Team Reports 2010

Team Leaders are encouraged to present a report for their team.

  1. Policy Group

  2. Audit Team

  3. #Infrastructure

  4. #Arbitration

  5. #Software-Assessment-Project

  6. #Critical

  7. #Education

  8. #ATE

  9. #Assurance

  10. #EventsTeam

  11. #SupportTeam

  12. #SpiritTeamReport

Infrastructure Team Report 2010

Here is the infrastructure report for this year. Please consider that getting new infrastructure is important for getting our current infrastructure in a secure state and allowing for growth. Please find someone to replace me.

Daniel CAcert Infrastructure Report 2010

The year began slowly. In January/February Brian Henson started and finished some major work to get a puppet centralised management ready for CAcert. Daniel Black did some planning to see what will be needed for CAcert in the foreseeable future. Some testing began with Ksplice as a mitigation for kernel vulnerabilities without having to reboot servers specificity virtual host servers.

February hit and the effects of CVE-2009-3555 SSL renegotiation started to hit as browsers broke a previously permitted behaviour. The previous approach of optional/mandatory client certificate authentication was on a directory basis which would require a SSL renegotiation. Some interim work was done to lists.cacert.org and community.cacert.org to require certificate authentication before a long term solution.

In March Mario Lipinski got restructured text working on the wiki.

Hugi April, Andreas Bürki got a proposal together with a hosting provider that covers our current and future requirements and put it to the board.

In May after a 3 month trial of KSplice the board approved to fund it for a year (m20100420.2). Thank you board. The gains of this in terms of uptime, security and lower sysadmin effort is much appreciated.

June saw some internal movements within BIT data centre. Thank you Wytze van der Raay for all the coordination and movement. Thanks also for getting all of our infrastructure services started due to our configuration problem.

Also in June, Jan Dittberner solved the CVE-2009-3555 issue. By packaging up a newer Apache version with SNI, using virtual hosting and certificates with subject alternate names we will be able to provide certificate authentication services, handle the idiosyncrasies of Safari, the poor error messages in Firefox.Jan also prepared a fully client certificate SVN server with client instructions.

June saw a new format of S/MIME message that our list software Sympa broke receiving. Daniel Black spent the time developing a workaround and filing an bug report in to fix this.

July saw the withdrawal of infrastructure offer after no decision was reached by the board before the end of June deadline.

Current state of Infrastructure:

Currently there are far too many VMs on Debian 4.0 Etch that finished security support on February 14 2010. Those that can be easily updated have been. A number of VMs have had adhoc packages installed that make an in-place upgrade is too risky an option with no reasonable blackout plan. The flexibility of the current managed gateway has made it undesirable to create and manage test VMs within the current for upgrading installations.

As indicated by Jan's recent work on SNI testing new opportunities exist for developing better client certificate based infrastructure services. Ideally this should be tested on independent VMs and a migration strategy deployed.

The ability to deploy new testing services is not conducive in BIT which is managed gateway designed around production systems. The hassle with organising accounts with the critical admin team, as helpful as they are, and the delays in Tunix firewall changes make this an unsuitable location for dynamic infrastructure.

In short - new infrastructure is needed to move existing services to a stable, secure and sustainable state.

Regarding specific services:

sun2 - the hosting machine is on Debian Etch and cannot be updated reliably without moving all the VMs.

wiki - on Debian Lenny. Looking for staff effort to migrate to a certificate auth and mitigate some spam.

Blog - on Debian Lenny. Fairly good state.

irc - is a mess of custom installed packages on what appears to be a Debian Etch host.

SVN - currently on Debian Etch - a new Debian Lenny server was prepared with full certificate authentication. Just needs to find a place to deploy to and then migration can happen.

bugs - on Debian Etch - not much effort/interest/investigation has been performed on this server.

lists - on Debian Etch - a number of custom fixes/packages are in place preventing an easy upgrade - particularly due to the criticality of the system. Volunteer effort for migration has been identified.

email - on Debian Etch - has a moderate amount of custom packages and configuration that will not survive and easy upgrade.

webmail/community.cacert.org - on Debian etch. Possibly upgradeable with some extreme care. Jan test2 - recently upgraded by Philipp

hashserver.cacert.org - abandoned service

translingo - Etch server of unknown state. Crudely working but internals are unknown.

CATS - Etch server. Class3 authentication is broken. Possibly upgradeable.

issue - Lenny server - working well and serving support teams well

logging - abandoned effort - logging achieved centrally using different mechanism.

forum - abandoned effort.

cod - documentation server - abandoned effort

emailout - working well as automated outbound services for wiki/issue tracking notices.

