On Thursday, July 20, 2017 at 3:32:29 PM UTC-5, Ryan Sleevi wrote:

> Broadly, yes, but there's unfortunately a shade of IP issues that make it
> more difficult to contribute as directly as Gerv proposed. Gerv may accept
> any changes to the Mozilla side, but if the goal is to modify the Baseline
> Requirements, you'd need to sign the IPR policy of the CA/B Forum and join
> as an Interested Party before changes.

I think at this phase that it makes sense to better flesh out within the 
Mozilla dev security community what kinds of mitigations might be economically 
feasible, provide measurable benefit of sufficient counterbalancing value, and 
practical details for implementation before trying to bring a ballot before the 
CAB forum.  Having said that, I did read over the IPR policy agreement and at 
first blush saw nothing that would prevent myself or my company from becoming 
signatories should the idea take off.

> 
> And realize that the changes have to be comprehensible by those with
> limited to know background in technology :)

Certainly.  I would expect that the target audience is more compliance / audit 
/ accounting than it is network engineering.  Even still, I have to believe it 
is possible to describe the specific modes of risk and counterbalancing 
mitigations in a framework that those of that skillset can evaluate.

> The question about the validity/reuse of this information is near and dear
> to Googles' heart (hence Ballots 185 and 186) and the desire to reduce this
> time substantially exists. That said, the Forum as a whole has mixed
> feelings on this, and so it's still an active - and separate - point of
> discussion.

I mentioned it mostly as I was curious if the argument that time-of-issuance 
(or thereabout) DNS queries of an issuance blocking nature pertaining to CAA 
had been utilized as yet as an argument that more revalidation might now be 
appropriate because the revalidation is merely a minor extra burden to the 
queries already being run for CAA.  (There's already a blocking DNS query on 
records of the subject domain holding up issuance, so what's a few more records 
on the same domain?)
 
> That said, I think it's worthwhile to make sure the threat model, more than
> anything, is defined and articulated. If the threat model results in us
> introducing substantive process, but without objective security gain, then
> it may not be as worthwhile. Enumerating the threats both addressed and
> unaddressible are thus useful in that scope.

Can you provide any good reference or point to an example of what you would 
regard an exceptionally well described definition and articulation of a thread 
model within the certificate issuance space generally?  I feel I have a quite 
solid grasp of the various weak points in the network infrastructure and 
network operations aspects that underpin the technological measures involved in 
domain validation.  I am interested in taking that knowledge and molding that 
into a view which might best permit this community to assess my thoughts on the 
matter, weigh pros and cons, and help guide proposals for mitigation.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to