Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-05-04 Thread Itzhak Daniel via dev-security-policy
On Thursday, April 20, 2017 at 4:03:36 PM UTC+3, Gervase Markham wrote: > Mozilla also doesn't believe that it's the job of CAs to police phishing CAs should police as long as the browser gives positive reinforcement to the end-users when they access a [phishing] site. There were suggestions in

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-05-01 Thread Gervase Markham via dev-security-policy
On 20/04/17 14:02, Gervase Markham wrote: > I propose this section be removed from the document. This section has now been removed. Regardless of other points raised, the issuing of wildcard certs /per se/ is not a Problematic Practice. Gerv ___ dev-sec

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-28 Thread Peter Kurrasch via dev-security-policy
"Incomplete understanding"? That's rich.There is no reliance on certs as a protection mechanism. Rather, the use of certs/encryption help to facilitate my bad acts. If I'm doing malvertising I basically must use a

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-28 Thread Ryan Sleevi via dev-security-policy
On Fri, Apr 28, 2017 at 9:48 AM, Peter Kurrasch wrote: > > Suppose I want to set up a system to be used for spam, malware > distribution, and phishing but, naturally, I want to operate undetected. > First step is to find a (legitimate) server that is already set up and is > not well secured. Witho

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-28 Thread Peter Kurrasch via dev-security-policy
I'll be the first to admit that the example I put together is far from ideal. Perhaps a shortcoming is the lack of any explicit mention regarding the knowledge, skill, competence, etc. of the cert requester--or "s

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-26 Thread okaphone.elektronika--- via dev-security-policy
On Thursday, 27 April 2017 00:42:20 UTC+2, Ryan Sleevi wrote: > On Wed, Apr 26, 2017 at 5:17 PM, okaphone.elektronika--- via > dev-security-policy wrote: > > > > If this is about the possible consequences of compromise, then I'd say you > > should try to adres that. But please do come up with som

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-26 Thread Ryan Sleevi via dev-security-policy
On Wed, Apr 26, 2017 at 5:17 PM, okaphone.elektronika--- via dev-security-policy wrote: > > If this is about the possible consequences of compromise, then I'd say you > should try to adres that. But please do come up with something that still > allows for enough flexibility, so I can arrange the H

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-26 Thread okaphone.elektronika--- via dev-security-policy
On Wednesday, 26 April 2017 22:43:19 UTC+2, Ryan Sleevi wrote: > On Wed, Apr 26, 2017 at 4:02 PM, okaphone.elektronika wrote: > > > I think this is getting weird. > > > > At first (some other thread) it get's explained that e.g. LetsEncrypt does > > not do anything beyond domain validation and po

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-26 Thread Ryan Sleevi via dev-security-policy
On Wed, Apr 26, 2017 at 4:02 PM, okaphone.elektronika--- via dev-security-policy wrote: > I think this is getting weird. > > At first (some other thread) it get's explained that e.g. LetsEncrypt does > not do anything beyond domain validation and possibly on notification take > down a few certifi

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-26 Thread okaphone.elektronika--- via dev-security-policy
I think this is getting weird. At first (some other thread) it get's explained that e.g. LetsEncrypt does not do anything beyond domain validation and possibly on notification take down a few certificates of phishing site. And that was "... all OK because we want SSL to be used everywhere, and

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-26 Thread Ryan Sleevi via dev-security-policy
On Wed, Apr 26, 2017 at 3:17 PM, Peter Kurrasch wrote: > Hi Ryan-- > > To your first comment, I'm afraid I won't have the time to take a closer > look at the discussion on 3.2.2.4. Hopefully a path from single domain to > unlimited domains exists (or will). It makes sense to me (without fully > c

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-26 Thread Peter Kurrasch via dev-security-policy
Hi Ryan--To your first comment, I'm afraid I won't have the time to take a closer look at the discussion on 3.2.2.4. Hopefully a path from single domain to unlimited domains exists (or will). It makes sense to me

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-24 Thread Ryan Sleevi via dev-security-policy
On Tue, Apr 25, 2017 at 1:31 AM, Peter Kurrasch via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > Wildcard certs present a level of risk that is different (higher?) than > for other end-entity certs.‎ The risk as I see it is two-fold: > > 1) Issuance: Setting aside the mer

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-24 Thread Peter Kurrasch via dev-security-policy
Wildcard certs present a level of risk that is different (higher?) than for other end-entity certs.‎ The risk as I see it is two-fold:1) Issuance: Setting aside the merits of the 10 Blessed Methods, there is no cl

