Hello Dimitris!

You are right, of course there are mandatory RFC to take into account. But 
there is - to my knowledge - no RFC that says, you MUST NOT issue a certificate 
to a domain that could be interpreted as an IDNA2008 punycode.

With best regards,
Rufus Buschart

Siemens AG
Information Technology
Human Resources
PKI / Trustcenter
GS IT HR 7 4
Hugo-Junkers-Str. 9
90411 Nuernberg, Germany 
Tel.: +49 1522 2894134
mailto:rufus.busch...@siemens.com
www.twitter.com/siemens

www.siemens.com/ingenuityforlife

Siemens Aktiengesellschaft: Chairman of the Supervisory Board: Jim Hagemann 
Snabe; Managing Board: Joe Kaeser, Chairman, President and Chief Executive 
Officer; Roland Busch, Lisa Davis, Klaus Helmrich, Janina Kugel, Cedrik Neike, 
Michael Sen, Ralf P. Thomas; Registered offices: Berlin and Munich, Germany; 
Commercial registries: Berlin Charlottenburg, HRB 12300, Munich, HRB 6684; 
WEEE-Reg.-No. DE 23691322

> -----Ursprüngliche Nachricht-----
> Von: Dimitris Zacharopoulos <ji...@it.auth.gr>
> Gesendet: Donnerstag, 24. Januar 2019 11:52
> An: Buschart, Rufus (GS IT HR 7 4) <rufus.busch...@siemens.com>; 
> mozilla-dev-security-pol...@lists.mozilla.org
> Betreff: Re: AW: AW: Incident Report DFN-PKI: Non-IDNA2003 encoded 
> international domain names
> 
> I referred to your comment that "you perform a successful domain validation". 
> My point, which you seem to understand and agree, is
> that there are additional rules than just DNS validation.
> 
> Dimitris.
> 
> 
> On 24/1/2019 12:21 μ.μ., Buschart, Rufus wrote:
> > Hello Dimitris,
> >
> > of course not, because the underscore is not part of the syntax for a 
> > hostname acc. RFC 1034, chapter 3.5. whereas xn--gau-
> 7ka.siemens.de is a perfectly valid hostname.
> >
> > With best regards,
> > Rufus Buschart
> >
> > Siemens AG
> > Information Technology
> > Human Resources
> > PKI / Trustcenter
> > GS IT HR 7 4
> > Hugo-Junkers-Str. 9
> > 90411 Nuernberg, Germany
> > Tel.: +49 1522 2894134
> > mailto:rufus.busch...@siemens.com
> > www.twitter.com/siemens
> >
> > www.siemens.com/ingenuityforlife
> >
> > Siemens Aktiengesellschaft: Chairman of the Supervisory Board: Jim
> > Hagemann Snabe; Managing Board: Joe Kaeser, Chairman, President and
> > Chief Executive Officer; Roland Busch, Lisa Davis, Klaus Helmrich,
> > Janina Kugel, Cedrik Neike, Michael Sen, Ralf P. Thomas; Registered
> > offices: Berlin and Munich, Germany; Commercial registries: Berlin
> > Charlottenburg, HRB 12300, Munich, HRB 6684; WEEE-Reg.-No. DE 23691322
> >
> >> -----Ursprüngliche Nachricht-----
> >> Von: Dimitris Zacharopoulos <ji...@it.auth.gr>
> >> Gesendet: Donnerstag, 24. Januar 2019 11:16
> >> An: Buschart, Rufus (GS IT HR 7 4) <rufus.busch...@siemens.com>;
> >> mozilla-dev-security-pol...@lists.mozilla.org
> >> Betreff: Re: AW: Incident Report DFN-PKI: Non-IDNA2003 encoded
> >> international domain names
> >>
> >> On 24/1/2019 10:47 π.μ., Buschart, Rufus via dev-security-policy wrote:
> >>> Good morning!
> >>>
> >>> I would like to sharpen my argument from below a little bit: If a CA
> >>> gets a request to issue a certificate for the domain xn--gau-
> >> 7ka.siemens.de, how can the CA tell, that xn--gau-7ka is a punycode
> >> string in IDNA2008 and not only a very strange server name? At least
> >> I don't have a glass bowl to read the mind of my customers. Therefor I 
> >> would say, it is perfectly okay to issue a certificate for xn--
> gau-7ka.siemens.de as long as you perform a successful domain validation for 
> xn--gau-7ka.siemens.de.
> >> By following this argument, you would also approve issuance of domain 
