Team Reports 2012

Team Leaders are encouraged to present a report for their team.


Policy Group's Year of Conquest!

Policy Group didn't passed as much as discussed in 2011-2012

Topics of discussions in Policy Group

2011 2nd half

2012 1st half

Policy Decisions

Despite the fact Policy Group has discussed many aspects only one topic moved into a change of an existing policy

Significant Events

Future Work - Stuff we'll predict we'll do next year

None of the Future Work proposed in 2011 has been picked up, so still open

By lack of a Policy Officer role (currently held by board) nobody seems to be responsible for coordination of Policys management (check policy states, reminder for voting from DRAFT to POLICY, WIP to DRAFT) and to manage a Policy repository migration plan.

Ulrich Schroeter


Audit Team Report 2012

Big-Masterplan-To-become-Audit-Ready-2010-10 From the 2011 team report the (co)-audit plans continued by following the masterplan as published in October 2010. But in 2011 second half, a couple of disturbing messages received us, that the commercial CAs and Browser vendors are working on a new audit criteria document: Baseline Requirements (BR). The Baseline Requirements Draft 5.0 becomes published in November 2011. This document signals a *significant impact* to CAcert and therefor CAcert's path to an Audit.

The quick summary: One side-effect of BR is that there are now multiple audits to pass to become a top-tier CA. Depending on how they are counted, CAcert can now expect to have to deal with 3 different audit processes: BR, WebTrust and EV.

Audit team, Ian Read also Boards Strategy

For the co-audit team and other teams working on the Big Masterplan to become Audit Ready continued their work, as they'll work for an internal audit. To work on procedures and process following existing policy and deploying not yet existing procedures.

The projects in detail:

Policies

CPS did undergo an update that was caused by a software bug and moved forward to Policy Group to be decided by Policy Group. The p20111113 CPS #7.1.2 "Certificate Extensions" adjustments motion CARRIED on 2011-11-28.

The list of Policies awaiting a decision to move from DRAFT to POLICY (expecting a one year hold time after voted to DRAFT)

and a long list of OAP subpolicies

One of the causes of Audit stop in mid of 2009 that was adressed as "Because of the long time it takes for getting policies accepted in the far-flung CAcert Community and CAcert Board" didn't make succeess in 2011/2012 too. Despite the fact a couple of topics were presented before the Policy Group, only one gets picked up and has been passed.

Software-Assessment

Software-Assessment passed a couple of patches according to their deployed procedures. One patch that passed end of November 2011 gots the attention from the Community. This was the "New Points Calculation" patch (as an interim patch for the planned audit related Tverify Assurance Points to expire patch). This update has been announced with a prepared scripted mailing, that can be also seen as a pilot for the CCA-Rollout project that relates to the DRC requirement, to notify each member about the CAcert Community Agreement (CCA) and requests acceptance by the member.

So other audit related software patches are still in the working queue that didn't finished until end of reporting period:

ATE / Co-Audit

Audit team, Uli Caused by the Software-Assessment project mailing "Changes at CAcert: New Points Counting" that includes the "Tverify points to expire (removal of Tverify assurance points)" topic and the "New Points Calculation" topic, CAcert received responses from the Community, that results in a couple of requests for an ATE from UK, US, Sweden. So at the end one ATE in the UK, and 4 ATEs in Germany did happen. The running machine to collect co-audit results is currently unavailable. So currently publishing of co-audited assurances results is impossible.

Infrastructure separation

In the meanwhile the infrastructure team worked on an interim plan to move all infrastructure servers from the critical system out to another machine within BIT, Ede. Plans to move the non-critical infrastructure out of BIT, Ede to another hosting center has been set on hold as current state has fixed one audit wish to separate the non-critical systems from the critical systems.

New Software / BirdShack

Currently there are no news about this project.

CCA Rollout

The preparation to get a CCA-Rollout passed has been handled by the Software-Assessment project team with the pilot mass mailing to the members. There are other preparations that requires further software development, so the CCA-Rollout can pass. Current state: not yet finished, but one step forward.

New Roots & Escrow

This project has been deferred to a completed risk management analysis. A CAcertRootKeySRA-DRAFT-0.91 DRAFT document has been written. No further work done yet. Current state: project stalls

Audit over RA, Audit over CA

Since the Baseline Requirements Draft 5.0 has been published, plans for an Audit in general stalls. Within the co-audit team the plan is to continue with the "internal audit" but the general audit plans were set on hold. The co-audit over assurance team continued their work with the ATE series and co-audits according to the plans deployed back in 2009 and 2010. But without a strategy plan for an internal audit this work decreased in priority.

CrowdIt

This project did not get any attention from within the Community. The main reason here: the audit plans have stopped. So there is currently no need to continue with this project, to transfer practicle results into an audit documentation. This may change in the future, once an internal audit will be pushed.

What has happened to audit in the interim?

The intro of this report is focused on the Baseline Requirements Draft 5.0 and the *impact to CAcert*. The result of thinking was in summary:

and did find their final statement in the Boards Strategy statement.

