Podcast
Root Causes 343: The EIDAS 2.0 Controversy


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
November 22, 2023
ETSI is preparing to release specifications for eIDAS 2.0. One controversial aspect of this new standard is that it limits browsers' ability to determine their own trusted roots. In this episode we explain this limitation and the concerns surrounding it.
Podcast Transcript
Lightly edited for flow and brevity.
e-I-D-A-S. That is an acronym and if I try to do it, I’m gonna mangle it so I’m probably not going to try. The e stands for electronic. But it is the EU, the European Union mandated digital certificate and digital identity ecosystem that is there to provide a variety of functions all of which at a high level are about connecting entities, citizens and businesses and government entities to each other in a reliable, irreputable way for electronic transactions. And eIDAS itself has been around for quite some time. Most of a decade. And now we are moving into the realm of eIDAS 2.0 which is very close to being complete and we should expect to appear full standards to appear next year.
And it’s not just QWAC certificates or certain kinds of other identity certificates for document signing. It’s also an entire legal platform as well.
It’s a set of laws so that the ability to actually do legal transactions with these kinds of signed documents signed by eIDAS certificates, the ability to do that legally is also all part of eIDAS, which in fact stands for by the way, electronic identification authentication and trust services.
I think we both agree we just want to understand it rather than give a lot of our own opinion perhaps at this point but let’s at least really help everybody here to understand exactly what’s going on.
Framing the debate is probably a full podcast so why don’t we do that and then maybe we will try to return to this and we’ll talk about - - <span dir="ltr">wax eloquent on our own thoughts</span> on this a little. <br><br> So, there is a thing in eIDAS they call a trust service provider or a TSP. I will say TSP from here on out. A TSP is the equivalent of what in my world we would call a public CA. It’s somebody who is able ultimately to issue certificates under the eIDAS rules and guidelines and those certificates are going to be honored by the software in the ecosystem that consumes certificates – the certificate consumers. If we want to use the CA/Browser Forum nomenclature. But, there are maybe 100 public CAs in the major browser root store programs and maybe 50 public CAs that are members of CA/Browser Forum. There are hundreds of TSPs and they are very fragmented and they are all over the place and most of the TSPs are country specific. So, you will literally get a TSP and they will just operate in Lithuania or they will just operate in Spain or they’ll just operate in Turkey or they’ll just operate in Germany. And if you think about it, it’s not really necessarily surprising because these are people who are creating certificates to be used within government mandated systems within each individual nation and so their market is local, their knowledge is local, the rules for them to validate is local. Everything is local. So you’ve got this large populous of a large number of TSPs and the TSPs can be qualified for different things. So maybe a TSP could only be qualified for doc signing and they can only give you doc signing certs. Or maybe a TSP could only be qualified for email signing and they could only give you email signing certs. Or, a TSP could be qualified for – drum roll please – a QWAC, which you said before. That’s a server certificate. So there are TSPs that are qualified to serve up QWACs. And this is the key point. Because the new eIDAS 2.0 rules have a new specification that isn’t in eIDAS 1.0 which states that browser consuming software – whatever that is – browsers must accept QWACs from any approved TSP. <br><br> So think about that for a second. Browsers going all the back to 1995 have decided which roots they trust and which roots they don’t. This is a storied tradition for nearly 30 years. <br><br>Now, the European Union, the European Parliament is going to pass a law saying that inside of the EU software needs to obey its decisions about which public CAs are to be trusted for server certificates. So what do you think of that?
“Article 45 forbids browsers from enforcing modern security requirements on certain CAs without the approval of an EU member government.”
And so, if you think about, alright, well why would browsers want to have their own root stores? Because well, if there is something to be distrusted well they can kick out one of the currently trusted public keys in their trust store and end that being trusted essentially. And there could be any number of reasons for that to happen. Real good, true, legitimate reasons.
But now what the EU is saying is, wow, um, even things like CT log keeping might not be allowed by the EU and maximum, they will have the right to declare the maximum bit length of the key, for the private keys.
So, in other words, everything you and I talk about on this podcast, Tim, which is about what makes up a good strong certificate and what’s always the worry about the lowest bar. Which that bar should always be raised and we know that quantum is gonna raise the bar a lot. To the point where we gotta swap out cryptographic algorithms. What this seems to look like – and I think this is where the controversy is and maybe you can reframe this better for me, Tim, but if you combine, if you combine what you said saying the EU government is in control of who is in the root store and they also get to determine the maximum bar on which the security definition of the certificates are set, then you’ve got a recipe for the EU basically has set up a system where, hey, if the EU wanted to spy on somebody…
Gee, has anybody encountered an example of a government attempting to abuse the technology in order to keep an eye on people’s supposedly secret and encrypted communications? How about all of them? I mean even the ones that are supposed to be the bastions of freedom and privacy and open communication, like the U.S. and U.K. and Australia. These guys are doing it. Let alone Turkey.
Number one, very frightening in that regard. And again, this law is that a government can just clarify, declare these are the QWAC TSPs. Too bad.
So there is a process specified in the latest draft whereby a browser can basically petition for removal of a TSP. But the browser can’t unilaterally remove it. They have to petition. What if they don’t get it? And so, we’ve seen a number of deprecations in recent years that we saw Certinomis and we saw obviously TrustCore and the Spanish one that my brain won’t say the word. You know the one I mean. And in all of these cases or at least in most of these cases, certainly there was a competence argument that was made. These guys aren’t competent to run a CA. But also, there was an integrity argument to be made. We don’t believe that these guys are on the up and up. We don’t believe these guys are being purely transparent. So when you start to worry about a government’s hand-chosen pet CA being forced to be in the trusted list and when you look at the fact that most of the deprecations that have occurred in living memory at least had an element of questioning the CA’s transparency and integrity that adds to the level of concern that we have. To the point where we could ask the question hypothetically if one of these deprecations like Certinomis was taking place a year from now or two years from now or whenever eIDAS 2.0 is in effect, it’s like two years from now hypothetically, would that deprecation actually be able to occur? What if the answer is no?
I said the words before. I’ll just leave it there. Look, questioning people’s motivations is one thing. You said it best when you said, look, it seems to be overall that governments want to control the internet, control encryption, etc. This is one way definitely that they could be doing bad. To me though, just as a security practitioner – and the real spirit of this podcast is to ask maybe the other question here, Tim, which is there any good reason at all why you set a high bar on security and not a low bar? And I just can’t figure it out at this point the way that this Article 45 seems to be written.
So all of this then gets into a theme that you and talk about a lot which is government versus the internet or government versus crypto or government versus tech. And once again, we are seeing government versus the internet is happening again.
I do not believe that all of the dialogue from the EFF and many, many, many commentators and academics and industry people and the huge flood of people who have been speaking up against this, I do not believe that’s gonna have any impact whatsoever. I think that the EU has decided it’s going to do what’s it going to do and it doesn’t care and if anything, maybe it does care and maybe it likes the fact that the tech people are upset. That we are gonna have eIDAS 2.0 in a way that’s shaped very similar to the current draft and this is going to be a thing that everybody needs to deal with. But with that, we are taking a risk. We are taking a risk that any tiny apparently inconsequential CA can get itself listed as a European TSP and it must be included in all the major browsers and then if that CA is compromised or dishonest or anything that could happen from this tiny little European CA now they have unlocked the keys to the entire world.
That’s right. You are in trouble either way.<br><br>Very exciting and I do expect we are going to return to this topic. It’s a big dialogue right now and we just wanted to make sure that we put it out there in front of you.

