Since a number of questions and concerns have been raised regarding the
sunset of underscore characters in dNSNames, I would like to summarize
Mozilla’s position on the issue as follows:

In early November, the CA/Browser Forum passed ballot SC12 [1], creating a
sunset period aimed at ending the practice of placing underscore characters
(“_”) in the subjectAlternativeName (SAN) attribute of publicly-trusted TLS
certificates. The ballot requires revocation of most existing certificates
with underscore characters in SANs before 15-Jan 2019, but allows continued
use of these certificates through April 2019 if they are valid for less
than 30 days.

A thorough review of RFC 5280 and its references shows that underscore
characters have never been permitted in dNSNames in the SAN of compliant
certificates. However, for many years this was a commonly accepted
practice, and all major browsers currently ignore this requirement.

In 2017, a ballot that attempted (among other things) to create an
exception to RFC 5280 for these certificates [2] in the CA/Browser Forum
Baseline Requirements was rejected [3], in-part due to objections to this
exception. At that time, some CAs decided to stop issuing these
certificates, while others continued. When the situation resurfaced earlier
this year, there was spirited debate about how best to resolve the problem,
and the compromise defined in ballot SC12 eventually emerged as the most
viable approach.

Mozilla has been asked by users of these certificates - primarily in the
financial services industry - and their CAs to make exceptions to extend
the revocation deadline until their systems can be updated. We don’t have
the power to unilaterally change the Baseline Requirements (only the
CA/Browser Forum can do that), but Mozilla can take a position on our plans
to enforce them. However, simply granting CAs a “free pass” to ignore the
revocation requirement is, we believe, not in the best interest of our
users, fundamentally because it sets the expectation that the Baseline
Requirements are negotiable. It is also:
* unfair to CAs who voted in favor of ballot SC12 under the assumption that
it would be enforced
* unfair to the CAs who avoided this situation by ending this practice last
year
* unfair to the CAs (and their impacted customers) who will revoke all
these certificates on time

This doesn’t mean that we are insensitive to the potential disruption
caused by the revocation of this type of certificate.

We sincerely hope that affected organizations make every effort to meet the
revocation deadline. If that is not possible for each and every certificate
containing an underscore in the SAN, our expectation is for CAs to treat
any failure to adhere to ballot SC12 as a policy violation. Should a CA
choose not to revoke certificates with underscores in a SAN prior to
15-January 2019, we expect the individual circumstances that led to the
decision for each Subscriber organization to be provided in a detailed
incident report.[4] For this situation, we prefer for the incident report
to be submitted immediately so that the Mozilla community can make our best
effort to evaluate the information and identify any gaps or unmet
expectations before the 15-January revocation deadline. We believe that
this approach creates the best incentives to balance the various risks and
to maximize disclosure, and in so doing helps us to improve the
trustworthiness of the web PKI.

- Wayne

[1]
https://cabforum.org/2018/11/12/ballot-sc-12-sunset-of-underscores-in-dnsnames/
[2] https://cabforum.org/pipermail/public/2017-July/011653.html
[3] https://cabforum.org/pipermail/public/2017-July/011708.html
[4] https://wiki.mozilla.org/CA/Responding_To_An_Incident#Incident_Report
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to