On Wed, Nov 2, 2016 at 9:38 AM, Jakob Bohm <jb-mozi...@wisemo.com> wrote:
> On 02/11/2016 17:08, Peter Bowen wrote:
>>
>> On Wed, Nov 2, 2016 at 8:26 AM, Tom Ritter <t...@ritter.vg> wrote:
>>>
>>> On 2 November 2016 at 09:44, Jakob Bohm <jb-mozi...@wisemo.com> wrote:
>>>>
>>>> The only thing that might be a CA / BR issue would be this:
>>>
>>>
>>> There's been (some) mention that even if a user moves off Cloudflare,
>>> the CA is not obligated to revoke.  I don't agree with that. If a user
>>> purchased a domain from someone (or bought a recently expired domain)
>>> and a TLS certificate was still valid for it, would the new owner not
>>> be able to get it revoked?  If so, how is this different?
>>
>>
>> Tom,
>>
>> As written today, there is no obligation of CAs to do anything a the
>> request of domain registrants.  There is an obligation that the CA
>> SHALL revoke a certificate if:
>>
>> " The CA is made aware of any circumstance indicating that use of a
>> Fully-Qualified Domain Name or IP
>> address in the Certificate is no longer legally permitted (e.g. a
>> court or arbitrator has revoked a Domain Name
>> Registrant’s right to use the Domain Name, a relevant licensing or
>> services agreement between the Domain
>> Name Registrant and the Applicant has terminated, or the Domain Name
>> Registrant has failed to renew the
>> Domain Name)"
>>
>
> Note that the phrase "services agreement" seems to apply directly to
> the Cloudflare situation.  When a domain owner stops using Cloudflare,
> the services agreement between the domain registrant and Cloudflare has
> terminated.  This when a CA is made aware that a domain registrant has
> stopped using Cloudflare, the above clause is triggered directly,
> leaving only the possibility that the domain registrant explicitly
> wants to keep the certificate in place for an upcoming return to
> Cloudflare.

I agree that would appear to cover this case.

>> Note that this does not give special authority to registrants.  In
>> particular, the straight up "request revocation" option is limited to
>> the _Subscriber_, which is the entity that acquired the certificate.
>>
>> I think that this is a massive gap, especially in the current state of
>> "WebPKI" where certificates are really a third party (CA) assertion
>> that they performed a Trust On First Use (TOFU) operation with the
>> objective that the CA is better positioned avoid attackers than the
>> party later relying upon the certificate.
>>
>>> Aside, it would be very interesting to watch domain renewals + contact
>>> info changes (if one can do this at scale) and pair it up with the CT
>>> logs to see how much of an issue this is/could be.
>>
>>
>> Given that every CA I know of will issue a certificate for a validity
>> period that exceeds the domain registration period, I suspect it is
>> not hard to find many certificates containing FQDNs under expired
>> domains.
>>
>
> Again, the above text explicitly says that if the CA is made aware that
> the domain has not been renewed, it must act accordingly.

Yes, but it does not require CAs to go checking such.  I strongly
doubt any CA is proactively revoking certificates for expired domains.

Thanks,
Peter
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to