To Software Software - To Software-Assessment Software/Assessment - To previous meeting - To next meeting
Minutes of the MiniTOP on the 2012-09-25
Setting
The MiniTOP will be held via telco 22:00 CEST
Attendees: uli, benbe, timo, Marcus, Michael, dirk
Topics
(skip to agenda)
Action items from last meeting Meeting Action Items
Software/Assessment/ActionItems
all
proposed Apache config SSLCipherSuite settings for CAcert SSL enabled infrastructure systems
see also BEAST migration https://community.qualys.com/blogs/securitylabs/2011/10/17/mitigating-the-beast-attack-on-tls
Proposal from Sysadm list 2013-09-06{0}
SA
documentation server cert design concept to SystemAdministration/Systems/Development/Prepare
{0}
all
{0}
BenBE, Marcus
documentation: developer git repos under github
bug #1131 history @ github
CAcertOrg @ github
started under Software/Assessment/Documentation/UpdateCycle/step1{0}
NEO
{0}
all
read x509 guide
{0}
all
bug#1068 blog problem (also relates to community)
debian lenny - edge - squeeze upgrades needed
alternate: new server with squeeze, install wordpress, transfer domain
workaround: configure your FF FAQ/BrowserClients{g}
uli
Experience points for ATE attendance
check board motions and/or trigger if not yet passed{0}
uli
Infrastructure separation, to contact secure-u (Frank, Mario, Ted, Sebastian) for discussion, prepare a plan, started 2011-12-18
current state: see Funding Landing Page
May 2013: tk-server sponsoring, tk-server rcvd, deployment: WIP, project not yet finished{0}
All
1. next: strategy for "New Roots & Escrow" - using indirect crl's ?
indirect CRL: RFC 5280 http://tools.ietf.org/html/rfc5280 (chapter 5) - test deployment{0}
dirk, Michael
3. next: strategy for "New Roots & Escrow" - how does debian work?
to contact, deferred to next events (?)
next round: picked up by Benedikt new proposal 2013-06-02{0}
Uli, Michael
Documentation Bugs.cacert.org Review, documentation I (bugs handbook) svg files to convert to jpg or png
{0}
Development, Deployment, Discussion
OAO, Ted
bug #943 change OA admin/assurer text
needs 2nd test -> Fabian, Marc, Alex? {g} / needs 2nd review -> Ted, rejected
{-}
uli, Ted
bug #824 Org User cert fix Case study
Organisation User Certificates: Need UI improvement for proper production usage
{0}
uli, ted
bug #823 email address removal fix
No warning when removing e-mail address from account that certificates will be revoked
checked by 4, needs 2nd review, deploy
rejected{-}
inopiae
bug #920 Join - single name only (eg Indonesian)
details under bug number
{0}
uli
bug #859 admin console interface
feature request: show activity on an account in the admin interface
rejected, certs login doesn't modify "modified" field{r}
Michael
p20111113 CPS #7.1.2 "Certificate Extensions" adjustments - testing
uli, marcus: needs full cert create tests
duplicate report to bug#978
tested by 3, 2nd review done, transfered
Ken reported: still has problems, bug kept open{0}
gagern, NEO
bug #440 Problem with subjectAltName (CSR, renew certs)
There seems to be a problem with the subjectAltName. Dupes, missing entries, and more, rejected, needs further development
{r}
neo
bug #1025 Domain Dispute issue
disputes rc and rc2 var prob
needs work{r}
dirk
bug #1054 0001054: Review the code regarding the new point calculation
Thawte patch part II
needs further work{r}
Software Assessors: Review 1 / add to cacert-devel, add to testserver
Software-Assessors task
Testing
Testers task
neo
bug #1004 Stats page improvement
tested by 2, needs 2nd review
{0}
neo
Bugs #1159 it might be possible to execute commands on the signing server
{0}
inopiae
bug #1065 Wrong wording when sending mails during the assurance process
{0}
inopiae
bug #1162 calcutate (the passwords) hash in php instead of in mysql
create test scenarios for the software testers
Full testing{0}
inopiae
bug #0028 Wrong language for you've been assured & [CAcert.org] Client Certificate emails
{0}
inopiae
bug #988 TTP cap form deployment
{0}
Software Assessors: 2nd Review, Bundle Package to Critical Team
Software-Assessors task
Ted
bug #500 Get contact mail adress after resolving test
tested by 3, requires review
{0}
Ted
bug #1140 Show if a test is passed in learnprogress
tested by 3, requires review
{0}
magu
bug #1131 Rename _all_ Policies from .php to .html and fix all links
global policy directory maintenance and update
{0}
inopiae
bug #1010 Reorder the view on organisation certificates
tested by 3
{0}
Software Assessors: Bundle Package to Critical Team
Software-Assessors task
inopiae
bug #1139 Add new fields to the database
tests through #500 and #1140, 2nd review done, requires transfer
{0}
Awaiting Response from Critical Team
inopiae
bug #411 Wrong text is made into link
{g}
Agenda
1. Preface
2. DEV on bug 1023/1054 "Thawte Patch"
"Thawte points removal, final step" bug #1023
- bug #1023 Testing (6.php)
- last patch transfered to production system 2012-05-30
- what are the next steps for thawte points revoke?
