I think there’s value in publicly logging things even if that isn’t the basis 
for trust.  So I disagree that what I wrote boils down to what I didn’t write.

 

-Tim

 

From: Ryan Sleevi [mailto:[email protected]] 
Sent: Thursday, November 30, 2017 1:57 PM
To: Tim Hollebeek <[email protected]>
Cc: Ben Laurie <[email protected]>; Paul Wouters <[email protected]>; 
[email protected]; [email protected]; 
Jeremy Rowley <[email protected]>
Subject: Re: Anomalous Certificate Issuances based on historic CAA records

 

 

 

On Thu, Nov 30, 2017 at 3:12 PM, Tim Hollebeek via dev-security-policy 
<[email protected] 
<mailto:[email protected]> > wrote:

The problem DNSSEC checks for CAA was intended to solve was the fact that it
is certainly possible that a well-resourced attacker can manipulate the DNS
responses that the CA sees as part of its CAA checks.  A better mitigation,
perhaps, is for multiple parties to publicly attest in a verifiable way as
to what the state of DNS was at/near the time of issuance with respect to
the relevant CAA records.  This leads to the idea that perhaps it's worth
exploring enhancing existing CT logging servers to do CAA checks and log
what they see.  That's probably easier than setting up an entirely separate
infrastructure for CAA transparency.  CT servers could even communicate back
to CAs the results they see to assist in detecting and identifying both
malicious and non-malicious discrepancies between the CA's own checks and
what the CT log is seeing.  "Thanks for the pre-cert.  We see a CAA record
at X.Y.Z.Z.Y that doesn't include you.  Do you really want to issue?"  There
are legitimate concerns that giving even more work to CT log servers might
put even more burden and expense onto those who are running CT log servers,
but that can probably be figured out.

 

While I understand the intent of the suggestion, it basically boils down to:

- To solve independently verifying CAA, we need Trusted Third Parties

- We have CT logs (which are not meant to be TTPs)

- We should make logs TTPs so we don't have to spin up new TTP infrastructure

 

The goal of CT from the get go has been that logs do not need to be TTPs, and 
that this is achieved by the cryptographic properties of the design combined 
with the ecosystem mitigations to detect any deviance. This is not possible 
with a CAA-in-CT, because CT is fundamentally not designed to provide 
cryptographic attestations about the statement of CAA (if we had such 
attestations, the CA could provide them anyways).

 

So I don't think we can get away from the notion that if we want CAA to be an 
independently-verified aspect, then you need either TTPs (and CT logs are by 
design not TTPs, and should not be made TTPs) or you need to solve the 
cryptographic verifiability (in which case, you don't need CT logs to do this).

 

Of course, I think this is all conditioned on whether CAA's value is somehow 
tied to the independently-verified. I don't believe that it is, no more than 
we're requiring cryptographic proofs of CA's validation of OV/EV documents or 
chains of custody from the QGIS and QIIS' used to validate that data. Instead, 
CAA serves as a machine-readable expression of policy intent, no different than 
having http://domain.com/.well-known/caa in some machine readable form. Our 
primary benefit of having it expressed in DNS (versus that HTTP-based file) is 
that we can leverage DNSSEC as a bootstrap for trust when it's available 
(despite all of its warts - and cryptographic issues) and it more easily aligns 
with CA's existing practices of DNS-based validation.

 

It may be surprising to hear me suggesting that we expect something of CAs 
without having it independently verified - but I think there's substantial 
value to be afforded applicants/subscribers, and I'm deeply worried when the 
suggestions we have to date are to introduce more TTPs, make explicitly 
non-TTPs into TTPs, or to add unreliable reporting mechanisms that might 
otherwise drive up the costs of a sensible risk mitigation technology.

 

I think for those that want to serve in a CAA Auditor role have the iodef 
mechanism as a way of reporting potential strangeness in such a way that the 
burden shifts to the applicant, but also that their ability to recognize (or 
reject) such information is the most scalable solution.

 

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to