State of Staffing:

From a bulk recruitment that happened August last year only a few admins still remain. Some have formally resigned and others have faded from existence. While goals were set initially the crux of the problem is that flexible infrastructure is needed to deploy/test and migrate services. Daniel Black also resigned as a sysadmin due to lack of support in this area.

Recently some new volunteers have offered to prepare Sympa6 and Mediawiki services in order to update our existing list and wiki services hopefully correcting a number of outstanding feature request/bugs. Without hosting there will be no place to provide these services.

Of concern is community projects that host important CAcert services like the main CAcert test/development site and co-auditing. These are occurring without the benefit of having CAcert ownership, backup, and monitoring. With no infrastructure hosting to offer these community teams the community assets they build are at risk from technical, relationship and management failures and may eventually be lost to the CAcert community.

So looking to the future the infrastructure team hopes to find a donor of infrastructure services who is willing to work with the CAcert board. The board is urged also seek out new services and form contracts in a more pragmatic way. The need is great and new services will provide reliable hardware and hosting so our aging systems can be migrated, and reinvigorated, new systems can appear, auditing critical systems will become easier (and less hassle for the critical team) and our staffing volunteer effort can be utilised.

Daniel Black (former) Infrastructure Team Lead CAcert

Arbitration Team Report 2009-2010

Starting pushing Assurance Policy into the Community in February/March 2009 and the first Assurer Training Events (ATE's) in May/June 2009 starts a Arbitration backlog and sets Arbitration under fire. So summer 2009 there was a run to bring in new Arbitrators into the team:

Teus

A new Dispute Resolution Officer (DRO) was appointed with motion m20090811.1 after Teus Hagen has left the Board and all his roles after SGM 2009-07-25.

Four new Arbitrators picked up the workload but could not prevent that the backlog increases. So a second run for new Arbitrators was started in November 2009:

From the November run, two Arbitrators picked up the challenge to help the team. Ulrich Schroeter assists the new arbitrators in their first steps. The result was a training course for Arbitrators Arbitration Training Course that helps also other Arbitrators doing their work, to get their work structured.

In November 2009 there was a Support / Arbitration crisis. Arbitration could not work w/o Support, as Support is the first entry point of new dispute filings and also handles the ruling of most cases. The Support bottleneck has been identified and fixed in November/December 2009.

At the moment Support again comes to work, an additional backlog of Arbitration cases comes in and the overall backlog increases again.

Also the Dispute Resolution Officers (DRO) work comes under fire at the Boardmeeting 2009-12-20 with the motion "That, given m20090811.1, and today's informal information that some arbitrators are non-working, board requests an immediate update of the state and health of the Arbitration system from DRO, with a view to changing the roles and re-invigorating the process.". Motion m20091220.3 carried. The outcome was the resign of Nick Bebout as DRO at 2009-12-21.

In the Boardmeeting 2010-01-03 Board passed the motion m20100103.2 and appoints Lambert Hofstra as the new DRO. Lambert

With the new Support team in place, one question araises about how to handle Delete My Account dispute filings. A mega IRC meeting with Arbitrators and Case Managers was announced for Monday January 4th. This IRC meeting started about 17:00 CET and ends Tuesday 0:45 CET. This meeting was the trigger for the recuring Arbitration Team Meetings that from now on are held 2 times a month. The meetings helps to identify problems, to exchange news that relates to Arbitration work, to form a team. An ongoing topic was the Arbitration backlog. The Arbitrators have many ideas about that, but not all yet could help to decrease the backlog.

About January / February 2010 Support moved to the ticketing system OTRS. New dispute filings flew in thru the Disputes Channel of OTRS. The Arbitrators team doesn't take much care about this move. So only about 2 Arbitrators could move new dispute filings from OTRS into the Arbitration queue. This first changed in June/July 2010.

In February / March 2010 Arbitration received 45 (!!) new disputes filings (see Statistics by Month below). This was probably too much to handle. The Arbitration work came to succumbs in March. For a period over 3 months no Arbitration cases were picked up, no Arbitration cases gets finished. First activity was seen again in June 2010.

Extensions to DRP

Mario

Arbitrators are appointed by Board motion. So the ongoing topic "How to remove inactive Arbitrators" raises the question, if Board is the audience to remove inactive arbitrators. That has been decided by board motion m20091206.2 Provision to remove arbitrators on advice of DRO - "The committee considers it has the authority to remove arbitrators, but resolves to only do so on advice of the Dispute Resolution Officer and after considering any written or oral submissions made by the arbitrator in question."

