Re: New wiki page on certificate revocation plans

2015-12-04 Thread Jakob Bohm

On 04/12/2015 15:58, Kurt Roeckx wrote:

On 2015-12-04 15:21, Jakob Bohm wrote:

On 04/12/2015 11:19, Kurt Roeckx wrote:

On 2015-12-04 02:55, Jakob Bohm wrote:

How huge and unwieldy are CRLs really, especially if letting the
computer (NSS/Firefox) do the updating?


Individual CRLs are in the range of a few kB to a few MB.  For the CA
that issues the subscriber certificates they have a maximum validity of
10 days but should be updated at least every 7 days.

The problem is that you want to check that CRLs before you send anything
to that site, so either you need to download that CRL during the
handshake, delaying the whole thing, of you would need to download all
the CRLs beforehand and update them regularly.

If you want to download them before you connect, you have a problem that
you don't know them all.  You only know about the root CAs, not the
intermediate ones.  But you do cache the intermediates that you've seen.



You know the ones for all the certificates you have during validation,
because each certificate lists all the applicable URLs directly. Root
CA certs only list the (optional) CRL whose sole job is to self-revoke
the root itself in worst case scenarios.  This CRL may or may not be the
same URL as the CRL that is used to revoke directly issued certificates.


It should be a different CRL.  A CRL is only about a specific CA
certificate.



The point is, that the two (one) CRLs are both for certificates issued
by that self-signed root CA.


Downloading for all the intermediates would be in the order of several
GB a week that you need to download.



As for timing, there is the bootstrap problem of slowing down the first
connection needing a specific CRL (whose URL may not, in general, be
known in advance), but subsequent connections to certificates pointing
to that URL can use a cached CRL, which is preemptively updated at the
first few "update by" times until N such downloads have been done
without any reuse of that CRL. Thus for a typical user surfing mostly
sites signed by the biggest 3-4 CAs plus 1 or 2 regional CAs, the
weekly update would be limited to those (and only to those subCAs
actually referenced).


I currently have 197 non-root CAs in my browsers cache.




But how many of those were accessed /recently/ and how big are their
CRLs.  And how does this compare to your regular weekly network usage,
since I suspect a close correlation between the general level of user
Internet activity and the number of subCAs involved in any given month.

However this is also why I wrote at length about how ensuring that all
mainstream/common browsers accept the more "recent" CRL format version
will allow CAs to set up bandwidth-saving delta CRL schemes for
certificates issued after this becomes a reality (remember that CRLs
are referenced by the certificates they can revoke, not the subCA that
signed those certificates).

This general availability of v2+ CRL  format compatibility applies
regardless if those specific browsers use CRL download by default or
not, just like the slow adaptation of SHA-2 in Microsoft browsers and
e-mail clients held back the SHA-2 transition for at least a decade
(and is still holding it back for code signing certificates because
Microsoft officially refuses to provide this update for some of its
OSes that software developers still need to support.)

Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2015-12-04 Thread Kurt Roeckx

On 2015-12-04 15:21, Jakob Bohm wrote:

On 04/12/2015 11:19, Kurt Roeckx wrote:

On 2015-12-04 02:55, Jakob Bohm wrote:

How huge and unwieldy are CRLs really, especially if letting the
computer (NSS/Firefox) do the updating?


Individual CRLs are in the range of a few kB to a few MB.  For the CA
that issues the subscriber certificates they have a maximum validity of
10 days but should be updated at least every 7 days.

The problem is that you want to check that CRLs before you send anything
to that site, so either you need to download that CRL during the
handshake, delaying the whole thing, of you would need to download all
the CRLs beforehand and update them regularly.

If you want to download them before you connect, you have a problem that
you don't know them all.  You only know about the root CAs, not the
intermediate ones.  But you do cache the intermediates that you've seen.



You know the ones for all the certificates you have during validation,
because each certificate lists all the applicable URLs directly. Root
CA certs only list the (optional) CRL whose sole job is to self-revoke
the root itself in worst case scenarios.  This CRL may or may not be the
same URL as the CRL that is used to revoke directly issued certificates.


It should be a different CRL.  A CRL is only about a specific CA 
certificate.



Downloading for all the intermediates would be in the order of several
GB a week that you need to download.



As for timing, there is the bootstrap problem of slowing down the first
connection needing a specific CRL (whose URL may not, in general, be
known in advance), but subsequent connections to certificates pointing
to that URL can use a cached CRL, which is preemptively updated at the
first few "update by" times until N such downloads have been done
without any reuse of that CRL. Thus for a typical user surfing mostly
sites signed by the biggest 3-4 CAs plus 1 or 2 regional CAs, the
weekly update would be limited to those (and only to those subCAs
actually referenced).


I currently have 197 non-root CAs in my browsers cache.


Kurt

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2015-12-04 Thread Jakob Bohm

On 04/12/2015 11:19, Kurt Roeckx wrote:

On 2015-12-04 02:55, Jakob Bohm wrote:

How huge and unwieldy are CRLs really, especially if letting the
computer (NSS/Firefox) do the updating?


Individual CRLs are in the range of a few kB to a few MB.  For the CA
that issues the subscriber certificates they have a maximum validity of
10 days but should be updated at least every 7 days.

The problem is that you want to check that CRLs before you send anything
to that site, so either you need to download that CRL during the
handshake, delaying the whole thing, of you would need to download all
the CRLs beforehand and update them regularly.

If you want to download them before you connect, you have a problem that
you don't know them all.  You only know about the root CAs, not the
intermediate ones.  But you do cache the intermediates that you've seen.



You know the ones for all the certificates you have during validation,
because each certificate lists all the applicable URLs directly. Root
CA certs only list the (optional) CRL whose sole job is to self-revoke
the root itself in worst case scenarios.  This CRL may or may not be the
same URL as the CRL that is used to revoke directly issued certificates.


Downloading for all the intermediates would be in the order of several
GB a week that you need to download.



As for timing, there is the bootstrap problem of slowing down the first
connection needing a specific CRL (whose URL may not, in general, be
known in advance), but subsequent connections to certificates pointing
to that URL can use a cached CRL, which is preemptively updated at the
first few "update by" times until N such downloads have been done
without any reuse of that CRL. Thus for a typical user surfing mostly
sites signed by the biggest 3-4 CAs plus 1 or 2 regional CAs, the
weekly update would be limited to those (and only to those subCAs
actually referenced).

If all relevant browsers (I suspect NSS is or was the last holdout)
supports v2+ CRLs with extra attributes in them, then the CA can
publish delta CRLs to greatly reduce the per-refresh download size.

If a still relevant browser supports only the original v1 CRL format,
the CA cannot include the attributes needed to protect against MitM
attackers duplicating one of the CRLs (master or delta) for the other
to hide that the attacker is using a revoked certificate listed only in
the thus suppressed CRL.  This in turn is because it is legal (and
good) for a certificate to provide redundant URLs for the same CRL, so
the browser cannot object to discovering that multiple listed URLs
point return the same CRL, unless that CRL contains a v2+ extension
attribute saying it should only be returned from one of the other URLs.

With proper delta CRL support across browsers, it might also be
possible (I think) for a huge CRL to be split into multiple layers:
A master updated every few months, a medium delta updated weekly and a
minimal delta updated daily (or even hourly).

Of cause all the technical details are in the relevant official
specifications from ITU-T, RSADSI and IETF.

Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2015-12-04 Thread Kurt Roeckx

On 2015-12-04 02:55, Jakob Bohm wrote:

How huge and unwieldy are CRLs really, especially if letting the
computer (NSS/Firefox) do the updating?


Individual CRLs are in the range of a few kB to a few MB.  For the CA 
that issues the subscriber certificates they have a maximum validity of 
10 days but should be updated at least every 7 days.


The problem is that you want to check that CRLs before you send anything 
to that site, so either you need to download that CRL during the 
handshake, delaying the whole thing, of you would need to download all 
the CRLs beforehand and update them regularly.


If you want to download them before you connect, you have a problem that 
you don't know them all.  You only know about the root CAs, not the 
intermediate ones.  But you do cache the intermediates that you've seen.


Downloading for all the intermediates would be in the order of several 
GB a week that you need to download.



Kurt

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2015-12-03 Thread Jakob Bohm

On 04/12/2015 02:20, Matt Palmer wrote:

On Thu, Dec 03, 2015 at 07:32:43PM +0100, Jakob Bohm wrote:

On 03/12/2015 11:25, Gervase Markham wrote:

On 30/11/15 22:37, Jakob Bohm wrote:

1.2. Certificates that are moved from a server software implementation
that does do OCSP stapling to another that doesn't.  In particular,
such cases should not lead to "certificate pinning errors" or any
similar failure modes.


You'll need to get a new cert if you have one which has must-staple in
it and you want to use it on a webserver which does not support stapling.


I wonder what the benefit is then (other than some CAs being able to force
their customers to reduce load on their OCSP servers).

Specifically: Regular stapling already provides the load and
performance benefits when used.  Non-stapling would result in an OCSP
or CRL check without the change and/or without the extension, while it
would result in instant failure with the change *and* the extension.


You're assuming a world in which OCSP or CRL checks are done as a matter of
course.  They're not, because they're largely worthless (OCSP is not
perfectly reliable, thus preventing hard-fail semantics, and CRLs are huge,
unwieldy, and thus rarely updated by clients).  Thus, a certificate without
must-staple is able to be used by someone who has acquired the corresponding
private key *long* after it has been revoked.  On the other hand, a
must-staple certificate isn't going to last past the OCSP response lifetime.

- Matt



How huge and unwieldy are CRLs really, especially if letting the 
computer (NSS/Firefox) do the updating?


Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2015-12-03 Thread Matt Palmer
On Thu, Dec 03, 2015 at 07:32:43PM +0100, Jakob Bohm wrote:
> On 03/12/2015 11:25, Gervase Markham wrote:
> >On 30/11/15 22:37, Jakob Bohm wrote:
> >>1.2. Certificates that are moved from a server software implementation
> >>that does do OCSP stapling to another that doesn't.  In particular,
> >>such cases should not lead to "certificate pinning errors" or any
> >>similar failure modes.
> >
> >You'll need to get a new cert if you have one which has must-staple in
> >it and you want to use it on a webserver which does not support stapling.
> 
> I wonder what the benefit is then (other than some CAs being able to force
> their customers to reduce load on their OCSP servers).
> 
> Specifically: Regular stapling already provides the load and
> performance benefits when used.  Non-stapling would result in an OCSP
> or CRL check without the change and/or without the extension, while it
> would result in instant failure with the change *and* the extension.

