AW: CA Communication: Underscores in dNSNames

2018-12-27 Thread Buschart, Rufus via dev-security-policy
> On Tue, Dec 18, 2018 at 8:19 AM Jakob Bohm via dev-security-policy < > dev-security-policy@lists.mozilla.org> wrote: > > On 10/12/2018 18:09, Ryan Sleevi wrote: > > > On Mon, Dec 10, 2018 at 6:16 AM Buschart, Rufus via > > > dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > >

Re: CA Communication: Underscores in dNSNames

2018-12-18 Thread Wayne Thayer via dev-security-policy
On Tue, Dec 18, 2018 at 3:47 PM Jakob Bohm via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > > Removing the "underscore mandatory" and "specific name X_Y mandatory" > rules > from deployed systems without introducing security holes takes more than > the > 1 month they have

Re: CA Communication: Underscores in dNSNames

2018-12-18 Thread Jakob Bohm via dev-security-policy
On 18/12/2018 18:15, Ryan Sleevi wrote: > On Tue, Dec 18, 2018 at 8:19 AM Jakob Bohm via dev-security-policy < > dev-security-policy@lists.mozilla.org> wrote: > >> On 10/12/2018 18:09, Ryan Sleevi wrote: >>> On Mon, Dec 10, 2018 at 6:16 AM Buschart, Rufus via dev-security-policy < >>> dev-security

Re: CA Communication: Underscores in dNSNames

2018-12-18 Thread Ryan Sleevi via dev-security-policy
On Tue, Dec 18, 2018 at 8:19 AM Jakob Bohm via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > On 10/12/2018 18:09, Ryan Sleevi wrote: > > On Mon, Dec 10, 2018 at 6:16 AM Buschart, Rufus via dev-security-policy < > > dev-security-policy@lists.mozilla.org> wrote: > > > >> Hell

Re: CA Communication: Underscores in dNSNames

2018-12-18 Thread Jakob Bohm via dev-security-policy
On 10/12/2018 18:09, Ryan Sleevi wrote: > On Mon, Dec 10, 2018 at 6:16 AM Buschart, Rufus via dev-security-policy < > dev-security-policy@lists.mozilla.org> wrote: > >> Hello! >> >> It would be helpful, if the CA/B or Mozilla could publish a document on >> its web pages to which we can redirect ou

Re: CA Communication: Underscores in dNSNames

2018-12-13 Thread Wayne Thayer via dev-security-policy
On Sat, Dec 8, 2018 at 12:50 PM pilgrim2223--- via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > thanks for the suggestions. > > We are exploring the OCSP and CRL checks. It has potential. > > Have you determined if these applications perform revocations checks, or if those

Re: CA Communication: Underscores in dNSNames

2018-12-10 Thread Ryan Sleevi via dev-security-policy
On Mon, Dec 10, 2018 at 6:16 AM Buschart, Rufus via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > Hello! > > It would be helpful, if the CA/B or Mozilla could publish a document on > its web pages to which we can redirect our customers, if they have > technical questions ab

AW: CA Communication: Underscores in dNSNames

2018-12-10 Thread Buschart, Rufus via dev-security-policy
trag von rahat3858--- via dev-security-policy > Gesendet: Montag, 10. Dezember 2018 01:45 > An: mozilla-dev-security-pol...@lists.mozilla.org > Betreff: Re: CA Communication: Underscores in dNSNames > > On Monday, November 12, 2018 at 3:19:17 PM UTC-8, Wayne Thayer wrote: > >

Re: CA Communication: Underscores in dNSNames

2018-12-09 Thread rahat3858--- via dev-security-policy
On Monday, November 12, 2018 at 3:19:17 PM UTC-8, Wayne Thayer wrote: > As you may be aware, the CA/Browser Forum recently passed ballot SC12 [1] > creating a sunset period for TLS certificates containing an underscore > ("_") character in the SAN. This practice was widespread until a year ago > wh

Re: CA Communication: Underscores in dNSNames

2018-12-08 Thread pilgrim2223--- via dev-security-policy
thanks for the suggestions. We are exploring the OCSP and CRL checks. It has potential. As to getting certs from a different root, that wouldn't help us. We have no Technical reason to keep underscored certs and are happy to get rid of them, it is simply the effort required and the timeline gi

