On Mon, Jan 15, 2018 at 3:36 PM, Doug Beattie via dev-security-policy <
[email protected]> wrote:

> Ryan,
>
> I’m not sure where we go from here.


As suggested, we encourage you to work on devising technical mitigations or
alternative methods of validating such certificates that can meet the use
case. We don't think that, as described, the OneClick method meets the
necessary level of assurance, nor do the necessary level of mitigating
factors exist, to consider such certificates trustworthy.


> We have customers that need certificates and they have demonstrated they
> can comply with not permitting the creation and use of certificates for
> domains other than those that the hosting company is hosting for that
> customer.  All certificates will continue to be posted to CT logs.
>

While understanding and sensitive to this, what you're asking is that, on
the basis of an abstract need, that known-insecure methods be used, with
the assurance that the CA has taken steps (which are fundamentally
non-interoperable) to mitigate, and for which an improper decision by a CA
has no further mitigating factors. This does not provide a sufficient level
of assurance to permit its continued use.


> As far as the wildcard question, when someone asks for a wildcard cert for
> a domain like *.us.example.com, we validate on that minus the * (so,
> us.example.com in this case).
>

I'm afraid you're still missing the point of FQDN versus Authorization
Domain Name. This further does not instill confidence that it's fully been
described.


> We’d like to move forward with issuing certificates with controls in
> place.


I'm sorry, but at present, we do not feel it is in the appropriate
interests of users, sites, or the ecosystem to permit this.


> If there are any other controls you need us to implement to resume
> issuance, let us know.  For example, if we limit validity to 1 year
> (possibly up to 15 months) and if we put a firm end date for OneClick for
> July 1, 2018, would that suffice?
>

As stated, we believe 90 days is an appropriate and necessary upper-bound
for such certificates.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to