You're assuming a world in which OCSP or CRL checks are done as a matter of
course.  They're not, because they're largely worthless (OCSP is not
perfectly reliable, thus preventing hard-fail semantics, and CRLs are huge,
unwieldy, and thus rarely updated by clients).  Thus, a certificate without
must-staple is able to be used by someone who has acquired the corresponding
private key *long* after it has been revoked.  On the other hand, a
must-staple certificate isn't going to last past the OCSP response lifetime.

- Matt

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2015-12-03 Thread Jakob Bohm

On 03/12/2015 11:25, Gervase Markham wrote:

On 30/11/15 22:37, Jakob Bohm wrote:

1.1. Certificates that are used on servers that don't implement
OCSP stapling.


No-one is suggesting dropping support for non-stapling web servers. But
the revocation options will not be as good.



Good.


1.2. Certificates that are moved from a server software implementation
that does do OCSP stapling to another that doesn't.  In particular,
such cases should not lead to "certificate pinning errors" or any
similar failure modes.


You'll need to get a new cert if you have one which has must-staple in
it and you want to use it on a webserver which does not support stapling.



I wonder what the benefit is then (other than some CAs being able to 
force their customers to reduce load on their OCSP servers).


Specifically: Regular stapling already provides the load and
performance benefits when used.  Non-stapling would result in an OCSP
or CRL check without the change and/or without the extension, while it
would result in instant failure with the change *and* the extension.




2. Reintroducing the original CRL support (as was once present in
Netscape browsers) would be a much more privacy friendly and efficient
thing than trying to run a centralized Chrome-style "OneCRL" service
for all ordinary revocations at all levels.


The privacy and performance trade-offs between CRLs, OCSP and OneCRL
have been hashed out many times. It's unlikely to be worth discussing
them again unless you have anything new to add.



Where?  Could you point me to such a discussion?



Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2015-12-03 Thread Gervase Markham
On 30/11/15 22:37, Jakob Bohm wrote:
> 1.1. Certificates that are used on servers that don't implement
> OCSP stapling.

No-one is suggesting dropping support for non-stapling web servers. But
the revocation options will not be as good.

> 1.2. Certificates that are moved from a server software implementation
> that does do OCSP stapling to another that doesn't.  In particular,
> such cases should not lead to "certificate pinning errors" or any
> similar failure modes.

You'll need to get a new cert if you have one which has must-staple in
it and you want to use it on a webserver which does not support stapling.

> 1.3. Certificates that are used on multiple servers with the same owner
> but different software, where some such servers support OCSP stapling
> and others don't.  One example would be the *.mozilla.org certificates
> and the possibility (even if not applicable to Mozilla specifically)
> that some may differ in that capability.

Again, don't get must-staple in this case.

> 2. Reintroducing the original CRL support (as was once present in
> Netscape browsers) would be a much more privacy friendly and efficient
> thing than trying to run a centralized Chrome-style "OneCRL" service
> for all ordinary revocations at all levels.

The privacy and performance trade-offs between CRLs, OCSP and OneCRL
have been hashed out many times. It's unlikely to be worth discussing
them again unless you have anything new to add.

Gerv

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2015-12-01 Thread Jakob Bohm

Having seen the current (as of a few hours ago) wiki page, I have two
major things to add:

1. Unfortunately, not all https servers seem capable of doing
OCSP stapling, thus any viable requirements and mechanisms must allow
for:

1.1. Certificates that are used on servers that don't implement
OCSP stapling.

1.2. Certificates that are moved from a server software implementation
that does do OCSP stapling to another that doesn't.  In particular,
such cases should not lead to "certificate pinning errors" or any
similar failure modes.

1.3. Certificates that are used on multiple servers with the same owner
but different software, where some such servers support OCSP stapling
and others don't.  One example would be the *.mozilla.org certificates 
and the possibility (even if not applicable to Mozilla specifically) 
that some may differ in that capability.


2. Reintroducing the original CRL support (as was once present in
Netscape browsers) would be a much more privacy friendly and efficient
thing than trying to run a centralized Chrome-style "OneCRL" service
for all ordinary revocations at all levels.  Specifically:

2.1. Make Mozilla products recognize the CRL urls present in
certificate extensions (accepting both the RFC-standard and the
historic Netscape extension IDs), eliminate duplicate URLs and check
those CRLs automatically (as opposed to the silly system where users
had to enter the URLs and update frequencies manually for every CA).

2.2. CRLs should be cached in the (regular) browser cache according to
their signed information on expiry on renewal, not the expiry values in
HTTP headers.  However unreasonably short or long expirys should be
capped before use.  Of cause invalid CRLs (bad syntax, bad signature,
not valid at time of download, ...) should be discarded and not pollute
the cache.

2.3. If relevant valid and current CRLs are obtained, skip OCSP
querying for that certificate.  This improves user privacy as OCSP
requests reveal more about the users activities than CRL downloads, and
since CRL downloads don't occur for each certificate but more like once
per subCA per day/week.  It should also be faster than OCSP.
  It is noted that many CAs (don't know the percentage amongst CAs in
Mozilla's default trust list), update the CRL and OCSP at the same
frequency, so there is rarely a benefit to check both.

2.4. Include logic that recognizes valid implementations of delta CRLs
and other multi-CRL schemes and doesn't consider the checkable CRLs
complete until a full set has been obtained and checked (for purposes
of determining that the CRLs declare a certificate OK, but not for the
purposes of declaring a certificate BAD).

2.5 Include countermeasures for CAs that try to provide different CRL
URLs for different users, as that negates the intended privacy and
efficiency benefits.  In the past I am aware that the "TDC OCES" e-mail
CA did this before moving to an even less secure model.

2.6. Note that such direct in-browser CRL support would also work with 
CAs not on the default Mozilla trust list, including local CAs inside 
companies and communities, as well as "citizen ID" CAs (that don't

certify websites, but do certify users for e-mail and client-side TLS).

On 21/11/2015 18:00, Richard Barnes wrote:

Sorry, wrong thread.  Expect to see a security blog post about revocation
soon, summarizing some recent work :)

On Sat, Nov 21, 2015 at 11:59 AM, Richard Barnes 
wrote:


I took a hack at the blog post.  I kept your outline, but ended up
text-editing a bunch of it.  I think it's pretty good now.

On Thu, Jul 31, 2014 at 10:07 PM, Richard Barnes 
wrote:


Hi all,

We in the Mozilla PKI team have been discussing ways to improve
revocation checking in our PKI stack, consolidating a bunch of ideas from
earlier work [1][2] and some maybe-new-ish ideas.  I've just pressed "save"
on a new wiki page with our initial plan:

https://wiki.mozilla.org/CA:RevocationPlan

It would be really helpful if people could review and provide feedback on
this plan.

There's one major open issue highlighted in the wiki page.  We're
planning to adopt a centralized revocation list model for CA certificates,
which we're calling OneCRL.  (Conceptually similar to Chrome's CRLsets.)
In addition to covering CA certifcates, we're also considering covering
some end-entity (EE) certificates with OneCRL too.  But there are some
drawbacks to this approach, so it's not certain that we will include this
in the final plan.  Feedback on this point would be especially valuable.

Thanks a lot,
--Richard

[1] https://wiki.mozilla.org/CA:ImprovingRevocation
[2] https://www.imperialviolet.org/2012/02/05/crlsets.html
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy







Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
Thi

Re: New wiki page on certificate revocation plans

2015-11-21 Thread Richard Barnes
Sorry, wrong thread.  Expect to see a security blog post about revocation
soon, summarizing some recent work :)

On Sat, Nov 21, 2015 at 11:59 AM, Richard Barnes 
wrote:

> I took a hack at the blog post.  I kept your outline, but ended up
> text-editing a bunch of it.  I think it's pretty good now.
>
> On Thu, Jul 31, 2014 at 10:07 PM, Richard Barnes 
> wrote:
>
>> Hi all,
>>
>> We in the Mozilla PKI team have been discussing ways to improve
>> revocation checking in our PKI stack, consolidating a bunch of ideas from
>> earlier work [1][2] and some maybe-new-ish ideas.  I've just pressed "save"
>> on a new wiki page with our initial plan:
>>
>> https://wiki.mozilla.org/CA:RevocationPlan
>>
>> It would be really helpful if people could review and provide feedback on
>> this plan.
>>
>> There's one major open issue highlighted in the wiki page.  We're
>> planning to adopt a centralized revocation list model for CA certificates,
>> which we're calling OneCRL.  (Conceptually similar to Chrome's CRLsets.)
>> In addition to covering CA certifcates, we're also considering covering
>> some end-entity (EE) certificates with OneCRL too.  But there are some
>> drawbacks to this approach, so it's not certain that we will include this
>> in the final plan.  Feedback on this point would be especially valuable.
>>
>> Thanks a lot,
>> --Richard
>>
>> [1] https://wiki.mozilla.org/CA:ImprovingRevocation
>> [2] https://www.imperialviolet.org/2012/02/05/crlsets.html
>> ___
>> dev-security-policy mailing list
>> dev-security-policy@lists.mozilla.org
>> https://lists.mozilla.org/listinfo/dev-security-policy
>>
>
>
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2015-11-21 Thread Richard Barnes
I took a hack at the blog post.  I kept your outline, but ended up
text-editing a bunch of it.  I think it's pretty good now.

On Thu, Jul 31, 2014 at 10:07 PM, Richard Barnes 
wrote:

> Hi all,
>
> We in the Mozilla PKI team have been discussing ways to improve revocation
> checking in our PKI stack, consolidating a bunch of ideas from earlier work
> [1][2] and some maybe-new-ish ideas.  I've just pressed "save" on a new
> wiki page with our initial plan:
>
> https://wiki.mozilla.org/CA:RevocationPlan
>
> It would be really helpful if people could review and provide feedback on
> this plan.
>
> There's one major open issue highlighted in the wiki page.  We're planning
> to adopt a centralized revocation list model for CA certificates, which
> we're calling OneCRL.  (Conceptually similar to Chrome's CRLsets.)  In
> addition to covering CA certifcates, we're also considering covering some
> end-entity (EE) certificates with OneCRL too.  But there are some drawbacks
> to this approach, so it's not certain that we will include this in the
> final plan.  Feedback on this point would be especially valuable.
>
> Thanks a lot,
> --Richard
>
> [1] https://wiki.mozilla.org/CA:ImprovingRevocation
> [2] https://www.imperialviolet.org/2012/02/05/crlsets.html
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-09-03 Thread Richard Barnes
Hey all,

Just to let you know: I've updated this wiki page and removed the {{draft}} 
indication at the top.  I'm considering this the plan of record for now.
https://wiki.mozilla.org/CA:RevocationPlan

The primary edit was with regard to OneCRL covering EE certificates.  For now, 
we're considering that off the table, and focusing on CA certificates.  Once we 
have something there, we might re-consider whether some EE certificates can be 
covered.  For example, the space of EV certificates seems small enough (~40K 
IIRC) that it might be feasible to cover with OneCRL.

