Re: GoDaddy Misissuance Action Items

2017-02-20 Thread Gervase Markham via dev-security-policy
On 13/02/17 23:53, Wayne Thayer wrote:
> Gerv - this makes sense and it is GoDaddy's intent to perform these steps 
> within 3 months.

No significant objections have been put forward about this action plan,
and so I have filed a Bugzilla bug to track GoDaddy's implementation:
https://bugzilla.mozilla.org/show_bug.cgi?id=1341014

Gerv
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: GoDaddy Misissuance Action Items

2017-02-15 Thread Gervase Markham via dev-security-policy
On 13/02/17 23:13, Santhan Raj wrote:
> One thing to highlight here is that the WebTrust audits are performed
> against the BRs and not against the root program requirements. 

This is true, although (apart from the relative importance of domain
validation) this is similarly true of many items in the Mozilla
requirements which we cannot directly check.

> So hopefully
> 169  makes it's way to BR soon.

I am hopeful that most or all of the methods will be back in the BRs soon.

Gerv

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: GoDaddy Misissuance Action Items

2017-02-13 Thread Wayne Thayer via dev-security-policy
> -Original Message-
> From: dev-security-policy [mailto:dev-security-policy-
> bounces+wthayer=godaddy@lists.mozilla.org] On Behalf Of Gervase
> Markham via dev-security-policy


> Here is our proposed remediation plan for GoDaddy.
> 
> 1) As with all CAs, update all their domain validation code to use one of the 
> 10
> approved methods;
> 
> 2) Implement comprehensive automated testing for their domain validation
> code for all issuance systems;
> 
> 3) Make sure those tests automatically run when any change is made to the
> code, before deployment, such that deployment is gated on a pass;
> 
> 4) Get a statement from their auditors that these tests have been created
> and positioned correctly in the deployment workflow.
> 
> All steps to be completed within 3 months.
> 
> Comments on this plan are welcome, including from GoDaddy.
>

Gerv - this makes sense and it is GoDaddy's intent to perform these steps 
within 3 months.

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: GoDaddy Misissuance Action Items

2017-02-13 Thread Santhan Raj via dev-security-policy
On Monday, February 13, 2017 at 3:14:06 PM UTC-8, Santhan Raj wrote:
> On Monday, February 13, 2017 at 4:22:34 AM UTC-8, Gervase Markham wrote:
> 
> > That is why, despite some IPR-related tangles, Mozilla will be requiring
> > in its next CA Communication that all CAs move to using only those
> > documented methods in a fairly short timeframe, regardless of what the
> > BRs say. CAs may wish to not wait for that communication to arrive
> > before starting to adapt their systems.
> 
> Grev,
> 
> One thing to highlight here is that the WebTrust audits are performed against 
> the BRs and not against the root program requirements. I.e., unless ballot 
> 169 makes it to the BRs, a (naughty) CA may still chose to use "any other 
> method" and it will not be flagged in the audit report, provided they 
> disclose as such in the CP/CPS. This means, Mozilla will have to review 
> (each) CA's CP/CPS to determine whether it validates _only_ using methods 
> specified in "the documented methods" and will have to do so for each CP/CPS 
> update. So hopefully 169  makes it's way to BR soon.
> 
> -Santhan

And sorry I misspelled you name!!!
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: GoDaddy Misissuance Action Items

2017-02-13 Thread Santhan Raj via dev-security-policy
On Monday, February 13, 2017 at 4:22:34 AM UTC-8, Gervase Markham wrote:

> That is why, despite some IPR-related tangles, Mozilla will be requiring
> in its next CA Communication that all CAs move to using only those
> documented methods in a fairly short timeframe, regardless of what the
> BRs say. CAs may wish to not wait for that communication to arrive
> before starting to adapt their systems.

Grev,

One thing to highlight here is that the WebTrust audits are performed against 
the BRs and not against the root program requirements. I.e., unless ballot 169 
makes it to the BRs, a (naughty) CA may still chose to use "any other method" 
and it will not be flagged in the audit report, provided they disclose as such 
in the CP/CPS. This means, Mozilla will have to review (each) CA's CP/CPS to 
determine whether it validates _only_ using methods specified in "the 
documented methods" and will have to do so for each CP/CPS update. So hopefully 
169  makes it's way to BR soon.