The next question that flews around the Arbitration team was: how gets DRO informed about inactive Arbitrators ? The Arbitration Team voted in the Arbitration Team Meeting 2010-04-06 for the "Inactive Arbitrators Procedure", so Case Managers, Arbitrators and Arbitration participients can inform DRO about not working Case Managers and Arbitrators. DRO has to contact the inactive Case Manager or Arbitrator and if he cannot find a solution has to report to Board, that Board can remove inactive Case Managers and Arbitrators with a board motion.

As a result of the Support Crisis November 2009, the DRP proposed procedure of picking up Case Managers from the Support Team has been moved to Arbitration Team. So Case Managers are now Arbitration Team members and every Arbitrator can now also be a Case Manager. But a Case Manager cannot be the Arbitrator in a case.

Arbitrated Background Checks

The Arbitrated Background Checks has been deployed within several ABC cases. The trigger was the Support crisis and the new Software-Assessment Project, that needs ABC'ed engineers. As there was no procedure defined before, it needs to be deployed. The basic procedure is outlined in Background Check Procedure. A list of questions circles between Arbitrators.

Forward Looking Statement

Alexander There are plans to replace the OTRS - Mailing lists - Wiki - Email storage - tools with an Arbitration Management System that is under development by Philipp Dunkel to assist Case Managers and Arbitrators in Arbitration filing. by take into account the special requirements for privacy purposes and publishing of essential informations, to get a quick overview on each arbitration case (history log), and also over all arbitration cases (Arbitration queue) and the state of each arbitration case. Also there is a need to store the communications of each case.

For handle the arbitration backlog, there are plans to deploy template procedures for recuring administrative dispute filing cases like "Delete My Account", "Name change requests", "DoB errors", to handle such cases in a fast lane by ruling precedent cases.

A 3rd topic is the Appeal process. Currently that process is moved by Dispute Resolution Policy to Board. But this imbalances the forces of the three columns of power: Policy Group (legislative), Board (executive), Arbitration (judiciary). So there are some thoughts to build an "trial court" or "supreme court" with an Appeal procedure. This topic has been started by Ian as an open discussion, but hasn't finalized yet on Policy Group.

Martin There was some thoughts about a job ladder - to jump into Triage - undergo an ABC for becoming Support-Engineer - and an optional move into the Arbtration Team, starting as Case Manager - becoming Arbitrator, so all Case Managers and Arbitrators are also ABC'ed before becoming Case Manager and Arbitrator.

Statistics

UlrichSchroeter
CARS

Arbitrations-by-Years-2007-2010-400.png

Arbitrations-by-Quaters-2009-2010-400.png

Software-Assessment-Project Team Report 2009-2010

In November 2009 the Software-Assessment Project team was formed to bring forward the Software-Assessment within CAcert. The Software-Assessment Project Team has also members that are not members of the Software-Assessment Team, as at this time starting the project, there was only one Software-Assessment Team member.

Andreas The Objectives of the new Software-Assessment Project team is:

The first meeting was the Essen Software MiniTOP 2009-12-16 followed by a second meeting in February Software MiniTOP Offenbach Feb 13th 2010. The project now has two project managers: Andreas Bäß for the technical part, UlrichSchroeter for the communcations part.

Markus The Software-Assessment Project Team pushed 4 new Software-Assessors Markus, Dirk, Alexander, Bernhard to become Software-Assessors, that results in the Board motion m20091220.2

Philipp The ABC's over Markus and Dirk has been finished. Both are nominated by Board motions to become Software-Assessors, so the Software-Assessment Team now has 3 members: Philipp, Markus, Dirk

The Critical Sysadmin Team deployed a mirror system on a discarded server machine that is currently hosted by Andreas Bäß in his office on a VM. This was also a test for the documentation of the production system for recovery purposes to rebuild the system as identical as possible. The deployed server VM will be used for running the new repository and the Testserver. Also a VM copy can be used by developers for installing it on their own machine for development purposes.

To bring the project forward, we held a weekly telco Tuesday evening 20 CEST with a system from the Community member Kees van Eeten. Its the same system that was used in a Board meeting run by Lambert and Bas.

Dirk The next phase in Software-Assessment-Project deployment was to build a Repository. First tests with SVN failed the tests in merging. The alternate choice was to use GIT as the new repository system. Markus Warg deployed the repository with assistance from MichaelTänzer.

