Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-10 Thread Hubert Kario
On Wednesday 10 June 2015 07:28:06 Rick Andrews wrote:
> I don't understand. The domain owner/admin is not a third party. 

the third party in question was an entity running the CT service

and since they can produce a certificate signed by a trusted CA as a proof of 
misissuance, the data itself is also trusted. Independent of your trust of the 
third party.

> 
> -Rick
> 
> 
> > On Jun 10, 2015, at 4:01 AM, Hubert Kario  wrote:
> > 
> > 
> >> On Tuesday 09 June 2015 11:57:40 Rick Andrews wrote:
> >> 
> >>> On Tuesday, June 9, 2015 at 3:05:30 AM UTC-7, Hubert Kario wrote:
> >>> True, OTOH, if a third party says that there was a misissuance, that
> >>> means
> >>> there was one.
> >> 
> >> 
> >> I disagree. Only the domain owner knows for sure what is a misissuance,
> >> and what isn't. It seems likely that I might turn over all known certs
> >> for my domain to the third party, but they might find another one, and I
> >> might say "oh, yeah, I forgot about that one". So a third party can only
> >> report to the domain owner, but cannot know if the cert is legitimate.
> > 
> > 
> > the implied situation was that the tool is run by the domain owner/admin
> > 
> > -- 
> > Regards,
> > Hubert Kario
> > Quality Engineer, QE BaseOS Security team
> > Web: www.cz.redhat.com
> > Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic
> 
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy

-- 
Regards,
Hubert Kario
Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic

signature.asc
Description: This is a digitally signed message part.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-10 Thread Rick Andrews
I don't understand. The domain owner/admin is not a third party. 

-Rick

> On Jun 10, 2015, at 4:01 AM, Hubert Kario  wrote:
> 
>> On Tuesday 09 June 2015 11:57:40 Rick Andrews wrote:
>>> On Tuesday, June 9, 2015 at 3:05:30 AM UTC-7, Hubert Kario wrote:
>>> True, OTOH, if a third party says that there was a misissuance, that means
>>> there was one.
>> 
>> I disagree. Only the domain owner knows for sure what is a misissuance, and
>> what isn't. It seems likely that I might turn over all known certs for my
>> domain to the third party, but they might find another one, and I might say
>> "oh, yeah, I forgot about that one". So a third party can only report to
>> the domain owner, but cannot know if the cert is legitimate.
> 
> the implied situation was that the tool is run by the domain owner/admin
> 
> -- 
> Regards,
> Hubert Kario
> Quality Engineer, QE BaseOS Security team
> Web: www.cz.redhat.com
> Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New certificate search tool - crt.sh

2015-06-10 Thread Rob Stradling

On 03/06/15 16:46, Rob Stradling wrote:

On 03/06/15 16:15, Richard Barnes wrote:



David Keeler has done some work on visualizing certs that may be helpful.
http://people.mozilla.org/~dkeeler/certsplainer/
https://github.com/mozkeeler/certsplainer


I'll take a look.  Thanks.


Hi Richard.  I've been looking at certsplainer.  There seem to be no 
limits on what you can do with JavaScript these days!


BTW, https://crt.sh now has a certificate ASN.1 dump feature, powered by 
asn1js.  :-)


--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New certificate search tool - crt.sh

2015-06-10 Thread Hubert Kario
On Tuesday 09 June 2015 10:53:37 Rob Stradling wrote:
> On 08/06/15 15:09, Rob Stradling wrote:
> > On 08/06/15 14:54, Hubert Kario wrote:
> >> On Wednesday 03 June 2015 09:43:23 Eric Mill wrote:
> >>> This is outstanding - simple, but totally what people need to start
> >>> getting
> >>> the idea and benefit of CT.
> >>> 
> >>> One high ROI addition might be RSS feeds for search terms. That way, I
> >>> could create e.g. an IFTTT alert that emails me whenever a
> >>> certificate is
> >>> publicly logged as being issued for my domains.
> >>> 
> >>> -- Eric
> >> 
> >> +1 on the awesome tool
> > 
> > Thanks Hubert.  :-)
> > 
> >> and I would like to propose to extend the RSS to a general web API (JSON)
> > 
> > Makes sense.  I've added this to my to-do list.
> 
> Hubert, I think a standard API for interfacing with CT monitors would be
> a bigger win than an API that's specific to https://crt.sh.  See the
> message I just posted to the "CA scope transparency" thread.

