tech-security archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

trust anchors and the base system



There is a lot to this and this messages services to establish a new
thread (please don't hijack the ftp thread) about how we might have
configured trust anchors.

I'm mostly only going to talk about requirements.

* the elephant in the room

The entire normal scheme isn't sound.  The mozilla root set has a huge
number of CAs, and there are a lot of auditing guidelines.  But "not
controlled or coercible by a government the verifier isn't comfortable
with" (which would exclude various CAs for various verifiers) isn't one
of them.

I don't think we have to really address this, but it's important to keep
it in mind because sometimes people seem to think this is totally
straightforward and that anyone who doesn't want to just install the
mozilla set doesn't understand.

* Users should be able to choose how their system is configured.

This means any of:
  - add a non-default trust anchor (e.g. US people might add the US
    government, anyone might add a particular self-signed cert, or a
    private CA)
  - remove a default trust anchor (e.g. foreign-controlled CAs,
      depending on where you are and which governments you don't like)
  - choose not to validate

and these choices should persist across upgrades.

* Defaults should be sane

This means:

  Any trust anchors configured by default should be widely viewed as
  appropriate for being in the default trust anchor set.  I am only
  aware of the mozilla set as having this standing.

  The NetBSD Foundation is not in the business of deciding if a CA
  belongs in or out.  This is a similar concept to license approval in
  pkgsrc, that defers to FSF, OSI, and Debian.

* trust anchor set update mechanism

CAs could get kicked out of the default set at any time, and this needs
to be pushed, separate from a system upgrade.   The update needs to be
delivered securely, which probably means signed by TNF.

The update of course has to not re-add CAs that the user removed, and
not blow away ones the user added.

* old systems and update paths

If someone unpacks new userland and doesn't fully merge etc it would be
nice not to break things.

I think the /etc/openssl/VALIDATE to turn on validation solves this.

* proposal

So, I think this leads to:

  rule is that NetBSD installs the mozilla set by default and when
  that's done, it set /etc/openssl/VALIDATE.

  verifiers use the system configured set if VALIDATE exists

  there's some fetch/update that happens to get new versions

  there is some way that there is a config file of certs in mozilla not
  to use, and some way to put certs that one wants as trust anchors, and
  this is respected by the update process

Attachment: signature.asc
Description: PGP signature



Home | Main Index | Thread Index | Old Index