On 10/01/2019 19:00, Jeremy Rowley wrote:
> A couple of thoughts:
> 1) CertCenter is not a CA or RA. They have a custom named ICA that is hosted 
> and operated by DigiCert. All validation, issuance, and linting is performed 
> by DigiCert prior to issuance.
> 2) Lots of cert customers have insecure websites. This indicates CAs should 
> scan websites for vulnerabilities. If that's the case, there will be lots of 
> revocations and that needs to be built into the Mozilla policy if required.
> 3) The only way we know that CertCenter is a reseller is by 
> self-identification. They use the same issuance and validation system as all 
> other customers. If they didn't self-identify as a reseller, they could do 
> the same thing and look like an enterprise.
> 4) I think they took their website down once the vulnerability was reported. 
> We've asked them to fix the site because it's high profile. However, if the 
> customer was something like Mozilla or Google, would we demand revocation of 
> their certificates? Granted, they wouldn't have the same vulnerabilities, but 
> I'm having a hard time differentiating from the CA perspective.
> 5) Generating private keys for third parties is definitely NOT encouraged by 
> DigiCert.
> 
> Anyway, I'm not sure what do here as it seems like the main difference 
> between this and any other insecure website is how they self-identify.
> 

There's also the CA observable fact that they use their SubCA to issue 
for other organizations.  This presumably involves different contract 
terms from an Enterprise SubCA only licensed for internal use in that 
Enterprise.

Admittedly, an Enterprise-licensed SubCA "owner" could cheat and issue 
DV certificates that carry the Enterprise name in the DN even though the 
domains are unrelated 3rd parties.  That could be difficult to detect, 
but would presumably be a contract violation.

Another case that would be hard for a CA to distinguish would be a 
hosting provider SubCA controlled by someone like Amazon or Google, 
as those would actually generate the keys (for use on their own 
servers to serve customer domains).  Here contract terms would be the 
only clear distinction, short of an audit of issued certificates versus 
who hosts the IP addresses using those certs.

Of cause I don't know if Digicert makes those distinctions in their 
SubCA contract terms, or if you made those distinctions when CertCenter 
signed up.



Enjoy

Jakob
-- 
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded 
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to