Re: SECURITY RELEVANT FOR CAs: The curious case of the Dangerous Delegated Responder Cert

2020-11-18 Thread Jakob Bohm via dev-security-policy
nner that complements the existing design constraints, rather than conflicts with them. However this solution seems to not rely on PKI clients having fail-hard CRL/OCSP handling, but on them having a way to enforce SubCA revocations. This includes Mozilla OneCRL, the static CRL support in OpenSSL and

Re: SECURITY RELEVANT FOR CAs: The curious case of the Dangerous Delegated Responder Cert

2020-11-17 Thread Jakob Bohm via dev-security-policy
best of us, to hire the very best, and to be the very best at explaining. Unfortunately, as your post highlights, CAs have largely optimized for reducing "financial strain", and thus, haven't really tried to be the best or have the best. And I think, for users, that's unfort

Re: Policy 2.7.1: MRSP Issue #186: Requirement to Disclose Self-signed Certificates

2020-11-12 Thread Jakob Bohm via dev-security-policy
s on how we can make this language even more clear. How would that phrasing cover doppelgangers of intermediary SubCAs under an included root CA? Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 This

Re: Policy 2.7.1: MRSP Issue #192: Require information about auditor qualifications in the audit report

2020-11-06 Thread Jakob Bohm via dev-security-policy
d they won't accept audits from. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 This public discussion message is non-binding and may contain errors. WiseMo - Remote Service Man

Re: Policy 2.7.1: MRSP Issue #153: Cradle-to-Grave Contiguous Audits

2020-11-06 Thread Jakob Bohm via dev-security-policy
ts, even if doing so would be legitimate or even required by the root programs. Thus the hypothetical scenario could land the CAO in an impossible situation, if root program requirements or common CA protocols change, and those changes would require even one additional signature by the root CA

Re: Policy 2.7.1: MRSP Issue #186: Requirement to Disclose Self-signed Certificates

2020-11-02 Thread Jakob Bohm via dev-security-policy
On 2020-10-30 18:45, Ryan Sleevi wrote: On Fri, Oct 30, 2020 at 12:38 PM Jakob Bohm via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: On 2020-10-30 16:29, Rob Stradling wrote: Perhaps add: "And also include any other certificates sharing the same private/publi

Re: Policy 2.7.1: MRSP Issue #186: Requirement to Disclose Self-signed Certificates

2020-10-30 Thread Jakob Bohm via dev-security-policy
"as CA certificates". ____ From: Jakob Bohm via dev-security-policy Sent: 29 October 2020 14:57 To: mozilla-dev-security-pol...@lists.mozilla.org Subject: Re: Policy 2.7.1: MRSP Issue #186: Requirement to Disclose Self-signed Certificates On 2020-10-29 01:25, Ben Wilson wrote

Re: TLS certificates for ECIES keys

2020-10-30 Thread Jakob Bohm via dev-security-policy
of certificates with easily compromised keys. Thus it makes sense for the involved CAs (such as Let's Encrypt) to issue these certificates with a unique EKU other than the generic "Server Authentication" traditionally associated with TLS. Enjoy Jakob -- Jakob Bohm, CI

Re: TLS certificates for ECIES keys

2020-10-29 Thread Jakob Bohm via dev-security-policy
criber participate in the above system without violating the relevant requirements? Thanks, Jacob Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 This public discussion message is non-binding and may contai

Re: Policy 2.7.1: MRSP Issue #186: Requirement to Disclose Self-signed Certificates

2020-10-29 Thread Jakob Bohm via dev-security-policy
add: "And also include any other certificates sharing the same private/public key pairs as certificates already included in the requirements." (this covers the situation you mentioned where a self-signed certificate shares the key pair of a certificate that chains to an included roo

Re: EJBCA performs incorrect calculation of validities

2020-10-28 Thread Jakob Bohm via dev-security-policy
On 2020-10-28 20:54, Ryan Sleevi wrote: On Wed, Oct 28, 2020 at 10:50 AM Jakob Bohm via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: This aspect of RFC5280 section 4.1.2.5 is quite unusual in computing, where the ends of intervals are typically encoded suc

Re: EJBCA performs incorrect calculation of validities

2020-10-28 Thread Jakob Bohm via dev-security-policy
seems another detail where the old IETF working group made things unnecessarily complicated for everybody. From a policy perspective, if enough code out there has the same interpretation as old EJBCA versions, maybe it would make more sense for the policy bodies to override RFC5280. Enjoy Jako

