Intro
In the project to project to create new roots for CAcert we need some form of ceremony for creation of the root.
Creating a new root is a big deal; it should be quite visible and involve many people. There is no way that this will work by simply telling someone to go off and do it. We need to generate a visible and clear signal that the process involved a lot of people, and all of those people would have to stuff up big time for it to have been bad.
Security Manual / Policy
See the SM and Security Policy for binding controls.
Other Dcumentation
Roots/TechScript has technical things.
A Ceremony for Creation
Here is some ideas for a generic root (either a top level one or a signed/low level one). It should be noted that this script was not followed in recent creation of root.
Preparations
- The Board
- prepare the decision by board instructing the creation of the root.
- choice of top level root or subroot dictates how many people N is, see below
prepare the Roots/Contents as far as possible
- designate the 1 or 2 Board members to be in attendance (part of N)
- these 1,2 members should be given full authority to act for the Board on the day so as to not slow down late changes
- designate the team leader
- experienced in technical and governance issues
- probably one of N
- prepare the decision by board instructing the creation of the root.
- Team Leader
- designate the system administrators (part of N, to total N with addition of Board member(s))
assist Board to finish off the Roots/Contents
- advise board and sysadm of final contents
- this is a negotiation with board; not a formal approval process
- there is no need to wait for "approval" as changes can be negotiated on the day with Board members
- Board retains authority to burn the entire root any time....
- designate the precise OS + OpenSSL distros needed
- advise all of N of the precise version and software so that they can create their CDs.
e.g., Knoppix, or as approved by SecurityManual
- prepare the hardware components needed
- ensure that the hardware used has the support of the OS chosen.
- designate the sneakerware transmission medium
- no wired or wireless networks permitted
- E.g, USB memory sticks.
- designate the escrow media (e.g., another N USB memory sticks)
- purchase N+x sets USB memory sticks
- x== extras for reliability
- with one other person to ensure no sneaky units
- from ordinary retail store, randomly chosen, not online
consider evil devices
- bring tools and power
- UPS would be useful
- designate documentation method
- video camera to record the progress
- photo camera
- Each attendee:
- prepare a random source generator
- bring own laptop for reading distro CDs.
The Ceremony
- N people meet at offline location with:
- offline location must be acceptable to all (not a pre-planned location)
- each brings a source of random numbers
- each brings CD download of approved OS + OpenSSL
- each with one part to build one machine?
- handful of small usb memsticks for escrow?
- documentation tools.
- each brings own laptop
- each of N confirms:
- the CD installs as being the same thing (using own laptops to sha1 them)
- all network access is down/off
- electronic devices are unpowered
- each machine component is simple, basic, clean
- the machine to create the root is created:
- build one-off machine from basic, isolated parts
- drives may be pre-used-CAcert as long as approved clean/destruction method followed
- all to inspect, approve and choose the parts
- leave out all networking hardware and software except that essential for sneakerware (e.g., USB)
- installed from scratch CD
- build one-off machine from basic, isolated parts
- generate the random feed
- inspect and approve random mixing code/method
- each of N provides a random block e.g., by using their laptop and putting their block onto the USB memory stick (note that each random block must be committed by the provider, before any visibility over any of the random blocks by any provider, in order to defeat an injection attack).
- all random blocks mixed into OpenSSL's random generator
- root is generated.
- create certificate: either of
- 1) for low-level root
- conduct de-escrow ceremony with top-level root,
- sign new root with top-level root,
- securely destroy copy of top-level root,
- self-sign the new top-level root
- 1) for low-level root
- generate the escrow copies of the root
method is according to Roots/EscrowAndRecovery
- encrypt to escrow list (board, sysadms, backups, etc)
- store escrow copies on memsticks?
- store passwords on paper?
- both into separate safe places, each member
- clean the hardware
scrub the memories (of machine and USB sticks) according to SecurityManual.
- destroy any key parts: disks, memory, bios, etc
- install new root
- travel in group form to machine location
- sysadm grants access to each escrow member
- escrow member copies in part
method is according to Roots/EscrowAndRecovery
- sysadm combines and prepares and secures.
- each submits signed/attested paper documentation
- "I supervised each step."
- "To best knowledge, each step followed faithfully."
- "My supplied parts and randoms were clean."
- "Result is a good root."
- "Root was securely installed on signing machine."
- followup:
- attestations collected, scanned, uploaded
- other documentation collected and cut for posterity (e.g., video, photos)
follow the process at Roots/RolloutProcedure
Assumptions for type of root
The process has to be done at least twice, once for the top-level root, and once each for the subroots.
issue |
top level root |
subroot or intermediate |
|
N |
5 |
3 |
for any root, 3 is minimum |
board |
2 |
1 |
always need one board member to oversee and report |
sysadm |
2 |
1 |
always need at least one sysadm to drive the software |
others |
1 |
1 |
could be additional independent observer, such as a senior Assurer, or another Board or sysadm |
There is no issue if there are more people than required. The above numbers are minimums.
Random Notes:
To figure out:
Roots/Structure says a top-level root needs to sign subroot.
- The entire ceremony could be taped for prosperity and used during the post-audit ceremonies.
- This would be good for openness and transparency and for those of us who can't/won't be there; usually this ritual is carried out behind closed doors.
- However: neither video nor presence of auditor are audit requirements, notwithstanding comments made in EV Guidelines.
- Why use hard-disks in those machines at all?
- Would be smart not to, easier to destroy memory sticks.
- one answer: if the machine generates its own randomness it might need access to rotating entropy generation. But this is a bad idea anyway, IMO the machine should not be relied upon to generate its own random source.
Why procurement of the parts cannot take the ordinary methods and must be paranoid: Der Spiegel writes:
Take, for example, when they intercept shipping deliveries. If a target person, agency or company orders a new computer or related accessories, for example, TAO can divert the shipping delivery to its own secret workshops. The NSA calls this method interdiction. At these so-called "load stations," agents carefully open the package in order to load malware onto the electronics, or even install hardware components that can provide backdoor access for the intelligence agencies. All subsequent steps can then be conducted from the comfort of a remote computer.
These minor disruptions in the parcel shipping business rank among the "most productive operations" conducted by the NSA hackers, one top secret document relates in enthusiastic terms. This method, the presentation continues, allows TAO to obtain access to networks "around the world."