-Santhan
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: GoDaddy Misissuance Action Items

2017-02-13 Thread Gervase Markham via dev-security-policy
On 13/02/17 16:41, Nick Lamb wrote:
> GoDaddy came up with). Thus, even though some of the methods from
> Ballot 169 are not included in the Baseline Requirements today,
> Mozilla intends to oblige root programme members to pick from those
> ten methods.

Yes. And this is permitted by the BRs because they currently have an
"any other method" method, which could cover any of the ones whose
actual text is missing.

Gerv
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: GoDaddy Misissuance Action Items

2017-02-13 Thread Gervase Markham via dev-security-policy
On 13/02/17 14:34, Nick Lamb wrote:
> I don't think Ballot 169 represents best practices per se. Instead as
> with the rest of the Baseline Requirements what we have here are
> _minimums_, we aren't asking that CAs should do no more than what is
> described, but that they must do at least what is described.

Well, OK. That wasn't really the focus of the statement. I suspect that
the ballot 169 methods are bar-raising for most CAs, even if they aren't
yet as watertight as they could be.

> Anyway, I have a nitpick for your GoDaddy remediation plan. I think
> in item (1) it's not clear that it's fine for a CA to choose to
> implement many or even all ten methods, and even for them to have
> other methods - what's important is that for any particular name
> validated their process ensures at least one of the ten Ballot 169
> methods was used.

That is my intent; I'm happy to make that clear.

Gerv
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: GoDaddy Misissuance Action Items

2017-02-13 Thread Patrick Figel via dev-security-policy
On 13/02/2017 16:15, Jürgen Brauckmann via dev-security-policy wrote:
> Gervase Markham via dev-security-policy schrieb:
>> 1) As with all CAs, update all their domain validation code to use one
>> of the 10 approved methods;
> 
> I'm probably confused regarding BRs pre/post Ballot 181: Aren't there
> only 4 methods per Ballot 181?

My understanding is that while Ballot 181 included only those methods
from Ballot 169 that were not affected by any patent exclusion notices,
plus "any other method", Mozilla will disallow "any other method" and
instead ask CAs to limit their validation methods to the ones from
Ballot 169.

This approach would still be compliant with the BRs because the 6
methods affected by the patent exclusions can be counted as
implementations of "any other method".
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: GoDaddy Misissuance Action Items

2017-02-13 Thread Nick Lamb via dev-security-policy
On Monday, 13 February 2017 15:15:47 UTC, Jürgen Brauckmann  wrote:
> I'm probably confused regarding BRs pre/post Ballot 181: Aren't there
> only 4 methods per Ballot 181?
> 
> Jürgen

Ballot 169 identified exactly 10 methods. Although this ballot passed 
unanimously, meaning that both CA members and Browser members on the whole 
supported these 10 methods, subsequently the CA/B effectively undid the changes 
from Ballot 169 because of patent concerns.

Mozilla's position as I understand it is that regardless of what happens with 
patents, they don't want CAs to continue inventing their own ad hoc validation 
methods (witness the flaws in the method GoDaddy came up with). Thus, even 
though some of the methods from Ballot 169 are not included in the Baseline 
Requirements today, Mozilla intends to oblige root programme members to pick 
from those ten methods.

So far as I can see three factors might cause a CA to decide it's necessary in 
their opinion to reject any particular method. These are

1. The method isn't allowed for them under the BRs, or another root programmes 
rules.

2. The method is subject to patent or other legal rights and they're unable or 
unwilling to agree acceptable terms to use the method.

3. The method is incompatible with the CA's business model or doesn't meet 
their own standards for validation.


For (1) I believe the BRs currently allow all ten Ballot 169 methods because 
they have an "any method" escape clause. If a CA believes another root 
programme requirement conflicts this would be the right forum for the CA to 
tell Mozilla about it.

For (2) where a CA is aware of such rights and they weren't already revealed to 
the CA/B it'd sure be helpful to know about them here.

For (3) I don't see any problem unless the CA rules out all ten methods. If any 
CA is on the verge of doing that they should definitely reach out to us in 
m.d.s.policy to explain their thinking.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: GoDaddy Misissuance Action Items

2017-02-13 Thread Jürgen Brauckmann via dev-security-policy
Gervase Markham via dev-security-policy schrieb:
> 1) As with all CAs, update all their domain validation code to use one
> of the 10 approved methods;

I'm probably confused regarding BRs pre/post Ballot 181: Aren't there
only 4 methods per Ballot 181?

Jürgen
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy