[cabfpub] Notes of meeting, CAB Forum, 10 January 2013
Moudrick M. Dadashov
md at ssc.lt
Fri Feb 1 20:28:07 UTC 2013
Hi Ben,
do you count those on skype? If the voice quality remains as stable as
it's been on the last 2 calls, I'll be happy to join again.
Thanks,
M.D.
On 1/31/2013 8:00 PM, Ben Wilson wrote:
>
> Notes of meeting
>
> CAB Forum
>
> 10 January 2013
>
> 1. Present: Maarten Van Horenbeeck, Stephen McHenry, Atsushi Inaba,
> Ryan Koski, Gerv Markham, Brad Hill, Dean Coclin, Rick Andrews, Robin
> Alden, Mert Ozarar, Atilla Biler, Cagdas Funda, Jeremy Rowley, Eddy
> Nigg, Sissel Hoel, Ryan Sleevi, Steve Roylance, and Kirk Hall.
>
> 2. Agenda Review: the agenda was reviewed and Ben mentioned that
> Phill Hallam-Baker had contacted him previously to make sure that CAA
> was discussed, and he thought it could occur later after the
> discussion of Turktrust. Phill was not on the call, but joined near
> the end of the call, and we discussed CAA under Item 9. Other Business.
>
> 3. Approve Minutes of 6 December 2012: The minutes of 6 December
> 2012 were approved as published.
>
> 4. OCSP AIA requirement (Remaining BR Issue 7)
>
> Ben said that we need to wrap up the correction needed on BR Issue 7
> (Mistake in Exhibit B -- Stapling is not an exception to having the
> OCSP AIA in a certificate)
>
> 5. WebTrust / ETSI Audit Implementation Cycles
>
> Dean said that we need to coordinate better on implementation
> timeframes and auditability. A working group was formed to hammer-out
> the details. Members of the working group are Don Sheehy, Iñigo
> Barreira, Dean Coclin, Kirk Hall, a representative of Google (TBD),
> Kelvin Yiu/Tom Albertson, Gerv Markham, and Jeremy Rowley. The
> objective/goal of the working group will be to come back to the group
> as a whole with a recommendation of how coordination among document
> revision cycles for requirements, audit criteria, auditing, and
> browser compliance should work.
>
> 6. Discussion of TURKTRUST facts
>
> Mert and Atilla presented the facts of the Turktrust-issued
> certificate to EGO that had CA=True. Atilla explained that they had
> provided an update on their web site and via email. The event
> occurred on August 8, 2011, prior to / during preparation for audit
> certification. Since November 2011 Turktrust has been compliant with
> ETSI audit requirements. Then in December 2012 they discovered the
> faulty certificate, and have now improved their existing Change
> Management procedures. The post-issuance logs examine certificate
> contents and extensions. These are checked by an internal audit
> process. He also said that they have also discussed the case with
> their KPMG-BSI auditors who will perform an additional limited scope
> audit for change management, incident management, and internal audit
> processes.
>
> Ben asked about the Checkpoint Firewall issue and whether other
> certificates besides the one issued to Google had been discovered.
> Atilla recounted that the Google certificate was detected by Google,
> but he has no further information about any detection or usage of any
> other certificate out of the EGO domain.
>
> Rick Andrews asked about Turktrust's plans to implement the Baseline
> Requirements and the Network and Certificate System Security
> Requirements. Atilla said that ETSI requirements for networking
> security have all been implemented and the Baseline Requirements that
> are referenced in the final ETSI standard are implemented and audited
> by their auditors. Rick noted that the current Turktrust CPS did not
> mention the "Baseline Requirements." Atilla said they hadn't yet
> declared conformance to the Baseline Requirements, but they will
> declare at some point. They have had discussions with KPMG-BSI
> Netherlands, their ETSI auditors, and they will first comply with ETSI
> audit requirements and then CABF Baseline Requirements.
>
> Stephen McHenry asked what procedures Turktrust had in place to detect
> whether any subCA certificates had/have been issued. Mert said that
> they had checked the audit logs for any certificates with those
> CA=true condition, and the only two certificates they found were the
> EGO one (ego.gov.tr) and one to e-islem.kktcmerkezbankasi.org. In
> addition to the existing controls coming from ETSI requirements,
> currently Turktrust has implemented an independent post-process
> control and a runtime control that runs live. The post-process
> control can additionally be run as a chron job to review such fields
> as BasicConstraints, AIAs, and the pathlengths of subCAs. Stephen
> asked how quickly are they detected after issuance, assuming that
> somehow the certificates make it past the current controls due to
> software errors, runtime errors, or whatever-to detect the situation
> after it has occurred. Mert said that they had previously explained
> how the misuse of the profiles had originally caused the problem and
> that if the runtime controls do not prevent a certificate from making
> it to the database the scan can be run on demand through the
> certificate database as a completely independent process that checks
> the certificates. Stephen said that Turktrust should run the process
> routinely because software errors do happen. Mert agreed and said they
> would run the process as a chron job periodically, but that he
> believed that they already run it daily already.
>
> 7. Discussion of preventative / remedial measures
>
> Ben asked for discussion on additional preventative or remedial measures.
>
> Jeremy said that he was working on an additional set of CA controls,
> such as developmental controls, because we already said during
> adoption of the Baseline Requirements and Network Security
> Requirements that we were going to come back and address some of the
> issues raised by the Diginotar situation later. He said he hoped to
> have a draft out soon and that volunteers were welcome. Robin said he
> would help.
>
> Rick asked whether Turktrust only issued certificates to Turkey, and
> if so, then Name Constraints might be used as a preventative measure?