Prospective View

There are two possible ways to go:

  1. move audit plans to an internal audit only
  2. rethink the Baseline Requirements and go in distance to them
    • cause: DRC has been adopted for a Community based CA. It includes several variations of audit requirements that aren't applicable to a Commercial CA and vss. So Baseline Requirements cannot cover a Community based CA requirements.
    • The main reason here: Commercial CAs are closed organisations. The Community CA is a CA of another type, that predicts Openess and Transparency, so thats why the Community based CA receives more and more acceptance in the world of CAs by their consumers and probably by security experts. This has to become subject to an open discussion in the upcoming months.

Ian Grigg, UlrichSchroeter


Infrastructure Team Report 2012

Non-critical Infrastructure team, Mario The remaining non-critical infrastructure systems were moved from Sun2 to the new LXC based infrastructure host Infra01 by Mario with assistance from their administrators.

The update status of the infrastructure systems is not in the shape Mario and I would like to have it in. Some systems are still running Debian Lenny (which is without security support since February 2012), others are running the even older Debian Etch release (without security support since January 2010). There are some positive examples though, that are well maintained and running the latest security patched Debian Squeeze release: Infra01, Bugs, Issue, Monitor, Svn, Translations. The two systems intended to replace the current mail infrastructure in future, Ldap and Mail, are already using the next planned Debian release Wheezy, which is in deep freeze now.

Non-critical Infrastructure team, Jan We (Mario and I) urge all admins of the outdated systems to upgrade their software or to ask for help. It is important to know that Debian only supports apt-get dist-upgrade from one release to the next, so the oldest systems have to go from Etch to Lenny to Squeeze and later to Wheezy if the security support for Squeeze ends. The upgrades should be easy in most cases, because only a tiny amount of services is running on each of the systems. If help is required, you can ask at cacert-sysadm@lists.cacert.org or ask me directly via mail or IRC.

The infrastructure team is lacking a clear list of tasks for existing and new team members and unfortunatelly we have no good guidelines describing the responsibilities of system administrators. Some new system administrators were recruited. However, it seems that they do not get on track, since no handover of previously orphaned systems was possible and they seem to hesitate with required bigger changes in order to not break currently running systems.

In my role as svn.cacert.org administrator I started an analysis of the existing accounts for the Subversion repository. Some of the account names (and their passwords) are older than my access to the system (before mid 2009) and I can not trace them back to their owners. I would like to disable all accounts that I do not know and that had no commit activity in the Subversion repository for more than two years.

jandd


Arbitration Team Report 2011-2012

The year in Arbitration

Arbitration Team Meetings

Arbitration team meetings did not happen in the reporting period.

The Team

Arbitration team, Lambert From the 12-13 listed Arbitrators only 1-2 worked continously along the reporting period and counts as active arbitrators. We had continously about 5-8 arbitrators marked busy in this period and continously 5 inactive ones who shows no sign of activity nor any other presence to arbitration. A red flag has raised first documented under Overview Projects Board in May 2011 that arbitration team is in a mess and also continously announced to the board that find its way into the Board Action Items plan, first picked up by Board around September/October 2012 (after this report period)

Precedent Cases

Within the reporting period two new finished Precedent cases has been ruled that effects

  1. Account removal, Delete Account cases
  2. add full middlename to accounts refering to name change request cases

The first one is the first attempt to get rid of the increasing "Delete my Account" requests, that flooded arbitration queue in the past two years, that gives authority to a Support-Engineer, to process the Delete Account procedure if the member has no remaining active certificates and did not give one assurance. This precedent ruling closed 12 similar cases by time of ruling and 35 further tickets have been handled by Support following the precedent ruling. So this means, this precedent ruling prevented Arbitration to be filled with 35 addtl. "Delete my Account" cases.

Precedent Cases Overview

Decreasing Arbitration Backlog

Arbitration team, Hans The work on decreasing arbitration backlog was unsuccessful.

89 new cases within report period relates to 56 closed cases. This is (again) an increase of 33 cases.

New Arbitrators

In 2012 first half the team has been increased by 1 arbitrator. A 2nd returning arbitrator has been nominated after the reporting period.

Arbitration future prospects

The situation in Arbitration didn't changed much related to previous year Arbitration team report.

With 1-2 active arbitrators, fast processing of cases was reduced to emergency cases handling upto an intermediate ruling.

Arbitration team, Sebastian So the first change becomes possible after the reporting period finished by the arbitration team meeting scheduled by board action. In the meeting a modification to DRP was proposed to change the default arbitration process to a 2 tears level (beside the appeal process under DRP 3.4).

A DRP update proposal has been suggested, needs to be written and proposed to Policy Group

Beside this, the search for experienced assurers who can actively increase the active team is still running.

