Category Archives: Information

General news/information to the CAcert community or about security in general

CAcert-Parties im Rheinland und Ruhrgebiet

Im Rahmen der Vorträge der beiden Java-User-Groups rheinjug und ruhrjug wird es wieder die Möglichkeit geben, sich assuren zu lassen:

Die Vorträge selbst finden ab ca. 19:00 statt, Assurer werden ab ca. 18:30 vor Ort sein. Während den Vorträgen ist KEINE Assurance möglich, erst wieder ab ca. 21:00.

Rheinjug (15.1.2009), Thema: Was ist OpenESB?, Dozent: Christof Strack

> Institut für Informatik
> Heinrich-Heine-Universität Düsseldorf
> Gebäude 25.22
> Hörsaal 5D (oder 5F, je nach Resonanz)

Ruhrjug (22.1.2009), Thema: Erstellung hoch-performanter Websites, Dozent: Peter Roßbach

> Unperfekthaus
> Friedrich-Ebert-Strasse 19
> 45127 Essen

Bei beiden Gelegenheiten wird auch PGP-Keysigning möglich sein.

CAcert Assurance event Fosdem’09, Brussels, Sun 8 Febr 2009

At the upcoming Fosdem’09 Free and Open Source Developers’ European Meeting, 7-8 Febr 2009 in Brussels, Belgium there will be at Sunday 8th of Febr 2009 12-14 pm  a CAcert Assurance event as well a PGP signing party will be helt. During the two meeting days there will be enough assurers around to assure you also if you cannot make it on this party time.Be prepared and take the newest 2009 CAcert Assurance Programme form and for PGP your PGP fingerprint with you to the meeting. Make sure you agree to the CAcert Community Agreement and if you have at least 100 Assurance points you have passed the Assurer Challenge. For more details visit the Fosdem web pages and the Assurance Party pages.

Happy new attack!

A few days ago, a group of scientists and security specialists finally succeeded to create a rogue CA that was able to issue certificates that are accepted by all browsers:

http://www.win.tue.nl/hashclash/rogue-ca/ and http://www.phreedom.org/research/rogue-ca/ The problem underneath are weaknesses that were discovered in the MD5 hash-algorithm.

CAcert has switched from MD5 to SHA-1 for certificate-issueing a few years ago, when the first research results were made public that indicated that such an attack will become feasible. CAcert is currently still using an intermediate CA that was issued with an MD5 based signature 3 years ago. We are currently working to phase out this intermediate CA.

We suggest that all certificates (except for root certificates, which aren’t affected), regardless of which CA has issued them, that were still issued with MD5, be replaced with SHA-1 based certificates within the next 3 months. We also suggest that all company-internal or organisation internal CA’s be checked and switched from MD5 to SHA-1 where necessary. To detect, whether a webserver certificate or any of the intermediate certificates are MD5 based, you can use this Firefox extension: http://codefromthe70s.org/sslblacklist.aspx

Happy new year!

RootKey ceremony

Although the new RootKeys are generated, they are not yet availlable. At the moment there is a review of the new keys going on to see if they comply fully with the requirements for inclusion in the mainstream browsers. When the review is succesfull, the new RootKeys will become public and will be used to sign new or renewed certificates.

The blog will be the first place where you can read they have gone on-line, as well as additional info

RootKey ceremony

Today, Friday 28th of november, CAcert is creating new RootKeys for signing the certificates. This is done to comply to the audit requirements of having everything documented. Our current RootKeys are audit fail because it lacks documentation about the procedure.

The current RootKeys will NOT be revoked yet because there are thousands of certificates still relying on them.All new or renewed certificates will be signed by the new RootKeys as soon as they are operational. Some extensive testing is done in the last few months for creating, securing and implementing the RootKeys on a very high standard and open way.

The generated RootKey and two sub-root keys for assured community members (class 3) and (not assured) community members (class 1) makes use of open source tooling, certified in the past with FIPS 140-2 certificate for OpenSSL (Mar 2006).

Replacing the RootKeys is the last part of the server rehosting to the Netherlands which was done in October.

invited talk at LISA2008

As mentioned by Maurice, I presented this at LISA2008:

An Open Audit of an Open Certification Authority

How does a lightweight community Certification Authority (“CA”) engage in the heavyweight world of PKI and secure browsing? This talk tracks the systems audit of CAcert, an open-membership CA, as a case study in auditing versus the open Internet, community versus professionalism, quality versus enthusiasm. It will walk through the background of “what, why, wherefore an audit,” look at how CAcert found itself at this point, and then walk through some big ticket items: risks/liabilities/obligations; assurance and what’s in a name; disputes and reliance; and systems and security.

Can CAcert deliver on its goal of free certs? The audit is into its 3rd year as of this writing; and remains incomplete. Some parts are going well, and other parts are not; by the end of the year 2008, we should be able to check all of the important areas, or rethink the process completely. Hence, finally, the talk will close with progress and status, and recommendations for the future.

There are slides and a very long paper on my paper’s page.  As this was a talk invited by LISA, and as the job of audit is to look for the bad things, not the good things, this talk is quite brutal in parts. Not for the squeamish.

CAcert-Parties in Düsseldorf

Gleich zwei CAcert-Parties gibt es diese Woche in Düsseldorf/NRW:

Chaosdorf

Der Chaos Computer Club Düsseldorf (www.chaosdorf.de) bietet am 28.11. ab ca. 20:00 eine Zertifizierungsmöglichkeit an. Hier können sich Interessenten auch über die Hintergründe zum Thema CAcert und PGP-Verschlüsselung informieren. Einlass ist ab ca. 19:00.

> Chaos Computer Club Duesseldorf
> Fuerstenwall 232
> 40215 Duesseldorf

(Sollte das Tor nicht offen sein, bitte klingeln).

RheinJug Logo

Im Anschluß an den Java-Vortrag der Rhein-Jug (www.rheinjug.de) zum Thema Open JDK und Da Vinci VM gibt es am 30.11. eine weitere Möglichkeit, sich assuren zu lassen. Der Vortrag selbst findet ab ca. 19:00 statt, Assurer werden ab ca. 18:30 vor Ort sein. Während dem Vortrag ist KEINE Assurance möglich, erst wieder ab ca. 21:00.

> Institut für Informatik
> Heinrich-Heine-Universität Düsseldorf
> Gebäude 25.22
> Hörsaal 5G