Thanks to all for the discussion.
--Richard




On Aug 7, 2014, at 4:23 PM, Richard Barnes  wrote:

> 
> On Aug 4, 2014, at 9:21 AM, Rob Stradling  wrote:
> 
>> On 04/08/14 14:16, Gervase Markham wrote:
>>> On 02/08/14 15:20, Jesper Kristensen wrote:
 * Have you considered adding support for multiple ocsp staples to allow
 stapeling of CA certs?
>>> 
>>> There is a proposed standard for multi-stapling but as far as I remember
>>> it's not even finished yet, yet alone implemented and deployed. We
>>> decided that we can't wait for it.
>> 
>> FWIW, it's a Standards Track RFC now.
>> 
>> http://tools.ietf.org/html/rfc6961
>> 
>> I'm not aware of any implementations though.
> 
> 
> Funny enough, I'm an author on RFC 6169 :)
> http://tools.ietf.org/html/rfc6169
> 
> Multi-stapling seems like a reasonable idea in principle.  However, given the 
> lack of implementation, it seems like a OneCRL-like strategy for 
> intermediates is likely to have more impact faster.
> 
> --Richard
> 
> 
> 
>> 
 * Why not allow short-lived CA certs without revocation info, just like
 EE certs?
>>> 
>>> I'm not sure there are any CAs out there who would like to get their
>>> root key out of it secure storage every 3 days.
>> 
>> Ouch.  Painful.
>> 
 * While must-staple and short-lived certificates seem to be scalable
 solutions, OneCRL seems to be a hack needed to make things work in the
 current situation. It would be nice if this could be explicitly stated,
 and even better if you could declare it as a temporary solution intended
 to be used only until more scalable solutions are specced, implemented
 and deployed.
>>> 
>>> It's not a temporary solution for intermediate certs. Well, perhaps it's
>>> possible that multi-stapling could eventually supplant it (if TCP init
>>> windows also enlarge) but I don't think it's really necessary to
>>> speculate on that yet.
>>> 
>>> Gerv
>>> 
>>> 
>>> ___
>>> dev-security-policy mailing list
>>> dev-security-policy@lists.mozilla.org
>>> https://lists.mozilla.org/listinfo/dev-security-policy
>>> 
>> 
>> -- 
>> Rob Stradling
>> Senior Research & Development Scientist
>> COMODO - Creating Trust Online
>> 
>> ___
>> dev-security-policy mailing list
>> dev-security-policy@lists.mozilla.org
>> https://lists.mozilla.org/listinfo/dev-security-policy
> 
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-07 Thread fhw843
Curious to know the process by which cert holders will get their certs‎ added 
to these lists. How much of that flow and the necessary security measures have 
been worked out? 

  Original Message  
From: Richard Barnes
Sent: Thursday, August 7, 2014 3:59 PM
To: Rob Stradling
Cc: mozilla-dev-tech-cry...@lists.mozilla.org; 
mozilla-dev-security-pol...@lists.mozilla.org
Subject: Re: New wiki page on certificate revocation plans


On Aug 7, 2014, at 9:47 AM, Rob Stradling  wrote:

> http://dev.chromium.org/Home/chromium-security/crlsets says:
> "The limit of the CRLSet size is 250KB"
> 
> Have Mozilla decided what the maximum OneCRL size will be?

No, we haven't. 

The need for a limit largely depends on whether we cover EE certificates. If we 
cover only intermediate CAs, of which there are roughly 1,800, then there is no 
size issue -- we can include the full SHA-256 digest of every CA certificate 
and only come to around 56KB. (Or just use a 1800-bit bitmap!)

If we choose to cover EE certificates (as CRLSets do), then we will have to 
impose a size limit. In some initial experiments in representing CRLs with 
Golomb compressed encoding, we've been able to get down to roughly N bits per 
entry for 2^-N false positive rate. Since we'll still have OCSP as a fall-back, 
we can tolerate a high failure rate, maybe as high as 0.5% (2^-9). At that 
rate, a 250KB limit would fit around 220,000 CRL entries. So we would need to 
do some experimentation to see how that capacity compares to the size of CRLs 
in the wild.

--Richard 


> 
> On 01/08/14 03:07, Richard Barnes wrote:
>> Hi all,
>> 
>> We in the Mozilla PKI team have been discussing ways to improve revocation 
>> checking in our PKI stack, consolidating a bunch of ideas from earlier work 
>> [1][2] and some maybe-new-ish ideas. I've just pressed "save" on a new wiki 
>> page with our initial plan:
>> 
>> https://wiki.mozilla.org/CA:RevocationPlan
>> 
>> It would be really helpful if people could review and provide feedback on 
>> this plan.
>> 
>> There's one major open issue highlighted in the wiki page. We're planning to 
>> adopt a centralized revocation list model for CA certificates, which we're 
>> calling OneCRL. (Conceptually similar to Chrome's CRLsets.) In addition to 
>> covering CA certifcates, we're also considering covering some end-entity 
>> (EE) certificates with OneCRL too. But there are some drawbacks to this 
>> approach, so it's not certain that we will include this in the final plan. 
>> Feedback on this point would be especially valuable.
>> 
>> Thanks a lot,
>> --Richard
>> 
>> [1] https://wiki.mozilla.org/CA:ImprovingRevocation
>> [2] https://www.imperialviolet.org/2012/02/05/crlsets.html
> 
> -- 
> Rob Stradling
> Senior Research & Development Scientist
> COMODO - Creating Trust Online

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-07 Thread Richard Barnes

On Aug 7, 2014, at 9:47 AM, Rob Stradling  wrote:

> http://dev.chromium.org/Home/chromium-security/crlsets says:
> "The limit of the CRLSet size is 250KB"
> 
> Have Mozilla decided what the maximum OneCRL size will be?

No, we haven't.  

The need for a limit largely depends on whether we cover EE certificates.  If 
we cover only intermediate CAs, of which there are roughly 1,800, then there is 
no size issue -- we can include the full SHA-256 digest of every CA certificate 
and only come to around 56KB.  (Or just use a 1800-bit bitmap!)

If we choose to cover EE certificates (as CRLSets do), then we will have to 
impose a size limit.  In some initial experiments in representing CRLs with 
Golomb compressed encoding, we've been able to get down to roughly N bits per 
entry for 2^-N false positive rate.  Since we'll still have OCSP as a 
fall-back, we can tolerate a high failure rate, maybe as high as 0.5% (2^-9).  
At that rate, a 250KB limit would fit around 220,000 CRL entries.  So we would 
need to do some experimentation to see how that capacity compares to the size 
of CRLs in the wild.

--Richard 


> 
> On 01/08/14 03:07, Richard Barnes wrote:
>> Hi all,
>> 
>> We in the Mozilla PKI team have been discussing ways to improve revocation 
>> checking in our PKI stack, consolidating a bunch of ideas from earlier work 
>> [1][2] and some maybe-new-ish ideas.  I've just pressed "save" on a new wiki 
>> page with our initial plan:
>> 
>> https://wiki.mozilla.org/CA:RevocationPlan
>> 
>> It would be really helpful if people could review and provide feedback on 
>> this plan.
>> 
>> There's one major open issue highlighted in the wiki page.  We're planning 
>> to adopt a centralized revocation list model for CA certificates, which 
>> we're calling OneCRL.  (Conceptually similar to Chrome's CRLsets.)  In 
>> addition to covering CA certifcates, we're also considering covering some 
>> end-entity (EE) certificates with OneCRL too.  But there are some drawbacks 
>> to this approach, so it's not certain that we will include this in the final 
>> plan.  Feedback on this point would be especially valuable.
>> 
>> Thanks a lot,
>> --Richard
>> 
>> [1] https://wiki.mozilla.org/CA:ImprovingRevocation
>> [2] https://www.imperialviolet.org/2012/02/05/crlsets.html
> 
> -- 
> Rob Stradling
> Senior Research & Development Scientist
> COMODO - Creating Trust Online

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-07 Thread Richard Barnes

On Aug 4, 2014, at 9:21 AM, Rob Stradling  wrote:

> On 04/08/14 14:16, Gervase Markham wrote:
>> On 02/08/14 15:20, Jesper Kristensen wrote:
>>> * Have you considered adding support for multiple ocsp staples to allow
>>> stapeling of CA certs?
>> 
>> There is a proposed standard for multi-stapling but as far as I remember
>> it's not even finished yet, yet alone implemented and deployed. We
>> decided that we can't wait for it.
> 
> FWIW, it's a Standards Track RFC now.
> 
> http://tools.ietf.org/html/rfc6961
> 
> I'm not aware of any implementations though.


Funny enough, I'm an author on RFC 6169 :)
http://tools.ietf.org/html/rfc6169

Multi-stapling seems like a reasonable idea in principle.  However, given the 
lack of implementation, it seems like a OneCRL-like strategy for intermediates 
is likely to have more impact faster.

--Richard



> 
>>> * Why not allow short-lived CA certs without revocation info, just like
>>> EE certs?
>> 
>> I'm not sure there are any CAs out there who would like to get their
>> root key out of it secure storage every 3 days.
> 
> Ouch.  Painful.
> 
>>> * While must-staple and short-lived certificates seem to be scalable
>>> solutions, OneCRL seems to be a hack needed to make things work in the
>>> current situation. It would be nice if this could be explicitly stated,
>>> and even better if you could declare it as a temporary solution intended
>>> to be used only until more scalable solutions are specced, implemented
>>> and deployed.
>> 
>> It's not a temporary solution for intermediate certs. Well, perhaps it's
>> possible that multi-stapling could eventually supplant it (if TCP init
>> windows also enlarge) but I don't think it's really necessary to
>> speculate on that yet.
>> 
>> Gerv
>> 
>> 
>> ___
>> dev-security-policy mailing list
>> dev-security-policy@lists.mozilla.org
>> https://lists.mozilla.org/listinfo/dev-security-policy
>> 
> 
> -- 
> Rob Stradling
> Senior Research & Development Scientist
> COMODO - Creating Trust Online
> 
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-07 Thread Rob Stradling

http://dev.chromium.org/Home/chromium-security/crlsets says:
"The limit of the CRLSet size is 250KB"

Have Mozilla decided what the maximum OneCRL size will be?