Re: CA Communication: Underscores in dNSNames

2018-12-08 Thread Alex Cohn via dev-security-policy
On Sat, Dec 8, 2018 at 5:01 AM Richard Moore via dev-security-policy wrote: > > > the scope of the main project if ~120 certs across a similar number of > > vendors. One of the home grown applications also hardcode the name of the > > certificate into the application and will require not only ce

Re: CA Communication: Underscores in dNSNames

2018-12-08 Thread Richard Moore via dev-security-policy
> the scope of the main project if ~120 certs across a similar number of > vendors. One of the home grown applications also hardcode the name of the > certificate into the application and will require not only certificate update > in coordination with the vendors but code changes on 120 certs in

Re: CA Communication: Underscores in dNSNames

2018-12-07 Thread Matt Palmer via dev-security-policy
On Fri, Dec 07, 2018 at 08:13:24AM -0800, pilgrim2223--- via dev-security-policy wrote: > As a retail organization we are in a moratorium till 1/2/2019 this happens > every year. So nothing is being done that may jeopardize selling of > widgets! Choosing to not do something is, itself, doing som

Re: CA Communication: Underscores in dNSNames

2018-12-07 Thread pilgrim2223--- via dev-security-policy
r 7, 2018 8:26:42 AM > To: mozilla-dev-security-pol...@lists.mozilla.org > Subject: Re: CA Communication: Underscores in dNSNames > > Thank you very much for your response! > > So at the end of the day I will not get any relief from the browsers, and > will need to get an exception from my C

Re: CA Communication: Underscores in dNSNames

2018-12-07 Thread Ryan Sleevi via dev-security-policy
On Fri, Dec 7, 2018 at 4:35 PM Jeremy Rowley wrote: > I only ask because telling people to go back to the CA and work something > out isn’t a great answer when the retort is that the CA will be distrusted > if they don’t. Either the customer doesn’t replace all their certs and they > are made non

RE: CA Communication: Underscores in dNSNames

2018-12-07 Thread Jeremy Rowley via dev-security-policy
Communication: Underscores in dNSNames On Fri, Dec 7, 2018 at 2:00 PM Jeremy Rowley via dev-security-policy mailto:dev-security-policy@lists.mozilla.org> > wrote: This isn't a CA-issue because the risk associated with non-compliance isn't defined yet. https://www.mozilla

RE: CA Communication: Underscores in dNSNames

2018-12-07 Thread Jeremy Rowley via dev-security-policy
That’s not well defined as there are various grades below that. Is the plan to remove any CA that doesn’t comply with this requirement? From: Ryan Sleevi Sent: Friday, December 7, 2018 2:26 PM To: Jeremy Rowley Cc: mozilla-dev-security-policy Subject: Re: CA Communication: Underscores in

Re: CA Communication: Underscores in dNSNames

2018-12-07 Thread Ryan Sleevi via dev-security-policy
On Fri, Dec 7, 2018 at 2:00 PM Jeremy Rowley via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > This isn't a CA-issue because the risk associated with non-compliance isn't > defined yet. https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/

RE: CA Communication: Underscores in dNSNames

2018-12-07 Thread Jeremy Rowley via dev-security-policy
: Friday, December 7, 2018 8:39 AM To: mozilla-dev-security-pol...@lists.mozilla.org; pilgrim2...@gmail.com Subject: Re: CA Communication: Underscores in dNSNames Personally, i think you should continue the discussion here. Although you can bring it up to whichever ca you use, the reality is that

Re: CA Communication: Underscores in dNSNames

2018-12-07 Thread Jeremy Rowley via dev-security-policy
: Friday, December 7, 2018 8:26:42 AM To: mozilla-dev-security-pol...@lists.mozilla.org Subject: Re: CA Communication: Underscores in dNSNames Thank you very much for your response! So at the end of the day I will not get any relief from the browsers, and will need to get an exception from my CA

Re: CA Communication: Underscores in dNSNames

2018-12-07 Thread pilgrim2223--- via dev-security-policy
Thank you very much for your response! So at the end of the day I will not get any relief from the browsers, and will need to get an exception from my CA? When I asked the CA they told me to take it here. Feels like the CA is where I'm going to have to focus! Thanks again for your time!

