On 9/10/16, Peter Bowen <[email protected]> wrote:
> On Sat, Sep 10, 2016 at 9:14 AM, Lee <[email protected]> wrote:
>> On 9/10/16, Gervase Markham <[email protected]> wrote:
>>> On 09/09/16 11:53, Jakob Bohm wrote:
>>
>> Does Mozilla feel that using 'clear text' protocols to validate
>> domains is adequate security?
>> https://cabforum.org/2016/08/05/ballot-169-revised-validation-requirements/
>>> Authorized Port: One of the following ports: 80 (http), 443 (http), 115
>>> (sftp), 25 (smtp), 22 (ssh).
>
> This is basically a catch-22 for initial issuance.  If you allow
> validation via connection to a host operating that the requested FQDN,
> then it will almost surely not be using a trusted public certificate
> for the first connection.

Right - I figured that out about 30 seconds after reading an email
about allowing verification on ports 80 and 443.  But you only need to
get the initial certificate one time - after that you should be able
to renew using port 443 and I didn't see anything in the requirements
about checking via an encrypted connection first.  Did I miss
something or is getting a renewal cert over port 80 allowed?

>  Using ssh or accepting a self-signed
> certificate does not appear to address any critical part of the threat
> model.

Is the threat model documented somewhere?

Admittedly, I'm doing cargo-cult security - "clear text protocols Are
Bad."  But is there really no better way to verify a domain?  Is there
really a need to allow clear-text protocols after an end-user gets
their first certificate?  Why no mention of DNSSEC in the BR?

I just started reading about certificate transparency so I might be
misunderstanding it, but if a CA is going to be handing out certs
automatically using clear-text protocols, why doesn't Mozilla make CT
a requirement?  Relying solely on audits is clearly a failure, so how
about trying continuous monitoring?  & make failure to log to CT
servers all by itself enough justification to be removed from the moz
trust store.

>> How bad does an auditor have to be before Mozilla will no longer
>> accept them as "a trusted auditor for the Mozilla root program"?
>> https://wiki.mozilla.org/CA:WoSign_Issues#Issue_J:_Various_BR_Violations_.28Apr_2015.29
>>> Google noted that many of these issues should have been caught by a
>>> competent auditor.
>>> WoSign's auditors at the time were Ernst and Young (Hong Kong).
>>
>> Will Mozilla accept CA audits done by Ernst and Young in the near future?
>>
>> Does Mozilla plan on giving any extra attention to CAs whose last
>> audit was done by Ernst and Young?
>
> EY, like BDO, Deloitte, KPMG, and PwC, are not single firms.  They are
> "networks" of firms which usually carry out their audit/attest
> services independently and are independently owned and operated.  So
> an opinion from Ernst & Young Bedrijfsrevisoren BCVBA (Belgium) is
> likely written by a team independent from the team that wrote an
> opinion from Ernst & Young P/S (Demark) which is independent from the
> team that wrote an opinion from EY 安永 (Hong Kong).

So Honest Achmed has his request for his CA to be added to the mozilla
root store denied & he comes up with a new business plan - pay the
franchise fee, get a brand name and go into business auditing CAs.  As
long as the CAs he audits don't screw up he gets to rake in the money?
 And when he does screw up the franchiser gets a free pass even though
they didn't make sure Honest Achmed was qualified to audit a CA?

>  That being said, I
> suspect that EY Global wants to protect its brand, so I would hope
> they review any reports from any member firm that appear to be
> lacking.

I would hope the brand owner would protect their brand by insisting
that the franchises' were actually competent.  In this case Google
says they weren't, so why isn't Mozilla asking EY Global for an action
plan on how they're going to fix their deficiencies?

I'm not seeing why
> EY, like BDO, Deloitte, KPMG, and PwC, are not single firms.
makes any difference.  The local offices are using a global brand name
& if one local office screws up it tarnishes the brand name, not just
that one local office.

I'm not seeing why Mozilla should think any EY office is competent to
audit a CA now.

Regards,
Lee
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to