On 01/08/14 03:07, Richard Barnes wrote:

Hi all,

We in the Mozilla PKI team have been discussing ways to improve revocation checking in 
our PKI stack, consolidating a bunch of ideas from earlier work [1][2] and some 
maybe-new-ish ideas.  I've just pressed "save" on a new wiki page with our 
initial plan:

https://wiki.mozilla.org/CA:RevocationPlan

It would be really helpful if people could review and provide feedback on this 
plan.

There's one major open issue highlighted in the wiki page.  We're planning to 
adopt a centralized revocation list model for CA certificates, which we're 
calling OneCRL.  (Conceptually similar to Chrome's CRLsets.)  In addition to 
covering CA certifcates, we're also considering covering some end-entity (EE) 
certificates with OneCRL too.  But there are some drawbacks to this approach, 
so it's not certain that we will include this in the final plan.  Feedback on 
this point would be especially valuable.

Thanks a lot,
--Richard

[1] https://wiki.mozilla.org/CA:ImprovingRevocation
[2] https://www.imperialviolet.org/2012/02/05/crlsets.html


--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-07 Thread fhw843
DANE will never happen, let's just acknowledge that, if for no other reason 
than DNSSEC will never happen. It will take years to get enough support for 
DANE (by both browsers and websites) to even judge how well it works. ‎And 
there is no guarantee it will work that well.

OneCRL itself will be of limited impact because it does not cover end entities. 
We should acknowledge that there is no possible way to come up with a list of 
end entities because in reality *all* entities need that protection. I know I 
rail on this a lot but it's because I've seen the damage it causes.

Regarding the trustworthiness of CA's, there is room for improvement here in 
terms of how we choose to evaluate the CA's and enforce the ideas of security 
and privacy. We've talked about this before and while I think Kathleen is 
interested in doing something I'm not sure how much of an appetite the larger 
Mozilla has (i.e. lawyers). There's probably an issue of time and staff 
availability. 


  Original Message  
From: Sebastian Wiesinger
Sent: Thursday, August 7, 2014 2:28 AM
To: dev-security-policy@lists.mozilla.org
Subject: Re: New wiki page on certificate revocation plans

* Ryan Sleevi  [2014-08-07 08:33]:
> Hi Sebastian,
> 
> While you raise an important issue, the problem(s) OneCRL sets out to
> solve are still problems that need solving, and we should not lose sight.

I agree with that. And I also agree that we should not lose sight. The
difference seems to be what we have set our sights on. :)

> Now, as for the problem you raise ("trusting CAs until you can prove that
> they have done wrong" and "Does not keep CAs from issuing certificates
> that can enable certain entities to mount MITM attacks"), it's important
> to realize and remember that DNSSEC/DANE do not solve these, and in fact,
> in many ways, make it easier. DNSSEC is still a single hierarchy of trust,
> much like CAs, and there's still ample opportunity for malfeasance, and
> there's even more opportunity for key mismanagement and insecure
> cryptographic practices.

DNSSEC also builds a chain of trust but it's a different chain. You
can easily tell if someone is manipulating the chain (because it
breaks) and the root is under control by multiple parties in multiple
countries. If someone tried to rig the system there would be
immediately noticeable effects.

Key mismanagement and insecure practices are a problem for
certificates as well. When adoption of DNSSEC raises people will get
used to it and tools will mature to ease implementation and
maintenance. It's happening already.

> I'm not trying to defend CAs or suggest the problem you raise isn't real,
> but there exist other solutions for this - like Public Key Pinning (which
> Firefox implements) and Certificate Transparency, which offer more
> substantial and meaningful benefits over a DANE-based solution.

Public Key Pinning is something that is good for a hand full of (big)
sites but not really feasible for large scale deployment. DNSSEC/DANE
works for everyone.

Certificate Transparency on the other hand requires additional
infrastructure and active monitoring. With DNSSEC/DANE you need no
additional infrastructure (DNS is required anyway) and it makes little
difference if the browser checks the DANE record or audits the CT log.
Reading the explanation on the CT site
(http://www.certificate-transparency.org/how-ct-works) it looks like
browsers are not even required to check every certificate while DANE
records would be checked for every site/cert.

I don't see the substantial and meaningful benefits to be honest.

> Though DANE seems like a simple solution, it's one filled with errors. And
> if Dan Veditz's and Patrick McManus' replies on the state of OCSP weren't
> depressing, DNSSEC is an order of magnitude more depressing. Important to
> keep in mind when talking "long-term vision", which is practically
> achievable, and what is really "long-long-long term vision", which is more
> theoretical and academic. Like DANE.

DANE is not a simple solution but it will solve the problems we have.
As for academical, right now mail providers start implementing DANE as
MTA software gets support for it. GNUTLS has DANE support and OpenSSL
has at least begun implementation. DNSSEC itself is starting to get
traction so I don't think it would be a very long-long-long term
vision.

Of course we need applications supporting DANE and browsers would be a
"killer feature" to increase deployment.

Regards

Sebastian

-- 
GPG Key: 0x93A0B9CE (F4F6 B1A3 866B 26E9 450A 9D82 58A2 D94A 93A0 B9CE)
'Are you Death?' ... IT'S THE SCYTHE, ISN'T IT? PEOPLE ALWAYS NOTICE THE SCYTHE.
-- Terry Pratchett, The Fifth Elephant
___
dev-secur

Re: New wiki page on certificate revocation plans

2014-08-07 Thread Sebastian Wiesinger
* Ryan Sleevi  [2014-08-07 08:33]:
> Hi Sebastian,
> 
> While you raise an important issue, the problem(s) OneCRL sets out to
> solve are still problems that need solving, and we should not lose sight.

I agree with that. And I also agree that we should not lose sight. The
difference seems to be what we have set our sights on. :)

> Now, as for the problem you raise ("trusting CAs until you can prove that
> they have done wrong" and "Does not keep CAs from issuing certificates
> that can enable certain entities to mount MITM attacks"), it's important
> to realize and remember that DNSSEC/DANE do not solve these, and in fact,
> in many ways, make it easier. DNSSEC is still a single hierarchy of trust,
> much like CAs, and there's still ample opportunity for malfeasance, and
> there's even more opportunity for key mismanagement and insecure
> cryptographic practices.

DNSSEC also builds a chain of trust but it's a different chain. You
can easily tell if someone is manipulating the chain (because it
breaks) and the root is under control by multiple parties in multiple
countries. If someone tried to rig the system there would be
immediately noticeable effects.

Key mismanagement and insecure practices are a problem for
certificates as well. When adoption of DNSSEC raises people will get
used to it and tools will mature to ease implementation and
maintenance. It's happening already.

> I'm not trying to defend CAs or suggest the problem you raise isn't real,
> but there exist other solutions for this - like Public Key Pinning (which
> Firefox implements) and Certificate Transparency, which offer more
> substantial and meaningful benefits over a DANE-based solution.

Public Key Pinning is something that is good for a hand full of (big)
sites but not really feasible for large scale deployment. DNSSEC/DANE
works for everyone.

Certificate Transparency on the other hand requires additional
infrastructure and active monitoring. With DNSSEC/DANE you need no
additional infrastructure (DNS is required anyway) and it makes little
difference if the browser checks the DANE record or audits the CT log.
Reading the explanation on the CT site
(http://www.certificate-transparency.org/how-ct-works) it looks like
browsers are not even required to check every certificate while DANE
records would be checked for every site/cert.

I don't see the substantial and meaningful benefits to be honest.

> Though DANE seems like a simple solution, it's one filled with errors. And
> if Dan Veditz's and Patrick McManus' replies on the state of OCSP weren't
> depressing, DNSSEC is an order of magnitude more depressing. Important to
> keep in mind when talking "long-term vision", which is practically
> achievable, and what is really "long-long-long term vision", which is more
> theoretical and academic. Like DANE.

DANE is not a simple solution but it will solve the problems we have.
As for academical, right now mail providers start implementing DANE as
MTA software gets support for it. GNUTLS has DANE support and OpenSSL
has at least begun implementation. DNSSEC itself is starting to get
traction so I don't think it would be a very long-long-long term
vision.

Of course we need applications supporting DANE and browsers would be a
"killer feature" to increase deployment.

Regards

Sebastian

-- 
GPG Key: 0x93A0B9CE (F4F6 B1A3 866B 26E9 450A  9D82 58A2 D94A 93A0 B9CE)
'Are you Death?' ... IT'S THE SCYTHE, ISN'T IT? PEOPLE ALWAYS NOTICE THE SCYTHE.
-- Terry Pratchett, The Fifth Elephant
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-06 Thread Ryan Sleevi
On Wed, August 6, 2014 11:14 pm, Sebastian Wiesinger wrote:
>  * Richard Barnes  [2014-08-01 04:09]:
> > Hi all,
> >
> > We in the Mozilla PKI team have been discussing ways to improve
> > revocation checking in our PKI stack, consolidating a bunch of ideas
> > from earlier work [1][2] and some maybe-new-ish ideas.  I've just
> > pressed "save" on a new wiki page with our initial plan:
> >
> > https://wiki.mozilla.org/CA:RevocationPlan
>
>  Hello,
>
>  while I appreciate that something is being done, this is another
>  band-aid for a system that is falling apart. Revocation is helping
>  when you know that a certificate was stolen/abused but does not keep
>  CAs from issuing certificates that can enable certain entities to
>  mount MITM attacks. It always comes down to trusting the CAs until you
>  can prove that they have done wrong.
>
>  CAs have lost a lot of trust and while we still depend on them NOW I
>  think it would be wise to keep working on better alternatives. When
>  looking at the "Long-Range Vision" paragraph on your page I don't see
>  that happening. It's rather a collection of band-aids.
>
>  There is bug 672239 which would implement DNSSEC DANE to verify
>  certificates/keys via DNSSEC secured DNS-Records:
>
>  https://bugzilla.mozilla.org/show_bug.cgi?id=672239
>
>  This bug is essentially abandoned at the moment which is really sad.
>  DANE would solve all the trust problems we have right now but it seems
>  no one is interested in working on it. That's especially frustrating
>  when seeing how much work is now put into the OneCRL stuff.
>
>  Regards
>
>  Sebastian
>
>  --
>  GPG Key: 0x93A0B9CE (F4F6 B1A3 866B 26E9 450A  9D82 58A2 D94A 93A0 B9CE)
>  'Are you Death?' ... IT'S THE SCYTHE, ISN'T IT? PEOPLE ALWAYS NOTICE THE
>  SCYTHE.
>  -- Terry Pratchett, The Fifth Elephant
>  ___
>  dev-security-policy mailing list
>  dev-security-policy@lists.mozilla.org
>  https://lists.mozilla.org/listinfo/dev-security-policy
>

Hi Sebastian,

While you raise an important issue, the problem(s) OneCRL sets out to
solve are still problems that need solving, and we should not lose sight.