Arbitration Statistics

Statistics by Year (FY)

Statistics period July 2011 - June 2012

Long term statistics 2008 - 2012

UlrichSchroeter


Software-Assessment-Project Team Report 2011-2012

Software-Assessment team, Michael Back by end of 2009 the team started working. The team consists of team members from several areas (dependent on current running special projects), so not only from area Software-Assessment, but also Support-Engineers, Arbitrators, Board-members, Critical team members, Software-developers, Software-testers, PR team members.

The team has weekly Tuesdays telco meetings via a telco server that is provided from the Community member Kees van Eeten from the Netherlands. The meetings will be minuted under the project wiki page Software/Assessment

The priority of projects given by the team:

  1. "Thawte points removal patch" aka "New points calculation"
  2. Critical system fixes
  3. Support and Organisation-Assurance area fixes
  4. Policy requirements fixes
  5. CCA-rollout

The patch processing has been installed in parallele processing way, so emergency patches can be passed beside long running tests patches.

The year in Software-Assessment-Project Team

Emergency Patches Procedure

Software-Assessment team, Dirk An Emergency Patches procedure has been proposed and documented under Emergency Patches.

The teams Software-Assessment and Critical team worked and discussed and voted on the proposal.

Thus we have 3 emergency patch strategies in the following order of escalation:

  1. Emergency patches fast path thru the regular software development update cycle (preferred choice)
  2. Critical sysadmin applies a patch to the critical system given by a Software-Assessor
  3. Critical sysadmin gives remote access to a software-assessor or software-engineer with critical admin control

For further details read above linked document.

Thawte Patch, New Points Calculation

The "Thawte" patch (read detailed report from last year) moved forward with the step 1 patch: "New points calculation". So all efforts were made to also start an "all-members notification" by a variation of the known scripted mailing for events procedure (Arbitration case a20090525.1). This "all-members notification" mass mailing to all members can be seen as the pilot to the audit project CCA-Rollout.

The bug #827 patch named "Tverify points to be deprecated" has been installed on 2011-11-16. Other names the patch has circulated: "New points calculation page" -or- "15.php patch"

The mass mailing (notification) to all members (regarding new points calculation) started 2011-11-27 and tooks about 2-3 days to complete (!)

Teams involved and decisions
  1. Software-Assessment project team
    • to prepare the framework that patch can be applied, members to notify
  2. Software-Assessment team
  3. Software Test team
  4. Critical sysadmin team
    • to install the bug #827 patch to the critical system

  5. Arbitration
    • (in development period of the patch) Arbitration case a20100822.1 to evaluate special criterias that needs to be catched for the New points calculation patch

    • (in development period of the patch) 2nd Arbitration case a20101114.1 to evaluate special criterias that needs to be catched for the New points calculation patch

    • ruling a20100309.1 with instructions to start a mass mailing and further authorizations required

    • running/open cases following notifications to all members:
      1. a20111001.1 "Dispute misssing points after applying bug fix 827"

      2. a20111019.1 "Missing points after applying bug fix 827"

      3. a20111129.5 "Dispute - discrimination and victimisation"

  6. Board
  7. Public Relations team
  8. Support team
    • briefing of Support team and potential members questions regarding new points calculation

Summary:

Webdb database upgrade

Software-Assessment team, Markus Another project that has been started under bug #976 "database restructure preparation" one can read as another precedure deployment how a database structure update can be passed to the production system.

The reason to have such a procedure at hand are feature requests that requires an update to the database structure on the critical system that falls under SP.

With the patch bug #976 installed on 2011-11-25 the Software-Assessment team enters another milestone for auditable procedures under SP

Teams involved and decisions
  1. Software-Assessment project team
    • to prepare the framework that patch can be applied
  2. Software-Assessment team
  3. Software Test team
  4. Critical sysadmin team
    • to install the bug #976 patch to the critical system by following the procedures deployed by the Software-Assessment team

Summary:

Translation replaces Translingo

Teams involved and decisions
  1. Non-critical Infrastructure team
    • deploy a new virtual machine
  2. Software-Assessment project team
    • to prepare the framework that patch can be applied
  3. Software-Assessment team
    • to pass bug #985 "Move from translingo to pootle"

  4. Software Test team
  5. Critical sysadmin team
    • to install the bug #985 patch to the critical system by following the procedures deployed by the Software-Assessment team (update procedures)

Summary:

Permissions Review project

Software-Assessment team, Martin

Teams involved and decisions
  1. Software-Assessment project team
    • to prepare the framework that patch can be applied
  2. Software-Assessment team
  3. Software Test team
  4. Critical sysadmin team
    • to install the bug #1003 patch to the critical system

  5. Arbitration
    • Arbitration case handled and intermediate ruled a20110118.1

  6. Support (2011-01-18)
    • 1st dispute filing a20110118.1: List of Admins (Support-Engineers) in the database

  7. Board (2011-12-28)
  8. Organisation Assurance (2012-03-26)
    • 2nd dispute filing, case merged a20110118.1: identify all organisation administrators that are not CAcert assurer

Summary:

Further projects

The Software-Assessors team

Team Development

In 2010/2011 the team got 2 new Software-Assessors with the hope, to increase the count of active Software-Assessors. But in 2011/2012 the count of active Software-Assessors stalls at 1.5 For passing successfuly any software bug fix to the Critical team 2 Software-Assessors are required to review the patches. This burdened the team and the search for addtl. active Software-Assessors still continued (made success in the post-reporting period with Benny Baumann by Board motion m20121017.3)

Michael Taenzer, who moved from Support t/l to Software-Assessment one year ago becomes more and more the team leader. So the Software-Assessment project team proposed Michael to become the Software-Assessment team teamleader as the seat was vacant since spring 2010 (fallback Board).