As the running testserver is under Software-Assessment Teams authority, testers needs an Testserver Mgmt System to control their accounts by adding assurances, adding special flags, so they are able to test patches. This needed a deployment of a Testserver Mgmt System. We decided to use a Zend framework with access to the testservers account database. MichaelTänzer wrote most of the scripts. The Testserver Mgmt System has been added to the repository too.

The Software-Assessment procedure deployment and documentation hasn't been finished yet. There exists a Description of Software Development Update Cycle (Proposal) but this needs been tested first. Documentation should be made on the Main Entry Info Page for Software Testers and test reports should be added to the Bug number presented on the overviews page in the existing bugs.cacert.org.

Currently, in August 2010, there is a run for building a Test team.

Software-Assessment-Project Team documentation website

UlrichSchroeter
CARS

Critical System Administrator Team Report July 2009 - June 2010

Signing server upgrade

Wytze A major step forward in the past reporting year was the migration of the signing server to new hardware (a brand-new Dell rackserver acquired thanks to a financial donation from NLUUG to Oophaga). The new signing server was deployed in September 2009, and has been running flawless since in essence. This migration was motivated by a couple of power fail/reset problems with the old signing server hardware in June 2009. Since, for security reasons, the signing server can only be brought back up by physically visiting the hosting site, running it on long-lasting reliable hardware is essential for keeping the workload in hand for Oophaga Access Engineers and CAcert Critical System Administrators. A feature like dual (redundant) power supplies on the new hardware thus comes in very handy.

Relocation of all equipment

Another major physical effort was delivered on June 15, 2010, when we moved ALL CAcert equipment to another hosting room/rack in the hosting facilities in Ede, at the request of our hosting sponsor BIT. This was a concerted effort by two Oophaga Access Engineers and two CAcert Critical Sysadmins, and supported by a BIT engineer. As far as critical systems were concerned, the move went smoothly; however, there were a number of problems with getting the supporting and infrastructure systems all back up and running. A good learning exercise for all ...

Visits to hosting facility

Hans The log of visits to the hosting facility shows the following "on site" activities:

[10.08.2009]

recover non-functional signing server (not hw, but sw!)

[15.08.2009]

signing server reboot (after power glitch)

[11.09.2009]

signing server migration to new hardware

[18.11.2009]

investigate condition of primary firewall hardware

[19.11.2009]

repair primary firewall hardware (power supply replacement)

[21.01.2010]

repair mirror firewall hardware (power supply replacement)

[02.06.2010]

inspect equipment in preparation for move

[15.06.2010]

move all CAcert equipment from BIT-2A to BIT-2B

Remote system administration

All other system administration work has been performed remotely. Issues directly affecting the operation of the webdb server have neem logged to the cacert-systemlog@lists.cacert.org mailing list (archived at https://lists.cacert.org/wws/arc/cacert-systemlog ) with heading "configuration change webdb server", "security upgrades webdb server" or "cvs.cacert.org checkin notification".

OCSP server

A lot of work was done to investigate causes of the unreliability of the OCSP server, and some improvements were put in place. A more permanent solution will be implemented in the next months, by setting up a new virtual machine on the critical systems vm host, and deploying a newer version of the OCSP server software.

DNS infrastructure

By order of the CAcert board, the administration of CAcert's domain names and DNS was also brought under control of the Critical System Admin team in January 2010. A new virtual server ns.cacert.org was set up as the primary domain name server for cacert.{org,net,com}. It is supported by a number of CAcert-community-supported secondary servers, with zone transfers between them properly protected by TSIG. Preparations have been made for turning on DNSSEC support for all CAcert domains, the appropriate software has been installed and will be configured and enabled in the coming months.

Non-relocation of infrastructure services

It was hoped that the manageability and auditability of the critical systems could be improved by moving all (non-critical) infrastructure services out of the current hosting center to elsewhere in the latter half of the past reporting year, but it looks now like this is not going to happen any time soon.

Test server

We did invest quite a bit of time to help the Software Assessment Team with setting up a test server (on a virtual machine) which looks as closely as possible as the production webdb server. Scripts and documentation were written to accomplish this. Besides creating a usable test environment, this also served to strengthen our capability for (re-)building a new webdb server from scratch, documenting many hitherto obscure aspects of the current production server (which is essentially inherited from its original author, quirks included).

Forward looking statement

Mendel Plans for the coming year include:

Wytze van der Raay, Mendel Mobach, Stefan Kooman

Education Team Report

Ted

Education team has not been very active during the last year, the main activity consisted in maintaining the "CAcert Training System" (CATS).

In June a french translation of CATS has been started, but did not get finished till now.