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-24 Thread Gervase Markham via dev-security-policy
On 22/04/17 02:23, Matt Palmer wrote: > Didn't a CA get caught fairly recently issuing certs with sAN:example.com > when the validation was for www.example.com, and got a stern talking to as a > result? I vaguely recall something about that, but not with enough detail > to trawl the archives looki

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-24 Thread Gervase Markham via dev-security-policy
On 21/04/17 12:09, Nick Lamb wrote: > Of the ballot 169 methods, 3.2.2.4.7 is most obviously appropriate > for verifying that the applicant controls the entire domain and thus > *.example.com, whereas say 3.2.2.4.6 proves only that the applicant > controls a web server, it seems quite likely they h

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-23 Thread Ryan Sleevi via dev-security-policy
On Sun, Apr 23, 2017 at 7:41 AM, Nick Lamb via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > > I was thinking of things like the GoDaddy incident reported in January > where they had mistakenly been accepting HTTP 404s to validate a domain or > the 2016 Comodo "re-dressing"

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-23 Thread Nick Lamb via dev-security-policy
On Saturday, 22 April 2017 02:24:50 UTC+1, Matt Palmer wrote: > Can you remind me (and the list) what specific instances you're referring > to? I was thinking of things like the GoDaddy incident reported in January where they had mistakenly been accepting HTTP 404s to validate a domain or the 20

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-21 Thread Matt Palmer via dev-security-policy
On Fri, Apr 21, 2017 at 02:12:51AM -0700, Nick Lamb via dev-security-policy wrote: > On Thursday, 20 April 2017 14:03:36 UTC+1, Gervase Markham wrote: > > I propose this section be removed from the document. > > I am not so sure the section ought to be removed. Wildcard DV is > potentially probl

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-21 Thread Matt Palmer via dev-security-policy
On Fri, Apr 21, 2017 at 04:09:57AM -0700, Nick Lamb via dev-security-policy wrote: > Of the ballot 169 methods, 3.2.2.4.7 is most obviously appropriate for > verifying that the applicant controls the entire domain and thus > *.example.com, whereas say 3.2.2.4.6 proves only that the applicant > con

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-21 Thread Nick Lamb via dev-security-policy
On Friday, 21 April 2017 11:02:01 UTC+1, Gervase Markham wrote: > This is all a bit inchoate :-) Can you give me any idea at all of what > such a policy would look like? Requiring OV is not an option IMO. Yes, it's inchoate, if I had a fully filled out policy in mind here I'd be proposing that p

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-21 Thread Gervase Markham via dev-security-policy
On 21/04/17 10:12, Nick Lamb wrote: > I'm not so uncomfortable with it that I want Mozilla to try to get it > stopped, but I think signalling some residual discomfort here is > worthwhile until somebody has thought through a good policy, and > preferably at least got the big CAs to go along with it

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-21 Thread Henri Sivonen via dev-security-policy
On Thu, Apr 20, 2017 at 4:02 PM, Gervase Markham via dev-security-policy wrote: > I don't believe the issuance of wildcard DV certs is problematic in > practice. Mozilla is of the view that ubiquitous SSL is the highest > priority for the Web PKI, and wildcard certs are a part of that. Mozilla > a

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-21 Thread Nick Lamb via dev-security-policy
On Thursday, 20 April 2017 14:03:36 UTC+1, Gervase Markham wrote: > I propose this section be removed from the document. I am not so sure the section ought to be removed. Wildcard DV is potentially problematic. Historically we have seen problems that wouldn't have happened or would be much less

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-20 Thread Eric Mill via dev-security-policy
Major +1. Removing this language is consonant with Mozilla objectives, with Web PKI trends, and with the health of the open web. -- Eric On Thu, Apr 20, 2017 at 9:02 AM, Gervase Markham via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > There is an entry on Mozilla's Poten

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-20 Thread Matt Palmer via dev-security-policy
On Thu, Apr 20, 2017 at 02:02:59PM +0100, Gervase Markham via dev-security-policy wrote: > I propose this section be removed from the document. My name is Matt Palmer, and I endorse this proposal. - Matt ___ dev-security-policy mailing list dev-secu

Re: Removing "Wildcard DV Certs" from Potentially Problematic Practices list

2017-04-20 Thread Alex Gaynor via dev-security-policy
+1 on removal, that paragraph doesn't square with current ideas about what's problematic in the WebPKI; as you've noted wildcards and DV are really orthogonal concerns. Alex On Thu, Apr 20, 2017 at 9:02 AM, Gervase Markham via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: >