On Wed, Oct 30, 2013 at 5:14 PM, Rick Andrews <[email protected]> wrote: > I'd like to explore how "Notification shall be made in an authenticated and > trusted manner". Kathleen's wiki page says to send email to > [email protected] or file a bug. How would Mozilla determine that the > request was legitimate?
If you do it in a bugzilla bug report, then you will be authenticated using your bugzilla credentials. > I suspect that Mozilla already maintains a short list of contacts for each > CA. Only they (or some selected subset of them) should be able to report a > revocation. Mozilla should have some other means of authenticating them. > Maybe you have a cell phone number for each, which you will call to validate > the request. If the reporter attaches the affected certificates, and/or links to the OCSP responses (which you can do if your OCSP responder supports GET), we can verify the revocation by looking at the OCSP responses. This will allow *anybody* to report a revocation to us in a way that we can authenticate. If a CA is reporting a revocation that it hasn't revoked via OCSP then we can only authenticate the request by checking the bugzilla credentials that were used to file the report. > From the CA's perspective, I'd like this process to work the same for Apple, > Microsoft and any other trusted root operator. I urge Mozilla to work with > these other companies to come up with a unified standard. I do not know if we need a new standard for this right away. We should investigate whether bugzilla.mozilla.org can serve as an unofficial clearinghouse for the smaller trusted root operators. bugzilla.mozilla.org has an API that allows programmatic access for filing bugs (which would allow CAs to build automation) and programmatic access for querying for bugs (which would allow the smaller trusted root operators to extract the information automatically from bugzilla). I expect that the number of revocations that need to be reported using this mechanism would be very, very low. If it is not very low then I'd like to investigate ways to make it very low. For example, dropping the CRLDP extension from intermediate certificates might allow CAs to avoid rotating intermediates so frequently since "too big to fail" will not be an issue (at least regarding the size of CRLs). Similarly, shortening the (allowed) validity period of externally-operated intermediate certificates so the validity period never extends beyond the length of the fully-paid-up part of the customer's contract with the CA may greatly reduce the number of intermediate certificates that get revoked. Improving mis-issuance prevention measures should drive the number of mis-issuances to zero, ideally. Improving the TLS protocol to make multi-stapling practical performance-wise, combined with a must-staple X.509 extension that applies to intermediates, should also greatly reduce the need for reporting revocations this way. With all this in mind, it isn't clear that we'd benefit from having a interim standard to hold us over until all revocation information can be stapled into every full handshake in an efficient way. In fact, I could see such an interim standard being harmful if it distracts implementers from working towards making multi-stapling work 100% of the time. Cheers, Brian _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