CATS statistics

CATS is running quite stable. Currently a total of almost 4000 Assurers have passed the test. In 2009 a total of 424 certificates for passing the tests have been requested, including 41 printed certificates.

From July 2009 to June 2010:

Future Prospects

Per definition education team should review, correct and extend existing education documents, as well as the CATS tests.

Some more specific things which should be done:

BernhardFröhlich

ATE / co-Audit Team Report 2009-2010

Ian

The Assurer Training Events (ATE) concept has been introduced Spring 2009. The first ATE ever happened was 2009-04-20 Innsbruck. In season 2009 till 2009-07-09 within 3 months, 14 ATEs takes place in 7 countries (7 DE, 2 NL, 1 AT, 1 CZ, 1 HU, 1 F, 1 UK).

The concept started by the needs of the Audit to audit the Assurers. Getting Assurers together, give them the informations they'll need to do their job with quality, to give informations what is essential about the Audit, is handled within the presentations part. The 2nd half is co-Audit.

From the experiences of these 14 ATEs the plan was to nail down the co-Audit plan (questions to be answered) and a system, to collect the infos from the co-Audits. The first plan was to start an Autumn 2009 tour, but caused by lack of resources this plan was defered to Spring 2010. Back in December 2009 at Assurance-MiniTOP Hamburg we've discussed, that we need documentations and the ATE thing structured. After AGM in January 2010 we've met at Fosdem Brussels with the Assurance-MiniTOP Brussels with defining what is a co-Auditor, what are the checks, how to collect the received infos, who tests the testers?. The results are in the MiniTOP minutes of Assurance MiniTOP Brussels Feb 6th 2010. Ian deployed a system that is hosted in Vienna. In a preview at MiniTOP Brussels we've added some requirements to the system, to allow tests not to complete, adding the level of experience of the test candidate and so on. At Assurance-MiniTOP Hannover at Cebit, we finalized the ATE and Co-Audit concept for this years season. Presentations that have to be added: PoJAM, Privacy. The set of co-Audit questions.

One plan that starts end of 2009 was to spread over Europe - Denmark, Sweden, Poland, Belgium, UK, France, Spain, Italy. All attempts to find contacts and Assurer groups in each of above listed countries failed (except Belgium and Sweden). The proposed ATEs Bilbao (E) (July 2009) did not happen, but another ATE in December 2009 ATE-Goteborg (S) did. The plan was for Fosdem Brussels, to find contacts to these countries. In practice, the result was disillusioning. We've got contacts to individuals but no Assurer groups. So the expected push did not happen and the run for ATEs in Germany and the Netherlands did not happen caused by lack of resources. The only ATE that was held was ATE-Sydney in March 2010. So the complete ATE season was defered to Autumn 2010.

The CAcert Assurer Reliable Statement (CARS) became an essential tool in gathering the evidence over the co-Audit results to present a future Auditor. We've first discussed this tool at Assurance MiniTOP Munich. First Arbitrators used this tool in 2009 to gather the evidence in Arbitration cases from the Assurers in practice. Later, the CARS moved to AssuranceHandbook2 as part of the Assurance process. Each statement an Assurer gives in an Assurance is also a CARS, that signals to the community, my result in the Assurance is a reliable statement you can rely on. The concept of reliance we have with the certificates. You can rely on my statement, if I add my certificate onto my email and I'm bound to the Arbitration system with the Dispute Resolution Policy. So the CARS is similiar to the digital certificates in the electronic world, so the CARS is the analogy to the analog world, where I have to send reports, results over a co-Audit. So therefor each result set that is entered into the co-Audit application is also a CARS statement made by the co-Auditor to the community and probably later to a future auditor. You can rely onto my entered results. These results are verifyable. With this method at hand, the co-Audit results becomes "acceptable" to an Auditor. The evidence over co-Auditor results vs. Auditor results has been checked in the Spring Tour 2009 and presented at Assurance MiniTOP Munich. There was no difference in testings by the Auditor and the co-Auditors so the process of co-Audit has been tested and checked to be useful in the overall Audit plan.

UlrichSchroeter
CARS

Assurance Team Report 2009-2010

The Assurance Team Report covers the time starting May 2009. At Assurance MiniTOP Munich 2009-05-17 the team was built up. The main task: Audit over Assurance. The team prepared together with the Education team the practicle ATE presentations for Assurers.

Subpolicies work

Uli After AP cames to DRAFT all special Assurance programs has been frozen. On Events Assurers runs into the problem with Underaged cases, TTP Assurance program was not announced to be frozen. So from within an Arbitration case also this program gots notification to Community, that it is frozen. Also the Super-Assurance program conflicts with the AP. So therefor we've started the Assurance-MiniTOP Hamburg mid of December 2009 to find solutions in prepared subpolicys and thoughts about the special Assurance programs.

