Re: Comodo issued a certificate for an extension

2016-10-02 Thread Peter Bowen
On Sun, Oct 2, 2016 at 9:49 AM, Nick Lamb wrote: > > The second thing obviously is that they do have exactly the "rule" Richard > Wang described, and they believe this was justified under the BRs old 3.2.2.4 > method 7 (which isn't a method at all, it's basically a

Re: Apple's response to the WoSign incidents

2016-10-01 Thread Peter Bowen
On Sat, Oct 1, 2016 at 6:40 AM, wrote: > Do you have a link to that process and is it automated. Reason is I have a > few hundred startSSL certs that my clients rely on. I can't speak for the specific process Apple is using, but in general you can use https://crt.sh/ or

Re: Updating Production Common CA Database

2016-09-26 Thread Peter Bowen
How about CA ID? On Sep 26, 2016 16:26, "Kathleen Wilson" wrote: > > "Certificate ID" seems like entirely the wrong name for this field, > > given that it [SHA-256(der(subject) + der(spki))] doesn't actually > > identify a unique certificate! > > Indeed, the whole point of

Re: Comodo issued a certificate for an extension

2016-09-25 Thread Peter Bowen
On Sun, Sep 25, 2016 at 9:19 AM, Nick Lamb wrote: > On Sunday, 25 September 2016 15:35:07 UTC+1, mono...@gmail.com wrote: >> am I the only one who a) thinks this is slightly problematic and b) is >> surprised that the cert still isn't revoked? > > I don't know enough about

Re: WoSign and StartCom audit reports

2016-09-23 Thread Peter Bowen
On Fri, Sep 23, 2016 at 10:46 AM, Eddy Nigg <eddy_n...@startcom.org> wrote: > On 09/23/2016 05:53 AM, Peter Bowen wrote: >> >> Review of StartCom audit reports >> for the period 1 January 2015 to 31 December 2015 >> >> Good: >> - Uses AICPA standards

Re: Audit requirements

2016-09-23 Thread Peter Bowen
On Fri, Sep 23, 2016 at 5:29 AM, Kurt Roeckx <k...@roeckx.be> wrote: > On 2016-09-23 00:57, Peter Bowen wrote: >> >> Kathleen, Gerv, Richard and m.d.s.p, >> >> In reviewing the WebTrust audit documentation submitted by various CA >> program members and organi

WoSign and StartCom audit reports

2016-09-22 Thread Peter Bowen
As hinted at in my earlier email about what is expected in audit reports, I've been looking at WebTrust audit reports from many CAs in the Mozilla program and those applying to be in the program. Since there has been lots of discussion about WoSign and Startcom recently, I took a look at their

Audit requirements

2016-09-22 Thread Peter Bowen
Kathleen, Gerv, Richard and m.d.s.p, In reviewing the WebTrust audit documentation submitted by various CA program members and organizations wishing to be members, it seems there is possibly some confusion on what is required by Mozilla. I suspect this might also span to ETSI audit

Re: Incidents involving the CA WoSign

2016-09-21 Thread Peter Bowen
On Wed, Sep 21, 2016 at 9:10 PM, Richard Wang wrote: >> Are you saying out of over 40,000 orders over the last year, only six >> "stopped to move forward" for a period of a week or more and these happen to >> all have been ordered on Sunday, December 20, 2015 (China time)? >

Re: Incidents involving the CA WoSign

2016-09-21 Thread Peter Bowen
Richard, I'm having a really hard time reconciling what you describe with what is found in the CT logs and what I observed today when doing as you suggested and getting a cert from https://buy.wosign.com/free/. I pulled all the WoSign certificates from CT logs that have embedded SCTs. There are

Re: Incidents involving the CA WoSign

2016-09-21 Thread Peter Bowen
is hosted by Qihoo 360 > > https://pierrekim.github.io/blog/2016-02-16-why-i-stopped-using-startssl-because-of-qihoo-360.html > and > that you're the sole director of StartCom, it's hard for me to believe > that > you "don't know anything" about Qihoo 360. >

Re: Incidents involving the CA WoSign

2016-09-19 Thread Peter Bowen
Richard, As someone pointed out on Twitter this morning, it seems that the PSC notification for Startcom UK was filed recently: https://s3-eu-west-1.amazonaws.com/document-api-images-prod/docs/UdxHYAlFj6U9DNs6VBJdnIDv4IQAWd4YKYomMERO_2o/application-pdf Were you unaware of this filing?