I agree, but we need to start from somewhere.

and starting with a versioned API, that is precisely defined and documented, 
on the crt.sh website would be, IMHO, a good way to do that

> >>> On Wed, Jun 3, 2015 at 8:56 AM, Rob Stradling 
> >>> 
> >>> wrote:
>  Hi.  I thought folks here might find this useful.  It's a web interface
>  that lets you search for certs that have been logged by CT.
>  
>  https://crt.sh
>  
>  Pronounced "search".  :-)

-- 
Regards,
Hubert Kario
Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic

signature.asc
Description: This is a digitally signed message part.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-10 Thread Hubert Kario
On Tuesday 09 June 2015 11:57:40 Rick Andrews wrote:
> On Tuesday, June 9, 2015 at 3:05:30 AM UTC-7, Hubert Kario wrote:
> > True, OTOH, if a third party says that there was a misissuance, that means
> > there was one.
> 
> I disagree. Only the domain owner knows for sure what is a misissuance, and
> what isn't. It seems likely that I might turn over all known certs for my
> domain to the third party, but they might find another one, and I might say
> "oh, yeah, I forgot about that one". So a third party can only report to
> the domain owner, but cannot know if the cert is legitimate.

the implied situation was that the tool is run by the domain owner/admin

-- 
Regards,
Hubert Kario
Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic

signature.asc
Description: This is a digitally signed message part.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-10 Thread Matt Palmer
On Wed, Jun 10, 2015 at 10:53:30AM +0100, Rob Stradling wrote:
> On 10/06/15 01:54, Matt Palmer wrote:
> >A log has a single well-defined purpose, and I don't think that adding 
> >independent
> >functionality to the purpose of the log itself is a winning strategy.
> 
> Indeed.  A log and a monitor are separate software components.
> 
> Sorry I was unclear.  I was imagining that a provider might want to provide
> both a log and a monitor for that log, running from the same server, using a
> shared database.  (IMHO, we shouldn't require this, but we shouldn't
> prohibit it either).

I must say, I'd never thought that anyone would try to forbid an entity
running a log from also running a monitor.  Its value, at least insofar as
it is attempting to detect malfeasance of the log operator, may be quite
limited, but that's for the users of the monitor service to decide for
themselves.

- Matt

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-10 Thread Rob Stradling

On 10/06/15 01:54, Matt Palmer wrote:

On Tue, Jun 09, 2015 at 10:44:58AM +0100, Rob Stradling wrote:

On 09/06/15 04:05, Clint Wilson wrote:

To further support your claims here, Chris, there are already tools coming out 
which actively monitor domains in CT logs and can be set up with notifications 
of misissuance:
https://www.digicert.com/certificate-monitoring/
https://groups.google.com/forum/#!topic/mozilla.dev.security.policy/EPv_u9V06n0

This type of tool for CT is only going to improve with time.


So I'm wondering if the TRANS WG should think about standardizing a JSON API
for searching CT logs and for setting up notifications of (mis-)issuance.
The server side of this API could be implemented by services such as
https://crt.sh or even directly by the logs themselves.


For logs themselves, as a requirement for *being* a log?  No.


Fully agree.


A log has a single well-defined purpose, and I don't think that adding 
independent
functionality to the purpose of the log itself is a winning strategy.


Indeed.  A log and a monitor are separate software components.

Sorry I was unclear.  I was imagining that a provider might want to 
provide both a log and a monitor for that log, running from the same 
server, using a shared database.  (IMHO, we shouldn't require this, but 
we shouldn't prohibit it either).



An API for querying the CT-relevant data for a collection of certificates...
*that* would probably be quite useful.


:-)


BTW, you probably won't be surprised to hear that I've been trying to think
of reasons to create a shell script called "crt.sh".  ;-)


Nope, not particularly surprised.


:-)

--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-10 Thread Rob Stradling

On 10/06/15 01:46, Matt Palmer wrote:

On Tue, Jun 09, 2015 at 12:00:23PM -0700, Rick Andrews wrote:

On Tuesday, June 9, 2015 at 7:45:05 AM UTC-7, Kurt Roeckx wrote:

On 2015-06-09 15:26, Peter Kurrasch wrote:

3) How frequently might such tools run? Or to put it differently, how much time 
do I probably have between when I issue a gmail cert and when someone figures 
it out (and of course how much longer before my illegitimate cert is no longer 
valid)? I need only 24 hours to do all the damage I want, but in a pinch I'll 
make do with 8.


CT allows to store precertificate.  That is, the CA says it intents to
issue a certificate.  Should we mandate the use of precertificates and a
minimum time between the precertificate and the real certificate?


Kirk,

The reason the CT designers invented SCTs was because the CAs weren't 
happy with the idea of CT imposing delays on certificate issuance.


The long term hope/expectation is that precertificates will become less 
and less common, as more and more webservers are enhanced to support the 
CT TLS extension and/or OCSP Stapling.  So the idea of requiring 
precertificates to be used is a non-starter, IMHO.


Also, note that CT is intended to help detect, not prevent, certificate 
misissuance.



Absolutely not. If a CA is unable to get the required minimum number of
SCTs, it will likely not issue the cert (sure, it may retry, but it's
possible that retries fail too).  Logging must be seen as intent, but not
a guarantee of issuance.