- points settings codes eg 50 pts open gpg/pgp, which certs avail by how many pts
- 15.php needs rename to 10.php
next step in: bug #1054 Review the code regarding the new point calculation in ./includes/general.php (current state: testing)
- email debug notification, search for other solution
testing scenarios: see bug note c3163
- some explanations
- assure someone - f2f, ttp, the sentence "Only tick the next box if the Assurance was face to face" is conflicting, fixed
- new patches by dirk, pushed to cacert-devel, (update 2012-09-18)
- tverify removed (?)
merge conflict with account id 60 (eg email removal), see bug #823
- max_points() routine replaced by new max_points() routine
- get_assurer_status(), output_summary_content() with parameter 0 replaced by max_points()
- received_points()
3. 2nd review of about again 4 remaining patches
Software-Assessors task
- Benny pre-views done
neo
bug #978 Invalid SPKAC requests are not properly validated
recheck full certs signing procedures
duplicate report to bug#5405 {0}
- from meeting 2012-07-17:
- 5 patches reviewed
- 3 simple, bugs 540 (fixed), 789 (fixed), 981 (reviewed)
- 2 with some difficultys, 978 (related to bug#540), complexest one: 1024 (reviewed)
bug #978 bug 978 (weak keys) (bug 918)
- invalid key format, no regular error message, something wrong, error code # identified
- debugging infos from user + infos from critical team with error code #, was spkac routine
- one test done 2011-12-17 by JensK
uli, marcus: more tests: certs routine, weak keys (small keys test), relates to bug#540 tests
- (week 7)
bug#1004, stats, Marcus + Uli did some tests, one problem identified, fixed 2012-08-25 by NEO
- fully re-tested by 2: 2012-08-25 (at froscon)
bug #1091 contact assurer improvement
- 2nd review still started by dirk two times within last 3 weeks
neo
bug #1091 contact assurer improvement
tested by 2, needs 2nd review
{0} 1
neo
bug #978 Invalid SPKAC requests are not properly validated
recheck full certs signing procedures
duplicate report to bug#5405 {0}
neo
bug #1004 Stats page improvement
tested by 2, needs 2nd review
{0}
neo
bug #860 someone accessed your password and secret questions notification
tested by 2, needs 2nd review
{0}
gagern, neo
bug #440 Problem with subjectAltName
tested, needs 2nd review
{0}
4. Patches Overview - Testing
bug #835 CATS test on testserver http://cats1.it-sls.de/
- create client cert
go over to http://cats1.it-sls.de/ pass a cats test
- inform Ted to trigger a transfer of the tests to the testserver
- check if CATS test passed to testserver
- test with different accounts
- members age GT 18
member < 100 pts, pass the CATS test
member >= 100 pts, pass the CATS test
- members age GT 14 and LT 18
member < 100 pts, pass the CATS test
member >= 100 pts, pass the CATS test
- members age LT 14
member < 100 pts, pass the CATS test
member >= 100 pts, pass the CATS test
- members age GT 18
- finish and report the tests, no need to transfer to production
Problem with subjectAltName: bugs: bug #440, bug #1054, test 1054.3.6, bug #1035
create several types of certs (client certs, server certs, org client certs, org server certs) and analyse the content of the certs -> subjectAltName and CN with single SAN and multiple SANs
- renew the certs
bug #922 missing "certificate about to expire" messages
- you can use previous test to also check "certificate about to expire" messages
bug #964 and bug #1017, relates also to bug #1054, test 1054.3.6 - Chrome certificate enrollement (relates to #964 "Black Jack")
- create client certs, go to signing routine
- new routine with 3 different potential signed public key download routines /account.php?id=6 list 3 options
- Install the certificate into your browser (tested)
- Download the certificate in PEM format
- Download the certificate in DER format
bug #1054 (Thawte patch) tests passed ?
