Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-10 Thread Hubert Kario
On Tuesday 09 June 2015 11:57:40 Rick Andrews wrote:
 On Tuesday, June 9, 2015 at 3:05:30 AM UTC-7, Hubert Kario wrote:
  True, OTOH, if a third party says that there was a misissuance, that means
  there was one.
 
 I disagree. Only the domain owner knows for sure what is a misissuance, and
 what isn't. It seems likely that I might turn over all known certs for my
 domain to the third party, but they might find another one, and I might say
 oh, yeah, I forgot about that one. So a third party can only report to
 the domain owner, but cannot know if the cert is legitimate.

the implied situation was that the tool is run by the domain owner/admin

-- 
Regards,
Hubert Kario
Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic

signature.asc
Description: This is a digitally signed message part.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New certificate search tool - crt.sh

2015-06-10 Thread Hubert Kario
On Tuesday 09 June 2015 10:53:37 Rob Stradling wrote:
 On 08/06/15 15:09, Rob Stradling wrote:
  On 08/06/15 14:54, Hubert Kario wrote:
  On Wednesday 03 June 2015 09:43:23 Eric Mill wrote:
  This is outstanding - simple, but totally what people need to start
  getting
  the idea and benefit of CT.
  
  One high ROI addition might be RSS feeds for search terms. That way, I
  could create e.g. an IFTTT alert that emails me whenever a
  certificate is
  publicly logged as being issued for my domains.
  
  -- Eric
  
  +1 on the awesome tool
  
  Thanks Hubert.  :-)
  
  and I would like to propose to extend the RSS to a general web API (JSON)
  
  Makes sense.  I've added this to my to-do list.
 
 Hubert, I think a standard API for interfacing with CT monitors would be
 a bigger win than an API that's specific to https://crt.sh.  See the
 message I just posted to the CA scope transparency thread.

I agree, but we need to start from somewhere.

and starting with a versioned API, that is precisely defined and documented, 
on the crt.sh website would be, IMHO, a good way to do that

  On Wed, Jun 3, 2015 at 8:56 AM, Rob Stradling rob.stradl...@comodo.com
  
  wrote:
  Hi.  I thought folks here might find this useful.  It's a web interface
  that lets you search for certs that have been logged by CT.
  
  https://crt.sh
  
  Pronounced search.  :-)

-- 
Regards,
Hubert Kario
Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic

signature.asc
Description: This is a digitally signed message part.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-10 Thread Matt Palmer
On Tue, Jun 09, 2015 at 12:00:23PM -0700, Rick Andrews wrote:
 On Tuesday, June 9, 2015 at 7:45:05 AM UTC-7, Kurt Roeckx wrote:
  On 2015-06-09 15:26, Peter Kurrasch wrote:
   3) How frequently might such tools run? Or to put it differently, how 
   much time do I probably have between when I issue a gmail cert and when 
   someone figures it out (and of course how much longer before my 
   illegitimate cert is no longer valid)? I need only 24 hours to do all the 
   damage I want, but in a pinch I'll make do with 8.
  
  CT allows to store precertificate.  That is, the CA says it intents to 
  issue a certificate.  Should we mandate the use of precertificates and a 
  minimum time between the precertificate and the real certificate?
 
 Absolutely not. If a CA is unable to get the required minimum number of
 SCTs, it will likely not issue the cert (sure, it may retry, but it's
 possible that retries fail too).  Logging must be seen as intent, but not
 a guarantee of issuance.

A minimum time doesn't imply a maximum (or, rather, a finite maximum).  From
your perspective, I'd object on another basis: any non-trivial delay in
issuance degrades the user experience of those acquiring certificates.  As a
consumer of CA services, I wouldn't want to have to wait (say) 3 days to get
my DV cert, just because of CT requirements.

- Matt

-- 
Advocating Object-Oriented Programming is like advocating Pants-Oriented
Clothing.
-- Jacob Gabrielson

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-10 Thread Matt Palmer
On Tue, Jun 09, 2015 at 08:26:55AM -0500, Peter Kurrasch wrote:
 1) How to exclude domains from the search? For example I want to find
 gmail certs but exclude something like eggmail which could be a false
 positive.

Constrain your search to domains which have a name part which is exactly
'gmail'.

 2) How to address wild cards? For example can I bypass these detection
 tools by issuing a cert for *[dot]innocentdomain[dot]com instead of
 gmail[dot]innocentdomain[dot]com?

Fun times.

 3) How frequently might such tools run? Or to put it differently, how much
 time do I probably have between when I issue a gmail cert and when someone
 figures it out (and of course how much longer before my illegitimate cert
 is no longer valid)?  I need only 24 hours to do all the damage I want,
 but in a pinch I'll make do with 8.

How frequently does the consumer of such services *want* the tool to run?

 4) What's the expected model for a third-party monitor? Who might the
 organizations be and how might the monitoring be funded?

People give the monitor money.  The monitor protects their interests.

 In a way the SSL Labs service is a perfect example of the limitations of a
 monitoring service.  Their SSL Pulse found an awful lot of servers with
 a failing grade.

Luckily, CT doesn't aim to fix every Goober-with-Apache; it's main benefit
is in providing sunshine on CA operations, and making it easier to provide
complete evidence of malfeasance or incompetence.