PoJAM

Assurers who passes the CATS test remember about the question, if Juniors can be assured. The correct answer: Yes, if they'll can be verified with an official ID document. After AP was pushed into the Community beginning 2009, at each event at least one Junior asks for an Assurance. So here Assurers are in a conflict: CATS test says, yes, you can assure Juniors, AP says, member has to agree to the CCA and to be bound into Arbitration. So this may conflict with local laws. An attempt was made with a PoJAM proposal at Assurance MiniTOP Munich May 2009. But this WIP had a disadvantage regarding parental consent. A guardian has no legal rights in a dispute filing case nor can he fully take the liablity over a Junior member. So this concept was void. With the new PoJAM proposal release, the liability is focused onto the parental consent. The trick in this new concept is: if once parental consent is established, this can be presented to all other Assurers with a parental consent form. Assurer has to make a note on the CAP form, that parental consent has been verified. Problem solved.

PoJAM subpolicy has been pushed to DRAFT end of January 2010. So its now binding to the Community.

TTP-Assisted-Assurance

With AP to DRAFT CAcert looses all special Assurance programs, to bring in new members from CAcert deserts. CAcert's grow is in danger. So the run has started to write new subpolicys to make the old special Assurance programs AP conform, With Policies in effect, these special assurance programs may be re-opened.

The first attempt is the TTP-Assisted-Assurance program. The proposal was written at Assurance-MiniTOP Hamburg, December 14th, 2009. The discussion in Policy Group started February 2010, after PoJAM has been pushed to DRAFT. The first results are included into the proposal. But this concept had one disadvantage: With two TTP-Assisted-Assurances a new member can gain 70 Assurance Points. But cannot become an Assurer by his own. This forces a new concept: The TOPUP. This allows members in the deserts to become potential new Assurers, as they have now an option to reach the 100 points level barrier.

Also new in the TTP-Assisted-Assurance subpolicy is that the task verifying TTP-Assisted-Assurances has been moved back into the Community by defining Senior Assurers as TTP-Admins. A definition of Senior-Assurer has been added onto Assurance Handbook.

By writing this report, TTP-Assisted-Assurance subpolicy has been pushed for call for vote into Policy Group. So probably this subpolicy become DRAFT end of September 2010.

Nucleus Assurance Program

The Super-Assurance program conflicts AP in full. AP limits the Assurance points to a level of 35 pts (50 pts max). All special Assurance programs are bound to this limitation. Also the Super-Assurance program.

This raises the question, how we can bring in new members easily, w/o Super-Assurers program ? From the experiences with Assurer groups, together with a mathematical experience, a group of potential Assurer candidates needs at least 10-12 candidates, who are interested in becoming Assurer.

With experiences of the training concept we've made in ATE's, we can push a group of members upto Assurer level in an area. This concept honors the AP limitation of 35 (50) Assurance points. So it can be seen as a replacement for the old Super-Assurance program. At the end of the process, a group of Assurers with at least 20 experience points each can seed a CAcert desert area with enough Assurers at this area. To find new potential Assurer candidates will be the most intersting question. So the focus is to find other OpenSource communities in an area that we can ask running this program.

Also thoughts about combining TTP-Assisted-Assurance program with the Nucleus program were made, but has been stopped, to allow at least one of these special Assurance programs to pass Policy Group.

The Nucleus Assurance program needs to be written as a subpolicy first. As it is a concept to replace the old Super-Assurance program it is included in this report, to signal to the Community, yes, there is progress in this area in finding replacements of the old special Assurance programs.

Updates on Handbook, Practice documents

With new subpolicies at hand, with rulings from Arbitration group regarding Assurance specials, my task was to implement the new details into Assurance Handbook, review the PracticeOnNames, PracticeOnIdChecking documents. A parental info package has been deployed regarding new PoJAM subpolicy. All you can find in Assurance Handbook.

Starting pushing AP to the Community, Assurers takes care about name mismatches in accounts. This raises dispute filings to the Arbitration group after the ATE series 2009 by stricter name rules. This also raises the Dutch short givenname variation problem. Arbitration ruled, that the Dutch short givenname variation has to be categorized as a country variation as defined under AP 2.2. So this opened a new variation to the strict rules as known and presented in the ATE 2009 series. This ruling has been added into PracticeOnNames. The new ATE series presentations needs to add this as a new section to push this info to the Community. At time of writing, the ATE series 2010 presentations are under preparations.

