CAcert Security Manual Version 0.1 ====================== 1. Authorisation for Accessing Computer Equipment Only Trust-Checked personell is allowed to physically access CAcert´s computer equipment All accesses are logged in realtime, the core-team is informed about all changes 2. Authorising System Changes See configuration change management documetnation 3. Access restrictions 4. Protection against theft and unauthorized access 5. Emergency handling 6. Catastrophy recovery 6.1 Lost Root Key How do we find out? Plausibly, we find it on the Filesharing networks, ... 1. How can we detect a publication of the private key as soon as possible? Run regular searches for the Hashsum of the file Implement a Network-Intrusion detection, and add a filter, that can detect the transmission of the private key on the wire What steps do we take? What will we do when the key compromise is discovered? Inform all Browser/Software vendors, to immediately revoke the key Revoke the root certificate in the CRL and via OCSP Issue a press release Inform all the users Trace-back the leak Generate a new key and certificate Ship the new certificate to the vendors Questions to consider How does a relying party check whether a certificate has been issued by the key after it was compromised, or before? Does the relying party have to turn on CRL checking or OCSP? What happens if they have no control over these features? Embedded software or embedded certs? Does a revocation over a root work? Which software correctly handles this? Is there a way to prepare a revocation in advance? A warm replacement root? Or is this a likely source of insecurity in and of itself? What should be done if it is only suspected that the key is compromised? Who decides to initiate the root compromise procedure? Should members re-sign all their certificates with the new root? In the event of dispute resolution, does a user who has been tricked by a compromised key-signed cert have a better claim? Worse claim? 7. Legal requirements Privacy Law in Australia: http://www.efa.org.au/Issues/Privacy/ Encryption Law in Australia: http://www.efa.org.au/Issues/Crypto/cryptfaq.html