On Mon, 15 Jan 2018 18:18:10 +0000
Doug Beattie via dev-security-policy
<[email protected]> wrote:

> -          Total number of active OneClick customers: < 10

What constitutes a OneClick customer in this sense?

The focus of concern for tls-sni-01 was service providers who present
an HTTPS endpoint for many independent entities, most commonly a bulk
web host or a CDN. These function as essentially a "Confused Deputy" in
the discovered attack on tls-sni-01. For those providers there would
undoubtedly be a temptation to pretend all is well (to keep things
working) even if in fact they aren't able to defeat this attack or some
trivial mutation of it, and that's coloured Let's Encrypt's response,
because there's just no way to realistically police whitelisting of
thousands or tens of thousands of such service providers.

>From the volumes versus numbers of customers, it seems as though
OneClick must be targeting the same type of service providers, is that
right?

The small number of such customers suggests that, unlike Let's Encrypt,
it could be possible for GlobalSign to diligently affirm that each of
the customers has technical countermeasures in place to protect their
clients from each other.

In my opinion such an approach ought to be adequate to continue using
OneClick in the short term, say for 12-18 months with the understanding
that this validation method will either be replaced by something less
problematic or the OneClick service will go away in that time.

But of course I do not speak for Google, Mozilla or any major trust
store.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to