Tim,

The historic thought to which you refer -- that proof of ownership is
stronger than proof of control -- has been clearly shown to be incorrect.
Nearly all of the proof of ownership methods require communication with a
Domain Contact, and all of the methods of discovering and communicating
with a Domain Contact (namely WHOIS, DNS SOA, and direct contact via
unspecified means with the Domain Name Registrar) are at least as
vulnerable to MITM/hijacking/takeover as any proof of control method. At
best, they only show "instantaneous ownership". The Validation Summit
Findings
<https://docs.google.com/document/d/1aJiOzYVTpoAPVWDucnp20cTO2PR_cRsHncvkhlrcR10/edit>
from
2018 don't make an argument otherwise.

To the contrary, I am making the opposite claim: that these "proof of
ownership" methods are currently weaker than their sibling "proof of
control" methods, precisely because of how under-specified the method for
finding the Domain Contact is.

- Using DNS SOA is largely equivalent to the similar methods which use DNS
TXT or CAA records to convey a contact address, so that's good.
- Using WHOIS has just been shown to be suspect for data quality reasons,
but it is also an unencrypted and unauthenticated protocol which comes with
its own risks.
- Direct contact with the Registrar has the potential to be
reasonably secure or wildly insecure depending on how it is implemented.

And of course, because all of these are just methods of *looking up* the
Domain Contact, they are not subject to MPIC, and so are now notably more
vulnerable to BGP hijacks than other DCV methods (including the DNS TXT and
CAA methods that DNS SOA would otherwise be comparable to).

Finally, all of these methods have a second point of vulnerability that
simply doesn't exist for the proof-of-control methods: the random token
must be kept secret. There is no analysis where two methods that are nearly
equivalent, but one requires a secret to be kept and the other doesn't,
have the same security properties.

Now, I'm not actually advocating for all of the Domain Contact-based
methods to be removed. I think that would be a somewhat extreme position,
and one in which I have no personal stake as the CA that I represent
doesn't use those methods. But I think we do need to carefully consider the
ways in which Domain Contact information is acquired, and cease thinking of
these methods as somehow stronger than their peers just because they
purport to validate something more permanent than "instantaneous control".

Aaron
_______________________________________________
Servercert-wg mailing list
Servercert-wg@cabforum.org
https://lists.cabforum.org/mailman/listinfo/servercert-wg

Reply via email to