Now, as for the problem you raise ("trusting CAs until you can prove that
they have done wrong" and "Does not keep CAs from issuing certificates
that can enable certain entities to mount MITM attacks"), it's important
to realize and remember that DNSSEC/DANE do not solve these, and in fact,
in many ways, make it easier. DNSSEC is still a single hierarchy of trust,
much like CAs, and there's still ample opportunity for malfeasance, and
there's even more opportunity for key mismanagement and insecure
cryptographic practices.

I'm not trying to defend CAs or suggest the problem you raise isn't real,
but there exist other solutions for this - like Public Key Pinning (which
Firefox implements) and Certificate Transparency, which offer more
substantial and meaningful benefits over a DANE-based solution.

Though DANE seems like a simple solution, it's one filled with errors. And
if Dan Veditz's and Patrick McManus' replies on the state of OCSP weren't
depressing, DNSSEC is an order of magnitude more depressing. Important to
keep in mind when talking "long-term vision", which is practically
achievable, and what is really "long-long-long term vision", which is more
theoretical and academic. Like DANE.

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-06 Thread Sebastian Wiesinger
* Richard Barnes  [2014-08-01 04:09]:
> Hi all,
> 
> We in the Mozilla PKI team have been discussing ways to improve
> revocation checking in our PKI stack, consolidating a bunch of ideas
> from earlier work [1][2] and some maybe-new-ish ideas.  I've just
> pressed "save" on a new wiki page with our initial plan:
> 
> https://wiki.mozilla.org/CA:RevocationPlan

Hello,

while I appreciate that something is being done, this is another
band-aid for a system that is falling apart. Revocation is helping
when you know that a certificate was stolen/abused but does not keep
CAs from issuing certificates that can enable certain entities to
mount MITM attacks. It always comes down to trusting the CAs until you
can prove that they have done wrong.

CAs have lost a lot of trust and while we still depend on them NOW I
think it would be wise to keep working on better alternatives. When
looking at the "Long-Range Vision" paragraph on your page I don't see
that happening. It's rather a collection of band-aids.

There is bug 672239 which would implement DNSSEC DANE to verify
certificates/keys via DNSSEC secured DNS-Records:

https://bugzilla.mozilla.org/show_bug.cgi?id=672239

This bug is essentially abandoned at the moment which is really sad.
DANE would solve all the trust problems we have right now but it seems
no one is interested in working on it. That's especially frustrating
when seeing how much work is now put into the OneCRL stuff.

Regards

Sebastian

-- 
GPG Key: 0x93A0B9CE (F4F6 B1A3 866B 26E9 450A  9D82 58A2 D94A 93A0 B9CE)
'Are you Death?' ... IT'S THE SCYTHE, ISN'T IT? PEOPLE ALWAYS NOTICE THE SCYTHE.
-- Terry Pratchett, The Fifth Elephant
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-06 Thread Daniel Veditz
On 8/4/2014 10:16 AM, Erwann Abalea wrote:
> I imagine you have access to more detailed information (OCSP URL,
> date/time, user location, ...), could some of it be open?

All of our telemetry data is open as far as I know. Because of privacy
concerns we only collect aggregate stats from users, nothing as specific
as URLs. Here's an example of the kind of data Patrick was using:

http://telemetry.mozilla.org/#filter=release%2F31%2FCERT_VALIDATION_HTTP_REQUEST_SUCCEEDED_TIME&aggregates=multiselect-all!Submissions!Mean!5th%20percentile!25th%20percentile!median!75th%20percentile!95th%20percentile&evoOver=Builds&locked=true&sanitize=true&renderhistogram=Graph

(or http://mzl.la/1qXOu8u )

Feel free to play with the many options for release and type of data
gathered.

You can look at your own local data at about:telemetry (the
cert_validation items are in the "Histograms" section).

-Dan Veditz
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: New wiki page on certificate revocation plans

2014-08-05 Thread Jeremy Rowley
I think most CAs use CDNs to help serve OCSP responses quite fast and reliably. 
 A breakdown of failure rates based on certificate provider could provide 
insight on what's going on. Is gathering this information too close to 
violating a user's privacy for Mozilla? Any chance of peering into this data 
further?

Jeremy

-Original Message-
From: dev-security-policy 
[mailto:dev-security-policy-bounces+jeremy.rowley=digicert@lists.mozilla.org]
 On Behalf Of Peter Bowen
Sent: Tuesday, August 5, 2014 10:18 AM
To: Gervase Markham
Cc: mozilla-dev-security-pol...@lists.mozilla.org
Subject: Re: New wiki page on certificate revocation plans

On Tue, Aug 5, 2014 at 2:02 AM, Gervase Markham  wrote:
> On 04/08/14 18:16, Erwann Abalea wrote:
>> OCSP is painful and costly to optimize, x509labs shows great 
>> availability and good performance for most CA/location combination, 
>> but this is in contradiction with real user measurements. Why, and 
>> how?
>
> Good question. Perhaps the point is that consumer internet connections 
> are a lot flakier than the one x509labs uses.

It is also possible that x509labs is requesting OCSP response for the same cert 
over and over which means it is getting edge-cached replies.
Users request responses for random certs, which could include certs just issued 
or rarely seen.

Thanks,
Peter
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-05 Thread Peter Bowen
On Tue, Aug 5, 2014 at 2:02 AM, Gervase Markham  wrote:
> On 04/08/14 18:16, Erwann Abalea wrote:
>> OCSP is painful and costly to optimize, x509labs shows great
>> availability and good performance for most CA/location combination,
>> but this is in contradiction with real user measurements. Why, and
>> how?
>
> Good question. Perhaps the point is that consumer internet connections
> are a lot flakier than the one x509labs uses.

It is also possible that x509labs is requesting OCSP response for the
same cert over and over which means it is getting edge-cached replies.
Users request responses for random certs, which could include certs
just issued or rarely seen.

Thanks,
Peter
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-05 Thread Gervase Markham
On 04/08/14 18:16, Erwann Abalea wrote:
> I imagine you have access to more detailed information (OCSP URL,
> date/time, user location, ...), could some of it be open?

Not necessarily; I suspect this data was gathered using Firefox
Telemetry, where we try very hard to avoid violating a user's privacy.
Aggregate pass/fail stats (and even failure reasons) are one thing;
details of sites visited are another.

It could be that we could break it down by CA (top level domain) without
significant privacy intrusion, as most CAs secure many websites, but I
suspect it would require more mods to Firefox to do that.

> OCSP is painful and costly to optimize, x509labs shows great
> availability and good performance for most CA/location combination,
> but this is in contradiction with real user measurements. Why, and
> how?

Good question. Perhaps the point is that consumer internet connections
are a lot flakier than the one x509labs uses.

Gerv

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-05 Thread Gervase Markham
On 04/08/14 18:44, Jesper Kristensen wrote:
> I agree that it would not be relevant for the traditional intermediate
> CA certificates in the near future for this reason. I was thinking of
> name constrained sub-CAs, which on some aspects are more similar to EE
> certs than CA certs.

OK. Let's assume for a moment that there is someone out there who wants
to do this. Can anyone think of a reason why allowing short-lived
intermediates is more risky than allowing short-lived EE certs?

Gerv

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-04 Thread fhw843
I agree that some of this performance data is concerning but I'm not ready to 
give up on OCSP just yet because I don't see any choice in the matter: OCSP 
hard fail has to be done. 

The fact that end entity certs can not be revoked is a major gap in Internet 
security right now. That gap should be acknowledged in the problem statement 
(on the wiki page) as either something that will be addressed now or something 
to be ignored until a later date. I hope we are going to address it now.

In contrast, we do have a revocation mechanism for intermediate and root certs 
called a browser update. Obviously that's reserved for the most egregious cases 
but it is there and it does work. I imagine someone has a ready example of a 
non-egregious situation ‎where intermediate revocation is necessary but the 
only one I can think of is periodic tweaks to cert data...???


The other issue I have with the problem statement is that it lists optimization 
goals that are separate from actually improving security. I think it's naive to 
suggest we can move forward without having an effect on latency or memory or 
privacy or all of the above. Obviously you want to choose a solution that 
minimizes those measurements, but that's all they represent: ways to evaluate 
solutions and not problems to be solved in and of themselves. 


‎So, let's clarify if end entity certs are in scope for this effort and we'll 
move forward from there.

Thanks.

  Original Message  
From: Erwann Abalea
Sent: Monday, August 4, 2014 12:17 PM‎

Le lundi 4 août 2014 18:34:50 UTC+2, Patrick McManus a écrit :
> Firefox 31 data:
> 
> on desktop the median successful OCSP validation took 261ms, and the 95th
> percentile (looking at just the universe of successful ones) was over
> 1300ms. 9% of all OCSP requests on desktop timed out completely and aren't
> counted in those numbers.
> 
> on mobile the median successful validation was 372ms with the 95th
> percentile over 1500ms. 20% of all requests on mobile timed out completely
> and aren't counted in those numbers.
> 
> OCSP is brutally painful.

This is depressing.

I imagine you have access to more detailed information (OCSP URL, date/time, 
user location, ...), could some of it be open?

OCSP is painful and costly to optimize, x509labs shows great availability and 
good performance for most CA/location combination, but this is in contradiction 
with real user measurements. Why, and how?
‎
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-04 Thread Jesper Kristensen

Den 04-08-2014 kl. 15:16 skrev Gervase Markham:

On 02/08/14 15:20, Jesper Kristensen wrote:

* Have you considered adding support for multiple ocsp staples to allow
stapeling of CA certs?


There is a proposed standard for multi-stapling but as far as I remember
it's not even finished yet, yet alone implemented and deployed. We
decided that we can't wait for it.


* Why not allow short-lived CA certs without revocation info, just like
EE certs?


I'm not sure there are any CAs out there who would like to get their
root key out of it secure storage every 3 days.


I agree that it would not be relevant for the traditional intermediate 
CA certificates in the near future for this reason. I was thinking of 
name constrained sub-CAs, which on some aspects are more similar to EE 
certs than CA certs.


