On Mon, Nov 27, 2017 at 8:29 PM, Jakob Bohm via dev-security-policy <
[email protected]> wrote:

> On 27/11/2017 19:37, Nick Lamb wrote:
>
>> On Fri, 24 Nov 2017 12:25:40 +0000
>> Gervase Markham via dev-security-policy
>> <[email protected]> wrote:
>>
>> Validate example.com -> add "www.example.com": seems fine to me, and a
>>> reasonable accommodation to a common customer desire.
>>>
>>> Validate www.example.com -> add "example.com": not at all fine.
>>>
>>> Validate *.example.com -> add "example.com": still dodgy IMO.
>>>
>>
>>
>> All of these can be a problem, and I would like us to have as the end
>> goal forbidding all these practices, but I recognise that it's
>> unrealistic to achieve that in the short term.
>>
>> The thing is, extraneous names on a certificate present a subtle
>> security flaw, even if control over those names was validated properly
>>
>> Extraneous names can appear in a CSR as a result of the applicant
>> making a bad security choice. But that's not our domain here, bad
>> choices by Relying Parties or Applicants are their problem. Bad choices
>> by the CAs can harm everybody and we should be trying to move things in
>> the right direction on that front.
>>
>>
> The inclusion of example.com with *.example.com is a long standing
> standard practice based on the fact that most subscribers don't realize
> that *.example.com doesn't already cover example.com.  The validations
> needed for *.example.com are a full superset of those needed for
> example.com, with the sole exception that the formal wording of the CAA
> specification allows a domain to set up CAA records that allow
> *.example.com but prohibit example.com.  One could reasonably discuss if
> this is a bug in the CAA specification, but until then, CAs are formally
> required to check for the scenario and reject the application.
>
> The inclusion of example.com with www.example.com is a tradition, but it
> would be good if CAs allowed applicants to deselect it in the rare cases
> where they don't intend to use it.
>
> While your scenario below sounds compelling, it is very much a contrived
> scenario of the type usually used to trick organizations into making bad
> policy decisions.
>
> Due to the cost of publicly trusted certificates, many organizations
> could, in the same scenario, obtain just the *.example.com + example.com
> certificate and install it on both servers.


Hi Jakob,

Please note the discussion is not about whether it's problematic to include
both, but how you validate. I don't believe anyone has suggested it's not
OK to include both, merely to ensure that the validation performed is
appropriate for both.

It's absolutely intentional that CAA can allow *.example.com and disallow
example.com. This is not something "One could reasonably discuss if this is
a bug", because it's an explicit intentional design choice documented
within the RFC. This isn't even subtle - it's called out. It's not about
being a 'contrived scenario' either - it's about ensuring the appropriate
level of validation.

As to your remarks about cost, I think that's about an argument about a
decade out of date, nor particularly germane to the level of security we
should expect from the CA ecosystem.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to