RE: AlwaysOnSSL web security issues

2019-01-10 Thread Jeremy Rowley via dev-security-policy
Yes – we will do so. We’ve encouraged all customers to not generate key pairs for TLS certs on behalf of third parties in the past. A reminder would be useful. From: Wayne Thayer Sent: Thursday, January 10, 2019 1:18 PM To: Jeremy Rowley Cc: Alex Gaynor ; Buschart, Rufus ; Alex Cohn ; Hanno B

Re: AlwaysOnSSL web security issues

2019-01-10 Thread Wayne Thayer via dev-security-policy
Thanks Jeremy. The fact that CertCenter is just a reseller and not an RA was not obvious to me. To your point, building an insecure website on top of a CA's API does not strike me as something that we should be terribly worried about. I would encourage DigiCert to ask CertCenter to discontinue the

Re: AlwaysOnSSL web security issues

2019-01-10 Thread Jakob Bohm via dev-security-policy
On 10/01/2019 19:00, Jeremy Rowley wrote: > A couple of thoughts: > 1) CertCenter is not a CA or RA. They have a custom named ICA that is hosted > and operated by DigiCert. All validation, issuance, and linting is performed > by DigiCert prior to issuance. > 2) Lots of cert customers have insecur

RE: AlwaysOnSSL web security issues

2019-01-10 Thread Jeremy Rowley via dev-security-policy
A couple of thoughts: 1) CertCenter is not a CA or RA. They have a custom named ICA that is hosted and operated by DigiCert. All validation, issuance, and linting is performed by DigiCert prior to issuance. 2) Lots of cert customers have insecure websites. This indicates CAs should scan website

Re: P-521 Certificates

2019-01-10 Thread Jakob Bohm via dev-security-policy
On 10/01/2019 15:38, Jason wrote: I would say that the problem here would be that a child certificate can't use a higher cryptography level than the issuer, this is agains good practices and, AFAIK, agains the Webtrust audit criteria. Jason Note that the only one of all these certificates th

Re: P-521 Certificates

2019-01-10 Thread jasonterrick92--- via dev-security-policy
Checking this again I see that I'm probably wrong about Webtrust... Looking at 4.1.3-b: 4.1.3 CA key generation generates keys that: a) use a key generation algorithm as disclosed within the CA’s CP and/or CPS; b) have a key length that is appropriate for the algorithm and for the validity perio

RE: P-521 Certificates

2019-01-10 Thread Doug Beattie via dev-security-policy
Jason - where did you see this requirement? -Original Message- From: dev-security-policy On Behalf Of Jason via dev-security-policy Sent: Thursday, January 10, 2019 9:38 AM To: mozilla-dev-security-pol...@lists.mozilla.org Subject: Re: P-521 Certificates I would say that the problem here

Re: P-521 Certificates

2019-01-10 Thread Jason via dev-security-policy
I would say that the problem here would be that a child certificate can't use a higher cryptography level than the issuer, this is agains good practices and, AFAIK, agains the Webtrust audit criteria. Jason ___ dev-security-policy mailing list dev-secur

Re: AlwaysOnSSL web security issues

2019-01-10 Thread Alex Gaynor via dev-security-policy
The Mozilla policy does not prohibit backdating, except when it's used to evade time-based policy controls. Backdating certs by a few hours is a relatively common practice to minimize breakages for consumers with busted clocks. Alex On Thu, Jan 10, 2019 at 4:43 AM Buschart, Rufus via dev-securit

AW: AlwaysOnSSL web security issues

2019-01-10 Thread Buschart, Rufus via dev-security-policy
The certificate [1] seems also to be 'back-dated' by about 18 hours. What is Mozillas opinion about this in the light of https://wiki.mozilla.org/CA/Forbidden_or_Problematic_Practices#Backdating_the_notBefore_Date ? > It appears AlwaysOnSSL is not completely disabled - if we trust CT as a >