-
Jesper Kristensen

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-04 Thread Erwann Abalea
Le lundi 4 août 2014 18:34:50 UTC+2, Patrick McManus a écrit :
> Firefox 31 data:
> 
> on desktop the median successful OCSP validation took 261ms, and the 95th
> percentile (looking at just the universe of successful ones) was over
> 1300ms. 9% of all OCSP requests on desktop timed out completely and aren't
> counted in those numbers.
> 
> on mobile the median successful validation was 372ms with the 95th
> percentile over 1500ms. 20% of all requests on mobile timed out completely
> and aren't counted in those numbers.
> 
> OCSP is brutally painful.

This is depressing.

I imagine you have access to more detailed information (OCSP URL, date/time, 
user location, ...), could some of it be open?

OCSP is painful and costly to optimize, x509labs shows great availability and 
good performance for most CA/location combination, but this is in contradiction 
with real user measurements. Why, and how?
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: New wiki page on certificate revocation plans

2014-08-04 Thread Jeremy Rowley
Thanks Patrick – that’s great information.  This high of failure rate is why 
the  CASC and DigiCert are encouraging OCSP stapling as the best way to move 
forward.

Jeremy

From: patrick.ducks...@gmail.com [mailto:patrick.ducks...@gmail.com] On Behalf 
Of Patrick McManus
Sent: Monday, August 4, 2014 10:35 AM
To: Jeremy Rowley
Cc: Matthias Hunstock; mozilla-dev-security-pol...@lists.mozilla.org
Subject: Re: New wiki page on certificate revocation plans

Firefox 31 data:
on desktop the median successful OCSP validation took 261ms, and the 95th 
percentile (looking at just the universe of successful ones) was over 1300ms. 
9% of all OCSP requests on desktop timed out completely and aren't counted in 
those numbers.
on mobile the median successful validation was 372ms with the 95th percentile 
over 1500ms. 20% of all requests on mobile timed out completely and aren't 
counted in those numbers.

OCSP is brutally painful.

On Mon, Aug 4, 2014 at 11:19 AM, Jeremy Rowley 
mailto:jeremy.row...@digicert.com>> wrote:
Seems like a lot of anecdotes are being shared with respect to hard fail 
without a lot of data.  Do the browsers have more data on this?  Considering 
the X.509 labs shows nearly 100% availability with response times of about 100 
ms, data showing in-depth info on failure rates (and the reasons why) would 
help drive the discussion in a productive direction.

Jeremy

-Original Message-
From: dev-security-policy 
[mailto:dev-security-policy-bounces+jeremy.rowley<mailto:dev-security-policy-bounces%2Bjeremy.rowley>=digicert@lists.mozilla.org<mailto:digicert@lists.mozilla.org>]
 On Behalf Of Matthias Hunstock
Sent: Monday, August 4, 2014 2:35 AM
To: 
mozilla-dev-security-pol...@lists.mozilla.org<mailto:mozilla-dev-security-pol...@lists.mozilla.org>
Subject: Re: New wiki page on certificate revocation plans
Am 01.08.2014 12:11, schrieb 
simon.zer...@gmail.com<mailto:simon.zer...@gmail.com>:
> Where is the evidence that OSCP hard fails and these speed issues are
> actually a problem in the real world?

Try it on a site with an unknown issuer.

The handshake takes at least 30 seconds longer, because thats the time you need 
to turn off hard fail in the browser UI.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org<mailto:dev-security-policy@lists.mozilla.org>
https://lists.mozilla.org/listinfo/dev-security-policy
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org<mailto:dev-security-policy@lists.mozilla.org>
https://lists.mozilla.org/listinfo/dev-security-policy

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-04 Thread Patrick McManus
Firefox 31 data:

on desktop the median successful OCSP validation took 261ms, and the 95th
percentile (looking at just the universe of successful ones) was over
1300ms. 9% of all OCSP requests on desktop timed out completely and aren't
counted in those numbers.

on mobile the median successful validation was 372ms with the 95th
percentile over 1500ms. 20% of all requests on mobile timed out completely
and aren't counted in those numbers.

OCSP is brutally painful.


On Mon, Aug 4, 2014 at 11:19 AM, Jeremy Rowley 
wrote:

> Seems like a lot of anecdotes are being shared with respect to hard fail
> without a lot of data.  Do the browsers have more data on this?
>  Considering the X.509 labs shows nearly 100% availability with response
> times of about 100 ms, data showing in-depth info on failure rates (and the
> reasons why) would help drive the discussion in a productive direction.
>
> Jeremy
>
> -Original Message-
> From: dev-security-policy [mailto:
> dev-security-policy-bounces+jeremy.rowley=digicert@lists.mozilla.org]
> On Behalf Of Matthias Hunstock
> Sent: Monday, August 4, 2014 2:35 AM
> To: mozilla-dev-security-pol...@lists.mozilla.org
> Subject: Re: New wiki page on certificate revocation plans
>
> Am 01.08.2014 12:11, schrieb simon.zer...@gmail.com:
> > Where is the evidence that OSCP hard fails and these speed issues are
> > actually a problem in the real world?
>
> Try it on a site with an unknown issuer.
>
> The handshake takes at least 30 seconds longer, because thats the time you
> need to turn off hard fail in the browser UI.
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: New wiki page on certificate revocation plans

2014-08-04 Thread Jeremy Rowley
Seems like a lot of anecdotes are being shared with respect to hard fail 
without a lot of data.  Do the browsers have more data on this?  Considering 
the X.509 labs shows nearly 100% availability with response times of about 100 
ms, data showing in-depth info on failure rates (and the reasons why) would 
help drive the discussion in a productive direction.

Jeremy

-Original Message-
From: dev-security-policy 
[mailto:dev-security-policy-bounces+jeremy.rowley=digicert@lists.mozilla.org]
 On Behalf Of Matthias Hunstock
Sent: Monday, August 4, 2014 2:35 AM
To: mozilla-dev-security-pol...@lists.mozilla.org
Subject: Re: New wiki page on certificate revocation plans

Am 01.08.2014 12:11, schrieb simon.zer...@gmail.com:
> Where is the evidence that OSCP hard fails and these speed issues are 
> actually a problem in the real world?

Try it on a site with an unknown issuer.

The handshake takes at least 30 seconds longer, because thats the time you need 
to turn off hard fail in the browser UI.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-04 Thread Rob Stradling

On 04/08/14 14:16, Gervase Markham wrote:

On 02/08/14 15:20, Jesper Kristensen wrote:

* Have you considered adding support for multiple ocsp staples to allow
stapeling of CA certs?


There is a proposed standard for multi-stapling but as far as I remember
it's not even finished yet, yet alone implemented and deployed. We
decided that we can't wait for it.


FWIW, it's a Standards Track RFC now.

http://tools.ietf.org/html/rfc6961

I'm not aware of any implementations though.


* Why not allow short-lived CA certs without revocation info, just like
EE certs?


I'm not sure there are any CAs out there who would like to get their
root key out of it secure storage every 3 days.


Ouch.  Painful.


* While must-staple and short-lived certificates seem to be scalable
solutions, OneCRL seems to be a hack needed to make things work in the
current situation. It would be nice if this could be explicitly stated,
and even better if you could declare it as a temporary solution intended
to be used only until more scalable solutions are specced, implemented
and deployed.


It's not a temporary solution for intermediate certs. Well, perhaps it's
possible that multi-stapling could eventually supplant it (if TCP init
windows also enlarge) but I don't think it's really necessary to
speculate on that yet.

Gerv


___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy



--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-04 Thread Gervase Markham
On 02/08/14 15:20, Jesper Kristensen wrote:
> * Have you considered adding support for multiple ocsp staples to allow
> stapeling of CA certs?

There is a proposed standard for multi-stapling but as far as I remember
it's not even finished yet, yet alone implemented and deployed. We
decided that we can't wait for it.

> * Why not allow short-lived CA certs without revocation info, just like
> EE certs?

I'm not sure there are any CAs out there who would like to get their
root key out of it secure storage every 3 days.

> * While must-staple and short-lived certificates seem to be scalable
> solutions, OneCRL seems to be a hack needed to make things work in the
> current situation. It would be nice if this could be explicitly stated,
> and even better if you could declare it as a temporary solution intended
> to be used only until more scalable solutions are specced, implemented
> and deployed.

It's not a temporary solution for intermediate certs. Well, perhaps it's
possible that multi-stapling could eventually supplant it (if TCP init
windows also enlarge) but I don't think it's really necessary to
speculate on that yet.

Gerv


___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-04 Thread Gervase Markham
I am generally in favour of this plan - I think it's the right way to
go. I am not sure we will ever get to hard-fail for plain OCSP, but I am
very happy for that to be a data-driven decision somewhere down the line.

On 01/08/14 03:07, Richard Barnes wrote:
> There's one major open issue highlighted in the wiki page.  We're
> planning to adopt a centralized revocation list model for CA
> certificates, which we're calling OneCRL.  (Conceptually similar to
> Chrome's CRLsets.)  In addition to covering CA certifcates, we're
> also considering covering some end-entity (EE) certificates with
> OneCRL too.  But there are some drawbacks to this approach, so it's
> not certain that we will include this in the final plan.  Feedback on
> this point would be especially valuable.

I think we should _not_ try and add EE certs (beyond high-profile
misissuances) to OneCRL. Here are my reasons, some of which are already
noted in the wiki page:

* The number of certificates involved means that either the data set is
of large size (bad for download and disk performance) or we use a Bloom
filter or equivalent which has a false positive rate. This would be such
that if a given cert was a false positive, it would be a false positive
for every user all the time, until the unrelated revoked cert it was
false-positived to fell out of the filter, e.g. by expiring.

This means that if Fred owns fred.com and Joe owns joe.com, and
joe.com's cert happens to be a Bloom match for a revoked cert, joe.com
will have worse performance than fred.com (because every Firefox user
will end up doing a hard-fail live OCSP lookup) in a way which is not
obvious to Joe. This random aspect to the performance of the solution is
not good.

* The Bloom filter part is extra engineering which is not needed for the
intermediate-only version. Even if the data is transmitted together,
OneCRL effectively becomes TwoCRLs, one for intermediates and one for
EEs, which work differently. We need to trade off this extra engineering
requirement against the priority of the many other things we'd like to
be doing.