Re: Guang Dong Certificate Authority (GDCA) root inclusion request

2016-09-19 Thread Peter Bowen
On Mon, Sep 19, 2016 at 1:56 AM, wrote: > Dear Peter, Thanks for your comments! We think that there are some good > suggestions for our work. We’ll take notes and do better in our future work. > > We have discussed these questions with our auditor. Here are our reply to

Re: Incidents involving the CA WoSign

2016-09-19 Thread Peter Bowen
Richard, I'm still somewhat confused. Can you review the following statements and either confirm they are true or specify they are not true and correct them? On 15 December 2015: 1) סטארט קומארשל בע"מ ("Start Commercial Limited" or StartCom IL) was a registered company in Israel. 2) 王高华

Re: Guang Dong Certificate Authority (GDCA) root inclusion request

2016-09-17 Thread Peter Bowen
On Wed, Aug 3, 2016 at 2:45 PM, Kathleen Wilson wrote: > This request from Guangdong Certificate Authority (GDCA) is to include the > "GDCA TrustAUTH R5 ROOT" certificate, turn on the Websites trust bit, and > enabled EV treatment. > > * CA Hierarchy: This root certificate

Re: Incidents involving the CA WoSign

2016-09-14 Thread Peter Bowen
On Sat, Sep 10, 2016 at 6:43 PM, Richard Wang wrote: > We will publish a more comprehensive report in the next several days that > will attempt to cover most / all issues. > Thanks for your patience. Richard, Thank you in advance for working on a comprehensive report. I

Re: Sanctions short of distrust

2016-09-13 Thread Peter Bowen
On Tue, Sep 13, 2016 at 7:53 AM, Ryan Sleevi wrote: > We also see a variety of domains using certs from either for purposes that > are ostensibly not relevant to browsers - a frequent dead give-away is a cert > for autodiscover.[example.com] - which is an Exchange

Re: Sanctions short of distrust

2016-09-13 Thread Peter Bowen
On Mon, Sep 12, 2016 at 2:46 PM, Ryan Sleevi wrote: > > Consider if we start with the list of certificates issued by StartCom and > WoSign [...] Extract the subjectAltName from every one of these certificates, > and then compare against the Alexa Top 1M. This yields more than

Re: Sanctions short of distrust

2016-09-12 Thread Peter Bowen
On Mon, Sep 12, 2016 at 7:02 PM, Ryan Sleevi <r...@sleevi.com> wrote: > On Monday, September 12, 2016 at 6:09:05 PM UTC-7, Peter Bowen wrote: >> This would have two advantages: >> 1) Helps limit blast radius of whitelisting a name/domain > > I'm unclear what you mean

Re: Sanctions short of distrust

2016-09-12 Thread Peter Bowen
On Mon, Sep 12, 2016 at 2:46 PM, Ryan Sleevi wrote: > To that end, I'm going to offer one more suggestion for consideration: > G) Distrust with a Whitelist of Hosts > > The issue with C is that it becomes easily inflated by issuing certificates, > even if they're not used; that

Re: Cerificate Concern about Cloudflare's DNS

2016-09-12 Thread Peter Bowen
On Mon, Sep 12, 2016 at 6:42 AM, Peter Kurrasch wrote: > I was thinking of more the server (cloud) side of things. I'm not familiar > enough with Cloudflare's service, but I imagine that if I have a server set > up I will also have access to my private key. If so, I now have

Re: Cerificate Concern about Cloudflare's DNS

2016-09-10 Thread Peter Bowen
On Sat, Sep 10, 2016 at 10:40 PM, Han Yuwei wrote: > So when I delegated the DNS service to Cloudflare, Cloudflare have the > privilege to issue the certificate by default? Can I understand like that? I would guess that they have a clause in their terms of service or

Re: Incidents involving the CA WoSign

2016-09-05 Thread Peter Bowen
On Wed, Aug 24, 2016 at 6:08 AM, Gervase Markham wrote: > Several incidents have come to our attention involving the CA "WoSign". > Mozilla is considering what action it should take in response to these > incidents. This email sets out our understanding of the situation. > >

Re: Incidents involving the CA WoSign

2016-09-04 Thread Peter Bowen
hanks, > > Regards, > > Richard > >> On 4 Sep 2016, at 12:12, Matt Palmer <mpal...@hezmatt.org> wrote: >> >>> On Sat, Sep 03, 2016 at 02:18:44PM -0700, Peter Bowen wrote: >>> Can you also please check the following two certificates? It looks >

Re: Incidents involving the CA WoSign

2016-09-03 Thread Peter Bowen
On Thu, Sep 1, 2016 at 9:00 AM, Ryan Sleevi wrote: > On Wed, August 31, 2016 10:09 pm, Richard Wang wrote: >> Thanks for your so detail instruction. >> Yes, we are improved. The two case is happened in 2015 and the mis-issued >> certificate period is only 5 months that we

Re: Incidents involving the CA WoSign

2016-09-03 Thread Peter Bowen
, Richard Wang <rich...@wosign.com> wrote: > We will check this tomorrow. > Now our time is 23:32 at night. > > > Regards, > > Richard > >> On 2 Sep 2016, at 23:20, Peter Bowen <pzbo...@gmail.com> wrote: >> >>> On Fri, Sep 2, 2016 at 8:11 AM, Richar

