On 16/9/2024 10:25 μ.μ., Amir Omidi wrote:
> I also agree with deprecating this method but we could do it in a
planned and controlled fashion. Not all validations with this method
are flawed, as it is currently presented.
I don't think this framing is correct. WHOIS is both unstructured and
unauthenticated data.
In most cases, the data structure has similar patterns and CAs have
developed methods to structure this data. DNS is also unauthenticated
data but it's been working well so far.
I would also say that `.mobi` isn't necessarily a "vanity TLD" - and
beyond that, a vanity TLD is still part of this ecosystem. WebPKI
should try its best to not discriminate between TLDs.
I stand corrected on the vanity part. You are correct. We should also
not discriminate but need to take measures proportional with the threat
and potential impact. If I understand correctly, this is about
insecure/bad implementation of WHOIS libraries that use stale entry
points to query certain TLDs, instead of refreshing the IANA sources or
using IANA and then following referrals. Please correct me if I'm
missing something.
A compromise for removing these methods can be allowing re-use of
existing authorizations done with these deprecated methods with a cut
off date of Sept 10th 2024 (around the time the watchtowr report was
released), while removing them for use for new authorizations. This
would effectively buy folks about a year time to migrate.
That makes sense but kills a method that is actively used securely for
the vast majority of queries to Domain Name Registrars. Instead we could
add controls for CAs to use WHOIS queries securely as an emergency
ballot, and gradually deprecate the WHOIS protocol, promoting the use of
RDAP in its place.
Dimitris.
On Mon, Sep 16, 2024 at 1:19 PM Dimitris Zacharopoulos (HARICA) via
Servercert-wg <servercert-wg@cabforum.org> wrote:
Is there feedback about the number of TLDs and possible
certificate volumes that might be affected by this attack?
The majority of validations performed by CAs using WHOIS is done
in gTLDs which have decent rules for monitoring and supervising
their operators. The biggest issue is with ccTLDs, which in
majority work ok. Unfortunately, most of them do not disclose
email contact information, making them unusable for Domain Validation.
Why are we causing such a large disturbance as if the Global
Internet is unsafe by this attack when the impact is 1 or 2 vanity
TLDs for which mitigations exist (like, use a better library or
use the latest updated list from IANA)?
I also agree with deprecating this method but we could do it in a
planned and controlled fashion. Not all validations with this
method are flawed, as it is currently presented.
Also, the deprecation date of November 1, 2024 is too soon. Even
if we consider the 7+7=14 days to pass a ballot, there are 30 days
of the IPR review process making this extremely close to the Nov
1, 2024 deadline. It is also difficult for all CAs to update their
RA systems to stop re-using existing validation evidence in such a
short timeframe.
Do the authors feel this ballot is super urgent and need such an
aggressive timeline? Is there any additional information for the
potential impact of this attack compared to the other "healthy"
cc/gTLDs? Would you consider an effective date closer to February
or March 2025?
Thank you,
Dimitris.
On 16/9/2024 7:16 μ.μ., Ryan Dickson via Servercert-wg wrote:
Purpose of Ballot SC-080 V1:
This Ballot proposes updates to the Baseline Requirements for the
Issuance and Management of Publicly-Trusted TLS Server
Certificates(i.e., TLS BRs) related to sunsetting the use of
WHOIS when identifying Domain Contacts.
Background:
In light of recent events where research from WatchTowr Labs
demonstrated how threat actors could exploit WHOIS to obtain
fraudulently issued TLS certificates [1] and follow-on
discussions in MDSP [2][3], we drafted an introductory proposal
[4] to sunset the use of WHOIS for identifying Domain Contacts.
The proposal sets a prohibition against relying on WHOIS to
identify Domain Contacts beginning 11/1/2024. At the same time,
it also prohibits use of DCV reuse where WHOIS was used as the
source of truth for a Domain Contact.
Proposal Revision History:
* Pre-Ballot Version #1 [4]
Previous Versions of this Ballot:
* N/A
References:
[1]
https://labs.watchtowr.com/we-spent-20-to-achieve-rce-and-accidentally-became-the-admins-of-mobi/
[2]
https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/FuOi_uhQB6U
[3]
https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/mAl9XjieSkA
[4] https://github.com/cabforum/servercert/pull/548
[5]
https://docs.google.com/spreadsheets/d/1IXL8Yk12gPQs8GXiosXCPLPgATJilaiVy-f9SbsMA28/edit?gid=268412787#gid=268412787
The following motion has been proposed by Ryan Dickson and Chris
Clements of Google (Chrome Root Program) and endorsed by Arvid
Vermote (GlobalSign) and Pedro Fuentes (OISTE).
— Motion Begins —
This ballot modifies the “Baseline Requirements for the Issuance
and Management of Publicly-Trusted TLS Server Certificates”
(“Baseline Requirements”), based on Version 2.0.7.
MODIFY the Baseline Requirements as specified in the following
Redline:
https://github.com/cabforum/servercert/compare/ba28d04894d69c8fac62850b9d0de5061658c7c5..356799f0dcfe11deb0a375a11233403236ab72c9
— Motion Ends —
This ballot proposes a Final Maintenance Guideline. The procedure
for approval of this ballot is as follows:
Discussion (7 days)
- Start: 2024-09-16 16:00:00 UTC
- End no earlier than: 2024-09-23 16:00:00 UTC
Vote for approval (7 days)
- Start: TBD
- End: TBD
_______________________________________________
Servercert-wg mailing list
Servercert-wg@cabforum.org
https://lists.cabforum.org/mailman/listinfo/servercert-wg
_______________________________________________
Servercert-wg mailing list
Servercert-wg@cabforum.org
https://lists.cabforum.org/mailman/listinfo/servercert-wg
_______________________________________________
Servercert-wg mailing list
Servercert-wg@cabforum.org
https://lists.cabforum.org/mailman/listinfo/servercert-wg