The nomination of Michael Taenzer has been accepted by Board with the motion m20120623.1 at committee meeting 2012-05-23

The Software-Testteam

The Software testers team is a loose team of individuals who assist in software testing dependent on patches, difficulty of patches, knowledge, and time. eg. for the iOS5 bug, we had other software testers then for the Thawte Points Removal patch. So this makes it difficult to build up a working software testers team.

In the past often we had the problem, that one did some testing and disappeared thereafter 'cause the next patch to test did come weeks later. To restart the Software Testers Reward Challenge 2011 we did run around eastern 2011 results, that we did not got one more software tester into the team. So we are still at the same point here.

Prospective view is, that the team may increase one day, we've found some more Software developers and patches gets passed faster.

Software Developers

In the last 3 years software developers were recruited from the Software-Assessment project team. Now with the fixed bottleneck on active Software-Assessors we now search for Software developers who are able to code in PHP.

Statistics

07/2011 - 06/2012

07/2012 - today

Software-Assessment stats 2011-2012

Benny Baumann, Martin Gummi, Marcus Maengel, Ulrich Schroeter


Critical System Administrator Team Report July 2011 - June 2012

Hardware changes

Critical team, Wytze No major changes were made to the hardware infrastructure for the CAcert servers in the past reporting period. A couple of failing components had to be replaced though: a broken disk on the infrastructure server, a broken disk on the signing server, and two Linksys switches (which were replaced by a single Cisco switch).

On-site activity

The log of visits to the hosting facility shows the following "on site" activities:

Critical team, Mendel The total number of visits (9) was considerably larger again than in the previous year (5), and 5 of these 9 visits could be labelled emergency visits, correlating closely with a number of hardware problems.

Unfortunately, after the visit of 22.06.2012, a piece of paper containing a subset of the critical secrets kept by CAcert critical system admins has been left unattened in the server room for a couple of days. This made it necessary to change all the affected passwords and encryption keys, which was done on 26.06.2012. Our subsequent investigation has revealed that no actual compromise has occurred due to this incident. Howver, the final word about this is still under arbitration (case http://wiki.cacert.org/Arbitrations/a20120626.1 ).

Off-site activity

All other (i.e. most!) system administration work has been performed remotely. Issues directly affecting the operation of the webdb server continue to be logged to the cacert-systemlog@lists.cacert.org mailing list (archived at https://lists.cacert.org/wws/arc/cacert-systemlog ) with headings like "configuration change webdb server", "security upgrades webdb server" or "cvs.cacert.org checkin notification". This logging is also used for changes to all other services like DNS, OCSP etc. under critical-admin management.

Webdb server

The software upgrade of the webdb server from the no longer supported Debian "Etch" release to the Debian "Lenny" (oldstable) was completed by propagating the upgrade to the chroot environment in which the web server runs. Other maintenance work on the webdb server during the reporting period involved:

thus making a total of 102 critical admin interventions for this server.

DNS service

The DNS service has been continued in the same configuration as the previous year. Maintenance activities for this server boiled down to:

thus making a total of 30 critical admin interventions for this server.

OCSP and CRL service

The OCSP service and CRL services have also been continued in the same configuration as the previous year. Maintenance activities for these services boiled down to:

thus making a total of 13 critical admin interventions for this server.

A plan to improve the availability of the OCSP service by replicating it on a (virtual) server provided by HCC/Hobbynet was killed unfortunately due to incompatibility of our security requirements.

Backup service

The boxbackup server has also been continued unchanged, with maintenance activities limited to installing a number of OS updates:

thus making a total of 7 critical admin interventions for this server.

Infrastructure support

The migration of all (non-critical) infrastructure services to infra01 (formerly known as sun1) as the new infrastructure server was finally completed in March/April 2012 thanks to some tremendous efforts of Mario Lipinski. The critical admin team supported this operation, and has ensured that the new infrastructure server is now able to reliably access its external USB backup drive. The old infrastructure server (sun2) is now available for use as a critical server, and preparation for its use as the new webdb server has been started.

Software Assessment Team support

We continued to support the Software Assessment Team by maintaining a test server (on a virtual machine) which looks as closely as possible to the production webdb server. A second similar test server is also maintained for special critical system tests and preparation of major software upgrades.

The patch process developed by the Software Assessment Team has resulted in a large number of successful patch updates to the production server (60 during the past year!).