Re: Incidents involving the CA WoSign

2016-09-02 Thread Peter Bowen
On Fri, Sep 2, 2016 at 5:04 PM, Richard Wang wrote: > From the screenshot, we know why Percy hate WoSign so deeply, we know he > represent which CA, everything is clear now. Richard, With all due respect, many of the people who participate in this dev-security-policy group

Re: Incidents involving the CA WoSign

2016-09-02 Thread Peter Bowen
On Fri, Sep 2, 2016 at 8:11 AM, Richard Wang <rich...@wosign.com> wrote: > Yes, we posted all 2015 issued SSL from WoSign trusted root. > > On 2 Sep 2016, at 22:55, Peter Bowen <pzbo...@gmail.com> wrote: >> Based on CT logs, I have seen certificates from the CAs below, a

Re: Incidents involving the CA WoSign

2016-09-02 Thread Peter Bowen
(forgot the list) On Fri, Sep 2, 2016 at 7:55 AM, Peter Bowen <pzbo...@gmail.com> wrote: > On Fri, Sep 2, 2016 at 12:37 AM, Richard Wang <rich...@wosign.com> wrote: >> We finished the CT posting, all 2015 issued SSL certificate is posted to >> WoSign CT log serve

Re: Incidents involving the CA WoSign

2016-09-02 Thread Peter Bowen
On Fri, Sep 2, 2016 at 12:37 AM, Richard Wang wrote: > We finished the CT posting, all 2015 issued SSL certificate is posted to > WoSign CT log server: https://ctlog.wosign.com, total 101,410 certificates. Richard, Based on CT logs, I have seen certificates from the CAs

Reuse of serial numbers by StartCom

2016-08-30 Thread Peter Bowen
In reviewing the Certificate Transparency logs, I noticed the StartCom has issued multiple certificates with identical serial numbers and identical issuer names. https://crt.sh/?serial=14DCA8 (2014-12-07) https://crt.sh/?serial=04FF5D653668DB (2015-01-05) https://crt.sh/?serial=052D14BA553ED0

Re: Incidents involving the CA WoSign

2016-08-30 Thread Peter Bowen
On Wed, Aug 24, 2016 at 6:08 AM, Gervase Markham wrote: > Dear m.d.s.policy, > > Several incidents have come to our attention involving the CA "WoSign". > Mozilla is considering what action it should take in response to these > incidents. This email sets out our understanding of

Re: Amazon Root Inclusion Request

2016-08-15 Thread Peter Bowen
Andrew, Thank you for your review of our CP and CPS. Please see our responses inline. Thanks, Peter > On Aug 10, 2016, at 3:12 PM, Andrew R. Whalley wrote: > > Here are the notes from my read-through. I commend Amazon for the clarity > of their CP and CPS. > >

Re: Intermediate certificate disclosure deadline in 2 weeks

2016-06-29 Thread Peter Bowen
I think there is confusion over the generic term “Symantec”. There is no issue for Symantec (the company) to be an affiliate of the USG FPKI and to operate CAs mutually cross-certified with the USG FPKI. Additionally there is no issue with Symantec (or anyone else) to operate CAs included in

Re: Intermediate certificate disclosure deadline in 2 weeks

2016-06-25 Thread Peter Bowen
On Sat, Jun 25, 2016 at 3:50 AM, Ben Laurie wrote: > On 25 June 2016 at 00:56, Rob Stradling wrote: >> On 24/06/16 14:38, Rob Stradling wrote: >>> >>> I've just updated https://crt.sh/mozilla-disclosures. >>> >>> There's now a separate grouping for

Re: Intermediate certificate disclosure deadline in 2 weeks

2016-06-22 Thread Peter Bowen
I think there are two things getting conflated here: 1) Disclosure of revoked unexpired CA certificates signed by a trusted CA 2) Disclosure of CA certificates signed by CAs that are the subject of #1 Imagine the following heirarchy: Univercert Root CA (in trust store) --(CA Cert A)-->

Re: Intermediate certificate disclosure deadline in 2 weeks

2016-06-22 Thread Peter Bowen
On Wed, Jun 22, 2016 at 11:19 AM, Ryan Sleevi wrote: > On Wed, Jun 22, 2016 at 8:21 AM, Ben Wilson wrote: >> It seems to me that requiring the registration of these subordinate CAs >> bloats the Salesforce database unnecessarily. > > We've historically

Re: Should we block Blue Coat's 'test' intermediate CA?

