On Tue, Jun 04, 2024 at 04:31:15PM -0700, 'Amir Omidi (aaomidi)' via 
dev-security-policy@mozilla.org wrote:
> TWCA has a couple of incidents open for revocation delays. I think until
> this CA can show that it can follow its own CP/CPS and BRs, new trust
> anchors from that CA should not be accepted into the Mozilla Trust Store.

This exchange (in
https://bugzilla.mozilla.org/show_bug.cgi?id=1884568#c10) gives me reason
for concern:

> > Can you share how customers are being advised to explore alternate
> > methods to certificate pinning and what those methods might be?
>
> We currently suggest three possible methods:
> 1. Binding the public key instead of the certificate fingerprint.

This will work really great, right up until the point that the key gets
compromised... is it expected that a two-week delay in revocation for a
compromised private key is reasonable, just because the certificate is
pinned in a banking app?

The only answer to "how should we pin WebPKI certs?" that is in any way
defensible is "DON'T".  If you want/need to pin, then don't do it with
WebPKI certs -- or, heck, don't use certs at all.  If you've got an
out-of-band mechanism for determining trust in a given bunch of secret
bytes, X.509 isn't buying you anything except a widely-supported public
key delivery mechanism.

I'd personally like to see Mozilla strongly and actively discourage
certificate pinning, as it is a dangerous practice that is, quite
clearly, detrimental to the security of the WebPKI (it seems to be the
de rigeur plausible-looking excuse for CAs delaying revocation).  As a
bonus, maintenance of private PKIs for those organisations for whom
pinning is deemed a security benefit can be a lucrative source of income
for CAs.

Seems like a win-win to me!

Also, from that same bug:

> 1 is used for communication with Financial Information Service Co.,
> Ltd. (FISC, the national interbank processing center) and requires
> system update on FISC side.

Using a WebPKI certificate for client authentication seems...
particularly unwise.  I know I'm not going to get it, but I'd *really*
like to hear what the rationale for doing that was.

- Matt

-- 
You received this message because you are subscribed to the Google Groups 
"dev-security-policy@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to dev-security-policy+unsubscr...@mozilla.org.
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/c95adff8-09d8-416a-bc4c-21b9208c1eac%40mtasv.net.
  • Approval of Tai... 'Ben Wilson' via dev-security-policy@mozilla.org
    • Re: Approv... 'Amir Omidi (aaomidi)' via dev-security-policy@mozilla.org
      • Re: Ap... Matt Palmer
        • Re... 'Hao-Chun Li' via dev-security-policy@mozilla.org
      • Re: Ap... 'Hao-Chun Li' via dev-security-policy@mozilla.org
        • Re... 'Ben Wilson' via dev-security-policy@mozilla.org
      • Re: Ap... Chya-Hung Tsai

Reply via email to