs.
[SR] DM does not currently have any external RAs and has only used our own RA services to issue certificates. External RAs are permitted in future, but only after they are audited as meeting the necessary controls by our Web Trust Auditors.
What audit criteria has DM determined to be sufficient evidence of meeting the necessary controls, and where is this documented? Given that CAs have been distrusted over issues regarding their supervision of RAs, will your CP/CPS also detail in sufficient detail the process for reviewing and approving RAs and determining that they comply with the applicable policies?
[SR] Part of the reason for wanting to participate in CABF WGs is to seek guidance on this very topic. Current plans are that future external RAs will need to produce a compliant RPS, and then demonstrate to either our WT Auditors, or another of their choosing, that the RPS maps to our CPS, and they have sufficient controls to implement what their RPS defines.
[WT]CPS section 3.2.2 does not clearly specify how email addresses are validated as required by Mozilla policy section 2.2(2).
[SR] We agree, none of the methods described are specific for the email validation process, but rather refer to Identity validation which can include verification of control of a claimed email address. We do however define this in our SOPs where we specify a suitably random value challenge is sent to the email address which must be received in the responding confirmation. We can provide more transparency in the next version of our CPS by describing this process there, rather than only detailing it in our SOPs.
When will an update be provided? Similar to the note in the BR self assessment
[SR] We will seek to address this in an updated CPS which we will publish within the next month
"5) If you intend to submit your self-assessment with statements such as "will add/update in our next version of CP/CPS", indicate when you plan to provide the updated documents."
Updated•6 years ago
|
Comment 85•6 years ago
|
||
I believe it is important to bring to the attention of Mozilla's reviewers the recent disclosures from Reuters journalists regarding very serious and troubling allegations of the involvement of the company in question into illegitimate hacking operations.
https://www.reuters.com/investigates/special-report/usa-spying-raven/
To quote:
Stroud had been recruited by a Maryland cybersecurity contractor to help the Emiratis launch hacking operations, and for three years, she thrived in the job. But in 2016, the Emiratis moved Project Raven to a UAE cybersecurity firm named DarkMatter. Before long, Stroud and other Americans involved in the effort say they saw the mission cross a red line: targeting fellow Americans for surveillance.
The story of Project Raven reveals how former U.S. government hackers have employed state-of-the-art cyber-espionage tools on behalf of a foreign intelligence service that spies on human rights activists, journalists and political rivals."
Under DarkMatter, Project Raven continued to operate in Abu Dhabi from the Villa, but pressure escalated for the program to become more aggressive.
Considering these revelations as well as previous allegations (such as https://www.evilsocket.net/2016/07/27/How-The-United-Arab-Emirates-Intelligence-Tried-to-Hire-me-to-Spy-on-its-People/), I believe that, similarly to bug 1232689, it is important for the reviewers to evaluate the information available and consider potential risks of abuse.
Comment 86•6 years ago
|
||
I also believe that including DarkMatter's root CA carries a large risk of abuse, and would reduce the security of Firefox. I would be surprised if DarkMatter didn't use their CA to sign malicious certificates to aid their illegitimate hacking operations, including against local UAE dissidents.
Comment 87•6 years ago
|
||
Claudio and Micah: This bug is being used by Mozilla representatives to collect and verify information about the CA's practices and discuss the CP/CPS and audits (see step #3 in https://wiki.mozilla.org/CA/Application_Process#Process_Overview). There will be ample time for discussing all other issues related to the CA on the mozilla.dev.security.policy mailing list during the public discussion phase (step #4), which hasn't started yet. Please hold further comments until the public discussion opens so that the focus can stay on the current step of the process.
Comment 88•6 years ago
|
||
BTW EFF is criticizing this inclusion request:
The concern in this case is that DarkMatter has made its business spying on internet communications, hacking dissidents’ iPhones, and other cyber-mercenary work. DarkMatter’s business objectives directly depend on intercepting end-user traffic on behalf of snooping governments. Giving DarkMatter a trusted root certificate would be like letting the proverbial fox guard the henhouse.