2016-05-31 Thread Peter Bowen
On Tue, May 31, 2016 at 9:59 AM, Nick Lamb wrote: > That said, so far as I understand the Mozilla requirement is actually that > such intermediates be disclosed _and audited_. The present disclosure from > Symantec asserts that this intermediate is covered by the same

Re: SSL Certs for Malicious Websites

2016-05-20 Thread Peter Bowen
[ Disclaimer: This message is my personal view and does not necessarily represent that of my employer. ] On Fri, May 20, 2016 at 5:41 PM, wrote: > Peter -- the reference to BR 9.6.8(8) is interesting, but is not really > relevant to discussion of the requirements of BR

Re: SSL Certs for Malicious Websites

2016-05-20 Thread Peter Bowen
[ Disclaimer: This message is my personal view and does not necessarily represent that of my employer. ] On Thu, May 19, 2016 at 9:15 AM, wrote: > This has been a very surprising discussion to me. If most CAs were asked “Do > you think CAs are supposed to investigate

Re: SSL Certs for Malicious Websites

2016-05-18 Thread Peter Bowen
On Wed, May 18, 2016 at 7:16 AM, Gervase Markham wrote: > I think the bullet as a whole could mean that we reserve the right to > not include CAs who happily issue certs to "www.paypalpayments.com" to > just anyone without any checks or High Risk string list or anything. > Such

Re: SSL Certs for Malicious Websites

2016-05-16 Thread Peter Bowen
On Mon, May 16, 2016 at 6:06 AM, Rob Stradling <rob.stradl...@comodo.com> wrote: > On 16/05/16 01:43, Peter Bowen wrote: > > This discussion should consider what's best for Mozilla's users. Perhaps > that aligns precisely with the minimum requirements in the EVGs, or perhaps >

Re: SSL Certs for Malicious Websites

2016-05-15 Thread Peter Bowen
(Top posting to bring the questions to the top) > 1) What does "Certificate misuse, or other types of fraud" in the definition > of Certificate Problem Report actually mean? > 2) What does "misused" mean in Section 4.9.1.1? I think there are a several of different things that could fall within

Re: Disclosure requirements for "subsequent certificates in a (name-constrained) certification path"

2016-05-05 Thread Peter Bowen
> On May 5, 2016, at 6:50 AM, Richard Barnes <rbar...@mozilla.com> wrote: > > On Thu, May 5, 2016 at 8:32 AM, Peter Bowen <pzbo...@gmail.com> wrote: >> >> I will disagree. I think the intent is to "prune" the tree > > > Oh, if only it we

Re: Undisclosed CA certificates

2016-04-29 Thread Peter Bowen
On Fri, Apr 29, 2016 at 7:17 PM, Matt Palmer <mpal...@hezmatt.org> wrote: > On Fri, Apr 29, 2016 at 05:12:28PM -0700, Peter Bowen wrote: >> On Fri, Apr 29, 2016 at 5:03 PM, Matt Palmer <mpal...@hezmatt.org> wrote: >> > Even more fun: what if the seria

[no subject]

2016-04-29 Thread Peter Bowen
I'm a little confused about the expected scope of audit reports with respect to non-Root issuers. The Mozilla CA policy says: "The term 'subordinate CA' below refers to any organization or legal entity that is in possession or control of a certificate that is capable of being used to issue new

Re: Undisclosed CA certificates

2016-04-27 Thread Peter Bowen
Here is a Google Spreadsheet without the subordinates that have EKU restrictions. I didn't match to SalesForce, so most of these are probably already in there. https://docs.google.com/spreadsheets/d/14lO33nW-tTN86Vq_urmI6IAIWRPZgd1KKfzvrLk5TZQ/edit?usp=sharing On Wed, Apr 27, 2016 at 6:11 PM,

Re: Undisclosed CA certificates

2016-04-27 Thread Peter Bowen
On Wed, Apr 27, 2016 at 7:36 PM, Richard Barnes <rbar...@mozilla.com> wrote: > On Wed, Apr 27, 2016 at 8:41 PM, Peter Bowen <pzbo...@gmail.com> wrote: >> >> As far as I can tell, SalesForce does not have a way to show multiple >> certificates for one CA. So it is

Re: What is the Mozilla Firefox policy concerning SHA-1 Client authentication certificates?

2016-04-27 Thread Peter Bowen
It does to a certain extent. If I have a certificate that uses a 512-bit RSA key and is signed using RSAwithMD2, will Mozilla even attempt to use that certificate for client authentication? On Wed, Apr 27, 2016 at 10:54 AM, Richard Barnes wrote: > For client certificates,

Re: Which intermediate certs to add to CA Community in Salesforce

2016-04-13 Thread Peter Bowen
On Wed, Apr 13, 2016 at 2:26 PM, Kathleen Wilson wrote: > All, > > I added the following to > https://wiki.mozilla.org/CA:SalesforceCommunity#Which_intermediate_certificate_data_should_CAs_add_to_Salesforce.3F > ~~ > Intermediate certificates are considered to be technically

Re: A-Trust Root Renewal Request

2016-03-27 Thread Peter Bowen
On Fri, Mar 25, 2016 at 7:33 AM, wrote: > can someone explain to a non security expert, why A-Trust is still not in the > inclusion phase? This bug-report goes over a year now. Is A-Trust not > cooperating promptly and correctly? Is Mozilla working too slow? I really > don't