- Marcus Bugs list
new bug #1095 "Problems with creating server sertificate where the csr is created with Java SDK Tools"
- cmdline sample: keytool -genkey -alias test.test.net -keyalg RSA -keystore test.test.net.ks -validity 1095
- NEO couldn't reproduce the problem using keytool, tested against production and testserver
5. New SA candidates and Coders
ABC Benny - possible Itzehoe (2012-09-14), mrmcd (2012-09-08) or other events before 2012-08-10 - 2012-08-11 BarCamp kiel
ABC Benny passed/closed
- Heino, not yet prepared, needs first contact
- How to find coders? Experiences from the Gentoo project
- report from last board meeting - topic Arbitration
is added to upcoming board meeting 2012-08-19
6. Long Term Projects
- Marek's sql class project:
- is working on charset replacement
- api project, Carsten continues with portal project not waiting for vendor-api to be delivered
- vendor-api delayed
- no coders
- other projects
- related to sql class project
- portal project continues with a workaround, needs an assurer
- arbitration case on locations database orders outsourcing of find-an-assurer asap
- with portal function, update of data is possible vs. update of data on critical system is difficult (keep data current for assurers)
- relation to location database
- website find an assurer
- scripted mailing for ATE invitations
- user check that data is still valid eg every 1 year
- notification at login upto 6 months not online
- notification by email if not logged in within last 6 months
- vendor-api delayed
- Automated testing system
- Timo: Unit-test testsystem, phpunit jenkins
- can we merge both environments? frontend tests and unit tests?
7. next meeting
- Tuesday, October 2nd, 2012 22:00 CEST
Minutes
- Preface
BenBe reviewed repo changes from within last 2 weeks
- found bug #1023 "Thawte Patch" changes
- mysql query, bug 967 1e98bc7a
- includes/account.php: lines 2295, 2296; related to line 2259 ?
- new function to document (description, input parameters, output parameters)
- timo: signer monitoring?
- BenBE: 453ad50d line 77: is there a missing [=] ???
- scripted mailings source (with win-line-endings), can be removed after some time
commit message: bug <number> text
- bug 1054 "Thawte Patch" testing
- u60 stumbled over bug 440, 1017, 1035 bugs in testing
- parse routines, get_alt, get_cn checks domains etc
bug 440 review -> dirk
- not started, not finished
- neo sent msi package for testing to u60, benbe
>openssl sha1 CAcert_Root_Certificates.msi SHA1(CAcert_Root_Certificates.msi)= f95043eb19828d3d1bce671dbc944c80cf41ba16 >openssl dgst -sha256 CAcert_Root_Certificates.msi SHA256(CAcert_Root_Certificates.msi)= c59901773f79929e675e9ebc1ac4d723a02220fcc4465304bab4557305ba8cf4
bug #922 missing "certificate about to expire" messages
- notification expected: 1d, 15d, 30d, 45d
new bug #1095 "Problems with creating server sertificate where the csr is created with Java SDK Tools"
- cmdline sample: keytool -genkey -alias test.test.net -keyalg RSA -keystore test.test.net.ks -validity 1095
- NEO couldn't reproduce the problem using keytool, tested against production and testserver
- identified as weak key usage: csr used MD2 encryption, not or no longer supported by openssl
how does bug #1017 relate to this bug?
NEO: "BlackJack" bug #964 testing from last week -> error codes
- started implementing
- cert signing routine
- ie5 ie6 automatic storage of signed key in local keystore
- doesn't work under vista, win7
- msi package is to download and import the keys to the local keystore under vista, win7
relates to bug #1099 but is quite different
- next meeting
- Tuesday, October 2nd, 2012 22:00 CEST
Fixed Action Items since last or within meeting
Action Items New
Action items: Meeting Action Items