Re: Cerificate Concern about Cloudflare's DNS

2016-09-12 Thread Matt Palmer
On Sat, Sep 10, 2016 at 06:33:59PM -0700, xiaoyi...@outlook.com wrote: > But is it a OK behavior if a CDN vendor doesn't immediately revoke the old > cert after I stop using its CDN service? I don't think it's automatically terrible behaviour. Plenty of people let certificates lapse rather than a

Re: Cerificate Concern about Cloudflare's DNS

2016-09-12 Thread Han Yuwei
在 2016年9月13日星期二 UTC+8上午8:07:31,Matt Palmer写道: > On Mon, Sep 12, 2016 at 08:57:29PM +0100, Rob Stradling wrote: > > On 12/09/16 18:57, Jakob Bohm wrote: > > > On 11/09/2016 07:49, Peter Bowen wrote: > > >> On Sat, Sep 10, 2016 at 10:40 PM, Han Yuwei wrote: > > >>> So when I delegated the DNS servic

Re: Sanctions short of distrust

2016-09-12 Thread Jakob Bohm
On 13/09/2016 05:01, Peter Bowen wrote: On Mon, Sep 12, 2016 at 7:02 PM, Ryan Sleevi wrote: On Monday, September 12, 2016 at 6:09:05 PM UTC-7, Peter Bowen wrote: This would have two advantages: 1) Helps limit blast radius of whitelisting a name/domain I'm unclear what you mean by this. I sug

Re: Compromised certificate that the owner didn't wish to revoke (signed by GeoTrust)

2016-09-12 Thread Jakob Bohm
On 13/09/2016 03:03, Kyle Hamilton wrote: I would prefer not to see a securelogin-.arubanetworks.com name, because such makes it look like Aruba Networks is operating the captive portal. If (for whatever reason) the system is compromised, or the login process is altered, or there's a

Re: Sanctions short of distrust

2016-09-12 Thread Peter Bowen
On Mon, Sep 12, 2016 at 7:02 PM, Ryan Sleevi wrote: > On Monday, September 12, 2016 at 6:09:05 PM UTC-7, Peter Bowen wrote: >> This would have two advantages: >> 1) Helps limit blast radius of whitelisting a name/domain > > I'm unclear what you mean by this. I suggest there's an additional, unstat

Re: Sanctions short of distrust

2016-09-12 Thread Ryan Sleevi
On Monday, September 12, 2016 at 6:14:34 PM UTC-7, Richard Wang wrote: > Please don't mix StartCom with WoSign case, StartCom is 100% independent at > 2015. > > Even now, it still independent in the system, in the validation team and > management team, we share the CRL/OCSP distribution resource

Re: Sanctions short of distrust

2016-09-12 Thread Ryan Sleevi
On Monday, September 12, 2016 at 6:09:05 PM UTC-7, Peter Bowen wrote: > I'm not clear from this description, are you proposing to whitelist > eTLD+1 or full hostnames? How large would the lists be if you > whitelisted eTLD+1? This is whitelisting at eTLD+1 (although with a slightly older version

RE: Sanctions short of distrust

2016-09-12 Thread Richard Wang
Please don't mix StartCom with WoSign case, StartCom is 100% independent at 2015. Even now, it still independent in the system, in the validation team and management team, we share the CRL/OCSP distribution resource only. Best Regards, Richard -Original Message- From: dev-security-po

Re: Sanctions short of distrust

2016-09-12 Thread Peter Bowen
On Mon, Sep 12, 2016 at 2:46 PM, Ryan Sleevi wrote: > To that end, I'm going to offer one more suggestion for consideration: > G) Distrust with a Whitelist of Hosts > > The issue with C is that it becomes easily inflated by issuing certificates, > even if they're not used; that is, a free certifi

Re: Compromised certificate that the owner didn't wish to revoke (signed by GeoTrust)

2016-09-12 Thread Kyle Hamilton
I would prefer not to see a securelogin-.arubanetworks.com name, because such makes it look like Aruba Networks is operating the captive portal. If (for whatever reason) the system is compromised, or the login process is altered, or there's a need to enter credit card information [I do

Re: Sanctions short of distrust

2016-09-12 Thread David Adrian
On Mon, Sep 12, 2016 at 5:46 PM Ryan Sleevi wrote: > On Wednesday, August 31, 2016 at 12:43:50 PM UTC-7, Nick Lamb wrote: > > I have spent some time thinking about this, but I am only one person, > and one with relatively little in-depth knowledge of the Mozilla project, > so I think I will lay o

Re: Cerificate Concern about Cloudflare's DNS

2016-09-12 Thread Jakob Bohm
On 13/09/2016 01:28, Ryan Sleevi wrote: On Monday, September 12, 2016 at 3:51:56 PM UTC-7, Jakob Bohm wrote: Note that this is *entirely* outside CA/B and CA inclusion related guidelines, since CloudFlare is (presumably) not a CA and thus not subject to such guidelines. Then isn't it also gene