Events team support

Feom time to time the events team wants to inform CAcert members about important events like Assurer Training Events and the like. These mailings are performed by adding a custom script to the webdb server and running it against the current database. Based on arbitration http://wiki.cacert.org/Arbitrations/a20090525.1, such scripts are prepared by the events team and handed over to the critical admin team for installation and execution. 11 cases were handled in the past year.

Team changes

After losing Stefan Kooman as member of the critical sysadmin team last year, we have been looking for a replacement. We were lucky to find Martin Simons as a suitable candidate in March 2012, but unfortunately, the ABC required in the enrollment process has taken a long time to complete. It completed finally on November 1, 2012 (well beyond the end of the reporting period), but at least we know now that we'll have a 3-person team again.

Plans

Plans for the coming year include:

Wytze van der Raay, Mendel Mobach


Education Team Report

Management of CATS and the Assurer Challenge

Education team, Ted During the last year the french User Interface translation has been finished and reviewed and should be installed until the AGM. Dutch is almost ready to deploy Spanish translation has been finished but still needs a review.

Translation of the tests made less progress. Only the french Org Assurer Test is ready to review, no significant progress on the other languages.

The Org Assurer Test has been initiated as a new test, but still is not ready to deploy.

The CATS system has turned out quite stable during the last year. There's one minor bug still reported in the bugtracker, though there are lots of extension requests (mostly by myself).

The development system for CATS has been moved from the old location at cacert.at to https://cats1.it-sls.de/.

During 2011 (numbers only available per calendar year), 114 PDF certificates and 19 printed certificates for passed Assurer Challenges have been issued.

Since the beginning of 2012 it is not possible any more to find out if an account has already 100 Assurance Points by using the standard "Assure Someone" interface, so the process of creating a certificate has become a bit more complicated. Support has to be asked to confirm that 100 Assurance Points have already been reached for an account.

Some statistics for the time July 2011 to June 2012:

Supporting ATEs

No requests to support ATEs have been received during the last year. :-(

Prospects for the next year

The same as last year:

BernhardFröhlich


Events Team Report 2011-2012

Assurance and Training Events Statistics

2011

2010

Assurance Events by Countries

Events scripted mailing

Events team, Walter With the Arbitration precedents case a20090525.1 "Event officer request recurrent notification to assurers near the location of the following ATEs" a scripted maiiling procedure has been implemented back in spring 2009 that assists Event Organizers to contact Assurers near their location. This scripted mailing has been used several times:

for event organizing or for event announcement.

A total of 7 mailings with 8437 recipients (approx 1205 recipients per mailing) within the last period.

The overall result was a success as Event Organizers found assistance by Assurers or people comes to the Events.

UlrichSchroeter


ATE / co-Audit Team Report 2011-2012

Two events did effect the ATE and Co-Audit team.

  1. The mass mailing notification script to all our members about "Changes at CAcert: New Points Counting" and "Tverify points to be deprecated"
  2. The Baseline Requirements Draft 5.0 that signals a *significant impact* to CAcert and therefor CAcert's path to an Audit.

Co-auditor team, Jochim The first results in a couple of requests for an ATE from United Kingdom, United States of America, Sweden and Australia. So at the end one ATE in the UK, and 4 ATEs in Germany did happen. The ATE in Australia at linux.conf.au ballarat has been downgraded to a regular assurance event with some ATE slides with a view to find new AU CAcert Inc members.

The 2nd slowed down the activities in ATE and Co-Audit area. ATE's requested where it was easily to arrange and man with co-auditors did happen.

The running machine to collect co-audit results is currently unavailable. Co-audited assurances results are backed up.

Prospective View

Moving forward depends on a new vision, that CAcert will move forward with an internal audit or other decisions. Also some work is required to do to bring the Co-audit results machine back online. So here the question goes to sysadmins of non-critical infrastructure to assist in this area.

To form a new vision and get it finalized is a common task to all community members.

UlrichSchroeter


PR Team Report 2011-2012

PR team, Alexander B We have had the following bigger articles in the german freeX (IT professional) magazine:

2012-03 We have created a press release for the Organisation Assurance of a regional branch of the german Pirate Party.

Not directly connected to Public Relations, yet performed mostly by Head of PR team between last quarter 2011 and mid-of-second quarter 2012:

The care for events has been so big that it is not advisable to do it in the same depth in the future. Also it is not the main focus of a "PR" team. Instead more time could be invested to initiate connections to other people and organizations. This was started in the desired way in October 2012 at T-Dose 2012 in the Netherlands.

For many events we have written quite a number of blog posts on blog.cacert.org, as well as on XING, LinkedIn and on our new site on Google+ which is followed by quite some people now. Several events, and especially ATEs were also announced on our Twitter account CAcert_ATE. Someone else holds a Twitter account named CAcert. We would still need to figure out who is he and hopefully to gain control over this account, too.

