Category Archives: Information

General news/information to the CAcert community or about security in general

Happy new attack!

A few days ago, a group of scientists and security specialists finally succeeded to create a rogue CA that was able to issue certificates that are accepted by all browsers:

http://www.win.tue.nl/hashclash/rogue-ca/ and http://www.phreedom.org/research/rogue-ca/ The problem underneath are weaknesses that were discovered in the MD5 hash-algorithm.

CAcert has switched from MD5 to SHA-1 for certificate-issueing a few years ago, when the first research results were made public that indicated that such an attack will become feasible. CAcert is currently still using an intermediate CA that was issued with an MD5 based signature 3 years ago. We are currently working to phase out this intermediate CA.

We suggest that all certificates (except for root certificates, which aren’t affected), regardless of which CA has issued them, that were still issued with MD5, be replaced with SHA-1 based certificates within the next 3 months. We also suggest that all company-internal or organisation internal CA’s be checked and switched from MD5 to SHA-1 where necessary. To detect, whether a webserver certificate or any of the intermediate certificates are MD5 based, you can use this Firefox extension: http://codefromthe70s.org/sslblacklist.aspx

Happy new year!

RootKey ceremony

Although the new RootKeys are generated, they are not yet availlable. At the moment there is a review of the new keys going on to see if they comply fully with the requirements for inclusion in the mainstream browsers. When the review is succesfull, the new RootKeys will become public and will be used to sign new or renewed certificates.

The blog will be the first place where you can read they have gone on-line, as well as additional info

RootKey ceremony

Today, Friday 28th of november, CAcert is creating new RootKeys for signing the certificates. This is done to comply to the audit requirements of having everything documented. Our current RootKeys are audit fail because it lacks documentation about the procedure.

The current RootKeys will NOT be revoked yet because there are thousands of certificates still relying on them.All new or renewed certificates will be signed by the new RootKeys as soon as they are operational. Some extensive testing is done in the last few months for creating, securing and implementing the RootKeys on a very high standard and open way.

The generated RootKey and two sub-root keys for assured community members (class 3) and (not assured) community members (class 1) makes use of open source tooling, certified in the past with FIPS 140-2 certificate for OpenSSL (Mar 2006).

Replacing the RootKeys is the last part of the server rehosting to the Netherlands which was done in October.

invited talk at LISA2008

As mentioned by Maurice, I presented this at LISA2008:

An Open Audit of an Open Certification Authority

How does a lightweight community Certification Authority (“CA”) engage in the heavyweight world of PKI and secure browsing? This talk tracks the systems audit of CAcert, an open-membership CA, as a case study in auditing versus the open Internet, community versus professionalism, quality versus enthusiasm. It will walk through the background of “what, why, wherefore an audit,” look at how CAcert found itself at this point, and then walk through some big ticket items: risks/liabilities/obligations; assurance and what’s in a name; disputes and reliance; and systems and security.

Can CAcert deliver on its goal of free certs? The audit is into its 3rd year as of this writing; and remains incomplete. Some parts are going well, and other parts are not; by the end of the year 2008, we should be able to check all of the important areas, or rethink the process completely. Hence, finally, the talk will close with progress and status, and recommendations for the future.

There are slides and a very long paper on my paper’s page.  As this was a talk invited by LISA, and as the job of audit is to look for the bad things, not the good things, this talk is quite brutal in parts. Not for the squeamish.

CAcert-Parties in Düsseldorf

Gleich zwei CAcert-Parties gibt es diese Woche in Düsseldorf/NRW:

Chaosdorf

Der Chaos Computer Club Düsseldorf (www.chaosdorf.de) bietet am 28.11. ab ca. 20:00 eine Zertifizierungsmöglichkeit an. Hier können sich Interessenten auch über die Hintergründe zum Thema CAcert und PGP-Verschlüsselung informieren. Einlass ist ab ca. 19:00.

> Chaos Computer Club Duesseldorf
> Fuerstenwall 232
> 40215 Duesseldorf

(Sollte das Tor nicht offen sein, bitte klingeln).

RheinJug Logo

Im Anschluß an den Java-Vortrag der Rhein-Jug (www.rheinjug.de) zum Thema Open JDK und Da Vinci VM gibt es am 30.11. eine weitere Möglichkeit, sich assuren zu lassen. Der Vortrag selbst findet ab ca. 19:00 statt, Assurer werden ab ca. 18:30 vor Ort sein. Während dem Vortrag ist KEINE Assurance möglich, erst wieder ab ca. 21:00.

