All,

I have started a similar, simultaneous discussion with the CA/Browser
Forum, in order to gain traction.

<goog_583396726>
https://lists.cabforum.org/pipermail/servercert-wg/2020-December/002382.html

Ben

On Wed, Dec 2, 2020 at 2:49 PM Jeremy Rowley <jeremy.row...@digicert.com>
wrote:

> Should this limit on reuse also apply to s/MIME? Right now, the 825 day
> limit in Mozilla policy only applies to TLS certs with email verification
> of s/MIME being allowed for infinity time.  The first draft of the language
> looked like it may change this while the newer language puts back the TLS
> limitation. If it's not addressed in this update, adding clarification on
> domain verification reuse for SMIME would be a good improvement on the
> existing policy.
>
> -----Original Message-----
> From: dev-security-policy <dev-security-policy-boun...@lists.mozilla.org>
> On Behalf Of Ben Wilson via dev-security-policy
> Sent: Wednesday, December 2, 2020 2:22 PM
> To: Ryan Sleevi <r...@sleevi.com>
> Cc: Doug Beattie <doug.beat...@globalsign.com>; Mozilla <
> mozilla-dev-security-pol...@lists.mozilla.org>
> Subject: Re: Policy 2.7.1: MRSP Issue #206: Limit re-use of domain name
> verification to 398 days
>
> See my responses inline below.
>
> On Tue, Dec 1, 2020 at 1:34 PM Ryan Sleevi <r...@sleevi.com> wrote:
>
> >
> >
> > On Tue, Dec 1, 2020 at 2:22 PM Ben Wilson via dev-security-policy <
> > dev-security-policy@lists.mozilla.org> wrote:
> >
> >> See responses inline below:
> >>
> >> On Tue, Dec 1, 2020 at 11:40 AM Doug Beattie
> >> <doug.beat...@globalsign.com
> >> >
> >> wrote:
> >>
> >> > Hi Ben,
> >> >
> >> > For now I won’t comment on the 398 day limit or the date which you
> >> propose
> >> > this to take effect (July 1, 2021), but on the ability of CAs to
> >> > re-use domain validations completed prior to 1 July for their full
> >> > 825 re-use period.  I'm assuming that the 398 day limit is only for
> >> > those domain validated on or after 1 July, 2021.  Maybe that is
> >> > your intent, but the wording is not clear (it's never been all that
> >> > clear)
> >> >
> >>
> >> Yes. (I agree that the wording is currently unclear and can be
> >> improved, which I'll work on as discussion progresses.)  That is the
> >> intent - for certificates issued beginning next July--new validations
> >> would be valid for
> >> 398 days, but existing, reused validations would be sunsetted and
> >> could be used for up to 825 days (let's say, until Oct. 1, 2023,
> >> which I'd advise against, given the benefits of freshness provided by
> >> re-performing methods in BR 3.2.2.4 and BR 3.2.2.5).
> >>
> >
> > Why? I have yet to see a compelling explanation from a CA about why
> > "grandfathering" old validations is good, and as you note, it
> > undermines virtually every benefit that is had by the reduction until
> 2023.
> >
>
> I am open to the idea of cutting off the tail earlier, at let's say,
> October 1, 2022, or earlier (see below).  I can work on language that does
> that.
>
>
> >
> > Ben, could you explain the rationale why this is better than the
> > simpler, clearer, and immediately beneficial for Mozilla users of
> > requiring new validations be conducted on-or-after 1 July 2021? Any CA
> > that had concerns would have ample time to ensure there is a fresh
> > domain validation before then, if they were concerned.
> >
>
> I don't have anything yet in particular with regard to a
> pros-cons/benefits-analysis-supported rationale, except that I expect
> push-back from SSL/TLS certificate subscribers and from CAs on their
> behalf. You're right, CAs could take the time between now and July 1st to
> obtain 398-day validations, but my concern is with the potential push-back.
>
> Also, as I mentioned before, I am interested in proposing this as a ballot
> in the CA/Browser Forum and seeing where it goes. I realize that this issue
> might come with added baggage from the history surrounding the
> validity-period changes that were previously defeated in the Forum, but it
> would still be good to see it adopted there first. Nonetheless, this issue
> is more than ripe enough to be resolved here by Mozilla as well.
>
>
>
> >
> > Doug, could you explain more about why it's undesirable to do that?
> >
> >
> >> >
> >> > Could you consider changing it to read more like this (feel free to
> >> > edit as needed):
> >> >
> >> > CAs may re-use domain validation for subjectAltName verifications
> >> > of dNSNames and IPAddresses done prior to July 1, 2021 for up to
> >> > 825 days
> >> <in
> >> > accordance with domain validation re-use in the BRs, section  4.2.1>.
> >> CAs
> >> > MUST limit domain re-use for subjectAltName verifications of
> >> > dNSNames
> >> and
> >> > IPAddresses to 398 days for domains validated on or after July 1,
> 2021.
> >> >
> >>
> >> Thanks. I am open to all suggestions and improvements to the language.
> >> I'll
> >> see how this can be phrased appropriately to reduce the chance for
> >> misinterpretation.
> >>
> >
> > As noted above, I think adopting this wording would prevent much
> > (any?) benefit from being achieved until 2023. I can understand that
> > 2023 is better than "never", but I'm surprised to see an agreement so
> > quickly to that being desirable over 2021. I suspect there's ample
> > context here, but I think it would benefit from discussion.
> >
>
> The language needs to be worked on some more.  As I note above, we should
> come up with a cutoff date that is before 2023. It seems that two years is
> too long to wait for the last 825-day validation to expire when there are
> domain validation methods that work in a matter of seconds.
>
>
> >
> >
> >> > From a CA perspective, I don't have any major concerns with
> >> > shortening
> >> the
> >> > domain re-use periods, but customers do/will.  Will there be a
> >> > Mozilla
> >> blog
> >> > that outlines the security improvements with cutting the re-use
> >> > period
> >> in
> >> > half and why July 2021 is the right time?
> >
> > >
> >>
> >> Yes.  I'll prepare a blog post that outlines the security
> >> improvements to be obtained by shortening the reuse period. (E.g.,
> >> certificates should not contain stale information.) July 2021 was
> >> chosen because I figured April
> >> 2021 would be too soon. It also allows CAs to schedule any needed
> >> system work during Q2/2021. In my opinion, Oct. 2023 is a
> >> considerably long tail for this change, and existing
> >> domains/customers should not be affected until then.
> >
> >
> > Right, my concern is that it's "too long" a tail. There's no real
> > benefit in July 2021 - the benefits aren't really met until Oct 2023.
> >
>
> Other options for a cutoff, other than July 2021 or October 2022, could be
> December 1, 2021, January 31, 2022, or July 1, 2022.
>
> Ben
> _______________________________________________
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to