Re: PEM of root certs in Mozilla's root store

2020-10-19 Thread Jakob Bohm via dev-security-policy
On 2020-10-17 01:38, Ryan Sleevi wrote: On Fri, Oct 16, 2020 at 5:27 PM Jakob Bohm via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: RFC4180 section 3 explicitly warns that there are other variants and specifications of the CSV format, and thus the full generalizati

Re: PEM of root certs in Mozilla's root store

2020-10-16 Thread Jakob Bohm via dev-security-policy
On 2020-10-16 14:11, Ryan Sleevi wrote: On Thu, Oct 15, 2020 at 7:44 PM Jakob Bohm via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: On 2020-10-15 11:57, Ryan Sleevi wrote: On Thu, Oct 15, 2020 at 1:14 AM Jakob Bohm via dev-security-policy < dev-securi

Re: Sectigo to Be Acquired by GI Partners

2020-10-16 Thread Jakob Bohm via dev-security-policy
rification started with: > In addition to the questions posted by Wayne, I think it'd be useful > to confirm: > ... Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 This public discussion me

Re: Sectigo to Be Acquired by GI Partners

2020-10-15 Thread Jakob Bohm via dev-security-policy
what meaning was intended. From: dev-security-policy on behalf of Jakob Bohm via dev-security-policy Sent: 12 October 2020 22:41 To: mozilla-dev-security-pol...@lists.mozilla.org Subject: Re: Sectigo to Be Acquired by GI Partners Hi Rob, The e-mail you quote below

Re: PEM of root certs in Mozilla's root store

2020-10-15 Thread Jakob Bohm via dev-security-policy
On 2020-10-15 11:57, Ryan Sleevi wrote: On Thu, Oct 15, 2020 at 1:14 AM Jakob Bohm via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: For example, embedded new lines are discussed in 2.6 and the ABNF therein. The one difference from RFC4180 is that CR and LF a

Re: PEM of root certs in Mozilla's root store

2020-10-14 Thread Jakob Bohm via dev-security-policy
On 2020-10-15 04:52, Ryan Sleevi wrote: On Wed, Oct 14, 2020 at 7:31 PM Jakob Bohm via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: Only the CSV form now contains CSV artifacts. And it isn't really CSV either (even if Microsoft Excel handles it). Hi Jakob,

Re: PEM of root certs in Mozilla's root store

2020-10-14 Thread Jakob Bohm via dev-security-policy
ent data, e.g. data published directly via the CCADB. I think that providing the data in an easily consumable format is better than having folks extract the data from certdata.txt. Thanks, Kathleen Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29,

Re: PEM of root certs in Mozilla's root store

2020-10-14 Thread Jakob Bohm via dev-security-policy
Pnnchpj04gftI2jE9K+OJ9dC1vX7gUMQSibMjmhAxhduub+84Mxh2EQIDAQABo4 IBbDCCAWgwEgYDVR0TAQH/BAgwBgEB/wIBDDAdBgNVHQ4EFgQU+SSsD7K1+HnA+mCIG 8TZTQKeFxkwgeMGA1UdIwSB2zCB2IAU+SSsD7K1+HnA+mCIG8TZTQKeFxmhgbSkgbEw ga4xCzAJBgNVBAYTAkVVMUMwQQYDVQQHEzpNYWRyaWQgKHNlZSBjdXJyZW50IGFkZHJ lc3MgYXQgd3d3LmNhbWVyZmlybWEuY29tL2FkZHJlc3MpMRIwEAYDVQQFEwlB

Re: PEM of root certs in Mozilla's root store

2020-10-13 Thread Jakob Bohm via dev-security-policy
On 2020-10-12 20:50, Kathleen Wilson wrote: On 10/7/20 1:09 PM, Jakob Bohm wrote: Please note that at least the first CSV download is not really a CSV file, as there are line feeds within each "PEM" value, and only one column.  It would probably be more useful as a simple concat

Re: Sectigo to Be Acquired by GI Partners

2020-10-12 Thread Jakob Bohm via dev-security-policy
zilla policy. Thanks, Ben ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy ___ dev-security-policy mailing list dev-security-pol

Re: PEM of root certs in Mozilla's root store

2020-10-07 Thread Jakob Bohm via dev-security-policy
Mozilla-trusted certificates and labels them as simply "mozilla/cert-public-name", even though more useful naming can be extracted from the last (most complete) report, after finding a non-gui tool that can actually parse CSV files with embedded newlines in string values. En

Re: Temporary WebTrust Seal for COVID Issues

2020-08-24 Thread Jakob Bohm via dev-security-policy
mat suits to avoid transporting the virus between redundant backup CA offices that have been kept separate to ensure CA operations continue even if every person at one office become critically ill. Thanks, Ben Wilson Mozilla Root Store Manager <https://wiki.mozilla.org/CA/Audit_Statements#Audi