> Institut für Informatik
> Heinrich-Heine-Universität Düsseldorf
> Gebäude 25.22
> Hörsaal 5G

CAcert is present at the LISA 2008 in San Diego, California.

The LISA, Large Installation System Administrators conference, will be interesting in particular on thursday between 11:00AM and 12:30PM as the CAcert auditor, Ian Grigg, will do his ´Invited talk´ about auditing a community driven Certificate Authority on this conference.

Ian will talk about how CAcert as a lightweight community Certificate Authority (“CA”) engage in the heavyweight world of PKI and secure browsing. With the introduction of Public Key Infrastructure, the Internet security framework rapidly became too complex for individuals and small groups to deal with, and the audit stepped into the gulf to provide a kinder face, in the form of a simple opinion or judgment call.

He will speak in detail about the systems audit of CAcert, as a case study in auditing versus the open Internet, community versus professionalism, quality versus enthusiasm and will look at how CAcert found itself at this point. Also he addresses some big-ticket items, such as risks, assurance, disputes, privacy, and security.

The CAcert Assurer Rudi van Drunen, and many others will organize a Birds of Feather assurance party for doing assurances and pgp signing. As such increasing the Web of Trust.

CAcert Association membership Annual General Meeting 2008

At next Friday (7th of November) 10 pm UTC irc://irc.cacert.org/#AGM the CAcert Inc. association General Annual Meeting will take place. CAcert is an open organisation.
The CAcert Year 2008 Report gives an excellent overview of the issues for the CAcert community Certificate Authority, the planned audit and why the CA is much different and non competitive with commercial CA’s:

  1. The trust issues, the CAcert trust concept
  2. The facts and figures: assurances, certificates, assurers, covered languages.
  3. CAcert organisation chart (departments, committees, technical setup)
  4. The on going audit project plan
  5. The agreements for CAcert members, non-related parties, software distributors.
  6. The policy issues (Policy on Policy, Assurance policy, organisation assurances in different countries, communication policy,
  7. Privacy issues (European Union DPA) and measurements.
  8. and much more…

The CAcert is happy that 7 members are nominated so a full board (seven seats) will be in charge again of the association.
The wiki page Announcement of AGM 2008 gives an overview of what is expected at the AGM.

CAcert Association board election

The CAcert Inc. association baord election will take place at the upcoming CAcert Association Annual General Meeting (AGM 2008) of the 7th of November 2008. If you are a CAcert Association Member and will become nominated for this election please get in touch with the CAcert board and have you nominated by at least two association members.

More details on the CAcert Inc. assocation can be found at the association wiki page
The upcoming AGM2008 agenda and references to reports can be found here

Servers Moved (comments from audit)

The CAcert critical services are now running on machines in the Netherlands.  This involved shutting down the machines in Vienna, transporting the data to Netherlands, handing over to a new team, and bringing the data up in the new location.

Names and places of the running systems will be mentioned elsewhere no doubt, but our thanks go to two groups in Vienna:  Funkfeuer and Sonance.  These two community groups provided the help when it was needed, and now they stand down from operational support to CAcert, retaining only a mention in the history (and, of course, many future Assurances).

BIT colo cam 4 ... not sure this is the right oneTo look at the audit context:  Although I was there, this move was not an audited, officially monitored operation;  this is because (a) the audit was frozen back in December of 2006, partly because of the difficult systems issues, (b) we still lack the full documentation set against which to audit, (c) the new team are focussed on getting basic control, and are not ready for dual control.  Also, always remember to view the auditor presence under the Heisenbergian lens of skepticism! It is your job to check the move and make it safe.  The auditor makes sure you are doing the job, so that we can all rely on the job being done each and every time.

Once we get a declaration that things are under control, the team expands its vision from the brutal short-term needs, and starts on its impressive task list, we will look at getting the audit formally restarted.

Still, that all said, the big job has been done, and done well.  The systems are now in place in the BIT high security ISP, and the new team is doing the work-through.  That will take place over the next few weeks.  At some stage, the new team will then be looking to carve up the work and bring in new people.  This latter expansion will be handled carefully, but it is necessary.  Think about that…

You can help in two ways.  One, take load of the systems people by helping in support, software and a myriad of other tasks.  Two, getting the CPS into DRAFT by answering the two blocking challenges.  Over to you!