I'm thrilled to see Let's Encrypt go down this path. At Amazon we found the 
key to doing this was communication. In addition to our extensive reach 
outs, we ensured that customers had a temporary option to return to the old 
ICA with enough time to transition to the new ones before the old one 
expired.

We at Amazon Trust Services are happy to help Let's Encrypt with their 
communication plan or offer any advice we can from our experience doing 
this. We believe unequivocally that this is better for the internet and for 
our customers. 

Amir is right wrt problems with ICA pinning. Intermediates are volatile, 
they're not under end user control. The baseline requirements prevent a CA 
creating a contractual agreement to use a specific ICA based on the 
revocation requirements. 

Happy to help with this migration if we can offer guidance,

Jonathan Kozolchyk
Amazon Trust Services
On Wednesday, December 6, 2023 at 12:05:54 PM UTC-8 Amir Omidi (aaomidi) 
wrote:

> > Pinning the intermediate, and removing unneeded limbs from the tree is 
> consistent with the Saltzer and Schroeder's principle of least privilege, 
> and it reduces the attack surface. 
>
> Maybe? But keep in mind that roots are kept offline. As in, these keys are 
> kept in a safe, in a locked room with various ACLs. An intermediate 
> doesn't, and can't have the same levels of security around it. When (not 
> if) an intermediate is pwned, revoked, etc, you'll end up DoSing the 
> systems that have had an intermediate pinned.
>
>
> > But under this scheme, we cannot pin an intermediate used to issue the 
> end-entity certificate because the intermediate is a moving target. I don't 
> see how that's a win for the security team
>
> What is the answer to the security team if the intermediate you had pinned 
> to got revoked?
>
> I think these principals of pinning intermediates make a lot of sense when 
> speaking about PrivatePKI where one entity controls the full lifecycle, but 
> with PublicPKI it needs to elevate security principals for, well, the 
> public. Sometimes these security principals can be in contrast of what a 
> power user would be handling. In other words, communal & public 
> strengthening in security might lead to subjective/objective decrease in 
> security for the folks who know what they're doing.
>
> On Wednesday, December 6, 2023 at 1:21:30 PM UTC-5 Ryan Hurst wrote:
>
>>
>> In WebPKI, "key continuity" has resulted in numerous outages, some of 
>> which are effectively non-recoverable. Overall, we have learned that the 
>> global and distributed nature of WebPKI demands agility.
>>
>> Ryan
>>
>> On Wed, Dec 6, 2023 at 5:27 AM Peter Gutmann <pgu...@cs.auckland.ac.nz> 
>> wrote:
>>
>>> Filippo Valsorda <fil...@ml.filippo.io> writes:
>>>
>>> >I am not sure what you mean by key continuity being adopted for PKI use
>>>
>>> I meant the use of certificate pinning, so trusting the known-good cert 
>>> you've
>>> seen before and, like SSH when a key changes, triggering an alert if it
>>> changes.
>>>
>>> Peter.
>>>
>>> -- 
>>> You received this message because you are subscribed to the Google 
>>> Groups "dev-secur...@mozilla.org" group.
>>> To unsubscribe from this group and stop receiving emails from it, send 
>>> an email to dev-security-po...@mozilla.org.
>>>
>> To view this discussion on the web visit 
>>> https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/SY4PR01MB6251D5B575FFD8981ACC72A6EE84A%40SY4PR01MB6251.ausprd01.prod.outlook.com
>>> .
>>>
>>

-- 
You received this message because you are subscribed to the Google Groups 
"dev-security-policy@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to dev-security-policy+unsubscr...@mozilla.org.
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/9013689d-d267-4199-90b1-8b229285610bn%40mozilla.org.

Reply via email to