Hi,

I am in support of sha256 only for uniformity and universal support.

+1 for Rob's comment regarding use of the "sha256" query string parameter
for crt.sh URLs.

I do think "https://crt.sh/?sha256=[hash]"; should probably be the
recommended formatting, however simply specifying the sha256 hash should be
allowed as to not require use of a specific website.

I would suggest to disallow any other websites unless they use similarly
obvious URL formats with a sha256 hash, or even disallow any outside of a
list of approved log sites. (that could include crt.sh, censys, etc)

The thinking I had here was that with something like the crt.sh URLs or
just a list of hashes, it would be trivial to translate into your favorite
cert viewer of choice with a simple regex or whatever. (in the case of list
of multiple certs that could be annoying to deal with by hand)

-Cynthia

On Wed, Nov 17, 2021, 23:46 Ben Wilson <[email protected]> wrote:

> All,
>
> In an incident report recently, there was discussion about the right way
> to report the certificates involved in the incident. See
> https://bugzilla.mozilla.org/show_bug.cgi?id=1736064
>
> In section 5 of
> https://wiki.mozilla.org/CA/Responding_To_An_Incident#Incident_Report, it
> currently says, "5. In a case involving TLS server certificates, the
> complete certificate data for the problematic certificates. The recommended
> way to provide this is to ensure each certificate is logged to CT and then
> list the fingerprints or *crt.sh IDs*, either in the report or as an
> attached spreadsheet, with one list per distinct problem."
>
> We are thinking of removing the reference to the "crt.sh ID" and
> clarifying the instructions on providing the certificate fingerprints.
> Instead of the crt.sh database ID, for instance, crt.sh currently supports
> a lookup based on the SHA256 hash (https://crt.sh/?q=[sha256 hash]).
>
> Should it instead say, "The recommended way to provide this is to ensure
> each certificate is logged to CT and then list the crt.sh fingerprint URL
> for each certificate in the format 'https://crt.sh/?q=[sha256 hash]',
> ...."? Should the SHA1 fingerprint also be allowed?
>
> What is the preferred method, and which other alternatives should be
> allowed for unambiguously reporting / locating the certificates or their
> "complete certificate data"?
>
> Thanks,
>
> Ben
>
>
> --
> You received this message because you are subscribed to the Google Groups "
> [email protected]" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> To view this discussion on the web visit
> https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaY5t3yMs2bVoGy-F%3D2_Tph__G%2BfLARXD3TxBZ7MJK97sw%40mail.gmail.com
> <https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaY5t3yMs2bVoGy-F%3D2_Tph__G%2BfLARXD3TxBZ7MJK97sw%40mail.gmail.com?utm_medium=email&utm_source=footer>
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CAKw1M3MrmGdEQRL838%2Botg0wxZvwRtLX0cj1b81HGgzVxxJ__w%40mail.gmail.com.

Reply via email to