CA ownership (re: Q1 2016 CA communication)

2016-03-22 Thread Peter Bowen
Over the last year or so there seems to be a lot of movement in CA ownership. Would it be worth asking for each root to provide an indication of company/organization ownership? For example, NetLock indicates on their website they were acquired by Docler Holding in 2013. Similarly, TrustWave

Re: OCSP Responders Are An Attack Vector For SHA-1 Collisions

2016-03-09 Thread Peter Bowen
On Wed, Mar 9, 2016 at 12:40 PM, Jakob Bohm wrote: > 1. Use a non-CA OCSP certificate if the relevant clients are known to > support this aspect of the OCSP protocol (I don't know if any OCSP > clients, historic or otherwise, lack this ability). Such an OCSP >

Re: New requirement: certlint testing

2016-02-09 Thread Peter Bowen
On Tue, Feb 9, 2016 at 6:55 AM, Erwann Abalea wrote: > Le lundi 8 février 2016 21:43:19 UTC+1, Kathleen Wilson a écrit : >> On 2/8/16 12:22 PM, Kathleen Wilson wrote: >> >> One topic currently under discussion in Bug #1201423 is regarding root >> certificates with serial number

Re: New requirement: certlint testing

2016-02-08 Thread Peter Bowen
On Mon, Feb 8, 2016 at 2:46 PM, Kathleen Wilson wrote: > > Note that I think there are still some things with the certlint tests that > need to be ironed out, before filing bugs for every reported error. I am unaware of anything that is flagged as Fatal or Error on non-CA

Policy revision proposal - transitive disclosure exception

2016-02-06 Thread Peter Bowen
The Mozilla CA Certificate policy says, in part: "8. All certificates that are capable of being used to issue new certificates, and which directly or transitively chain to a certificate included in Mozilla’s CA Certificate Program, MUST be operated in accordance with Mozilla’s CA Certificate

More SHA-1 certs

2016-01-31 Thread Peter Bowen
These are all in the last week Sub-CA under SHECA (which has applied to be in the Mozilla program) https://crt.sh/?id=12367776=cablint Sub-CA under DigiCert https://crt.sh/?id=12460684=cablint Sub-CA under Symantec https://crt.sh/?id=12456194=cablint https://crt.sh/?id=12434313=cablint

Re: ComSign Root Renewal Request

2016-01-29 Thread Peter Bowen
Peter, I obviously do not represent ComSign, but several of the items in your list are not really specific to the CPS and instead are more comments on the Mozilla policies. On Fri, Jan 29, 2016 at 4:24 PM, Peter Kurrasch wrote: > * There is a BR from CABF that covers code

Re: Nation State MITM CA's ?

2016-01-07 Thread Peter Bowen
On Thu, Jan 7, 2016 at 2:34 PM, David E. Ross <nobody@nowhere.invalid> wrote: > On 1/7/2016 12:29 PM, Kathleen Wilson wrote: >> On 1/7/16 11:15 AM, Peter Bowen wrote: >>> >>> >>> Until such time that the provide this, I don't see how they are any >&g

Re: Name issues in public certificates

2015-12-10 Thread Peter Bowen
On Thu, Dec 10, 2015 at 6:07 AM, Matthias Hunstock <no-s...@ple4se.org> wrote: > Am 09.12.2015 um 18:46 schrieb Peter Bowen: > >> Do you have an example where you think IPv6 addresses are not being >> handled correctly? > > Serial 19D70E1B381579 in your document

Re: Name issues in public certificates

2015-12-09 Thread Peter Bowen
On Wed, Dec 9, 2015 at 9:35 AM, Matthias Hunstock <no-s...@ple4se.org> wrote: > Am 17.11.2015 um 09:04 schrieb Peter Bowen: > >> There are a couple of rules that may create false positives, so please >> don't assume every certificate on the sheet is problematic. > > I

Re: Policy Update Proposal: Timeline for Disclosing SubCAs

2015-12-03 Thread Peter Bowen
On Thu, Dec 3, 2015 at 11:17 AM, Kathleen Wilson <kwil...@mozilla.com> wrote: > On 12/3/15 11:04 AM, Peter Bowen wrote: >> >> On Thu, Dec 3, 2015 at 10:31 AM, Kathleen Wilson <kwil...@mozilla.com> >> wrote: >>>> >>>> On 23/11/15 15:57, Pe

Re: Policy Update Proposal: Timeline for Disclosing SubCAs

2015-12-03 Thread Peter Bowen
On Thu, Dec 3, 2015 at 10:31 AM, Kathleen Wilson <kwil...@mozilla.com> wrote: >> On 23/11/15 15:57, Peter Bowen wrote: >>> >>> I realize that Mozilla carved out allowance for not disclosing, but >>> the CA/Browser Forum did not adopt this, instead only ex

Re: Policy Update Proposal: Timeline for Disclosing SubCAs

2015-11-23 Thread Peter Bowen
On Tue, Nov 3, 2015 at 4:24 PM, Kathleen Wilson wrote: > Topic to discuss [1]: > “(D3) Make the timeline clear about when the audit statements and disclosure > has to happen for new audited/disclosed subCAs. > > What further clarification needs to be added to Mozilla’s CA

Re: [FORGED] Name issues in public certificates

2015-11-20 Thread Peter Bowen
On Fri, Nov 20, 2015 at 9:28 AM, wrote: > Yes, thanks. I had CommonName field in mind and that is limited to 64 > characters but SubjectAltName is completely different when it comes to max > length (even though they both hold a FQDN). I had missed that limitation

Re: Policy Update Proposal: Timeline for Disclosing SubCAs

2015-11-20 Thread Peter Bowen
On Tue, Nov 3, 2015 at 4:24 PM, Kathleen Wilson wrote: > Topic to discuss [1]: > “(D3) Make the timeline clear about when the audit statements and disclosure > has to happen for new audited/disclosed subCAs. > > Section 10 of the Inclusion Policy says: >

Re: Name issues in public certificates

2015-11-19 Thread Peter Bowen
On Thu, Nov 19, 2015 at 4:26 PM, Brian Smith <br...@briansmith.org> wrote: > Peter Bowen <pzbo...@gmail.com> wrote: >> >> Robin Alden <ro...@comodo.com> wrote: >> Given that it doesn't, but that that the BRs say "MUST be either a >>

Re: Name issues in public certificates

2015-11-19 Thread Peter Bowen
On Thu, Nov 19, 2015 at 11:57 AM, Robin Alden wrote: > Peter said.. >> While I realize that it is not clear cut in many contexts, RFC 5280 is >> rather clear cut. The authors clearly wanted to avoid stumbling and >> being eaten by a grue, so they wrote: >> >>When the

Re: [FORGED] Name issues in public certificates

2015-11-18 Thread Peter Bowen
On Wed, Nov 18, 2015 at 2:22 AM, Rob Stradling wrote: > I would also like to get clarification on if/when the underscore character > may be used in each of the name types. Your report seems to flag > underscores as always prohibited (I think), but I expect that some CAs

Re: [FORGED] Name issues in public certificates

2015-11-18 Thread Peter Bowen
On Wed, Nov 18, 2015 at 10:25 AM, Ryan Sleevi <ryan-mozdevsecpol...@sleevi.com> wrote: > On Wed, November 18, 2015 8:56 am, Peter Bowen wrote: >> On Wed, Nov 18, 2015 at 2:22 AM, Rob Stradling <rob.stradl...@comodo.com> >> wrote: >> > I would also

Re: [FORGED] Name issues in public certificates

2015-11-18 Thread Peter Bowen
On Wed, Nov 18, 2015 at 5:43 PM, Brian Smith <br...@briansmith.org> wrote: > Peter Bowen <pzbo...@gmail.com> wrote: >> >> 2) For commonName attributes in subject DNs, clarify that they can only >> contain: >> >> - IPv4 address in dotted-decimal notat

Re: [FORGED] Name issues in public certificates

2015-11-17 Thread Peter Bowen
On Tue, Nov 17, 2015 at 2:40 PM, Rob Stradling wrote: > On 17/11/15 17:54, Kurt Roeckx wrote: >> >> On Tue, Nov 17, 2015 at 05:40:28PM +, Rob Stradling wrote: >>> >>> >>> Great. I tried importing the list into postgres but I couldn't persuade >>> it >>> to accept

Re: [FORGED] Name issues in public certificates

2015-11-17 Thread Peter Bowen
er 17, 2015 2:12 PM > To: Jeremy Rowley > Cc: Richard Wang; mozilla-dev-security-pol...@lists.mozilla.org; Peter Bowen; > Peter Gutmann > Subject: Re: [FORGED] Name issues in public certificates > > On 17/11/15 18:27, Jeremy Rowley wrote: >> Encoding an IP Address in a dNSName i

Re: [FORGED] Name issues in public certificates

2015-11-17 Thread Peter Bowen
d, please check it, thanks. > > The attached certificate is No. 6653, please check its EKU, thanks. > > > Best Regards, > > Richard > > > -Original Message- > From: Peter Bowen [mailto:pzbo...@gmail.com] > Sent: Wednesday, November 18, 2015 12:33 AM > To:

Re: Clarify that a ccTLD is not acceptable in permittedSubtrees

2015-11-11 Thread Peter Bowen
On Wed, Nov 11, 2015 at 12:21 AM, Adriano Santoni wrote: > The issue I raised is not whether ccTLD are allowed in the BRs (they > apparently are, to date) or what kind of entity could be allowed a ccTLD in > their SubCA certificate's permittedSubtrees. > > My point

Re: Clarify that a ccTLD is not acceptable in permittedSubtrees

2015-11-11 Thread Peter Bowen
On Wed, Nov 11, 2015 at 3:11 AM, Gervase Markham wrote: > "Presence on the ICANN section of the list" gets closer, but this > doesn't solve the brand-TLD problem. > > Ideally, we would know which TLDs were public-registration and which > were not; ICANN has made noises about

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-10-08 Thread Peter Bowen
> On Oct 8, 2015, at 6:27 AM, Peter Kurrasch wrote: > > ‎I will cop to being confused about the Linux situation--I thought some issue > had been identified for one of the distros. > > 1. Impacts to specific products: I had hoped that by now we'd be able to > point to

Re: Firefox security too strict (HSTS?)?

2015-09-17 Thread Peter Bowen
> On Sep 17, 2015, at 8:29 PM, AnilG wrote: > > On Friday, 18 September 2015 12:29:46 UTC+10, Peter Gutmann wrote: >> base. If you look at Mozilla's own figures at >> https://input.mozilla.org/en-US/, they have a 90% dissatisfaction rating from > > To make my point

Re: Major SSL Root issue...

2015-09-14 Thread Peter Bowen
Sebastien, I apologize, but I don’t follow the issue. What flaw are you reporting? Can you describe in detail the problem? Also, if you think that this is not a publicly known issue, please see https://www.mozilla.org/en-US/security/#For_Developers

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-10 Thread Peter Bowen
On Thu, Sep 10, 2015 at 3:54 PM, Peter Kurrasch wrote: > It seems to me that the benefits of this proposed change are minimal while > the negative impacts to embedded systems ‎are significant. Perhaps I've > missed something? > > It should be understood that code signing is

Re: Remove Roots used for only Email and CodeSigning?

2015-09-08 Thread Peter Bowen
On Tue, Sep 8, 2015 at 11:04 AM, Kurt Roeckx wrote: > On Tue, Sep 08, 2015 at 10:58:39AM -0700, Kathleen Wilson wrote: >> 28. Remove Code Signing trust bits. As of Firefox 38, add-ons are signed >> using Mozilla's own roots. There doesn't appear to be anyone else using the >>

Re: Letter from US House of Representatives

2015-07-06 Thread Peter Bowen
Thinking about this from a technical perspective, rather than a political one, this seems very similar to a user deciding to add additional certificates to their trust store. I think the primary differences are the need to add a set of certificates and possibly automatically update the list. If

Publicly disclosed and audited policy

2015-06-15 Thread Peter Bowen
The Mozilla CA Certificate policy says that all certificates which are capable of being used to issue new certificates must either be technically constrained or be publicly disclosed and audited. For certificates in the latter category, there are several requirements. I'm hoping to get clarity

Re: Name-constraining government CAs, or not

2015-06-12 Thread Peter Bowen
On Fri, Jun 12, 2015 at 3:46 PM, Tom Ritter t...@ritter.vg wrote: Are https://technet.microsoft.com/en-us/library/cc751157.aspx and http://aka.ms/auditreqs the MSFT components (previously?) under NDA? The published requirements are not under NDA. Microsoft released a draft version under NDA

Re: Name-constraining government CAs, or not

2015-05-31 Thread Peter Bowen
On Sun, May 31, 2015 at 3:43 PM, Ryan Sleevi ryan-mozdevsecpol...@sleevi.com wrote: On Sat, May 30, 2015 2:47 pm, Brian Smith wrote: IIRC, in the past, we've seen CAs that lapse in compliance with Mozilla's CA policies and that have claimed they cannot do the work to become compliant again

Re: Name-constraining government CAs, or not

2015-05-17 Thread Peter Bowen
On Sun, May 17, 2015 at 5:48 PM, Ryan Sleevi ryan-mozdevsecpol...@sleevi.com wrote: On Sun, May 17, 2015 3:28 pm, Peter Bowen wrote: What if Mozilla puts a simple rule in place? All CAs must either: - Have a WebTrust for BR and ETSI TS 102 042 assessment conducted by a assessor who meets

Re: Name-constraining government CAs, or not

2015-05-17 Thread Peter Bowen
On Sun, May 17, 2015 at 7:59 PM, Ryan Sleevi ryan-mozdevsecpol...@sleevi.com wrote: On Sun, May 17, 2015 6:06 pm, Peter Bowen wrote: I was assuming this discussion was based on the concept that Government CAs did not need to meet all the audit criteria. Otherwise why are we having

Re: Name-constraining government CAs, or not

2015-05-17 Thread Peter Bowen
On Thu, May 14, 2015 at 8:25 AM, Gervase Markham g...@mozilla.org wrote: The topic of name-constraining government CAs, probably to the TLD(s) of their territory(ies), has come up numerous times. I'd like to try and hash out, once and for all, whether we think this is actually a good idea, so

Re: Consequences of mis-issuance under CNNIC

2015-03-30 Thread Peter Bowen
On Mon, Mar 30, 2015 at 2:22 PM, jjo...@mozilla.com wrote: On Monday, March 30, 2015 at 8:34:47 AM UTC-7, Richard Barnes wrote: As a compromise, however, I would be willing to add the CNNIC intermediates to the Mozilla root list (F). [...] Rather, we should plan to remove them after a fixed

Re: 答复: Consequences of mis-issuance under CNNIC

2015-03-25 Thread Peter Bowen
On Wed, Mar 25, 2015 at 10:10 AM, Kathleen Wilson kwil...@mozilla.com wrote: All, I appreciate your thoughtful and constructive feedback on this situation. The suggestions regarding the CNNIC root certificates that I've interpreted from this discussion are as follows. These are listed in no

Re: ç­”å¤ : Consequences of mis-issuance under CNNIC

2015-03-25 Thread Peter Bowen
On Wed, Mar 25, 2015 at 12:20 PM, Gervase Markham g...@mozilla.org wrote: On 25/03/15 17:45, Ryan Sleevi wrote: That is, in a hypothetical world where E1 is pursued (for any CA), the CA can simply backdate the certificate. They'd be non-compliant with the Baseline Requirements, presumably, but

Re: Consequences of mis-issuance under CNNIC

2015-03-25 Thread Peter Bowen
On Wed, Mar 25, 2015 at 6:24 PM, Peter Kurrasch fhw...@gmail.com wrote: ‎Someone correct me if I'm wrong, but my understanding of the Superfish debacle is that sites that have EV certs would get the green bar treatment on other devices but not on the Lenovo devices where Superfish was

Require separation between Issuing CAs and Policy CAs

2015-03-24 Thread Peter Bowen
Today the Mozilla CA policy and the CAB Forum categorize CAs as either Root CAs or Intermediate CAs. However the reality is that the line is not always clear between the two and this leads to uncertainty of what requirements apply in various circumstances. For example, the Baseline Requirements

Re: 答复: Consequences of mis-issuance under CNNIC

2015-03-24 Thread Peter Bowen
Anyin, It seems that the mailing list strips attachments. I copied the ones you attached to this message a shared location. They are at: https://pzb-public-files.s3-us-west-2.amazonaws.com/B1.pdf https://pzb-public-files.s3-us-west-2.amazonaws.com/B2.pdf Thanks, Peter On Mon, Mar 23, 2015 at

Re: address prefixes allowed for domain control validation

2015-03-23 Thread Peter Bowen
On Mon, Mar 23, 2015 at 9:41 AM, Robin Alden ro...@comodo.com wrote: I wonder if the current publicity will lead all webmail providers to do a review, and then we won't see any further problems... That would be nice! Pertaining to Peter Bowen's suggestion that some CAs who use email

Re: Consequences of mis-issuance under CNNIC

2015-03-23 Thread Peter Bowen
On Mon, Mar 23, 2015 at 3:47 PM, Richard Barnes rbar...@mozilla.com wrote: It has been discovered that an intermediate CA under the CNNIC root has mis-issued certificates for some Google domains. Full details can be found in blog posts by Google [0] and Mozilla [1]. We would like to discuss

Re: Consequences of mis-issuance under CNNIC

2015-03-23 Thread Peter Bowen
On Mon, Mar 23, 2015 at 5:50 PM, Kathleen Wilson kwil...@mozilla.com wrote: Peter, Did you read the blog posts? 1) https://blog.mozilla.org/security/2015/03/23/revoking-trust-in-one-cnnic-intermediate-certificate/ 2)

Re: address prefixes allowed for domain control validation

2015-03-22 Thread Peter Bowen
On Sun, Mar 22, 2015 at 4:18 PM, Kathleen Wilson kwil...@mozilla.com wrote: admin@domain administrator@domain webmaster@domain hostmaster@domain postmaster@domain What do you all think? (Note this is also in Baseline Requirements section 11.1.1) It is hard to know

Re: Propose Removal of E-Guven root

2015-03-19 Thread Peter Bowen
On Thu, Mar 19, 2015 at 4:39 PM, David Keeler dkee...@mozilla.com wrote: On 03/19/2015 01:01 PM, Peter Bowen wrote: Given this ratio, I find it very hard to believe that they would be able to receive an audit report without qualifications that Mozilla would deem unacceptable. Maybe I'm

Re: Removed roots

2015-03-18 Thread Peter Bowen
On Wed, Mar 18, 2015 at 4:04 PM, Kathleen Wilson kwil...@mozilla.com wrote: On 2/7/15 3:02 PM, Peter Bowen wrote: There are currently spreadsheets for roots that are included in the Mozilla trust store and roots have applied to be in the trust store. Is there any tracking of roots that were

<    1   2   3   4   >