There are also external blogs who are willing to spread informations on some CAcert news. We have found supporters who are willing to translate our news to british, spanish and italian. Still, these connections have to be made stronger and stable, and we are still looking for further supporters who are willing to translate our news into their native languages. For 2013, we're also looking on how to celebrate CAcert's 10 years' market presence.

Alexander Bahlo


Assurance Team Report 2011-2012

Event Reports and Audit over Assurance

Assurance team, Uli Our last Auditor instructs Events and Assurance Officer to request delivery of Events reports of each Assurance event with a statement by the Events organizer with at least two basic informations:

  1. How many Assurances were made?
  2. Were all assurances given conducted by Assurance Policy?

The instructions given by the last Auditor back in 2009 relates to Audit and Co-audit. Without delivered event reports the audit over assurance becomes difficult and expensive. The last auditor prepared the framework to cover the Audit over Assurance area. But this only works if all event organizers will send their event reports to the Events team and Assurance Officer.

The statistics from Events team signals a heavy decrease in delivered event reports. That is no good signal in moving forward with Audit over Assurance plans.

With a statement delivered by the Event organizers, that all assurances made were conducted following Assurance Policy, Audit area receives an evidence that Assurances given followed Policy. Without received Event reports -> no evidence, so this becomes a potential Audit fail!

Supporting ATE processes

Board continued supporting ATE processes

https://lists.cacert.org/wws/arc/cacert-board/2010-12/msg00031.html Events report ATE-Melbourne gives some hint about expenses, that are required to travel along AU.

ATE Manchester

The ATE Manchester/Crewe events report can probably seen as a precedent for expenses paid that comes outside an ATE event along Europe with traveling fees, accomodation costs and other expenses, that a potential Auditor will add to a bill (once audit plans will move forward).

Current agreement is, that both Board and the Community have to pay ATE expenses to move forward with the internal audit. So Board support is a partly support. This to keep in mind for future plans to drive an ATE within Europe.

Regional Supporters

Another option is that a local or regional supporter who supports CAcert ATEs in their country like Secure-U did for ATE-Munich (2011-04-02)

But also here, support by the local Community is required. eg. the local Community in a country spends money to the local incorporation and the local incorporation can support CAcert projects.

For the Netherlands, the local supporter is Oophaga. In Austria its Sonance and in Germany its Secure-U

Baseline Requirements Draft 50 - CABforum (BR)

In autumn 2011 the Assurance team discussed the Audit state, that

In November 2011 then, the Baseline Requirements Draft 50 of CABforum (BR) has been published.

So pride did come close before fall.

In policy group much discussions started. Within the co-audit team the vision of an internal audit did survive. So also in 2012 ATE's did happen. But this also shows, that a public visible vision is needed to move forward either way.

Tverify points to depricate project

The Tverify points to depricate project that started back in 2009 with two board motions, has been picked up by the Software-Assessment project team based on ideas by dirk of a new points counting schema (more in next section).

The project moved forward, so by end of 2011, an announcement has been made to the Community that the day of Tverify points removal comes closer.

For Assurance area the Tverify program has been stopped by end of 2009 but the Tverify Assurance points still counts. Software-Assessment now comes to ground to pass the required software-patches (after first establish a working software-update procedure to the critical system) to incorporate the changes that are needed according to policies.

The special assurance program Tverify has been stopped by audit purposes as we have no evidences over these assurances. So therefor the call to all ex-Thawte assurers has been pushed out since 2009 - bring your account in compliance with AP. So to get assured and to give assurances under AP.

Proposed New Points Counting Schema

Assurance Policy's definition is:

Back in 2009 dirk comes along with the idea, that only the last entered assurance points will count by turning the points count order.

Tverify points to depricate

As Software-Assessment makes progress, the day of the final cut of Tverify points comes closer and closer. Currently software developers and software testers prepares the software for the second step.

The first step has been made by end of 2011 by introducing the New Points counting schema. That is available though your accounts - my details - my points - new points counting page Under this page you receive a sneak preview how your points will be counted once step 2 of the project has finished. If this page lists, that you fall below a certain level (eg below 50 assurance points, below 100 assurance points, below 50 experience points, you should be warned to bring your points count up in a good working order by receiving and giving assurances.

The prospective view is, that step 2 will become active in spring or summer 2013

Scripted and Mass Mailing to Members

The Tverify points to depricate project also results in a subproject to inform our members regarding new points counting schema and also that Tverify points will expire soon.

Mass Mailings to Members

Based on the scripted mailings introduced by the Events Officer back in 2009 and precedent ruled under arbitration, the script to mass mail around 200.000 recipients has been slightly modified and the script has been executed between 2012-11-27 and 2012-11-30. So this was also a test run for the CCA rollout program still in the pipeline to process for audit reasons.

With a 3 days run, the practice has shown that it is possible to run such a mass mailing to all members through scripted mailing, but it should be prevented to a minimum of events if there is no other option possible to get all members informed.