- Matt

-- 
My favourite was some time ago, and involved a female customer thanking Mr.
Daemon for his effort trying to deliver her mail, and offering him a good
time if he ever visited Sydney.
-- Matt McLeod

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-10 Thread Rob Stradling

On 10/06/15 01:54, Matt Palmer wrote:

On Tue, Jun 09, 2015 at 10:44:58AM +0100, Rob Stradling wrote:

On 09/06/15 04:05, Clint Wilson wrote:

To further support your claims here, Chris, there are already tools coming out 
which actively monitor domains in CT logs and can be set up with notifications 
of misissuance:
https://www.digicert.com/certificate-monitoring/
https://groups.google.com/forum/#!topic/mozilla.dev.security.policy/EPv_u9V06n0

This type of tool for CT is only going to improve with time.


So I'm wondering if the TRANS WG should think about standardizing a JSON API
for searching CT logs and for setting up notifications of (mis-)issuance.
The server side of this API could be implemented by services such as
https://crt.sh or even directly by the logs themselves.


For logs themselves, as a requirement for *being* a log?  No.


Fully agree.


A log has a single well-defined purpose, and I don't think that adding 
independent
functionality to the purpose of the log itself is a winning strategy.


Indeed.  A log and a monitor are separate software components.

Sorry I was unclear.  I was imagining that a provider might want to 
provide both a log and a monitor for that log, running from the same 
server, using a shared database.  (IMHO, we shouldn't require this, but 
we shouldn't prohibit it either).



An API for querying the CT-relevant data for a collection of certificates...
*that* would probably be quite useful.


:-)


BTW, you probably won't be surprised to hear that I've been trying to think
of reasons to create a shell script called crt.sh.  ;-)


Nope, not particularly surprised.


:-)

--
Rob Stradling
Senior Research  Development Scientist
COMODO - Creating Trust Online

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-10 Thread Rick Andrews
I don't understand. The domain owner/admin is not a third party. 

-Rick

 On Jun 10, 2015, at 4:01 AM, Hubert Kario hka...@redhat.com wrote:
 
 On Tuesday 09 June 2015 11:57:40 Rick Andrews wrote:
 On Tuesday, June 9, 2015 at 3:05:30 AM UTC-7, Hubert Kario wrote:
 True, OTOH, if a third party says that there was a misissuance, that means
 there was one.
 
 I disagree. Only the domain owner knows for sure what is a misissuance, and
 what isn't. It seems likely that I might turn over all known certs for my
 domain to the third party, but they might find another one, and I might say
 oh, yeah, I forgot about that one. So a third party can only report to
 the domain owner, but cannot know if the cert is legitimate.
 
 the implied situation was that the tool is run by the domain owner/admin
 
 -- 
 Regards,
 Hubert Kario
 Quality Engineer, QE BaseOS Security team
 Web: www.cz.redhat.com
 Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New certificate search tool - crt.sh

2015-06-10 Thread Rob Stradling

On 03/06/15 16:46, Rob Stradling wrote:

On 03/06/15 16:15, Richard Barnes wrote:

snip

David Keeler has done some work on visualizing certs that may be helpful.
http://people.mozilla.org/~dkeeler/certsplainer/
https://github.com/mozkeeler/certsplainer


I'll take a look.  Thanks.


Hi Richard.  I've been looking at certsplainer.  There seem to be no 
limits on what you can do with JavaScript these days!


BTW, https://crt.sh now has a certificate ASN.1 dump feature, powered by 
asn1js.  :-)


--
Rob Stradling
Senior Research  Development Scientist
COMODO - Creating Trust Online

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-10 Thread Hubert Kario
On Wednesday 10 June 2015 07:28:06 Rick Andrews wrote:
 I don't understand. The domain owner/admin is not a third party. 

the third party in question was an entity running the CT service

and since they can produce a certificate signed by a trusted CA as a proof of 
misissuance, the data itself is also trusted. Independent of your trust of the 
third party.

 
 -Rick
 
 
  On Jun 10, 2015, at 4:01 AM, Hubert Kario hka...@redhat.com wrote:
  
  
  On Tuesday 09 June 2015 11:57:40 Rick Andrews wrote:
  
  On Tuesday, June 9, 2015 at 3:05:30 AM UTC-7, Hubert Kario wrote:
  True, OTOH, if a third party says that there was a misissuance, that
  means
  there was one.
  
  
  I disagree. Only the domain owner knows for sure what is a misissuance,
  and what isn't. It seems likely that I might turn over all known certs
  for my domain to the third party, but they might find another one, and I
  might say oh, yeah, I forgot about that one. So a third party can only
  report to the domain owner, but cannot know if the cert is legitimate.
  
  
  the implied situation was that the tool is run by the domain owner/admin
  
  -- 
  Regards,
  Hubert Kario
  Quality Engineer, QE BaseOS Security team
  Web: www.cz.redhat.com
  Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic
 
 ___
 dev-security-policy mailing list
 dev-security-policy@lists.mozilla.org
 https://lists.mozilla.org/listinfo/dev-security-policy

-- 
Regards,
Hubert Kario
Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic

signature.asc
Description: This is a digitally signed message part.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy