On Mon, Jan 14, 2019 at 5:45 PM Wayne Thayer via dev-security-policy <
[email protected]> wrote:

> > Am I wrong to expect US CAs to be monitoring OFAC sanctions lists?
> Otherwise they would risk violating the typical "comply with applicable
> law" stipulation in section 9 of their CPS'.
>

I'm concerned that such a policy interpretation would necessarily imply
that the CA, in the routine course, might need to have an assertion as to
the individual / organization requesting or benefitting from the
certificate.  While Let's Encrypt allows account registration to be
attached to an email address, I'm pretty sure they don't require it.

I'm working from the assumption that the CAs in the US are following a
"most-conservative approach" legal guidance in determining whether or not a
given certificate that they might issue or may have issued constitutes a
covered dealing as defined in the various sanctions orders and laws (which
are numerous.)  In the strictest literal sense, a CA is performing a
service (as in performing work upon the request of a party) at the behest
of a certificate requestor / subscriber -- who might in fact be unrelated
to the ownership of the DNS name which is incorporated in the certificate
(providing the requestor can succeed at validation.  This would suggest
that providing service for the wrong requestor might be of more
significance to the sanctions rules than whether or not the target website
mentioned in the certificate is owned or operated by a sanctioned entity.

There's also a reasonable case to be made that providing OCSP status
information over an unrelated third party's certificate, to and/or upon the
request of a sanctioned entity might be construed as providing service to a
sanctioned entity.

I suppose my concern is that generally speaking, dns names aren't
sanctioned.  Entities are.  But in a domain validation environment, it is
reasonable to suggest that CAs pull in lists of entities and then monitor
these for domain names, the provenance of said domain names having not even
been required and/or established in the course of issuance?
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to