So this also affects Assurance area, as we cannot use this path on a regular basis (eg weekly newsletters, weekly updates)

Scripted Mailing in OA area

Similar to the scripted mailing for events to inform members in a certain area about events, OA area has got their own scripted mailing procedure ruled by precedent under arbitration.

So now, OAO is able to start a process to inform Organisations about OA specific topics.

CCA Termination

One topic that also covers Assurance area are member request for CCA termination. As long no assurances has been given terminations of members do not effect the WoT. But if one member who wants to terminate has given assurances, the Assurance paperwork needs a safe storage or the members acceptance over the remaining 7 years to answer arbitration request. This means, the user is still bound to the Risks/Liabilities/Obligations of the CCA.

Procedures under Arbitration have been established, to return the CAP forms of members who wants to terminate to the Arbitrator processing the case. So WoT is secured.

So a precedent ruling under Arbitration has passed that covers all such simple cases, where members didn't gave an assurance.

Other Assurance Programs/Assurance Subpolicies

PoJAM and TTP-assisted-assurance subpolicy has passed Policy group in 2010.

PoJAM

With the Policy on Junior Assurers/Members we now have some experience for a while. It is subject of the ATE presentations, so therefor known to the active assurers who still have attended an ATE. We currently have no counts how many Assurees and Assurers falling under this rule (below 18). An Adhoc query has been started before the subpolicy passed policy group.

The result has been published 2009-12-23 in policy group mailing list.

However, Software had not been updated to reflect PoJAM cases as its required by the subpolicy.

So current practice is to add a note under the locations field

for a PoJAM case -and- a handwritten note on the CAP from:

TTP-assisted-assurance

Since all special assurance programs were frozen since at least 2009 the deployment of policies and procedures started end of 2009 and hasn't yet been finished. One of these special assurance programs is the TTP-assisted-assurance program.

The TTP-assisted-assurance subpolicy passed policy group in 2010. The TTP subpolicy defines 2 TTP assisted assurances and an addtl. TOPUP assurance. Until today, the latter hasn't been deployed and implemented in a sufficient way into the software, so it cannot be passed currently.

Discussions within the TTP deployment team, comes to the conclusion to no longer wait to get the TTP-assisted-assurance subpolicy requirements implemented into the software. This states, that TTP assurances to be defined as TTP assurances into the system and the TOPUP assurance to be defined as a TOPUP assurance in the online system. By default, current available assurance method by Polciy is limited to Face-to-Face assurance only.

To move forward with the TTP-assisted-assurance program, we've decided to reuse the old "TTP" assurance method in the online system so we can start deploying the new TTP program for the first countries USA and AU where we have some background infos about TTP's

Then a software bug with the old assurance method "TTP" blocks moving forward with the reuse of the old assurance method "TTP". This software bug should have been fixed by now, but awaits a verification by software testers with a current software revision state as our production system (testserver has also other fixes installed, that may interfere with this bugfix)

The permissions review project that has been started this year by Board disclosed the current state of the old special assurance programs flags and accounts with permissions to do so. All permission flags now have been reset.

So the next step will become to process the nominations by Board for the first 4 TTP assurers into the production system and further deployment of the TTP-assisted-assurance processes. Documentation have been made in the wiki by now under the topic TTP.

Deployment of TTP specific CAP forms moved forward but currently automatic processing is impossible caused by missing Software implementation. This is also the reason why TTP CAP forms aren't available to the public.

Overall state: work-in-progress

Nucleus

Back in 2009 an alternate to the Super-Assurers program has been introduced, named Nucleus. Until today, no one picked up these ideas to transfer it into a assurance subpolicy.

The ideas are similar to the TTP-assisted-assurance subpolicy, to add missing points between 70 and 100 to an account (TOPUP under TTP-assisted-assurance), to pass the requirements upto 100 assurance points for becoming an assurer.

With two experienced assurers who can spread the CAcert Assurance philosophy to CAcert desert areas, the Nucleus program can be a starter to build up local communities also in current CAcert desert areas.

But first requirement is a written subpolicy. This task needs to be picked up by the Community in policy group.

Legacy Policy

The Legacy Policy is a yet unwritten policy too. It shall give an answer to the question what to do with old assurance points given by old assurance programs.

With the new CABforum (baseline requirements), there is another source of requirements that needs to be answered.

So this topic is still on the ToDo list for policy group.

UlrichSchroeter


Organisation Assurance Report

Organisation-Assurance team, Marcus Statistics by 2012-06-30

Country

Total

Jul 2010 to
June 2011

Jul 2011 to
June 2012

Since
2012-06-30

AT

18

2

AU

9

Be

3

1

CA

1

CH

19

1

1

DE

134

7

17

5

DK

1

FR

7

1

GB

1

HU

5

IE

3

IN

1

IT

2

1

1

LU

3

1

NE

1

NL

22

1

PL

1

RO

1

SE

3

UK

2

1

US

30

ZA

1

Grand Total

268

12

21

7

During the last fiscal year quite a few Organisation Assurer could be trained. Alexander Bahlo and Marc-Oliver Hofmann were nominated as Orgnaisation Assurer. 4 more were nominated after the end of the fisal year.