The Arbitration group has introduced new Assurance practice procedures to assist Support and Arbitration with procedures w/ Assurance like the Name Change Request w/ Assurance or Password Recovery w/ Assurance. These procedures are enhancements to the Assurance process at a Face-2-Face meeting to collect additional infos from the Assurers and Assuree, so that the original request by Support or Arbitration can be passed easily. As these procedures are quiet new, they had not been added to Assurance Handbook yet. Documentation to the new procedures can be found in the Wiki on Password Recovery or Arbitration precedents cases.

I've reviewed PracticeOnIdChecking (PoIDC) against AP. The old tool with 100 points conflicts with the Assurance Points concept as it totaly confuses Assurers who read that concept. So therefor this has been removed and PracticeOnIdChecking has been rewritten. There is an ongoing discussion wether confidence in an Assurance statement is a black/white or a grey view. AP states the grey view: less points if less confidence, ZERO points if ZERO confidence, If Negative Confidence then collect the evidence, file a dispute.

Assurance Events

Joost Many of Assurance events that were announced thru Upcoming Events wiki page, signals lacks report. As I'm attended many of these events, I can confirm for these events, that the Assurances made on these events were conducted by Assurance Policy. In problem cases disputes were filed. The shift from old CAcert days to the new CAcert days has finished, starting with the ATEs, Assurers becomes trained, the CAP forms from CAcert's website now are AP conform, Assurance Handbook and the Practice documents now becomes living documents that are read by the Assurers. Co-Audits at regular Assurance Events the first half of 2010 shows a significant count of Assurers not attended an ATE before. The co-Audit results have a significant higher error rate in comparison to Assurers that attended an ATE before (see table 1). So this leads to the conclusion, that the ATE program is an essential program in the Audit process, to get the Audit passed over the RA part.

Table 1: Result from 54 co-Audits (2010)

country

# errors

ATE

EP

% att.

0-50

DE

1.4

26

32

NL

1

0

29

FR

4.2

20

16

BE

4.5

0

7

AU

0.8

100

22

Sebastian Table 2: Results from Audit presentation at Assurance MiniTOP - Munich 20090517

country

# errors

ATE

EP

% att.

0-50

AT

0.44

?

CZ

1.00

100

DE

0.88

100

FR

1.63

?

HU

1.67

?

NL

1.88

0

UK

1.78

?

The core Assurance Team: Ulrich, Joost, Ian, Dirk, Ted and Sebastian

UlrichSchroeter
CARS

Events Team Report 2009-2010

In the FY 2009-2010 we had 52 Assurance Events in total, 4 of them were announced as ATEs.

So in total 45 Assurance Events takes place with 10 Event reports received (20-25%).

Walter Assurance Events by Countries:

Event Reports

The Events Reports problem ... Starting Audit over Assurance back in Spring 2009, Auditor requested to bring in an Event report for each event that takes place with a statement from the Events Organizer, that all assurances conducted by Assurance Policy. Me as Events Team Leader, I've requested the Events report for every passed events. Sent reminders over reminders ... nothing happened. So here, the support from Community wasn't that great as expected. Andreas Buerki created a Events Report template, that I've sent around by requesting the Events report. But also this doesn't helps to get in more event reports. I've introduced the signaling of received event reports to the Past Events wiki site, but it doesn't helps to bring one more event report in. Probably a minimalistic Events report - request for a statement that all Assurances were conducted by AP from the Events Organizers - will help to get better results.

Cross Community Work

With the relation to other OpenSource groups we can share the work on booths, we can bundle the resources. E.g. if we have not enough Assurers for a booth we can build a network of Assurers at an event like Linuxtag. "Sorry, we can't give you currently the full 100 points, but you can visit the booths of Sidux, OpenOffice and Ubuntu, and you'll find more Assurers there"

With the Client Certs presentation, we've started a Cross Community push to other OpenSource communities, to think about Client Certs usage in their software.

Support on Events

There is a big support from the Community for Events.

Big Events

FOSDEM and Cebit planning started Autumn 2009.

FOSDEM 2010

For FOSDEM we've tried to find contacts all around Europe 'cause Fosdem is a European conference. We got some contacts, but it was far behind what we've expected. The Event by itself was a great success. Ian presented a talk about Client Certs - The Old New Thing. This presentation we've presented also on other Events in Germany (DA-Treff, Linuxtag, mrmcd). The goal to find Assurer groups in other countries did not happen. We've met individual Assurers, but did not find any bigger group.