> >> names that contain the underscore "_" character, right?
> >>
> >> Dimitris.
> >>
> >>> With best regards,
> >>> Rufus Buschart
> >>>
> >>> Siemens AG
> >>> Information Technology
> >>> Human Resources
> >>> PKI / Trustcenter
> >>> GS IT HR 7 4
> >>> Hugo-Junkers-Str. 9
> >>> 90411 Nuernberg, Germany
> >>> Tel.: +49 1522 2894134
> >>> mailto:rufus.busch...@siemens.com
> >>> www.twitter.com/siemens
> >>>
> >>> www.siemens.com/ingenuityforlife
> >>>
> >>> Siemens Aktiengesellschaft: Chairman of the Supervisory Board: Jim
> >>> Hagemann Snabe; Managing Board: Joe Kaeser, Chairman, President and
> >>> Chief Executive Officer; Roland Busch, Lisa Davis, Klaus Helmrich,
> >>> Janina Kugel, Cedrik Neike, Michael Sen, Ralf P. Thomas; Registered
> >>> offices: Berlin and Munich, Germany; Commercial registries: Berlin
> >>> Charlottenburg, HRB 12300, Munich, HRB 6684; WEEE-Reg.-No. DE
> >>> 23691322
> >>>
> >>>> -----Ursprüngliche Nachricht-----
> >>>> Von: dev-security-policy
> >>>> <dev-security-policy-boun...@lists.mozilla.org> Im Auftrag von
> >>>> Buschart, Rufus via dev-security-policy
> >>>> Gesendet: Mittwoch, 23. Januar 2019 20:24
> >>>> An: mozilla-dev-security-pol...@lists.mozilla.org
> >>>> Betreff: AW: Incident Report DFN-PKI: Non-IDNA2003 encoded
> >>>> international domain names
> >>>>
> >>>> Hello!
> >>>>
> >>>>> Von: Servercert-wg <mailto:servercert-wg-boun...@cabforum.org> Im
> >>>>> Auftrag von Wayne Thayer via Servercert-wg
> >>>>>
> >>>>>> On Mon, Jan 21, 2019 at 5:50 PM Jeremy Rowley via Servercert-wg 
> >>>>>> <mailto:servercert...@cabforum.org> wrote:
> >>>>>> We received a report for someone saying that certificates issued with 
> >>>>>> puny-code are mis-issued if they use IDNA2008.
> >>>>>> Considering a number of people probably received the same report, I 
> >>>>>> figured we should raise and discuss the implications
> here.
> >>>>>> ISSUES:
> >>>>>> 1. Does a CA have to check the puny-code provided by a customer
> >>>>>> for compliance? Generally, we send the validation request to the
> >>>>>> puny-code domain (not the pre-conversation name). This confirms
> >>>> control over the domain so is there a need to check this?
> >>>>>> If we aren’t doing the conversion, are we actually an implementer in 
> >>>>>> this case?
> >>>>> The BRs require 5280 compliance, so yes I think CAs need to ensure that 
> >>>>> certificates they sign conform to IDNA2003.
> >>>> Where exactly in RFC5280 do you find the requirement that domains
> >>>> that follow IDNA2008 but not IDNA2003 are not permitted in a
> >>>> certificate? If I understand chapter 7.3 of RFC2008 correctly, it
> >>>> describes how to process a domain that follows IDNA2003 (rfc3490)
> >> but it does not forbid that a domain can be encoded in IDNA2008
> >> (rfc5890 / rfc5891). It simply says nothing special about how to handle it.
> >>>> Therefor I would interpret RFC5280 that in this case the domain
> >>>> name in punycode can (or better say MUST) be treated like any other 
> >>>> domain name.
> >>>>
> >>>> Excerpt from the bug mentioned by Jürgen:
> >>>>> Question: Are ACE-labels not encoded as IDNA 2003 in certificates
> >>>>> a misissuance under the Baseline Requirements? Yes, we think
> >>>> this is currently the case:
> >>>>> Baseline Requirements mandate conformance to exactly RFC 5280 and
> >>>>> don't reference/allow any updates, e.g., RFC 8399
> >>>>>
> >>>>> Chapter 7.2 of RFC 5280 https://tools.ietf.org/html/rfc5280#page-97 
> >>>>> states:
> >>>>> "Specifically, conforming implementations MUST perform the
