> On Jan 24, 2018, at 15:20, Wayne Thayer via dev-security-policy 
> <dev-security-policy@lists.mozilla.org> wrote:
> 
> 2. On 19-December, significant concerns were raised about the reliability
> of the domain validation methods specified in BR 3.2.2.4.1 and 3.2.2.4.5.
> [3] Since then, discussions on the CA/Browser Forum Public list have
> resulted in a proposed ballot to prohibit the use of these methods after
> 1-August 2018. [4] If your CA uses either of these methods, please evaluate
> your implementation for vulnerabilities and be prepared to discontinue
> their use prior to the deadline if ballot 218 succeeds.

Is there a reason to make this deprecation conditional on the ballot? Given 
what we know about how the vulnerable methods are used in the wild, they have 
the same level of brokenness as TLS-SNI-01/02 and it’s not clear how evaluating 
for vulnerabilities would fix anything. August is a long time from now, and 
even that date would be conditional on the ballot.

I strongly believe that requiring CAs to disclose their use of these methods 
immediately, and setting a date not more than a couple months from now where 
these methods and previous validations using them must not be used would be the 
correct choice to protect Mozilla’s users.

Jonathan
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to