A minimum time doesn't imply a maximum (or, rather, a finite maximum).  From
your perspective, I'd object on another basis: any non-trivial delay in
issuance degrades the user experience of those acquiring certificates.  As a
consumer of CA services, I wouldn't want to have to wait (say) 3 days to get
my DV cert, just because of CT requirements.


Indeed so, Matt.  That's precisely why the CAs lobbied against delays on 
certificate issuance.


--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-10 Thread Matt Palmer
On Tue, Jun 09, 2015 at 10:44:58AM +0100, Rob Stradling wrote:
> On 09/06/15 04:05, Clint Wilson wrote:
> >To further support your claims here, Chris, there are already tools coming 
> >out which actively monitor domains in CT logs and can be set up with 
> >notifications of misissuance:
> >https://www.digicert.com/certificate-monitoring/
> >https://groups.google.com/forum/#!topic/mozilla.dev.security.policy/EPv_u9V06n0
> >
> >This type of tool for CT is only going to improve with time.
> 
> So I'm wondering if the TRANS WG should think about standardizing a JSON API
> for searching CT logs and for setting up notifications of (mis-)issuance.
> The server side of this API could be implemented by services such as
> https://crt.sh or even directly by the logs themselves.

For logs themselves, as a requirement for *being* a log?  No.  A log has a
single well-defined purpose, and I don't think that adding independent
functionality to the purpose of the log itself is a winning strategy.  An
API for querying the CT-relevant data for a collection of certificates...
*that* would probably be quite useful.

> BTW, you probably won't be surprised to hear that I've been trying to think
> of reasons to create a shell script called "crt.sh".  ;-)

Nope, not particularly surprised.

- Matt

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-10 Thread Matt Palmer
On Tue, Jun 09, 2015 at 08:26:55AM -0500, Peter Kurrasch wrote:
> 1) How to exclude domains from the search? For example I want to find
> gmail certs but exclude something like "eggmail" which could be a false
> positive.

Constrain your search to "domains which have a name part which is exactly
'gmail'".

> 2) How to address wild cards? For example can I bypass these detection
> tools by issuing a cert for "*[dot]innocentdomain[dot]com" instead of
> "gmail[dot]innocentdomain[dot]com"?

Fun times.

> 3) How frequently might such tools run? Or to put it differently, how much
> time do I probably have between when I issue a gmail cert and when someone
> figures it out (and of course how much longer before my illegitimate cert
> is no longer valid)?  I need only 24 hours to do all the damage I want,
> but in a pinch I'll make do with 8.

How frequently does the consumer of such services *want* the tool to run?

> 4) What's the expected model for a third-party monitor? Who might the
> organizations be and how might the monitoring be funded?

People give the monitor money.  The monitor protects their interests.

> In a way the SSL Labs service is a perfect example of the limitations of a
> monitoring service.  Their SSL Pulse found an awful lot of servers with
> a failing grade.

Luckily, CT doesn't aim to fix every Goober-with-Apache; it's main benefit
is in providing sunshine on CA operations, and making it easier to provide
complete evidence of malfeasance or incompetence.

- Matt

-- 
My favourite was some time ago, and involved a female customer thanking "Mr.
Daemon" for his effort trying to deliver her mail, and offering him a "good
time" if he ever visited Sydney.
-- Matt McLeod

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-10 Thread Matt Palmer
On Tue, Jun 09, 2015 at 12:00:23PM -0700, Rick Andrews wrote:
> On Tuesday, June 9, 2015 at 7:45:05 AM UTC-7, Kurt Roeckx wrote:
> > On 2015-06-09 15:26, Peter Kurrasch wrote:
> > > 3) How frequently might such tools run? Or to put it differently, how 
> > > much time do I probably have between when I issue a gmail cert and when 
> > > someone figures it out (and of course how much longer before my 
> > > illegitimate cert is no longer valid)? I need only 24 hours to do all the 
> > > damage I want, but in a pinch I'll make do with 8.
> > 
> > CT allows to store precertificate.  That is, the CA says it intents to 
> > issue a certificate.  Should we mandate the use of precertificates and a 
> > minimum time between the precertificate and the real certificate?
> 
> Absolutely not. If a CA is unable to get the required minimum number of
> SCTs, it will likely not issue the cert (sure, it may retry, but it's
> possible that retries fail too).  Logging must be seen as intent, but not
> a guarantee of issuance.

A minimum time doesn't imply a maximum (or, rather, a finite maximum).  From
your perspective, I'd object on another basis: any non-trivial delay in
issuance degrades the user experience of those acquiring certificates.  As a
consumer of CA services, I wouldn't want to have to wait (say) 3 days to get
my DV cert, just because of CT requirements.

- Matt

-- 
Advocating Object-Oriented Programming is like advocating Pants-Oriented
Clothing.
-- Jacob Gabrielson

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy