On Tue, Feb 23, 2016 at 6:26 PM, Eric Mill <[email protected]> wrote:

> On Tue, Feb 23, 2016 at 1:57 PM, Gervase Markham <[email protected]> wrote:
>
>>
>> Our proposal, which we have sent to Symantec, Worldpay and the other
>> browsers, is as follows:
>>
>
> Thank you for bringing this to the list for public input, even with a
> tight timeline and under immense pressure. It really speaks to how
> sincerely Mozilla and its root program are rooted in public review and
> participation.
>
> I agree fully with Andrew Ayer's comments, and don't believe Mozilla
> should allow this exception. While it would certainly cause pain and a loss
> of business for some of WorldPay's customers, WorldPay should take
> alternative drastic action, such as buying all of their affected customers
> a new terminal, paying the shipping costs, and providing human on-site
> support wherever possibly practical. If this is expensive to them, fine --
> it's more expensive to the web PKI to establish this kind of precedent.
>
> It would also be worth learning what segment of the market these 10,000
> terminals would affect. I've seen these terminals before:
>
>
> https://www.google.com/search?q=worldpay&espv=2&biw=1168&bih=783&site=webhp&source=lnms&tbm=isch&sa=X&ved=0ahUKEwj91arSqo_LAhUBOSYKHZ4_AtYQ_AUICCgD#tbm=isch&q=worldpay+terminal
>
> Many of them are used by small businesses and sole proprietors. Many of
> them are used by large businesses. Which kind of customer is being affected
> should factor into Mozilla's decision.
>
> All that said, if Mozilla does decide to proceed, some suggestions inline
> below.
>
> Symantec may issue certificates to Worldpay if the following things are
>> true:
>>
>> 1. You immediately give copies to Mozilla (and other vendors who desire
>> them) for us to immediately add them to OneCRL, as if they had been
>> mis-issued.
>>
>> 2. Symantec's OCSP server MUST present a response of Revoked to any
>> request for these certificates from, at a minimum, Firefox (based on
>> User-Agent). Other browsers may wish to be added to this list. Sending
>> Revoked to everyone would be easiest, but that depends on your testing
>> as to whether it will break the intended clients.
>>
>
> Has testing of whether it will break the intended clients been done yet?
> Or, will it be done before the certificates are issued?
>
> If tests show that the intended clients will not affected by Symantec's
> OCSP responder generically returning Revoked for all user agents, then the
> proposal should not allow an exception for the Firefox user agent. While
> Mozilla can't speak for what other browsers want, neither the Baseline
> Requirements or the Mozilla root program allow CAs to only comply with
> requirements insofar as they affect Firefox user agents.
>
> If the testing can't be completed in time, then the proposal should
> include a conditional that only allows user agent discretion if testing
> shows, after the fact, that the terminals will not work if Symantec's OCSP
> responders show them a Revoked response.
>
> Further, if testing shows that the terminals won't work, that testing
> should produce a fingerprint that can identify the machines to Symantec's
> OCSP responders. So, if user agent testing is allowed, the preferred
> approach should be for Worldpay to only produce non-revoked OCSP responses
> to those terminals, rather than whitelisting Firefox.
>

I got some feedback privately that encouraging "split-horizon" OCSP is
really architecturally a bad idea, and I have to say I agree.  I think we
got caught up in the technical aspects of simulating a revocation for the
web as faithfully as possible, but on further thought, it's important that
a certificate's status have a single, global value that is reflected in
OCSP.

However, Symantec and WorldPay say that the affected devices do check OCSP,
so a globally uniform revocation would not allow these devices to continue
to operate.  So we would have to rely on OneCRL.  I can probably live with
this; OneCRL has been in Firefox for long enough (since 37) that the base
of old browsers that don't get OneCRL information should be fairly small.

--Richard


>> 6. The lifetime of the issued SHA-1 certificates MUST be no more than 90
>> days. Reissuance is permitted, but Mozilla reserves the right to decide
>> in the future that the conditions for further issuance of such
>> certificates may vary, including deeming them unacceptable under any
>> circumstances. Mozilla is very likely to not permit validity to extend
>> beyond the SHA-1 deadline of 31st December 2016.
>>
>
> This seems much too vague. WorldPay should commit to a date by which their
> systems will be updated to support SHA-256 certificates, and publish this
> date to cabfpub. Mozilla should not permit issuance of certificates with
> notAfter dates after that date.
>
> If the committed-to timeline is > 90 days, Mozilla and Symantec should
> encourage WorldPay to beat their deadline. Mozilla can do that by notifying
> this list (or requiring Symantec or WorldPay to do so) in advance of a
> renewal taking place, in case there is relevant public input.
>
> If WorldPay turns out to need an extension to their committed date, the
> process we're doing right now should repeat in full (with more notice), and
> the extension should be treated as a newly proposed exception.
>
>
>>
>> 7. This exception applies to Worldpay only; you need to come back and
>> ask, presenting the circumstances, for other cases. If the impact is
>> similar, similar terms may be extended.
>>
>
> I would add a requirement that further applicants for exceptions do so
> here, on the mozilla.dev.security.policy list, and that they must provide
> more than a few days' notice. This would ensure that neither Mozilla nor
> the community get jammed like this again.
>
>
> Mozilla is very keen to see SHA-1 eliminated, but understands that for
>> historical reasons poor decisions were made in private PKIs about which
>> roots to trust, and such decisions are not easily remedied.
>>
>
> As Andrew Ayer said, the biggest danger here is allowing a poor precedent.
> Anyone getting an exception should have dire needs that affect the general
> public, and the experience of getting that exception should not be pleasant.
>
> This seems quite fair, in the face of the rather audacious security
> exception they are asking the web PKI to create for them, and Mozilla is
> asking the community to accept, especially after so many others with dire
> use cases have been turned down.
>
> And again, some questions Mozilla should get prompt answers to (and share
> with this list) if at all possible before making a decision include:
>
> * What customer segment is affected by this issue?
> * Will a universal Revoked response from Symantec's OCSP servers result in
> the terminals failing to operate correctly?
> * What date is WorldPay willing to commit to, by which they will have
> fixed these terminals?
>
> -- Eric
>
>
>>
>> Please comment on whether this proposal seems reasonable, being aware of
>> the short timelines involved.
>>
>> Gerv
>> _______________________________________________
>> dev-security-policy mailing list
>> [email protected]
>> https://lists.mozilla.org/listinfo/dev-security-policy
>>
>
>
>
> --
> konklone.com | @konklone <https://twitter.com/konklone>
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to