On Thu, Aug 16, 2018 at 7:25 AM Eric Mill <[email protected]> wrote:

>
> I think this paper provides a good impetus to look at further shortening
> certificate lifetimes down to 13 months. That would better match the annual
> cadence of domain registration so that there's a smaller window of time
> beyond domain expiration for which a certificate would be valid, and would
> continue the momentum Mozilla and the CA/B Forum have been building around
> reducing certificate lifetimes and encouraging automation.
>
> The presentation suggests having certificates only be valid through the
> expiration date of the relevant registered domain, but I think that's
> unrealistic. Most of the time, domains are set to autorenew so that people
> never have to think about them, and their renewal cadence is totally
> disconnected from certificate renewal cadence. If a domain is 6 days from
> autorenew, a CA offering a 6-day-long cert and forcing someone to come back
> a week later for another one would be very unreasonable.
>
> I don't think the presentation points to building in stronger support for
> revocation. If anything, it points to revocation being a threat vector for
> DoS-ing sites that have nothing to do with the problem at hand, due to the
> long-standing (and reasonable) practice of multi-SAN certs that combine
> clumps of customers into individual certificates. Ryan points out that SNI
> is becoming something that can be relied on more universally, which would
> reduce the need for multi-SAN certificates, but multi-SAN certificates also
> provide useful operational benefits to organizations who are using CAs with
> rate limits, or simply for whom the ability to use 100x fewer certificates
> relieves an operational scaling burden.
>
> It may still be useful to deprecate multi-SAN certificates over time, but
> I think the single biggest thing to take away from the presentation is that
> long-lived certs create invisible risks during domain transfers, and that
> the risk is more than just theoretical when looking at the whole of the
> web. It's been a year and a half now since the last discussion and vote
> that went from a 39-month max to a 27-month max, so I think it's a great
> time to start talking about a 13-month maximum.
>
> I have to agree that the most practical improvement here is the reduction
of max validity to 13 months. As pointed out by Ryan, a step in that
direction would be to reduce the max data reuse period to 13 months or less.

I've also proposed a CAB Forum ballot [1] that should make it a bit easier
for domain owners to get residual certificates revoked. It includes a more
specific revocation requirement covering this scenario and clearer
disclosure of the CA's problem reporting mechanism.

- Wayne

[1] https://cabforum.org/pipermail/servercert-wg/2018-August/000093.html
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to