(the claims there are backed by links/more resources)
Reporter | ||
Comment 89•6 years ago
|
||
DarkMatter CEO has provided an official response to Mozilla on the recent media article about the UAE that referenced security and intelligence matters. Wayne has invited DM to share this on the mozilla.dev.security.policy mailing list, which we have done, but due to the size (scanned PDF) it may not make it past moderation. So I am also adding a copy of that letter here in case it is easier for folks to access.
Reporter | ||
Comment 90•6 years ago
|
||
DM CEO letter to Mozilla
Reporter | ||
Comment 91•6 years ago
|
||
CPS updates have been completed, copy is added to submission. new CPS will be live at https://ca.darkmatter.ae/CPS/index.html in next 48 hours.
Comment hidden (offtopic) |
Comment 93•6 years ago
|
||
Please see Comment #87. There is an appropriate venue to continue that discussion, and it's not on this bug, but in mozilla.dev.security.policy.
I've gone ahead and removed the comment, to ensure this bug does not become cluttered. Please feel free to repost on the discussion at https://groups.google.com/d/msg/mozilla.dev.security.policy/nnLVNfqgz7g/YiybcXciBQAJ
Assignee | ||
Comment 94•6 years ago
|
||
The CA has generated new versions of their root certificates, and is updating this root inclusion case in the CCADB.
https://ccadb-public.secure.force.com/mozilla/PrintViewForCase?CaseNumber=00000251
Comment 95•6 years ago
|
||
I recommend that this inclusion request be denied based on the discussion at https://groups.google.com/d/msg/mozilla.dev.security.policy/nnLVNfqgz7g/TseYqDzaDAAJ , which was concluded as follows:
I would like to thank everyone for their constructive input on this
difficult issue. I would also like to thank DarkMatter representatives for
participating in the open, public discussion. I feel that the discussion
has now, after more than 4 months, run its course.
The question that I originally presented [1] to this community was about
distrusting DarkMatter’s current intermediate CA certificates (6 total)
based on credible evidence of spying activities by the company. While a
decision to revoke trust in these intermediates would likely result in a
denial of DarkMatter’s root inclusion request [2], the public discussion
for that request has not yet begun. A decision not to revoke these
intermediates does not necessarily mean that the inclusion request will be
approved.
Some of this discussion has revolved around compliance issues, the most
prominent one being the serial number entropy violations discovered by
Corey Bonnell. While these issues would certainly be a consideration when
evaluating a root inclusion request, they are not sufficient to have
triggered an investigation aimed at revoking trust in the DarkMatter
intermediates or QuoVadis roots. Therefore, they are not relevant to the
question at hand.
Much of the discussion has been about the desire for inclusion and distrust
decisions to be made based on objective criteria that must be satisfied.
However, if we rigidly applied our existing criteria, we would deny most
inclusion requests. As I stated earlier in this thread, every distrust
decision has a substantial element of subjectivity. One can argue that
we’re discussing a different kind of subjectivity here, but it still
amounts to a decision being made based on a collective assessment of all
the information at hand rather than a checklist.
Some, including DarkMatter representatives [3], have declared the need to
examine and consider the benefits of having DarkMatter as a trusted CA.
However, last year we changed our policy to replace the weighing of
benefits and risks with “based on the risks of such inclusion to typical
users of our products.” [4]
Perhaps the most controversial element in this discussion has been the
consideration of “credible evidence”. The first component is the inherent
uncertainty over what is “credible”, especially in this day and age. While
it has been pointed out that respected news organizations are not beyond
reproach [5], having four independent articles [6][7][8][9] from reputable
sources published years apart does provide some indication that the
allegations are credible. These articles are also extensively sourced.
If we assume for a second that these allegations are true, then there is
still a sincere debate over what role they should play in our decision to
trust DarkMatter as a CA. The argument for considering these allegations is
akin to the saying “where there’s smoke there’s fire”, while the argument
against can be described as “innocent until proven guilty”.