> >>>>> conversion operation specified in Section 4 of RFC 3490, with the
> >>>> following clarifications: ...."
> >>>>> So, IDNs must be converted according to the rules of RFC 3490
> >>>>>
> >>>>> We, as a CA, don't perform the conversion mentioned in RFC 5280.
> >>>>> We receive/process ACE-labels only. This means that our system
> >>>> is likely not meant by the wording "conforming implementations" of RFC 
> >>>> 5280.
> >>>>> However, our systems have the technical means and generally the
> >>>>> responsibility to check for correct input. So, we shall
> >>>> check/enforce IDNA 2003 ACE-labels.
> >>>>
> >>>> I don't share your opinion, that you MUST check if a domain is a
> >>>> valid IDNA2003 domain, just because you could technically do so. I
> >>>> think this leads on a very slippery road. With the same argument
> >>>> one could require a CA to scan every web server before the issuance
> >>>> of a certificate (or even regularly while the certificate is valid) if 
> >>>> the web server is distributing malware (BRGs chapter 9.6.3 sub
> bullet 8).
> >> And this is obviously not the duty of a CA. So I understand the
> >> spirit of RFC 5280 and the BRGs that a CA has to perform domain validation 
> >> on the ACE-label but not to enforce any additional
> syntax on top of validated dNSNames.
> >>>> With best regards,
> >>>> Rufus Buschart
> >>>>
> >>>> Siemens AG
> >>>> Information Technology
> >>>> Human Resources
> >>>> PKI / Trustcenter
> >>>> GS IT HR 7 4
> >>>> Hugo-Junkers-Str. 9
> >>>> 90411 Nuernberg, Germany
> >>>> Tel.: +49 1522 2894134
> >>>> mailto:rufus.busch...@siemens.com
> >>>> www.twitter.com/siemens
> >>>>
> >>>> www.siemens.com/ingenuityforlife
> >>>>
> >>>> Siemens Aktiengesellschaft: Chairman of the Supervisory Board: Jim
> >>>> Hagemann Snabe; Managing Board: Joe Kaeser, Chairman, President and
> >>>> Chief Executive Officer; Roland Busch, Lisa Davis, Klaus
> >> Helmrich, Janina Kugel, Cedrik Neike, Michael Sen, Ralf P.
> >>>> Thomas; Registered offices: Berlin and Munich, Germany; Commercial
> >>>> registries: Berlin Charlottenburg, HRB 12300, Munich, HRB 6684;
> >>>> WEEE-Reg.-No. DE 23691322
> >>>>
> >>>>> -----Ursprüngliche Nachricht-----
> >>>>> Von: dev-security-policy
> >>>>> <dev-security-policy-boun...@lists.mozilla.org> Im Auftrag von
> >>>>> Jürgen Brauckmann via dev-security-policy
> >>>>> Gesendet: Mittwoch, 23. Januar 2019 13:42
> >>>>> An: mozilla-dev-security-pol...@lists.mozilla.org
> >>>>> Betreff: Incident Report DFN-PKI: Non-IDNA2003 encoded
> >>>>> international domain names
> >>>>>
> >>>>> We received a report about non-idna2003 encoded international
> >>>>> domain names. 4 certificates were affected and are revoked by
> >>>> now.
> >>>>> Details can be found here:
> >>>>> https://bugzilla.mozilla.org/show_bug.cgi?id=1522080
> >>>>>
> >>>>> Please also take note of the ongoing discussion regarding this
> >>>>> topic in the CA/B Forum's Server Certificate Working Group mailing
> >> list:
> >>>>> https://cabforum.org/pipermail/servercert-wg/2019-January/000520.html 
> >>>>> ff.
> >>>>>
> >>>>> Thanks,
> >>>>>       Jürgen
> >>>>> _______________________________________________
> >>>>> dev-security-policy mailing list
> >>>>> dev-security-policy@lists.mozilla.org
> >>>>> https://lists.mozilla.org/listinfo/dev-security-policy
> >>> _______________________________________________
> >>> dev-security-policy mailing list
> >>> dev-security-policy@lists.mozilla.org
> >>> https://lists.mozilla.org/listinfo/dev-security-policy
> >>>
> >

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to