Re: [FORGED] Re: How Certificates are Verified by Firefox

2019-12-09 Thread Jakob Bohm via dev-security-policy
y the code to collect and cache OCSP responses. P.S. One commonly wilified server brand actually does use AIA to build the server chain. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct

Re: Certificate OU= fields with missing O= field

2019-11-01 Thread Jakob Bohm via dev-security-policy
in accordance with Section 3.2.2.1. I'm pretty sure this isn't what the BRs intended, but this appears to forbid issuance with a meaningful subject:organizationalUnitName unless all of the above attributes are populated. EVG §9.2.9 forbids including those attributes in the first pla

Re: Firefox removes UI for site identity

2019-10-23 Thread Jakob Bohm via dev-security-policy
. It was moved entirely off screen, and replaced with very subtle differences in the contents of a pop-up. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 This public discussion message is non-binding and

Re: CAs cross-signing roots whose subjects don't comply with the BRs

2019-10-08 Thread Jakob Bohm via dev-security-policy
been issued before Vrowser Policy made BR compliance mandatory. In other words, BR non-compliance may not have been actual non-compliance at that time. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10

Re: CAs cross-signing roots whose subjects don't comply with the BRs

2019-10-07 Thread Jakob Bohm via dev-security-policy
On 07/10/2019 17:35, Ryan Sleevi wrote: > On Mon, Oct 7, 2019 at 11:26 AM Jakob Bohm via dev-security-policy < > dev-security-policy@lists.mozilla.org> wrote: > >> On 07/10/2019 16:52, Ryan Sleevi wrote: >>> I'm curious how folks feel about the following p

Re: CAs cross-signing roots whose subjects don't comply with the BRs

2019-10-07 Thread Jakob Bohm via dev-security-policy
clear-cut violation of the Baseline Requirements, and "Foo" could have pursued an alternative hierarchy to avoid needing to cross-sign. However, I thought it interesting to solicit others' feedback on this situation, before opening the CA incident for Foo. Enjoy Jakob -- Jakob Bo

Re: DigiCert OCSP services returns 1 byte

2019-09-16 Thread Jakob Bohm via dev-security-policy
the equation. :-) >> >> Short-term: >> - I think BR 7.1.2.5, as written, is decidedly unhelpful and should >> be revised to have a much smaller scope. Surely only the serial number >> uniqueness requirement (RFC5280 section 4.1.2.2) needs to be relaxed, >> n

Re: DigiCert OCSP services returns 1 byte

2019-09-16 Thread Jakob Bohm via dev-security-policy
t if a consumable component (such as a COTS disk system or COTS server) fails. - A system failure during actual certificate signing needs to be detected and handled within the 24 hour deadline. But such failures are typically detected within the hour, thus during any business hours signing cer

Re: Question about the issuance of OCSP Responder Certificates by technically constrained CAs

2019-09-04 Thread Jakob Bohm via dev-security-policy
rtificates that contain the EKU for Microsoft compatibility. This is especially bad if the SubCA is controlled by an entity other than its direct parent CA. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13

Re: 2019.08.28 Let’s Encrypt OCSP Responder Returned “Unauthorized” for Some Precertificates

2019-09-02 Thread Jakob Bohm via dev-security-policy
On 03/09/2019 00:54, Ryan Sleevi wrote: > On Mon, Sep 2, 2019 at 2:14 PM Alex Cohn via dev-security-policy < > dev-security-policy@lists.mozilla.org> wrote: > >> On Mon, Sep 2, 2019 at 12:42 PM Jakob Bohm via dev-security-policy < >> dev-security-policy@lists.mozilla

Re: 2019.08.28 Let’s Encrypt OCSP Responder Returned “Unauthorized” for Some Precertificates

2019-09-02 Thread Jakob Bohm via dev-security-policy
On 02/09/2019 20:13, Alex Cohn wrote: On Mon, Sep 2, 2019 at 12:42 PM Jakob Bohm via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: If an OCSP server supports returning (or always returns) properties of the actual cert, such as the CT proofs, then it really cannot

Re: 2019.08.28 Let’s Encrypt OCSP Responder Returned “Unauthorized” for Some Precertificates

2019-09-02 Thread Jakob Bohm via dev-security-policy
Responder Returned “Unauthorized” > for Some Precertificates > > I dont recall the cab forum ever contemplating or discussing ocsp for > precertificates. The requirement to provide responses is pretty clear, but > what that response should be is a little confusing imo. > ... Enjoy

Re: 2019.08.28 Let’s Encrypt OCSP Responder Returned “Unauthorized” for Some Precertificates