* If we put the EE CRLs of all publicly-trusted CAs into OneCRL, we have
a significant information management issue for all the changing data. If
we don't, we have to make decisions about who is in and who is out.
Whatever we decide and however, the people who end up out suffer a
performance (and therefore market) disadvantage for their certs. We are
effectively playing favourites. I.e. we could be open and transparent,
but it's impossible to be neutral.

* If a CA has managed to persuade us to include their CRL in OneCRL,
they have no incentive to encourage their users to deploy must-staple or
short-lived, because revocation already works fine. That has a number of
negative effects, including that there will be less pressure for greater
ecosystem support for these technologies. Non publicly-trusted CAs can
_only_ use these solutions (they can't be in OneCRL) so they need to
work and be well supported.


So I am of the opinion that must-staple OCSP and short-lived certs
together (plus OneCRL for malicious misissuance) should be our solution
for EE cert revocation.

Gerv
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-04 Thread Phillip Hallam-Baker
On Mon, Aug 4, 2014 at 12:12 AM, Jeremy Rowley
 wrote:
> Why does OneCRL seem like a hack?  Considering how infrequently intermediates 
> and roots are revoked, OneCRL seems like a satisfactory way to provide this 
> information long-term, provided that the certs are removed from OneCRL at 
> some point.  I'd think they could safely remove the OneCRL certs after the 
> listed cert expires.  For EE, OneCRL is only necessary where the other 
> methods of revocation are considered insufficient.  If hard-fail OCSP is 
> turned on (the last point), then OneCRL for EE certs becomes obsolete.

Hack or not, its very important to check revocation there.

We don't have armed guards at the data centers and if we did any
attacker could easily come with more.

The only viable defense here is to make sure that what is being
guarded is not worth taking. ATMs are protected the same way - with a
dye-pack that explodes on the cash if someone attempts to remove the
cartridge.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-04 Thread Hubert Kario
- Original Message -
> From: "David Huang" 
> To: mozilla-dev-security-pol...@lists.mozilla.org
> Sent: Saturday, August 2, 2014 1:21:58 AM
> Subject: Re: New wiki page on certificate revocation plans
> 
> This is great news!
> 
> Regarding the max lifetime threshold of short-lived certificates, we ran
> study [1] a while back that indicated the average OCSP validity time was 4
> days (while 87.14% were equal to or less than 7 days). Thus, FWIW, we
> suggested a certificate lifetime of 4 days in our paper [2] advocating
> short-lived certificates for revocation.
> 
> [1] http://www.internetsociety.org/sites/default/files/12_4.pdf
> [2] http://www.w2spconf.com/2012/papers/w2sp12-final9.pdf

Very interesting, thanks for sharing!

This results are a bit scary though:

OCSP responder:   Max Validity lifetime 
http://EVIntl-ocsp.verisign.com   86 days 7 hours
http://ocsp.verisign.com  20 days 21 hours

How often did they provide responses valid for over a week?

-- 
Regards,
Hubert Kario
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-04 Thread Matthias Hunstock
Am 01.08.2014 12:11, schrieb simon.zer...@gmail.com:
> Where is the evidence that OSCP hard fails and these
> speed issues are actually a problem in the real world?

Try it on a site with an unknown issuer.

The handshake takes at least 30 seconds longer, because thats the time
you need to turn off hard fail in the browser UI.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: New wiki page on certificate revocation plans

2014-08-03 Thread Jeremy Rowley
Why does OneCRL seem like a hack?  Considering how infrequently intermediates 
and roots are revoked, OneCRL seems like a satisfactory way to provide this 
information long-term, provided that the certs are removed from OneCRL at some 
point.  I'd think they could safely remove the OneCRL certs after the listed 
cert expires.  For EE, OneCRL is only necessary where the other methods of 
revocation are considered insufficient.  If hard-fail OCSP is turned on (the 
last point), then OneCRL for EE certs becomes obsolete. 

Jeremy 

-Original Message-
From: dev-security-policy 
[mailto:dev-security-policy-bounces+jeremy.rowley=digicert@lists.mozilla.org]
 On Behalf Of Jesper Kristensen
Sent: Saturday, August 2, 2014 8:21 AM
To: mozilla-dev-security-pol...@lists.mozilla.org
Subject: Re: New wiki page on certificate revocation plans

Hi

This sounds like a really great plan!

Some comments:

* Have you considered adding support for multiple ocsp staples to allow 
stapeling of CA certs?

* Why not allow short-lived CA certs without revocation info, just like EE 
certs?

* While must-staple and short-lived certificates seem to be scalable solutions, 
OneCRL seems to be a hack needed to make things work in the current situation. 
It would be nice if this could be explicitly stated, and even better if you 
could declare it as a temporary solution intended to be used only until more 
scalable solutions are specced, implemented and deployed.

-
Jesper Kristensen

Den 01-08-2014 kl. 04:07 skrev Richard Barnes:
> Hi all,
>
> We in the Mozilla PKI team have been discussing ways to improve revocation 
> checking in our PKI stack, consolidating a bunch of ideas from earlier work 
> [1][2] and some maybe-new-ish ideas.  I've just pressed "save" on a new wiki 
> page with our initial plan:
>
> https://wiki.mozilla.org/CA:RevocationPlan
>
> It would be really helpful if people could review and provide feedback on 
> this plan.
>
> There's one major open issue highlighted in the wiki page.  We're planning to 
> adopt a centralized revocation list model for CA certificates, which we're 
> calling OneCRL.  (Conceptually similar to Chrome's CRLsets.)  In addition to 
> covering CA certifcates, we're also considering covering some end-entity (EE) 
> certificates with OneCRL too.  But there are some drawbacks to this approach, 
> so it's not certain that we will include this in the final plan.  Feedback on 
> this point would be especially valuable.
>
> Thanks a lot,
> --Richard
>
> [1] https://wiki.mozilla.org/CA:ImprovingRevocation
> [2] https://www.imperialviolet.org/2012/02/05/crlsets.html
>

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-02 Thread Jesper Kristensen

Hi

This sounds like a really great plan!

Some comments:

* Have you considered adding support for multiple ocsp staples to allow 
stapeling of CA certs?


* Why not allow short-lived CA certs without revocation info, just like 
EE certs?


* While must-staple and short-lived certificates seem to be scalable 
solutions, OneCRL seems to be a hack needed to make things work in the 
current situation. It would be nice if this could be explicitly stated, 
and even better if you could declare it as a temporary solution intended 
to be used only until more scalable solutions are specced, implemented 
and deployed.


-
Jesper Kristensen

Den 01-08-2014 kl. 04:07 skrev Richard Barnes:

Hi all,

We in the Mozilla PKI team have been discussing ways to improve revocation checking in 
our PKI stack, consolidating a bunch of ideas from earlier work [1][2] and some 
maybe-new-ish ideas.  I've just pressed "save" on a new wiki page with our 
initial plan:

https://wiki.mozilla.org/CA:RevocationPlan

It would be really helpful if people could review and provide feedback on this 
plan.

There's one major open issue highlighted in the wiki page.  We're planning to 
adopt a centralized revocation list model for CA certificates, which we're 
calling OneCRL.  (Conceptually similar to Chrome's CRLsets.)  In addition to 
covering CA certifcates, we're also considering covering some end-entity (EE) 
certificates with OneCRL too.  But there are some drawbacks to this approach, 
so it's not certain that we will include this in the final plan.  Feedback on 
this point would be especially valuable.

Thanks a lot,
--Richard

[1] https://wiki.mozilla.org/CA:ImprovingRevocation
[2] https://www.imperialviolet.org/2012/02/05/crlsets.html



___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-02 Thread David Huang
This is great news!

Regarding the max lifetime threshold of short-lived certificates, we ran study 
[1] a while back that indicated the average OCSP validity time was 4 days 
(while 87.14% were equal to or less than 7 days). Thus, FWIW, we suggested a 
certificate lifetime of 4 days in our paper [2] advocating short-lived 
certificates for revocation.

[1] http://www.internetsociety.org/sites/default/files/12_4.pdf
[2] http://www.w2spconf.com/2012/papers/w2sp12-final9.pdf


Cheers,
David


On Thursday, July 31, 2014 7:07:32 PM UTC-7, Richard Barnes wrote:
> Hi all,
> 
> 
> 
> We in the Mozilla PKI team have been discussing ways to improve revocation 
> checking in our PKI stack, consolidating a bunch of ideas from earlier work 
> [1][2] and some maybe-new-ish ideas.  I've just pressed "save" on a new wiki 
> page with our initial plan:
> 
> 
> 
> https://wiki.mozilla.org/CA:RevocationPlan
> 
> 
> 
> It would be really helpful if people could review and provide feedback on 
> this plan.
> 
> 
> 
> There's one major open issue highlighted in the wiki page.  We're planning to 
> adopt a centralized revocation list model for CA certificates, which we're 
> calling OneCRL.  (Conceptually similar to Chrome's CRLsets.)  In addition to 
> covering CA certifcates, we're also considering covering some end-entity (EE) 
> certificates with OneCRL too.  But there are some drawbacks to this approach, 
> so it's not certain that we will include this in the final plan.  Feedback on 
> this point would be especially valuable.
> 
> 
> 
> Thanks a lot,
> 
> --Richard
> 
> 
> 
> [1] https://wiki.mozilla.org/CA:ImprovingRevocation
> 
> [2] https://www.imperialviolet.org/2012/02/05/crlsets.html
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-01 Thread Hubert Kario
- Original Message -
> From: "Simon Zerafa" 
> To: mozilla-dev-security-pol...@lists.mozilla.org
> Sent: Friday, 1 August, 2014 8:38:53 PM
> Subject: Re: New wiki page on certificate revocation plans
> 
> 
> I have asked lots of people who use OCSP hard fail if they have ever seen a
> hard fail (via Twitter and a group of technical people admittedly) and only
> one person reported ever seeing one.

then you can count me as another (the ocsp server was down/incorrect)

it's a real issue

the problem is that we have two types of sites that use TLS:
 * important sites that have your personal data, your password(s), etc.
 * sites that have just information you want to read

I don't care for validity of certificates, let alone OCSP responses, for the
second set of sites. I do very much care for revocation data, used ciphers, etc.
for the first set of sites.

Unfortunately only the user can say which site is which. If I'm the author
of a site, it falls into the first category, if I'm a user, usually to the 
second.

-- 
Regards,
Hubert Kario
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-01 Thread Simon Zerafa
Hi Ryan,

Yes I do represent the real world. I am not fictional or in a test lab 
somewhere with non production hardware or Internet connectivity :-)

I'm looking at that data now and from what it seems to be showing OCSP fails 
are transitory and short lived. I will look at the numbers to see if this 
impression is correct or not :-)

I do have relatively high bandwidth but even in first world countries it's not 
always reliable. It fails now and again but fortunately not on a regular basis. 
My last mile connection was not all that good untill recently. Lots of data 
errors on the infrastructure.

