Category Archives: Information

General news/information to the CAcert community or about security in general

CAcert.org at OpenExpo09 in Bern – April 1. and 2., 2009

OpenExpo, the Swiss conference and trade show for Free and Open Source Software, takes place for the 6th time Wednesday and Thursday April 1 and 2 (No April Fool’s Joke!), 2009 at the BEA expo Hallen in Bern. Read more… http://www.openexpo.ch/openexpo-2009-bern/

Additional Swiss assurers or assurers from any country with successfully passed assurer test and willing to help, register in the CAcert.org Wiki: http://wiki.cacert.org/wiki/OpenExpo2009-CH-Bern

———————————————————————————————————————————————–

OpenExpo, die Schweizer Messe und Tagung für Freie und Open Source Software findet in sechster Austragung am Mittwoch und Donnerstag, 1./2. April 2009 (Kein Aprilscherz!)in den BEA expo Hallen in Bern statt. Mehr unter… http://www.openexpo.ch/openexpo-2009-bern/

Zusätzliche Schweizer Assurer oder Assurer aus irgend einem Land mit erfolgreich absolviertem Assurer Test, welche mithelfen wollen, tragen sich bitte im CAcert.org Wiki ein: http://wiki.cacert.org/wiki/OpenExpo2009-CH-Bern

CAcert-Parties im Rheinland und Ruhrgebiet

Im Rahmen der Vorträge der beiden Java-User-Groups rheinjug und ruhrjug wird es wieder die Möglichkeit geben, sich assuren zu lassen:

Die Vorträge selbst finden ab ca. 19:00 statt, Assurer werden ab ca. 18:30 vor Ort sein. Während den Vorträgen ist KEINE Assurance möglich, erst wieder ab ca. 21:00.

Rheinjug (15.1.2009), Thema: Was ist OpenESB?, Dozent: Christof Strack

> Institut für Informatik
> Heinrich-Heine-Universität Düsseldorf
> Gebäude 25.22
> Hörsaal 5D (oder 5F, je nach Resonanz)

Ruhrjug (22.1.2009), Thema: Erstellung hoch-performanter Websites, Dozent: Peter Roßbach

> Unperfekthaus
> Friedrich-Ebert-Strasse 19
> 45127 Essen

Bei beiden Gelegenheiten wird auch PGP-Keysigning möglich sein.

CAcert Assurance event Fosdem’09, Brussels, Sun 8 Febr 2009

At the upcoming Fosdem’09 Free and Open Source Developers’ European Meeting, 7-8 Febr 2009 in Brussels, Belgium there will be at Sunday 8th of Febr 2009 12-14 pm  a CAcert Assurance event as well a PGP signing party will be helt. During the two meeting days there will be enough assurers around to assure you also if you cannot make it on this party time.Be prepared and take the newest 2009 CAcert Assurance Programme form and for PGP your PGP fingerprint with you to the meeting. Make sure you agree to the CAcert Community Agreement and if you have at least 100 Assurance points you have passed the Assurer Challenge. For more details visit the Fosdem web pages and the Assurance Party pages.

Happy new attack!

A few days ago, a group of scientists and security specialists finally succeeded to create a rogue CA that was able to issue certificates that are accepted by all browsers:

http://www.win.tue.nl/hashclash/rogue-ca/ and http://www.phreedom.org/research/rogue-ca/ The problem underneath are weaknesses that were discovered in the MD5 hash-algorithm.

CAcert has switched from MD5 to SHA-1 for certificate-issueing a few years ago, when the first research results were made public that indicated that such an attack will become feasible. CAcert is currently still using an intermediate CA that was issued with an MD5 based signature 3 years ago. We are currently working to phase out this intermediate CA.

We suggest that all certificates (except for root certificates, which aren’t affected), regardless of which CA has issued them, that were still issued with MD5, be replaced with SHA-1 based certificates within the next 3 months. We also suggest that all company-internal or organisation internal CA’s be checked and switched from MD5 to SHA-1 where necessary. To detect, whether a webserver certificate or any of the intermediate certificates are MD5 based, you can use this Firefox extension: http://codefromthe70s.org/sslblacklist.aspx

Happy new year!

RootKey ceremony

Although the new RootKeys are generated, they are not yet availlable. At the moment there is a review of the new keys going on to see if they comply fully with the requirements for inclusion in the mainstream browsers. When the review is succesfull, the new RootKeys will become public and will be used to sign new or renewed certificates.

The blog will be the first place where you can read they have gone on-line, as well as additional info

RootKey ceremony

Today, Friday 28th of november, CAcert is creating new RootKeys for signing the certificates. This is done to comply to the audit requirements of having everything documented. Our current RootKeys are audit fail because it lacks documentation about the procedure.

The current RootKeys will NOT be revoked yet because there are thousands of certificates still relying on them.All new or renewed certificates will be signed by the new RootKeys as soon as they are operational. Some extensive testing is done in the last few months for creating, securing and implementing the RootKeys on a very high standard and open way.

The generated RootKey and two sub-root keys for assured community members (class 3) and (not assured) community members (class 1) makes use of open source tooling, certified in the past with FIPS 140-2 certificate for OpenSSL (Mar 2006).

Replacing the RootKeys is the last part of the server rehosting to the Netherlands which was done in October.

invited talk at LISA2008

As mentioned by Maurice, I presented this at LISA2008:

An Open Audit of an Open Certification Authority

How does a lightweight community Certification Authority (“CA”) engage in the heavyweight world of PKI and secure browsing? This talk tracks the systems audit of CAcert, an open-membership CA, as a case study in auditing versus the open Internet, community versus professionalism, quality versus enthusiasm. It will walk through the background of “what, why, wherefore an audit,” look at how CAcert found itself at this point, and then walk through some big ticket items: risks/liabilities/obligations; assurance and what’s in a name; disputes and reliance; and systems and security.

Can CAcert deliver on its goal of free certs? The audit is into its 3rd year as of this writing; and remains incomplete. Some parts are going well, and other parts are not; by the end of the year 2008, we should be able to check all of the important areas, or rethink the process completely. Hence, finally, the talk will close with progress and status, and recommendations for the future.

There are slides and a very long paper on my paper’s page.  As this was a talk invited by LISA, and as the job of audit is to look for the bad things, not the good things, this talk is quite brutal in parts. Not for the squeamish.