Tim, The historic thought to which you refer -- that proof of ownership is stronger than proof of control -- has been clearly shown to be incorrect. Nearly all of the proof of ownership methods require communication with a Domain Contact, and all of the methods of discovering and communicating with a Domain Contact (namely WHOIS, DNS SOA, and direct contact via unspecified means with the Domain Name Registrar) are at least as vulnerable to MITM/hijacking/takeover as any proof of control method. At best, they only show "instantaneous ownership". The Validation Summit Findings <https://docs.google.com/document/d/1aJiOzYVTpoAPVWDucnp20cTO2PR_cRsHncvkhlrcR10/edit> from 2018 don't make an argument otherwise.
To the contrary, I am making the opposite claim: that these "proof of ownership" methods are currently weaker than their sibling "proof of control" methods, precisely because of how under-specified the method for finding the Domain Contact is. - Using DNS SOA is largely equivalent to the similar methods which use DNS TXT or CAA records to convey a contact address, so that's good. - Using WHOIS has just been shown to be suspect for data quality reasons, but it is also an unencrypted and unauthenticated protocol which comes with its own risks. - Direct contact with the Registrar has the potential to be reasonably secure or wildly insecure depending on how it is implemented. And of course, because all of these are just methods of *looking up* the Domain Contact, they are not subject to MPIC, and so are now notably more vulnerable to BGP hijacks than other DCV methods (including the DNS TXT and CAA methods that DNS SOA would otherwise be comparable to). Finally, all of these methods have a second point of vulnerability that simply doesn't exist for the proof-of-control methods: the random token must be kept secret. There is no analysis where two methods that are nearly equivalent, but one requires a secret to be kept and the other doesn't, have the same security properties. Now, I'm not actually advocating for all of the Domain Contact-based methods to be removed. I think that would be a somewhat extreme position, and one in which I have no personal stake as the CA that I represent doesn't use those methods. But I think we do need to carefully consider the ways in which Domain Contact information is acquired, and cease thinking of these methods as somehow stronger than their peers just because they purport to validate something more permanent than "instantaneous control". Aaron
_______________________________________________ Servercert-wg mailing list Servercert-wg@cabforum.org https://lists.cabforum.org/mailman/listinfo/servercert-wg