At Fosdem 2010 the Assurance core team held Assurance MiniTOPs about co-Audit to prepare the co-Audit season 2010.

Cebit 2010

Cebit 2010 attendance was tried to get a sponsored booth thru Linux-New-Media. Alexander Bahlo assists us in the paperwork, to write a Call-4-Participation with success. Linux-New-Media offered OpenSource projects a sponsored booth for 12 projects. 65 projects sends their application. A jury selected the best 12 projects. CAcert was one of the 12 selected.

Two topics on the Cebit agenda:

We've got some contacts from Italy, Spain, South-America, but these were only individuals with no strong CAcert support in their local areas. So the plan to push Assurer groups for a Nucleus didn't happen.

The 2nd topic, the finishing of co-Audit preperations for season 2010 has been successfuly finished. We have the documentations in place. We have a system up and running to collect the co-Audit results and started the first co-Audits.

Assurances were made following PoJAM that moved to DRAFT end of January 2010. So here we had another success in practice with a new subpolicy in effect.

Push AP to Community

The push of AP into the Community could be concluded as a big success, since started early 2009. At all bigger and smaller events Assurance now were conducted by AP. Assurers takes care about the Assurance statement, to not only check identities, also to check the Assurees to be bound to CCA and also bound into Arbitration.

Change in Events Team Leader role

Back in 2009 I took over the Assurance Officers role by pushing several new subpolicies. I've also handled the practice documents. Also active as Arbitrator, we've discussed the role of Events Team Leader and started the search for a new Events Team Leader, we've found in Walter Gueldenberg, who also handles the Events management for the Sidux-EV, a Debian derivate. The change in Events Team Leader role changed 2010-03-27 by board motion m20100327.1 New Events Team Leader

UlrichSchroeter
CARS

Support Team

Guillaume After the disruptions from last year Support had pretty smooth operations this year. The Support Team is constantly building up to cope with the daily operations.

Workforce

In the beginning of 2010 Ian Grigg stepped down from his role as Temporary Support Team Leader and Michael Tänzer became new Support Team Leader.

After some nasty incident we lost one of our Support Engineers but have been able to steadily gain more man power. New Support Engineers have been appointed (Joost Steijlen and Dominik George) and even more Triagers have been added to the Team. Although we have been adding up there is a drop out rate and we need to continue recruiting more people to shorten the response times.

Werner Just recently we had the first of what we hope to be recurring series of meetings to discuss issues that have come up and do a little bit of team building.

Operations

We have been getting more and more comfortable with our issue tracking system OTRS and have updated some of our documentation accordingly.

Password recoveries are the lion's share of requests that get to the Support Team (apart from spam ;-) ) and as noted in last year's report they are time consuming, cumbersome, complex and come with risks. In joint effort with our liaison from the arbitration team Ulrich Schroeter we therefore developed the Password Recovery with Assurance which uses our network of Assurers to re-authenticate the user. We hope that some day this will be implemented in software so we can concentrate on the rest of the cases (which is still enough to deal with).

Michael In the last year over 587 issues have been handled by our Support Engineers (that number doesn't include the requests that never made it through Triage or were forwarded to Arbitration) and each issue accounts for the whole conversation between Support and the user on that specific case (thus possibly many replies). There were days where we had a long backlog of more than two weeks but all in all we managed to get by.

The Todo List

One can say that we have progressed on all our items on last years todo list and even completed some of them:

Wolfgang New items that are added to our todo list for next year:

Michael Tänzer Support Team Leader

Spirit Team Report

Dominik In the last period of CAcert's 2009/2010 business year, a need for a new team arose and caught the eye of Martin Gummi and Dominik George. In the course of some rather unsatisfying incidents at CeBIT 2010, decisive action was taken by Dominik George in order to re-establish trust in a young assurer who had to face serious problems within the community beforehand-

The aftermath of that brought up the idea of founding a new team dedicated to the entire community aspect of CAcert. A concept was created and board signaled their good-will for letting us run an experiment within the German community.

Points listed in this concept include, but are not limited to, assurer assistance under arbitration (as defined in DRP), general care for fellow community members and organisation and observation of social events.

The team has not started any real work yet, but is planning on compiling a team of volunteers who tend to show a more-than-average interest for the mentioned aspects.

Martin Gummi and Dominik George have instated themselves as temporary team leaders in order to develop the idea and start a vote once the group has grown. Arbitration a20100304.1 mentions the Spirit Team as a potential means for establishing assurer assistance under DRP.


AGM/TeamReports/2010 (last edited 2011-07-17 15:01:59 by UlrichSchroeter)