DarkMatter has argued [3] that their CA business has always been operated
independently and as a separate legal entity from their security business.
Furthermore, DarkMatter states that once a rebranding effort is completed,
“the DarkMatter CA subsidiary will be completely and wholly separate from
the DarkMatter Group of companies in their entirety.” However, in the same
message, DarkMatter states that “Al Bannai is the sole beneficial
shareholder of the DarkMatter Group.” and leaves us to assume that Mr. Al
Bannai would remain the sole owner of the CA business. More recently,
DarkMatter announced that they are transitioning all aspects of the
business to DigitalTrust and confirmed that Al Bannai controls this entity.
This ownership structure does not assure me that these companies have the
ability to operate independently, regardless of their names and legal
structure.
Mozilla’s principles should be at the heart of this decision. “The Mozilla
Manifesto [10] states:
Individuals’ security and privacy on the internet are fundamental and must
not be treated as optional.”
And our Root Store policy states: “We will determine which CA certificates
are included in Mozilla's root program based on the risks of such inclusion
to typical users of our products.”
In other words, our foremost responsibility is to protect individuals who
rely on Mozilla products. I believe this framing strongly supports a
decision to revoke trust in DarkMatter’s intermediate certificates. While
there are solid arguments on both sides of this decision, it is reasonable
to conclude that continuing to place trust in DarkMatter is a significant
risk to our users. I will be opening a bug requesting the distrust of
DarkMatter’s subordinate CAs pending Kathleen’s concurrence. I will also
recommend denial of the pending inclusion request, and any new requests
from DigitalTrust.
In the past, we’ve seen CAs attempt to make an end run around adverse trust
decisions - through an acquisition, a shell company, etc. We will treat any
such attempt as a violation of this decision and act accordingly. Mozilla
does welcome DigitalTrust as a “managed” subordinate CA under the oversight
of an existing trusted CA that retains control of domain validation and the
private keys.
This discussion has highlighted an opportunity to improve our review of new
externally-operated subordinate CAs [11]. This issue [12] is part of the
current policy update discussions.
Wayne
[1]
https://groups.google.com/d/msg/mozilla.dev.security.policy/nnLVNfqgz7g/YiybcXciBQAJ
[2] https://bugzilla.mozilla.org/show_bug.cgi?id=1427262
[3]
https://groups.google.com/d/msg/mozilla.dev.security.policy/nnLVNfqgz7g/mJ0EV2eoCgAJ
[4]
https://groups.google.com/d/msg/mozilla.dev.security.policy/58F6FgeGOz8/Zzb-r76wBQAJ
[5]
https://www.washingtonpost.com/blogs/erik-wemple/wp/2018/11/27/bloomberg-is-still-reporting-on-challenged-story-regarding-china-hardware-hack/
[6]
https://theintercept.com/2016/10/24/darkmatter-united-arab-emirates-spies-for-hire/
[7] https://www.reuters.com/investigates/special-report/usa-spying-raven/
[8]
https://www.nytimes.com/2019/03/21/us/politics/government-hackers-nso-darkmatter.html
[9] https://theintercept.com/2019/06/12/darkmatter-uae-hack-intercept/
[10] https://www.mozilla.org/en-US/about/manifesto/
[11]
https://ccadb-public.secure.force.com/mozilla/IntermediateCertsSeparateAudits
[12] https://github.com/mozilla/pkipolicy/issues/169
Assignee | ||
Comment 97•6 years ago
|
||
I concur with Wayne's recommendation to deny this root inclusion request.
Reference:
https://groups.google.com/d/msg/mozilla.dev.security.policy/nnLVNfqgz7g/JIBk4fECDwAJ
Reporter | ||
Comment 98•6 years ago
|
||
DigitalTrust's appeal to Mozilla's decision
Updated•2 years ago
|
Description
•