Together with the software team a few bug fixes could be installed to improve the usability of the software for the organisation section. There is still a lot to do but we are moving in the right direction.

Marcus Mängel


Support Team

Support team, Joost In August 2011 there was a support team meeting at the FrOSCon 2011 where most team member were able to attend. We decided to move the team leadership from Micheal to Joost.

In autumn 2011 Werner could be reactivated as Support Engineer and he is doing a good job since than.

Marek was trained as new support member and he was nominated as Support Engineer in June 2012.

Over the year support was able to handle 848 tickets, for details see statistcs below. Together with Arbitration a few new precedent cases could be developed an put into place, so that not erverything needs to go to Arbitration any more. eg. name change after marriage. The statiscs shows the tickets that handle special cases inside support.

Support team, Werner Statisics of Support tickets

Topic

Number

Account delete prescedent case

59

Code signing requests

46

Name change with assurance

6

Name change with precedent case

21

New point calculation

18

Password reset with assurance

30

Passwort reset old style

65

Revoke assurance

17

Support tickets total

848

Joost Steijlen, Marcus Mängel, Werner Dworak


Support team, Dominik Support team, Wolfgang











Birdshack Team

Birdshack team, Ian Michael posted Requirements taken from his thesis, entitled “The Influence of the Architectural Style on Security, Using the Example of a Certification Authority”

Iang led a development effort starting in May of 2012 through to September 2012 to produce a basic template.

Internship

In May of 2012, student intern Marie Louise Nesfield joined us for a (northern) summer of coding. This took place in Australia under the direct supervision of Iang, with Piers Lauder and Kevin Dawson appointed as advisory and guardians of the coffee review.

Marie Louise had yet to do her first serious university-level course (which became Computing 401 at UNC-NC), so she entered at a very junior level. Iang tasked her to write classes to transfer data back and forth between client and server within the overall CRUD and REST client-server design for a new secure Certification Authority server. This Birdshack project had been started 2 years previously in Austria.

This tasking came with a couple of further quirks, being a unique unit-testing pattern developed in prior work, and a set of request/response classes that handled the CRUD pattern within a prior security framework. The set of classes was completed by Marie Louise to a major extent, and came with the self-testing inherent in the pattern, as well as test harnesses that successively entered higher and deeper into the business semantics of CRUD.

The overall tasking was quite challenging for the level of experience, and was only just completed in the last few days! The deliverable consisted of:

Type of Component

Java Classes

pure BirdShack API

AccountHolder Domain Name Rid Assurance Email Profile SDF Controller Member Resource

Resource

AbstractResource AbstractResource AssurancePointsResource AssuranceResource DomainResource EmailResource ExperiancePointsResource MemberResource NameResource ProfileResource PromiscuousResource SDFResource TestResource ResourceId

util

ResourceMap ResourceIdSet

Request/Response Model

CRUDRequest CRUDReply CreateRequest CreateReply ReadRequest ReadReply UpdateRequest UpdateReply DeleteRequest DeleteReply

Transactional support

TransRequest TransReply PromiscuousResource Promiscuous

testing

AbstractTestClient TestClient TestClient2 TestClient3 TestClient4 TestClient5 ClientTest

During the internship, additional focus was put on the curricula for Computing 401 and some additional concepts relevant to the project.

Measurands

Qty

source files:

49

hard core code lines, not comments nor { }:

4021

lines including useful comments:

5865

In addition to coding work, Marie Louise participated in other joint activities. Firstly, she co-authored a paper on the above-mentioned technique, which came to be known as the Ouroboros Pattern. Secondly, she presented that technique at BarCampMelbourne, in an impromptu 30 minutes spot. Finally, Marie Louise participated as an Assurer at BarCampMelbourne, making her third so far.

Iang


Affiliate Programme

Affiliate Program team, Marcus In December 2011 we started an affiliate programme with booking.com.

For each booking that is made over the CAcert relate link at booking.com CAcert gets part of the provision that booking.com gets from the hotels.

Until June 2012 we had 21 bookings with a total of 59.53 EUR that CAcert get. In the following quarter we got 22 bookings with 90.79 EUR fees.

The first share of 115 EUR has been paid in November.

Software-Assessment stats 2010-2011

Table: Development of bookings per country where the hotel was used

Software-Assessment stats 2010-2011

Chart: Development of bookings per month

The bookings came from Australia, Germany, Netherlands and USA.

So I hope many of the Inc and Community Member will support CAcert by using this affilate programme with booking.com.

Marcus Mängel


Board

Board member, Michael Board member, Piers













Board member, Ian Board member, Dirk












Board member, Raoul Board member, Tomas












Board member, Kevin Board member, Jeff












Board member, Werner













AGM/TeamReports/2012 (last edited 2012-11-25 22:45:08 by SunTzuTormenta)