Re: Sanctions short of distrust

2016-09-12 Thread Adam Caudill
Of all the possible options - G seems to be the most practical. It provides a few key benefits, that I see as making it a clear leader: 1) It can be implemented quickly. It has been discussed that C is rather complex because of the size of the list, with the only truly practical solution being

Re: Security concern on various domain validating methods

2016-09-12 Thread Stephen Schrauger
On Friday, September 9, 2016 at 11:13:49 AM UTC-4, Han Yuwei wrote: > 在 2016年9月9日星期五 UTC+8上午12:00:15,Stephen Schrauger写道: > > Regarding the specific file verification method: > > > > It proves you control the web server that runs under the domain. Which is > > more or less all that you need to pr

Re: Cerificate Concern about Cloudflare's DNS

2016-09-12 Thread xiaoyin . l
On Saturday, September 10, 2016 at 10:44:05 AM UTC-4, Erwann Abalea wrote: > Bonjour, > > Le samedi 10 septembre 2016 14:37:40 UTC+2, Han Yuwei a écrit : > > I am using Cloudflare's DNS service and I found that Cloudflare has issued > > a certficate to their server including my domain. But I didn

Re: Cerificate Concern about Cloudflare's DNS

2016-09-12 Thread asherkin
On Monday, September 12, 2016 at 2:43:09 PM UTC+1, Peter Kurrasch wrote: > I was thinking of more the server (cloud) side of things. I'm not familiar > enough with Cloudflare's service, but I imagine that if I have a server set > up I will also have access to my private key. If so, I now have acc

Re: Cerificate Concern about Cloudflare's DNS

2016-09-12 Thread Matt Palmer
On Mon, Sep 12, 2016 at 08:57:29PM +0100, Rob Stradling wrote: > On 12/09/16 18:57, Jakob Bohm wrote: > > On 11/09/2016 07:49, Peter Bowen wrote: > >> On Sat, Sep 10, 2016 at 10:40 PM, Han Yuwei wrote: > >>> So when I delegated the DNS service to Cloudflare, Cloudflare have > >>> the privilege to

Re: Cerificate Concern about Cloudflare's DNS

2016-09-12 Thread Ryan Sleevi
On Monday, September 12, 2016 at 3:51:56 PM UTC-7, Jakob Bohm wrote: > Note that this is *entirely* outside CA/B and CA inclusion related > guidelines, since CloudFlare is (presumably) not a CA and thus not > subject to such guidelines. Then isn't it also generally outside the scope of this list?

Re: Cerificate Concern about Cloudflare's DNS

2016-09-12 Thread Jakob Bohm
On 12/09/2016 23:48, Ryan Sleevi wrote: On Monday, September 12, 2016 at 2:33:47 PM UTC-7, Jakob Bohm wrote: I find fault in CloudFlare (presuming the story is actually as reported). Why? Apologies, but I fail to see what you believe is "wrong", given how multiple people have pointed to you i

Re: Cerificate Concern about Cloudflare's DNS

2016-09-12 Thread Ryan Sleevi
On Monday, September 12, 2016 at 2:33:47 PM UTC-7, Jakob Bohm wrote: > I find fault in CloudFlare (presuming the story is actually as > reported). Why? Apologies, but I fail to see what you believe is "wrong", given how multiple people have pointed to you it being well-understood and permissible,

Re: Sanctions short of distrust

2016-09-12 Thread Ryan Sleevi
On Wednesday, August 31, 2016 at 12:43:50 PM UTC-7, Nick Lamb wrote: > I have spent some time thinking about this, but I am only one person, and one > with relatively little in-depth knowledge of the Mozilla project, so I think > I will lay out the options I've thought about and invite feedback t

Re: Cerificate Concern about Cloudflare's DNS

2016-09-12 Thread Jakob Bohm
On 12/09/2016 21:57, Rob Stradling wrote: On 12/09/16 18:57, Jakob Bohm wrote: On 11/09/2016 07:49, Peter Bowen wrote: On Sat, Sep 10, 2016 at 10:40 PM, Han Yuwei wrote: So when I delegated the DNS service to Cloudflare, Cloudflare have the privilege to issue the certificate by default? Can I

Re: Cerificate Concern about Cloudflare's DNS

2016-09-12 Thread Rob Stradling
On 12/09/16 18:57, Jakob Bohm wrote: > On 11/09/2016 07:49, Peter Bowen wrote: >> On Sat, Sep 10, 2016 at 10:40 PM, Han Yuwei wrote: >>> So when I delegated the DNS service to Cloudflare, Cloudflare have >>> the privilege to issue the certificate by default? Can I understand >>> like that? >> >> I

Re: Ambiguous wording or the Mozilla CA security reporting requirement

2016-09-12 Thread Percy
I agree with Jakob. This is similar to case laws vs statutory law. Even though we can get the same understandings from various cases, I believe in this situation, it will be clearer to codify such requirements clearly. On Monday, September 12, 2016 at 10:38:48 AM UTC-7, Jakob Bohm wrote: > On

