On 29/11/2018 12:14 π.μ., Wayne Thayer via dev-security-policy wrote:
The way that we currently handle these types of issues is about as good as
we're going to get. We have a [recently relaxed but still] fairly stringent
set of rules around revocation in the BRs. This is necessary and proper
because slow/delayed revocation can clearly harm our users. It was
difficult to gain consensus within the CAB Forum on allowing even 5 days in
some circumstances - I'm confident that something like 28 days would be a
non-starter. I'm also confident that CAs will always take the entire time
permitted to perform revocations, regardless of the risk, because it is in
their interest to do so (that is not mean to be a criticism of CAs so much
as a statement that CAs exist to serve their customers, not our users). I'm
also confident that any attempt to define "low risk" misissuance would just
incentivize CAs to stop treating misissuance as a serious offense and we'd
be back to where we were prior to the existence of linters..

CAs obviously do choose to violate the revocation time requirements. I do
not believe this is generally based on a thorough risk analysis, but in
practice it is clear that they do have some discretion. I am not aware of a
case (yet) in which Mozilla has punished a CA solely for violating a
revocation deadline. When that happens, the violation is documented in a
bug and should appear on the CA's next audit report/attestation statement.
>From there, the circumstances (how many certs?, what was the issue?, was it
previously documented?, is this a pattern of behavior?) have to be
considered on a case-by-case basis to decide a course of action. I realize
that this is not a very satisfying answer to the questions that are being
raised, but I do think it's the best answer.

- Wayne

Mandating that CAs disclose revocation situations that exceed the 5-day requirement with some risk analysis information, might be a good place to start. Of course, this should be independent of a "mis-issuance incident report". By collecting this information, Mozilla would be in a better position to evaluate the challenges CAs face with revocations *initiated by the CA* without adequate warning to the Subscriber. I don't consider 5 days (they are not even working days) to be adequate warning period to a large organization with slow reflexes and long procedures. Once Mozilla collects more information, you might be able to see possible patterns in various CAs and decide what is acceptable and what is not, and create policy rules accordingly.

For example, if many CAs violate the 5-day rule for revocations related to improper subject information encoding, out of range, wrong syntax and that sort, Mozilla or the BRs might decide to have a separate category with a different time frame and/or different actions.

It is not the first time we talk about this and it might be worth exploring further.

As a general comment, IMHO when we talk about RP risk when a CA issues a Certificate with -say- longer than 64 characters in an OU field, that would only pose risk to Relying Parties *that want to interact with that particular Subscriber*, not the entire Internet. These RPs *might* encounter compatibility issues depending on their browser and will either contact the Subscriber and notify them that their web site doesn't work or they will do nothing. It's similar to a situation where a site operator forgets to send the intermediate CA Certificate in the chain. These particular RPs will fail to get TLS working when they visit the Subscriber's web site.


Dimitris.



On Wed, Nov 28, 2018 at 1:10 PM Nick Lamb via dev-security-policy <
[email protected]> wrote:

On Mon, 26 Nov 2018 18:47:25 -0500
Ryan Sleevi via dev-security-policy
<[email protected]> wrote:
CAs have made the case - it was not accepted.

On a more fundamental and philosophical level, I think this is
well-intentioned but misguided. Let's consider that the issue is one
that the CA had the full power-and-ability to prevent - namely, they
violated the requirements and misissued. A CA is only in this
situation if they are a bad CA - a good CA will never run the risk of
"annoying" the customer.
I would sympathise with this position if we were considering, say, a
problem that had caused a CA to issue certs with the exact same mistake
for 18 months, rather than, as I understand here, a single certificate.

Individual human errors are inevitable at a "good CA". We should not
design systems, including policy making, that assume all errors will be
prevented because that contradicts the assumption that human error is
inevitable. Although it is often used specifically to mean operator
error, human error can be introduced anywhere. A requirements document
which erroneously says a particular Unicode codepoint is permitted in a
field when it should be forbidden is still human error. A department
head who feels tired and signs off on a piece of work that actually
didn't pass tests, still human error.

In true failure-is-death scenarios like fly-by-wire aircraft controls
this assumption means extraordinary methods must be used in order to
minimise the risk of inevitable human error resulting in real world
systems failure. Accordingly the resulting systems are exceptionally
expensive. Though the Web PKI is important, we should not imagine for
ourselves that it warrants this degree of care and justifies this level
of expense even at a "good CA".

What we can require in policy - and as I understand it Mozilla policy
does require - is that the management (also humans) take steps to
report known problems and prevent them from recurring. This happened
here.

This presumes that the customer cannot take steps to avoid this.
However, as suggested by others, the customer could have minimized or
eliminated annoyance, such as by ensuring they have a robust system
to automate the issuance/replacement of certificates. That they
didn't is an operational failure on their fault.
I agree with this part.

This presumes that there is "little or no risk to relying parties."
Unfortunately, they are by design not a stakeholder in those
conversations
It does presume this, and I've seen no evidence to the contrary. Also I
think I am in fact a stakeholder in this conversation anyway?

I agree that it's entirely worthless the increasingly implausible
"important" revocations. I think a real and meaningful solution is
what is being more consistently pursued, and that's to distrust CAs
that are not adhering to the set of expectations.
I don't think root distrust is an appropriate response, in the current
state, to a single incident of this nature, this sort of thing is,
indeed, why you may remember me suggesting that Mozilla needs other
mechanisms short of distrust in its arsenal.

Nick.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to