Background

CAcert uses roots as described at Structure of Roots and many other places. Because the existing roots have been deemed to be Audit Fail here, we have to create new ones.

Authority

The Board authorises creation of roots and subroots from time to time. The procedures are authorised under DRAFT Security Policy and are indexed into the Security Manual. Also see the wip DRAFT.

Work List / wip Procedures

We need a collection of procedures and guidelines for each stage:

  1. technical organisation of roots:
  2. ceremony for creation of root (s)
  3. storage securely on signing server
  4. escrow root securely for disaster recovery
  5. finally, when all is good, start the rollout procedure

Note that as we decide on the way to do this, the process should be aligned with DRAFT Security Policy and the wip Security Manual. These pages are the works-in-progress procedures and guidelines of the New Roots Task Force, and include any procedures authorised in SP/SM.

Proposals

Root cert chain testing

Please have a look on Roots/TestNewRootCerts to help testing the new model of root certificates.

Teams

Root Key Task Force is CAcert Sub-Committee installed by board motion m20081008.1 see Board decision list 2008. Task Force has the following members: Guillaume Rogmany, Teus Hagen and advisor (Philipp Gühring). Audit is observer (Ian Grigg).

The following teams:

Root Key Task Force

software configuration and scripting

Guillaume Rogmany

in charge

Teus Hagen

assists

Security Evaluation

Philipp Gühring

remote

Critical Systems

system admin

Wytze van der Raay

in charge

Mendel Mobach

assists

Oophaga

servers and physical security

Rudi Engelbertink

in charge

Rudi van Drunen

Hans Verbeek

Auditor

Ian Grigg

observes

Press & PR

press contacts and news

Maurice Kellenaers

in charge

Henrik Heigl

Planning

Timeline

TO DO

Before activating the signing with the two new Sub-Root keys the new keys will be tested by Philipp Gühring and others. The signed certificates will be tested for acceptance by different browsers (Mozilla, Internet Explorer, Opera, Safari, etc.) and key managers.

When policies have been accepted for the key signing (CPS) the new Sub-Root keys can be applied for signing.

Only the Sub-Root keys generated on this Key Generation event will then be used for the audit completion and if the audit is successful will be subjected for CA Root Key inclusion.


CategoryAudit