The Public Suffix List is a model for failure, not success - and I say that
as one of the two PSL maintainers. As to the remaining points, I think each
and every one of them doesn't actually hold up to scrutiny, and in fact,
the opposite conclusion is more in line with reality.

For example, if anti-spam systems applied per-account algorithms, then
there's an incentive for spammers to add themselves to the list. This is
demonstrable by some CAs using rate limiting at the PSL boundary, causing a
surge in additions to bypass those rate limits - similarly for various
browser security mechanisms.

Regarding the domain holder acting as behalf as the user - it's absolutely
true they can. The position advocated is like suggesting that 3.2.2.4.6 is
more secure than 3.2.2.4.2/.3 - the domain holder has primacy over the
website operator, and the postmaster has primacy over individual mailboxes.

On Mon, May 14, 2018 at 12:10 PM, Jakob Bohm via dev-security-policy <
[email protected]> wrote:

> Another approach could be to have something akin to the (non-ICANN)
> public suffix list, but for e-mail.  This would list e-mail domains
> where the e-mail address holders are not the subordinates (employees,
> students, etc.) of the domain holder.
>
> Such a list would have multiple uses (just like the public suffix list for
> domain delegations):
>
> 1. E-mails from these domains are not presumed to represent the opinion
>   of the domain holder in various contexts (including validation of TLS
>   certs against non-reserved e-mail addresses).
>
> 2. Anti-spam systems could apply a more per-account algorithm for
>   computing reputation scores.
>
> 3. S/MIME certificate issuance does not assume the domain holder can
>   act on behalf of the e-mail users.  Thus validation with
>   [email protected] would not be valid for [email protected],
>   but on the other hand CAA records for example.net would not apply
>   to S/MIME (both if example.net was on the public e-mail domain list).
>
>
> On 14/05/2018 17:48, Neil Dunbar wrote:
>
>> But it also seems reasonable for organisations making CAA assertions to
>> know the scope of their stipulations before they make them, no?
>>
>> So, if in the case of Yahoo, they make the assertion “All of our web
>> certificates should come from DigiCert”, are they aware that they are also
>> making the statement “And all of our user mail accounts should only be
>> granted S/MIME certificates from DigiCert too”.
>>
>> Perhaps they are, perhaps not, but I’m willing to bet that a fair number
>> of Yahoo accounts have S/MIME certificates not issued by DigiCert - a shift
>> to CAA-S/MIME enforcement could cause some unwelcome disruption to Yahoo’s
>> customers.
>>
>> Please note: I’m not opposed to CAA stipulations applying to S/MIME. I
>> would just want all participants in the PKI world to know what their
>> statements mean and how far they reach.
>>
>> Since the syntax of CAA is extensible, perhaps ‘issue’ could indeed be
>> restricted to TLS certificates, and a newer tag ‘issueall’ be taken to mean
>> ‘covering all possible forms of certificates’?
>>
>> Just a thought,
>>
>> Neil
>>
>> On 14 May 2018, at 08:39, Ryan Sleevi via dev-security-policy <
>>> [email protected]> wrote:
>>>
>>> It seems perfectly reasonable and desirable to require that CAs,
>>> regardless
>>> of the type of certificate they are issuing, respect CAA.
>>>
>>> If an email provider wishes to restrict some types of certificates (e.g.
>>> HTTPS) while allow others (e.g. S/MIME), this could be accomplished
>>> through
>>> additional expressions within the CAA syntax.
>>>
>>> However, it would be a long-lasting, and tragic mistake if CAA was
>>> presumed
>>> to 'only' apply to HTTPS - because it would make the same mistake of
>>> nameConstraints - namely, everything that is not expressly listed as
>>> permitted/restricted is implicitly permitted - rather than doing what