I have asked lots of people who use OCSP hard fail if they have ever seen a 
hard fail (via Twitter and a group of technical people admittedly) and only one 
person reported ever seeing one.

If we want to check last mile issues then Mozilla could add metrics to the OCSP 
hard fail as an experiment (assuming it's not there already) to get the data. 
With such a baseline then it might be possible to ask the right questions.

Are OCSP fails and hard fails really the problem they are reported to be? Does 
Mozilla record such information already?

The reason I am asking questions is precisely because we do need good quality 
data to make informed decisions. Anecdotes are not data but they are 
observations from which it's possible to start asking the right questions and 
looking for data to support or refute the topic under discussion.

Yes it's possible that for some set of people OCSP hard fail could be an issue 
but if that is the case then where are they and how and when does it manifest 
itself?

>From what I have seen to date nothing would warrant the removal of OCSP hard 
>fail from FF on reliability grounds.

Adding a separate and supporting CRL solution should not be an issue and would 
be of some benefit to those FF users who cannot use OCSP hard fail reliability.

Regards

Simon


___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-01 Thread Ryan Sleevi
On Fri, August 1, 2014 3:11 am, simon.zer...@gmail.com wrote:
>  Hi,
>
>  I would really like to see some hard metrics on OSCP failures and SSL/TLS
>  setup speed issues.
>
>  I use FF a lot with OSCP hard fail enabled and I don't seem to see any
>  hard fails. In addition my SSL/TLS sessions seems to be as quick to set up
>   and responsive as ever.
>
>  Where is the evidence that OSCP hard fails and these speed issues are
>  actually a problem in the real world?

Do you represent the real world?

Or are you, more than likely, accessing the Internet from a first-world
country, probably with a high-bandwidth connection, and more than likely,
from a relatively modern machine?

The reference Jeremy pointed you gives you a reasonable understanding of
'raw' server availability, as measured from certain core Internet links. A
more reasonable path is to consider the 'last mile' issues - and which
there are many (as the endless debates in the US regarding Netflix
streaming quality attest to, on one extreme, and as anyone who has been to
countries like China, India, Australia, or South Africa can attest to, on
another)

The plural of anecdote is not data.

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: New wiki page on certificate revocation plans

2014-08-01 Thread Jeremy Rowley
Some information on performance is available here: 
http://ocspreport.x509labs.com/.  You might be able to reach out to them and 
get the actual data related to number of failed responses.  

Whether fails and speed are major issues depends on who you ask.  

Jeremy


-Original Message-
From: dev-security-policy 
[mailto:dev-security-policy-bounces+jeremy.rowley=digicert@lists.mozilla.org]
 On Behalf Of simon.zer...@gmail.com
Sent: Friday, August 1, 2014 4:12 AM
To: mozilla-dev-security-pol...@lists.mozilla.org
Subject: Re: New wiki page on certificate revocation plans

Hi,

I would really like to see some hard metrics on OSCP failures and SSL/TLS setup 
speed issues.

I use FF a lot with OSCP hard fail enabled and I don't seem to see any hard 
fails. In addition my SSL/TLS sessions seems to be as quick to set up  and 
responsive as ever.

Where is the evidence that OSCP hard fails and these speed issues are actually 
a problem in the real world?

It seems to be repeated that these are major issues, so if that is the case 
where are the metrics to demonstrate it?

Many users such as myself are not happy about the way the Google Chrome project 
is moving away from best available security towards an incomplete and less 
secure CRLset method.

If you wish to provide a CRLsets type feature that's fine but please don't 
remove OSCP hard fail.

Security is far more important for many users that fractional speed 
improvements and the illusion of security.

Kind Regards

Simon Zerafa
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-01 Thread simon . zerafa
Hi,

I would really like to see some hard metrics on OSCP failures and SSL/TLS setup 
speed issues.

I use FF a lot with OSCP hard fail enabled and I don't seem to see any hard 
fails. In addition my SSL/TLS sessions seems to be as quick to set up  and 
responsive as ever.

Where is the evidence that OSCP hard fails and these speed issues are actually 
a problem in the real world?

It seems to be repeated that these are major issues, so if that is the case 
where are the metrics to demonstrate it?

Many users such as myself are not happy about the way the Google Chrome project 
is moving away from best available security towards an incomplete and less 
secure CRLset method.

If you wish to provide a CRLsets type feature that's fine but please don't 
remove OSCP hard fail.

Security is far more important for many users that fractional speed 
improvements and the illusion of security.

Kind Regards

Simon Zerafa
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: New wiki page on certificate revocation plans

2014-08-01 Thread Richard Barnes

On Jul 31, 2014, at 11:23 PM, Jeremy Rowley  wrote:

> This is great.  Thanks Richard!  

Thanks go to the whole team.  This was very much a group effort.
 

> For OneCRL and the EE certs, establishing parameters around when an EE is 
> eligible for inclusion would give guidance to CAs about when to report 
> revocations.  Is the OneCRL intended for when the cert is compromised because 
> of a breach of the CA?  Or can high profile domains with stolen keys request 
> inclusion?

There are two types of EE coverage you could imagine:

1. One-off "exceptional" inclusions of individual certificates
2. Bulk inclusion of an EE-issuing CA's CRL

I think most of the discussion/controversy here is about the bulk inclusion.  
One-off exceptional inclusion in OneCRL is something that we will almost 
certainly do for high-profile cases.  By definition, it's a small enough set 
that the burden to include it will not be that high.  Is there a reason to 
discriminate between the two cases you describe?  The earlier proposal for 
something like OneCRL included some instructions for requesting revocation be 
distributed through OneCRL.  We should produce something similar once we're 
ready to accept such requests.

https://wiki.mozilla.org/CA:ImprovingRevocation#Preload_Revocations_of_Certain_End-Entity_Certificates

Hope that helps,
--Richard



> Jeremy 
> 
> -Original Message-
> From: dev-security-policy 
> [mailto:dev-security-policy-bounces+jeremy.rowley=digicert@lists.mozilla.org]
>  On Behalf Of Richard Barnes
> Sent: Thursday, July 31, 2014 8:08 PM
> To: mozilla-dev-security-pol...@lists.mozilla.org; 
> mozilla-dev-tech-cry...@lists.mozilla.org
> Subject: New wiki page on certificate revocation plans
> 
> Hi all,
> 
> We in the Mozilla PKI team have been discussing ways to improve revocation 
> checking in our PKI stack, consolidating a bunch of ideas from earlier work 
> [1][2] and some maybe-new-ish ideas.  I've just pressed "save" on a new wiki 
> page with our initial plan:
> 
> https://wiki.mozilla.org/CA:RevocationPlan
> 
> It would be really helpful if people could review and provide feedback on 
> this plan.
> 
> There's one major open issue highlighted in the wiki page.  We're planning to 
> adopt a centralized revocation list model for CA certificates, which we're 
> calling OneCRL.  (Conceptually similar to Chrome's CRLsets.)  In addition to 
> covering CA certifcates, we're also considering covering some end-entity (EE) 
> certificates with OneCRL too.  But there are some drawbacks to this approach, 
> so it's not certain that we will include this in the final plan.  Feedback on 
> this point would be especially valuable.
> 
> Thanks a lot,
> --Richard
> 
> [1] https://wiki.mozilla.org/CA:ImprovingRevocation
> [2] https://www.imperialviolet.org/2012/02/05/crlsets.html
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: New wiki page on certificate revocation plans

2014-07-31 Thread Jeremy Rowley
This is great.  Thanks Richard!  

For OneCRL and the EE certs, establishing parameters around when an EE is 
eligible for inclusion would give guidance to CAs about when to report 
revocations.  Is the OneCRL intended for when the cert is compromised because 
of a breach of the CA?  Or can high profile domains with stolen keys request 
inclusion?

Jeremy 

-Original Message-
From: dev-security-policy 
[mailto:dev-security-policy-bounces+jeremy.rowley=digicert@lists.mozilla.org]
 On Behalf Of Richard Barnes
Sent: Thursday, July 31, 2014 8:08 PM
To: mozilla-dev-security-pol...@lists.mozilla.org; 
mozilla-dev-tech-cry...@lists.mozilla.org
Subject: New wiki page on certificate revocation plans

Hi all,

We in the Mozilla PKI team have been discussing ways to improve revocation 
checking in our PKI stack, consolidating a bunch of ideas from earlier work 
[1][2] and some maybe-new-ish ideas.  I've just pressed "save" on a new wiki 
page with our initial plan:

https://wiki.mozilla.org/CA:RevocationPlan

It would be really helpful if people could review and provide feedback on this 
plan.

There's one major open issue highlighted in the wiki page.  We're planning to 
adopt a centralized revocation list model for CA certificates, which we're 
calling OneCRL.  (Conceptually similar to Chrome's CRLsets.)  In addition to 
covering CA certifcates, we're also considering covering some end-entity (EE) 
certificates with OneCRL too.  But there are some drawbacks to this approach, 
so it's not certain that we will include this in the final plan.  Feedback on 
this point would be especially valuable.

Thanks a lot,
--Richard

[1] https://wiki.mozilla.org/CA:ImprovingRevocation
[2] https://www.imperialviolet.org/2012/02/05/crlsets.html
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


New wiki page on certificate revocation plans

2014-07-31 Thread Richard Barnes
Hi all,

We in the Mozilla PKI team have been discussing ways to improve revocation 
checking in our PKI stack, consolidating a bunch of ideas from earlier work 
[1][2] and some maybe-new-ish ideas.  I've just pressed "save" on a new wiki 
page with our initial plan:

https://wiki.mozilla.org/CA:RevocationPlan

It would be really helpful if people could review and provide feedback on this 
plan.

There's one major open issue highlighted in the wiki page.  We're planning to 
adopt a centralized revocation list model for CA certificates, which we're 
calling OneCRL.  (Conceptually similar to Chrome's CRLsets.)  In addition to 
covering CA certifcates, we're also considering covering some end-entity (EE) 
certificates with OneCRL too.  But there are some drawbacks to this approach, 
so it's not certain that we will include this in the final plan.  Feedback on 
this point would be especially valuable.

Thanks a lot,
--Richard

[1] https://wiki.mozilla.org/CA:ImprovingRevocation
[2] https://www.imperialviolet.org/2012/02/05/crlsets.html
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy