0. Preamble

Background

CAcert uses roots as described at Structure of Roots and many other places. Because the existing roots have been deemed to be Audit Fail here, we have to create new ones that are capable of passing a future audit. Also, this project has taken on more urgency because of the deprecation of MD5 and the general weakening of the roots over time.

0.2 Authority

The Board authorises creation of roots and subroots from time to time. The procedures are authorised under DRAFT Security Policy and are indexed into the Security Manual. Also see the wip DRAFT.

1. Documentation

Documentation is described more fully in the Roots/Library.

Discussion on the project is at cacert-root maillist. You can subscribe here and read the archives.

1.1 Procedures

Each stage should be covered by a procedure. This is your primary documentation kit:

  1. technical organisation of roots: Roots/Structure and Roots/Contents.

  2. ceremony for creation of root (s) and also tech stuff.

  3. storage securely on signing server
  4. escrow root securely for disaster recovery

  5. finally, when all is good, start the rollout procedure and Roots/TestNewRootCerts.

1.2 Policies & Decisions

Roots/Library lists the deeper references: policies and decisions:

  1. The DRAFT Security Policy

  2. The wip Security Manual.

As the above procedures change and evolve, keep them aligned with SM/SP.

1.1 Unresolved Issues / Documentation Task List

These need to be addressed with written procedures:

2. Planning

Currently there is no plan on the table. In order to proceed, fill in the following:

Team

Plan

Logistics

Historical

Timeline

Most recent at top.

Teams

Team 2010

Following a long debate

building now?

Team 2008 "May Plan"

Root Key Task Force of 2008 was a CAcert Sub-Committee installed by board motion m20081008.1 see Board decision list 2008. Task Force had the following members: Guillaume Rogmany, Teus Hagen and advisor (Philipp Gühring). Audit was observer (Iang).

The following teams:

Root Key Task Force subteams

Member

Notes

software configuration and scripting

Guillaume Rogmany

in charge

Teus Hagen

assisted

Security Evaluation

Philipp Gühring

remote

Critical Systems

system admins

Wytze van der Raay

in charge

Mendel Mobach

assisted

Oophaga

servers and physical security

Rudi Engelbertink

in charge

Rudi van Drunen

Hans Verbeek

Audit

Iang

observer

Press & PR

press contacts and news

Maurice Kellenaers

in charge

Henrik Heigl


CategoryAudit