* rehosting day 2 | ![]() |
The second day was mainly testing and making preparations for the rootkey ceremony.
A bug has been found in openSSL which blocks the rootkey creation on friday.
* rehosting day 2 | ![]() |
The second day was mainly testing and making preparations for the rootkey ceremony.
A bug has been found in openSSL which blocks the rootkey creation on friday.
* rehosting day 1 | ![]() |
On 9:06h CET on wednesday, the team arrived at BIT, the Dutch ISP. They started with Opening the sealed disks under the watchful eye of the auditor and one person from the Dutch ISP. Around 12:00h The servers were booted and the data integrety was checked. At 13:32h The servers were running.
The Team is now smoothing out the last glitches, doing extensive tests and are monitoring the servers closely. It's still possible to have some outages in the coming days.
We got some questions by mail regarding the SSL keys and the (possible) debian vulnerability.
There are blacklists of sites who may have this issue. Unfortunately, the off-line page was also on this list.
After investigation, it turned out the off-line page was running on a computer which was booted with an older live-cd containing the bug.
Since it was a single static page, no harm is done. Our on-line site has different keys and it's verified that these ssl keys are ok.
CAcert apologises for this inconvenience.
* Travel day | ![]() |
The servers were shut down around 8:00h CET on tuesday and a temporary page is set up for the off-line period.
After the disks were removed and sealed under the watchful eye of the auditor and one person from the Austrian ISP, The Vienna team started on their about 1100km trip to the Netherlands and arrived late in the evening.
* Preperation day | ![]() |
Yesterday, 26th of September, The website was down for a brief period around 7PM CET.
An extra disk was added to the server for backup purposes.
The final backup will be made on monday around 7PM CET.
This is the first blog entry where CAcert informs the users on the progress of the rehosting of the critical servers.
As you may have read in previous blog entries, CAcert are moving the last servers from Austria to the Netherlands. These servers are the mission-critical systems. This is done to comply fully with the very strict security rules that are in place for inclusion into mainstream browsers. The Netherlands location is planned to host the servers in a full dual control and 4 eyes environment, at both physical and logical levels. As an audit requirement, this is essential for balancing the security of certificates. Also, some internal protocols will have to change due to hardware issues.
The systems will have a short shut down on Friday evening, 26th at 19:00 for a brief period for backups. The servers will be shut down from 07:30 Tuesday morning, 30th September. We have blocked-out the period September 30 to October 4 for the project. Hopefully, we will not be down for that entire time, but because of the size of the project it is best to plan on at least 2 days downtime. During the downtime, an alternative page and the blog will show the progress on the moving. The blog, e-mail list and wiki will be available since they are already hosted at the new location in the Netherlands. During the downtime, no Account changes can be made, nor new Certificates or Assurer actions can be done. Please be aware of that downtime period. CAcert will inform all Members via the blog as soon as the Services are again up and running. More details are found on the wiki.
An international team of experts will be working on this relocation project. As well as our CAcert systems people, we will be supported in the Netherlands by people from BIT (ISP), Tunix (firewalls) and Oophaga (CAcert hosting in NL). In Austria, we will be supported by Funkfeuer (ISP) and Sonance (Verein). Should any problem arise during the move, the team will tackle them there and then.
If the servers are moved succesfully, we will be back on track with the audit and CAcert can move on. If CAcert does not relocate the servers, or fails to do so, it will have severe consequencies for CAcert. In such a case the chance to pass the audit and ability to achieve RootKey inclusion in the mainstream browsers will fail. The Austrian servers will be shut down permanently.
At the Annual General Meeting of CAcert Inc. on 7th of November, a report will be made to the Association Members and if needed decisions for the future will be taken.
update:
The Backup date will be on Monday, 29th (19h CET).
Anmeldung (bis 21.10.2008) ist keine Pflicht aber zumindest für PGP eine enorme Erleichterung.
Wir freuen uns über euere zahlreichen Anmeldungen!
We will soon start to organise CAcert’s Annual General Meeting (AGM) for 2008. If you are interested in becoming an Association Member so you can vote at this AGM please do so now. All details on how to join are here.
One side issue relating to the earlier post: in order to release funds for the critical systems work, we will need to sort out the CPS quickly. There are two blocking questions that need to be fixed, so I’ll list them here for all to think about:
CPS Bug #1: Assurance is now on a good footing with the DRAFT Assurance Policy, and we can state with some confidence that CAcert does a good job at identifying people within the community.
But, there is a bug: the certificates with names do not always use Assured Names. Specifically, in the Organisations, there is no compelling reason to use Assurance information or anything else to name people. So, Members are faced with a “name” that is either strongly Assured, or worthless, or somewhere arbitrarily in-between.
How are you to tell the difference? Perhaps by further looking in the certificate, but forcing people to investigate every certificate to figure out detailed issues makes a mockery of the process, and of the Assurers.
Let’s put it to you: Should the Name in the certificate (specifically, the CommonName or CN field as shown by software) be
All of these choices have merits. For example, the last one looks odd, but is maybe OK, if we recall that all certificates will identify the Member through the serial number.
What do you think? Over on the policy group, a choice will have to be made somehow, so dive on over there and help.
CPS Bug #2: The domains and email addresses placed in certificates are only ping-tested once, when added. Over time, various changes and problems can occur, such as transfer, expiry, loss, etc, so this is not good. Something has to be improved. The question is, what? There are these possibilities that I have seen so far:
Probably, we need some combination of 2 or more of the above, because some of them will be hard for people to do. As before, check in on the policy group to express your opinion.
The latest of the audit reports, for July-August, is now on the wiki. As this report and CAcert’s current situation are almost totally dominated by critical systems issues I shall only list those here. First, the big direct issues:
The above plan is the Number One Thing on everyone’s desktop. Other issues that bear mentioning are these, because they effect the plan:
Some have said that this report looks overly dark. If anything, it is too polite, not dark enough: CAcert has had 2 years to prepare the critical systems, and has not. It has had over a year in the current situation, and not done the migration. The issues are very clear, and have been repeated maybe a hundred times, so I won’t list them again.
The time has come for CAcert to decide whether you want an audit or not.
That’s it from audit. Next report will be (not before) November. Either it will be lighter, or darker. Over to you!
Drupalcon is the twice-yearly gathering of Drupalers to learn about, discuss and advance Drupal, and to network with other community members. Experience this thriving community in person yourself in Szeged, Hungary!
See the Drupalcon website for more information.
At Drupalcon we’ll have a CAcert event organized by the people from erdfisch. If you need some assuring you’ll find them every day of the conference from 12:45 to 13:15 on the ground floor in the sitting corner near the registration desk.
See the full announcement CAcert event at Drupalcon