Re: Cerificate Concern about Cloudflare's DNS

2016-09-12 Thread Jakob Bohm
On 11/09/2016 07:49, Peter Bowen wrote: On Sat, Sep 10, 2016 at 10:40 PM, Han Yuwei wrote: So when I delegated the DNS service to Cloudflare, Cloudflare have the privilege to issue the certificate by default? Can I understand like that? I would guess that they have a clause in their terms of

Re: WoSign Issue L and port 8080

2016-09-12 Thread Jakob Bohm
On 12/09/2016 09:42, Gervase Markham wrote: On 11/09/16 23:42, Lee wrote: A careful CA validator does DNS only by making authoritative queries, so they're not subject to cache poisoning since they don't look at cached answers. Would a not careful CA be flagged on their yearly audit? It only

Re: Ambiguous wording or the Mozilla CA security reporting requirement

2016-09-12 Thread Jakob Bohm
On 10/09/2016 14:39, Gervase Markham wrote: On 09/09/16 11:59, Jakob Bohm wrote: Since a major root compromise is generally considered the worst possible security event for a trusted CA, this wording could easily be (mis?)understood not to require reporting of lesser security failures, such as i

Re: WoSign Issue L and port 8080

2016-09-12 Thread Jakob Bohm
On 10/09/2016 14:45, Gervase Markham wrote: On 09/09/16 11:53, Jakob Bohm wrote: As I read the Wiki description of WoSign issue L: Arbitrary High port validation, the description notes a case of port 8080 validation as an instance of this. If the BR and or CP/CPS indeed classify port 8080 as a

Re: Cerificate Concern about Cloudflare's DNS

2016-09-12 Thread Erwann Abalea
Le lundi 12 septembre 2016 15:59:14 UTC+2, Ben Laurie a écrit : > On 10 September 2016 at 15:43, Erwann Abalea wrote: > > Ironically, since you're not the Subscriber, you cannot request for the > > revocation of this certificate, at least not directly to the CA. If you > > want this certificate

Re: Cerificate Concern about Cloudflare's DNS

2016-09-12 Thread Kristian Fiskerstrand
On 09/12/2016 03:42 PM, Peter Kurrasch wrote: > Hi Erwann, > > I was thinking of more the server (cloud) side of things. I'm not > familiar enough with Cloudflare's service, but I imagine that if I > have a server set up I will also have access to my private key. If > so, I now have access to the

Re: Cerificate Concern about Cloudflare's DNS

2016-09-12 Thread Peter Bowen
On Mon, Sep 12, 2016 at 6:42 AM, Peter Kurrasch wrote: > I was thinking of more the server (cloud) side of things. I'm not familiar > enough with Cloudflare's service, but I imagine that if I have a server set > up I will also have access to my private key. If so, I now have access to the > pri

Re: Cerificate Concern about Cloudflare's DNS

2016-09-12 Thread Peter Kurrasch
Hi Erwann,  I was thinking of more the server (cloud) side of things. I'm not familiar enough with Cloudflare's service, but I imagine that if I have a server set up I will also have access to my private key. If so, I now have access to the private key of the other domains. Perhaps there are pr

Re: Cerificate Concern about Cloudflare's DNS

2016-09-12 Thread Erwann Abalea
Bonjour, Le lundi 12 septembre 2016 14:30:56 UTC+2, Peter Kurrasch a écrit : > I noticed there a several other domains listed on that cert besides Han's > (and wildcard versions for each).‎ Unless Han is the registrar or has some > other affiliation with those domains it seems to me there is a r

Re: Cerificate Concern about Cloudflare's DNS

2016-09-12 Thread Peter Kurrasch
I noticed there a several other domains listed on that cert besides Han's (and wildcard versions for each).‎ Unless Han is the registrar or has some other affiliation with those domains it seems to me there is a risk of some private key compromise situation. Also, if I want to add a new domain

Re: Cerificate Concern about Cloudflare's DNS

2016-09-12 Thread Rob Stradling
On 10/09/16 15:43, Erwann Abalea wrote: > In my opinion, the most plausible verification method in this case is the > last one: "Having the Applicant demonstrate practical control over the FQDN > by making an agreed-upon change to information found in the DNS containing > the FQDN"; Correct.

Re: Sanctions short of distrust

2016-09-12 Thread Rob Stradling
On 09/09/16 18:25, Ryan Sleevi wrote: > On Friday, September 9, 2016 at 4:42:12 AM UTC-7, Rob Stradling wrote: >> That's a good point. So, to fix my proposal... >> >> For CAs that are on (borrowing Matt's wording) "quintuple secret >> probation" due to a "history of shenanigans with notBefore date

Re: WoSign Issue L and port 8080

2016-09-12 Thread Gervase Markham
On 11/09/16 23:42, Lee wrote: >> A careful CA validator does DNS only by making authoritative queries, so >> they're not subject to cache poisoning since they don't look at cached >> answers. > > Would a not careful CA be flagged on their yearly audit? It only might, if doing non-authoritative qu