Re: CA Communication: Underscores in dNSNames

2018-12-06 Thread Wayne Thayer via dev-security-policy
On Thu, Dec 6, 2018 at 10:36 PM pilgrim2223--- via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > I need some clarification on something here > > 1) Why are legacy certs not being allowed to expire, and instead we are > being forced to replace in a very short window? We stop

Re: CA Communication: Underscores in dNSNames

2018-12-06 Thread pilgrim2223--- via dev-security-policy
I need some clarification on something here 1) Why are legacy certs not being allowed to expire, and instead we are being forced to replace in a very short window? We stopped issuing certs with underscores as soon as our CA told us to (probably mid-September) but that still puts me at having hu

Re: CA Communication: Underscores in dNSNames

2018-11-15 Thread Rob Stradling via dev-security-policy
Wayne, many thanks for drawing the attention of the CAs to this matter. Sectigo (formerly Comodo CA) stopped issuing certificates with underscores in dNSNames soon after CABForum ballot 202 failed. A search of our CA database this week found 251 certificates that are in scope for the BRs, expi

Re: CA Communication: Underscores in dNSNames

2018-11-14 Thread Wayne Thayer via dev-security-policy
half of Bruce via dev-security-policy < > dev-security-policy@lists.mozilla.org> > Sent: Wednesday, November 14, 2018 5:37:20 PM > To: mozilla-dev-security-pol...@lists.mozilla.org > Subject: Re: CA Communication: Underscores in dNSNames > > Hi Wayne, I wanted to get some cla

Re: CA Communication: Underscores in dNSNames

2018-11-14 Thread Tim Shirley via dev-security-policy
be revoked. From: dev-security-policy on behalf of Bruce via dev-security-policy Sent: Wednesday, November 14, 2018 5:37:20 PM To: mozilla-dev-security-pol...@lists.mozilla.org Subject: Re: CA Communication: Underscores in dNSNames Hi Wayne, I wanted to get some clarification. For example, let&

Re: CA Communication: Underscores in dNSNames

2018-11-14 Thread Bruce via dev-security-policy
Hi Wayne, I wanted to get some clarification. For example, let's say that a Subscriber has a 1 year certificate which expires on 30 January 2019. On 15 January 2019, the remaining validity period is less than 30 days; as such, I interpret that the certificate does not have to be revoked. On th

Re: CA Communication: Underscores in dNSNames

2018-11-14 Thread Wayne Thayer via dev-security-policy
On Wed, Nov 14, 2018 at 9:47 AM Vincent Lynch wrote: > Was looking for some quick clarification on interpretation of this bit: > > *"All certificates containing an underscore character in any dNSName entry > and having a validity period of more than 30 days MUST be revoked prior to > January 15,

Re: CA Communication: Underscores in dNSNames

2018-11-14 Thread Vincent Lynch via dev-security-policy
Was looking for some quick clarification on interpretation of this bit: *"All certificates containing an underscore character in any dNSName entry and having a validity period of more than 30 days MUST be revoked prior to January 15, 2019."* This language refers to the TOTAL validity period of th

Re: CA Communication: Underscores in dNSNames

2018-11-13 Thread Wayne Thayer via dev-security-policy
It was pointed out that the email I sent to CAs stated that the effective date of the ballot (once it completed the IPR review period) will be December 10, **2019**. The year is obviously wrong and contradicts the rest of the message. The correct effective date is December 10, **2018**. All of the

Re: CA Communication: Underscores in dNSNames

2018-11-13 Thread Wayne Thayer via dev-security-policy
On Mon, Nov 12, 2018 at 6:18 PM Man Ho via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > When the ballot said "... would result in a valid domain label", does it > mean that "... would result in a valid domain name of the applicant, > that has passed the same level of domai

Re: CA Communication: Underscores in dNSNames

2018-11-12 Thread Man Ho via dev-security-policy
When the ballot said "... would result in a valid domain label", does it mean that "... would result in a valid domain name of the applicant, that has passed the same level of domain authorization (DV, OV, EV) check? Secondly, is it necessary for CAs to state their practice of handling undersco

CA Communication: Underscores in dNSNames

2018-11-12 Thread Wayne Thayer via dev-security-policy
As you may be aware, the CA/Browser Forum recently passed ballot SC12 [1] creating a sunset period for TLS certificates containing an underscore ("_") character in the SAN. This practice was widespread until a year ago when it was pointed out that underscore characters are not permitted in dNSName