> Atilla said that they do not issue any certificates in the US so far,
> but that doesn't tell the whole story because they issue certificates
> to .com domains and to many sites all around the world that have
> physical locations and data centers within the United States. Atilla
> said that therefore a name constraint of .tr would not work, because
> there would be too many negative effects.
>
> Maarten asked if anyone knew whether the EGO subCA certificate was
> installed on the Checkpoint Firewall intentionally to inspect
> traffic. Atilla said that he does not know because it happened at a
> customer site. What we do know is that at one point it was installed
> on a server and was detected by Chrome. The assumption is that the
> firewall was intended to inspect traffic, but he is not sure whether
> EGO or Checkpoint Turkey will release any announcements or final
> reports, but that hopefully they will.
>
> Eddy suggested that we scan certificate databases at EFF and elsewhere
> for certificates on SSL servers where CA=true and other similar
> criteria. Ben suggested that Eddy write a note to EFF, Ivan Ristic,
> Yngve Pettersen, and Bernhard Amann at Berkeley to see if they are
> interested in running such scans, even if only for academic reasons or
> out of curiosity.
>
> 8. Logistics of next face-to-face meeting
>
> Gerv said that they are expecting at least 24 people and there will be
> enough seats, but any one arriving beyond that number might anticipate
> standing or sitting along the wall.
>
> 9. Any Other Business
>
> Ben asked about involvement of invited experts like Yngve who sign the
> IPR Agreement. They have posting privileges on the public list, but
> what about their ongoing allowed participation? While it depends on
> each proposal, for instance with the revocation group, those who have
> signed the IPR Agreement should be able to participate. Dean said he
> thought it was a good idea to improve the rules in this area. Kirk
> noted that while we have observer status for entities like WebTrust,
> ETSI, and PayPal, but that there are plenty of people in the world who
> might qualify as experts and that allowing participation just on that
> alone won't work and we do allow them to participate in working
> groups---so he would oppose opening up greater participation in
> meetings and regular phone calls to that category. Kirk said he was
> open to working with Dean on this issue. Ben said that the working
> group is one approach to segregating discussions off from the main
> group, but the other approach is to have very stringent rules on which
> experts will be invited or qualified to participate as invited
> experts. With the first approach we'd have to make sure that there is
> a working group in which someone interested could participate, with
> the second approach we'd have to decide what the qualification steps
> and voting percentage would be to approve someone as a permanent
> invited expert. There would have to be sufficient rules around the
> latter approach so that we would not be accused of being too
> exclusionary. Jeremy said if all of the discussion took place on the
> public list, the only thing that such individuals would not have would
> be voting rights. Ben noted that they would get to participate in
> live discussions. Kirk said that where we determine that an
> individual has enough expertise we could invite them to speak as a
> guest. Ben agreed.
>
> Phill joined the call and those who stayed on continued with a
> discussion of the CAA record proposal. Phill said he'd like to put
> forward a proposal that CAA be required. Rick said that there are
> several solutions that have been proposed and he wondered if we
> mandated CAA whether people would stop looking at the alternatives or
> whether they would implement "all of the above" or what. Phill said
> that CAA does something that nothing else does, which is it allows
> companies to say, "do not issue certificates for my domain unless
> you're one of my approved CAs." Everything else, CT and DANE, are
> looking at either client enforcement or detecting anomalies and
> reporting them. Because CAA is different than CT or DANE, adopting
> one solution does not exclude the other. Ben noted that during our
> December call we discussed using the word "should" rather than "shall"
> except when necessary to mandate a global solution. Phill said that
> CAA only requires that you look at the CAA record, nothing other than
> that. Ben said he understood Phill's position on how CAA would be
> implemented, but that as Phill is trying to draft and put forth a
> motion that will pass, maybe he should consider using the word
> "should" rather than "shall." Phill said that it may not need to be a
> "shall" depending on how CAA is adopted by the domains --- whether it
> is by the 100s or the 1000s. Jeremy said he was apprehensive about
> adopting a requirement in the CA/B Forum if it were seen as an abuse
> by the CAs in locking in existing customers making it harder to get a
> certificate without a corresponding benefit. Phill said that the
> issue had been raised at the IETF and so they specified a mechanism
> for obtaining the data and stating that how you treat that information
> is up to you. So, if you state, "we don't observe the records in this
> TLD data," so long as it is in writing, you are complying with the
> IETF. Ben said that it will be interesting to see what the registries
> do. Phill noted that the registrar for xxx was trying to place a
> variety of controls on their registrants. Rick said that in discussing
> concerns with encountering CAA records he wasn't sure how difficult it
> would be to get the customer to just go off and update their CAA
> record. Ryan K. said he knew about the previously expressed CA
> concerns, but that it also will increase the support time burden and
> some CAs may even start to require customers to set up a CAA record
> before they'll issue a certificate to the customer and the CA could
> have a tool during the application process that says, "hey, you don't
> have a CAA record," so I share these concerns. Ben asked that anyone
> interested in endorsing Phill's proposal coordinate with him, and Rick
> advised Phill that it would be good to also get at least one browser
> to endorse it as well, since he will need more than 50% of the browser
> vote, too.
>
> 10. Meeting adjourned until the Next Call -- Thurs. January. 24th
>
>
>
> _______________________________________________
> Public mailing list
> Public at cabforum.org
> https://cabforum.org/mailman/listinfo/public
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/public/attachments/20130201/73eb230e/attachment-0002.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 2457 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.cabforum.org/pipermail/public/attachments/20130201/73eb230e/attachment.p7s>
More information about the Public
mailing list