[Servercert-wg] Ballot SC29v3: System Configuration Management
Dimitris Zacharopoulos (HARICA)
dzacharo at harica.gr
Mon Apr 27 01:57:53 MST 2020
Sorry for the late response, we couldn't get the entire team together
sooner to discuss.
On 2020-04-22 3:14 π.μ., Ryan Sleevi via Servercert-wg wrote:
> The point of the review is to make sure that systems are in defined
> states; ideally, states that can be readily recreated if necessary
> (modulo the private key, of course). The point of the NCSSRs is to
> make sure that state changes do not go undetected (i.e. DigiNotar),
> but that's necessary, not sufficient. Understanding when and how a CA
> system undergoes a state change is equally important - least of all,
> because it's necessary to know what state you "should" be in to
> compare when you look at what state you "are" in.
And that's the argument, right there "that by having good logging,
monitoring and alerting about unsupervised security updates, and by
having personnel following up on these in due time, that a CA may have
an equally good grip, overview, understanding and control of their
systems". In addition to that, we don't consider this to be "equally
good grip" but *better*.
Delaying installation of vendor provided security OS patches brings more
harm than good and the risk of getting your systems compromised from
someone exploiting a known vulnerability, is not compared to the risk of
"decreasing service availability" which will happen if "something
breaks". We provided more details about the trade-offs in previous posts
on this thread.
>
> As Trev highlighted in the minutes, there's an element of making sure
> that applying the patch is not going to disable some security control.
> I'm shocked and disappointed by how many CAs have made configuration
> changes and had it cause issues or disable their security or system
> checks. Patches are no different, OS vendor or not.
And you will continue to be shocked and disappointed because
configuration changes remain under human review. This is a worldwide
phenomenon, not limited to just CAs and Browsers or just our industry.
However, some people would be somehow more relieved if they knew that
automatic installation of OS vendor security updates are done without an
additional human review (which cannot possibly be performed at the level
of an OS vendor *group of experts*), and at the same time be confident
that the vast majority (I cannot say about 100%) have not introduced any
new security issues that the system didn't already have. This doesn't
prevent you from knowing *exactly **what **has changed in your system*
and *when*.
We would still like to see real documented cases where an OS vendor
introduced a security patch that created NEW security problems. And even
if there were such few cases, these are probably very rare compared to
the number of security patches that have been published by OS vendors.
>
> I think you're right to highlight that, unfortunately, the state of
> the world for some CAs may be security practices very misaligned with
> the goals and expectations of a globally, publicly trusted CA (or at
> least, those goals and expectations as seen by a root program), and so
> I appreciate that SC29 brings this to stark, unfortunate attention. I
> also agree that we shouldn't let the perfect be the enemy of the good
> - we need to make incremental improvements.
> My worry from the discussion, however, is that responsible CAs with
> strong change management systems will see such systems as unnecessary,
> because as the Forum, we potentially voted on a weaker set of
> expectations. New CAs will also lack the context that indicates such
> an approach of blindly trusting the vendor is dangerous.
There is a disconnect here. Strong change management is useful for some
areas but not a panacea. You have argued in the past that strong change
management is an obstacle for cases that need more automation (e.g.
automated certificate installation/renewals/changes). We support strong
change management for configuration changes and other areas but we
consider it *counterproductive *to add human review to decide if an OS
vendor security patch (that has been tested, reviewed and vetted already
by a group of OS vendor experts) is "good enough" for it to be
installed. And how long should this "independent" human review last for
it to be *effective*? Just a few seconds? A week? A month? For how long
would the systems need to remain unpatched/vulnerable in case this
procedure is blocked/postponed by more imminent matters? Do people
honestly believe that a CA-level human review of the contents of a
security update can determine if that update introduces a NEW security
issue? We see hundreds of security updates throughout each year.
After almost a month of discussion, I am still trying to find our
misunderstanding of the situation. We are merely discussing about
security updates of packages that are already installed, right? We are
not discussing about installing *new *packages for which there might be
an OS security update (like the Bluetooth example that was discussed
previously on this thread). We are also *not* discussing about updates
of third party software (in general software that is not provided
directly by the OS vendor).
> I'm not sure the right approach to resolve this. Normally, it'd be
> ideal to capture in the ballot, but I can understand that some CAs may
> be self-interested to oppose security requirements stronger than what
> they practice, and not unreasonably so. It may be that the answer is
> via Root Program communication. Unfortunately, simply "telling" isn't
> enough to have confidence that the issue isn't practiced, and
> "showing" (i.e. audits) is what's desired. I think if we were to pass
> this up with the NCSSRs, given the issue posed, one possibility is
> that CAs will be required to provide the detailed control reports and
> show and document exactly their change management process. Root
> Programs could use that to provide feedback about whether or not it
> meets the Root Programs' expectations, helping the CA improve their
> security posture to an acceptable level. That's a much bigger change,
> and puts a lot more work on the Root Programs, and so I'd prefer a
> more equitable solution such as via the BRs/NCSSRs.
This statement proves that there must be a huge misunderstanding
somewhere that I still can't exactly pin-point. None of what you say
above matches anything related to this thread. The NetSec subcommittee
stated on the last call I participated (with an auditor present), that
even when they wrote the original ballot language, they thought that the
practice HARICA tried to clarify was allowed. Their intent was not to
prohibit this practice. I am glad I brought this up in Bratislava, even
if it was "by accident", because it revealed an ambiguity that resulted
in different interpretations. The subcommittee tried to clarify this by
stating "the intent" of the ballot that clearly and unambiguously allows
the practice we described.
We presented a different approach supported by arguments, and, unless I
am greatly misunderstanding things, you consider that CAs that follow
this practice are either not "responsible CAs", or that they do not meet
the "Root Programs' expectations" or that their security posture is not
at "an acceptable level". It would save everyone the trouble of having
to interpret complicated security requirements and trade-offs if there
was a list of detailed "recipes" for how to be a "responsible CA" and
here are the "Root Program expectations". But that would shift the
burden from CAs to Relying Parties. So, I'm really confused about how we
should engage in such discussions. We have made an honest and earnest
attempt to present an approach to a security case and instead of seeing
more counter arguments and leaving this for Members to decide (via
voting), we see negative characterizations of CAs that might actually
follow an equally good (or even -as we claim- better) practice.
For what it's worth, with the exception of that last paragraph from your
last post, I think it was a good discussion, we presented our arguments
on a security related topic. For security topics we believe that there
is no "single and ultimate truth". If Root Programs feel too strong
about how some of these practices must be implemented, despite being
allowed by the SCWG and the NetSec Subcommittee when they drafted this
ballot, of course they can require them via their individual Policies.
Dimitris.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cabforum.org/pipermail/servercert-wg/attachments/20200427/51b60d58/attachment.html>
More information about the Servercert-wg
mailing list