Re: Protection against BGP hijacking

2022-10-12 Thread 'Moudrick M. Dadashov' via dev-security-policy@mozilla.org
Consider telco root store applications as high risk ?Thanks,M.D.Sent from my Galaxy Original message From: Ben Wilson Date: 10/13/22 04:04 (GMT+02:00) To: Michel Le Bihan Cc: dev-security-policy@mozilla.org, "matt...@thisisntrocket.science" , Matt Palmer Subject: Re: Prot

Re: Protection against BGP hijacking

2022-10-12 Thread Ben Wilson
All, In the article, I saw advice about actions that project owners can take to protect themselves, but what about things that CAs or root store programs can or should do? Ben On Thu, Sep 29, 2022 at 12:16 AM Michel Le Bihan < michel.lebihan2...@gmail.com> wrote: > Recently there was another case

Re: CRL partitioning and IDPs

2022-10-12 Thread 'Aaron Gable' via dev-security-policy@mozilla.org
On Wed, Oct 12, 2022 at 1:02 PM Corey Bonnell wrote: > My interpretation of this passage is that it is defining the required > scope of the CRL in the absence of the distributionPoint field. Namely, all > revoked certificates issued by the CA must be contained within the scope of > the CRL. Howev

Re: CRL partitioning and IDPs

2022-10-12 Thread 'Rob Stradling' via dev-security-policy@mozilla.org
> I'm also inclined to say HTTPS must not be used here. I just went through the same thought process regarding the Full CRL field (see https://bugzilla.mozilla.org/show_bug.cgi?id=1794899#c1). It turns out that several CAs are currently using HTTPS URLs for CRL. ___

Re: CRL partitioning and IDPs

2022-10-12 Thread 'Rob Stradling' via dev-security-policy@mozilla.org
FWIW, I'm confident that my reading is what was intended when this sentence was added to the MRSP, because I recall some of the events that led to that language being proposed. It's very unfortunate that an alternative interpretation is possible, and that there don't seem to be any Incident bug

Re: Add another field to AllCertificateRecordsCSVFormat

2022-10-12 Thread Kathleen Wilson
> I believe at least part of the problem Andrew mentions is because of > Salesforce or some intermediary processing within CCADB tooling. > > I had pinged Andrew offline and he mentioned what he was seeing from our > JSON was no "" around the URL, we have confirmed what we publish does have >

RE: CRL partitioning and IDPs

2022-10-12 Thread 'Corey Bonnell' via dev-security-policy@mozilla.org
Hi Aaron, > But no, including the distributionPoint is absolutely not required by RFC > 5280 as long as the CRL includes all revoked unexpired certificates within > its scope. It is not even required by the Mozilla Root Store Policy, as long > as there is no critical IssuingDistributionPoint

Re: CRL partitioning and IDPs

2022-10-12 Thread 'Aaron Gable' via dev-security-policy@mozilla.org
On Wed, Oct 12, 2022 at 7:07 AM Corey Bonnell wrote: > > A simple fix would be to require that CAs use HTTPS URLs for CRL shards, > > though this wouldn't be as strong as relying on indicators within the > CRL > > itself. > > I believe including the IDP is the better solution, for three reasons:

Re: CRL partitioning and IDPs

2022-10-12 Thread 'Clint Wilson' via dev-security-policy@mozilla.org
I'm in agreement with Corey here. The IDP URL must be present in sharded CRLs (i.e. if a CRL is not a complete CRL for the entire CA). I'm also inclined to say HTTPS must not be used here. There are cases where it could work, others where it could cause issues, but overall I don't believe it bri

RE: CRL partitioning and IDPs

2022-10-12 Thread 'Corey Bonnell' via dev-security-policy@mozilla.org
> A simple fix would be to require that CAs use HTTPS URLs for CRL shards, > though this wouldn't be as strong as relying on indicators within the CRL > itself. I believe including the IDP is the better solution, for three reasons: Firstly, compromise of the web server/CDN serving the sharded C