>>> security practitioners have long known is the safe and secure base -
>>> forbid
>>> unless expressly permitted (default-deny).
>>>
>>> In terms of order of concerns and constituents, the domain holders needs
>>> and security goals outweigh those of the notion of users 'owning' an
>>> email
>>> address.
>>>
>>> On Mon, May 14, 2018 at 3:45 AM, Pedro Fuentes via dev-security-policy <
>>> [email protected]> wrote:
>>>
>>> Just to say that looking at this from Europe, I don't see this feasible.
>>>>
>>>> Citizens getting their personal eIDAS-compliant certificate go through
>>>> face-to-face validation and will give virtually any valid e-mail
>>>> address to
>>>> appear in their certificate.
>>>>
>>>> El sábado, 12 de mayo de 2018, 2:30:58 (UTC+2), Wayne Thayer  escribió:
>>>>
>>>>> I created a new issue suggesting that we add this requirement to
>>>>> Mozilla
>>>>> policy: https://github.com/mozilla/pkipolicy/issues/135
>>>>>
>>>>> On Wed, May 9, 2018 at 4:59 PM Ryan Sleevi via dev-security-policy <
>>>>> [email protected]> wrote:
>>>>>
>>>>> On Wed, May 9, 2018 at 11:47 AM, Adrian R. via dev-security-policy <
>>>>>> [email protected]> wrote:
>>>>>>
>>>>>> Hello,
>>>>>>> this question is somewhat outside the current Baseline Requirements,
>>>>>>>
>>>>>> but...
>>>>>>
>>>>>>>
>>>>>>> wouldn't it be normal for the same CAA rules for server certificates
>>>>>>>
>>>>>> to
>>>>
>>>>> also apply to client certificates when the email address is for a
>>>>>>>
>>>>>> domain
>>>>
>>>>> that already has a valid CAA policy published in DNS?
>>>>>>>
>>>>>>>
>>>>>>> RFC 6844 doesn't seem to make any distinction between server and
>>>>>>>
>>>>>> S/MIME
>>>>
>>>>> client certificates, it combines them together by referring to
>>>>>>>
>>>>>> certificates
>>>>>>
>>>>>>> "for that domain" as a whole.
>>>>>>>
>>>>>>>
>>>>>>> i tested this last night - i obtained an email certificate from one
>>>>>>>
>>>>>> of
>>>>
>>>>> the
>>>>>>
>>>>>>> CAs participating here (not for this exact address though) and it was
>>>>>>> happily issued even if CAA records authenticated by DNSSEC do not
>>>>>>>
>>>>>> allow
>>>>
>>>>> their CA to issue for this domain.
>>>>>>>
>>>>>>> Now, this is technically not a mis-issuance because it was a proper
>>>>>>> email-validated address and their CPS says that CAA is only checked
>>>>>>>
>>>>>> for
>>>>
>>>>> server-type certificates. It doesn't say anything about CAA
>>>>>>>
>>>>>> validation
>>>>
>>>>> for
>>>>>>
>>>>>>> such client certificates.
>>>>>>>
>>>>>>> I got in touch with them and they seemed equally surprised by such
>>>>>>> intended use case for CAA, so my second question is: is anyone
>>>>>>>
>>>>>> actually
>>>>
>>>>> checking CAA records for client certificates where an email address
>>>>>>>
>>>>>> is
>>>>
>>>>> included in the certificate subject info and the EKU includes Secure
>>>>>>>
>>>>>> Email?
>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> Or is CAA usually checked only for server-type certificates, even if
>>>>>>>
>>>>>> RFC
>>>>
>>>>> 6844 refers to certificates "for that domain" as a whole?
>>>>>>>
>>>>>>>
>>>>>> CAs are generally only checking CAA when they're required to in order
>>>>>>
>>>>> to be
>>>>
>>>>> trusted.
>>>>>>
>>>>>> Right now, CAs are only required to check CAA for server-type
>>>>>>
>>>>> certificates
>>>>
>>>>> (by virtue of the Baseline Requirements Section 3.2.2.8).
>>>>>> CAs are not presently being required to check CAA for e-mail. They
>>>>>>
>>>>> can, but
>>>>
>>>>> they are required to do it, so they are unlikely to do it.
>>>>>>
>>>>>
>
> Enjoy
>
> Jakob
> --
> Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
> Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
> This public discussion message is non-binding and may contain errors.
> WiseMo - Remote Service Management for PCs, Phones and Embedded
>
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to