2019-08-30 Thread Jakob Bohm via dev-security-policy
subscriber to use the validity before the cert actually exists, while in other cases it is not possible, except for the difficulty in proving that the cert doesn't exist. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denm

Re: Intent to Ship: Move Extended Validation Information out of the URL bar

2019-08-29 Thread Jakob Bohm via dev-security-policy
On 29/08/2019 19:47, Nick Lamb wrote: > On Thu, 29 Aug 2019 17:05:43 +0200 > Jakob Bohm via dev-security-policy > wrote: > >> The example given a few messages above was a different jurisdiction >> than those two easily duped company registries. > > I see. Perha

Re: Intent to Ship: Move Extended Validation Information out of the URL bar

2019-08-29 Thread Jakob Bohm via dev-security-policy
b Site" from London, UK [Union > flag]. > > Sounds legitimate. > > Remember, the British government doesn't care that Authorised Web Site > is a stupid name for a company, that its named officers are the > characters in Toy Story, that its claimed offices are a bu

Re: Symantec migration update

2019-08-29 Thread Jakob Bohm via dev-security-policy
** Note that this plan excludes QuoVadis; we will be posting updates on the QuoVadis system migration later once we free up resources from the Symantec migration. Looking forward to the questions! Jeremy Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.

Re: Intent to Ship: Move Extended Validation Information out of the URL bar

2019-08-27 Thread Jakob Bohm via dev-security-policy
On 27/08/2019 08:03, Peter Gutmann wrote: > Jakob Bohm via dev-security-policy > writes: > >> <https://www.typewritten.net/writer/ev-phishing/> and >> <https://stripe.ian.sh/> both took advantage of weaknesses in two >> government registries >

Re: Intent to Ship: Move Extended Validation Information out of the URL bar

2019-08-26 Thread Jakob Bohm via dev-security-policy
On 26/08/2019 21:49, Jonathan Rudenberg wrote: > On Mon, Aug 26, 2019, at 15:01, Jakob Bohm via dev-security-policy wrote: >> <https://www.typewritten.net/writer/ev-phishing/> and >> <https://stripe.ian.sh/> both took advantage of weaknesses in two >> government

Re: Intent to Ship: Move Extended Validation Information out of the URL bar

2019-08-26 Thread Jakob Bohm via dev-security-policy
.1.543.2117&rep=rep1&type=pdf An undated(!) study involving highly outdated browsers. No indication this was ever in a peer reviewed journal. DV is sufficient. Why pay for something you don't need? Unproven claim, especially by studies from before free DV without traceable credit

Re: Jurisdiction of incorporation validation issue

2019-08-23 Thread Jakob Bohm via dev-security-policy
rwork. Thus someone reading the wording of company bylaws, would assume all companies are registered and incorporated at the county level, because the bylaws will usually not even mention the country (or the registration number, as the initial bylaws must be submitte

Re: Jurisdiction of incorporation validation issue

2019-08-23 Thread Jakob Bohm via dev-security-policy
istration. But a CA validation team should research this further to set up proper templates and scripts for validating EV/OV/IV applicants claiming C=DK. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16

Re: CA handling of contact information when reporting problems

2019-08-19 Thread Jakob Bohm via dev-security-policy
n the report is one of claiming a subscriber violates a subjective rule, such as malicious cert use or name ownership conflicts. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 This public discussion message

Re: Intent to Ship: Move Extended Validation Information out of the URL bar

2019-08-17 Thread Jakob Bohm via dev-security-policy
s that use EV certificates, but the EV indicator bar is still better than just nothing. AntiPhishing filters are not a good alternative because they only protect when the harm is already done to some users. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transfor

Re: Intent to Ship: Move Extended Validation Information out of the URL bar

2019-08-16 Thread Jakob Bohm via dev-security-policy
not perfect, they are useless, while ignoring any and all improvements since you original write ups. You really should look at the long term agendas at work here and reconsider what you may be inadvertently supporting. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com

Re: Fwd: Intent to Ship: Move Extended Validation Information out of the URL bar

2019-08-14 Thread Jakob Bohm via dev-security-policy
On 14/08/2019 21:55, Peter Bowen wrote: On Wed, Aug 14, 2019 at 10:16 AM Jakob Bohm wrote: On 14/08/2019 18:18, Peter Bowen wrote: On thing I've found really useful in working on user experience is to discuss things using problem & solution statements that show the before and af

Re: Fwd: Intent to Ship: Move Extended Validation Information out of the URL bar

2019-08-14 Thread Jakob Bohm via dev-security-policy
On 14/08/2019 18:18, Peter Bowen wrote: On Tue, Aug 13, 2019 at 4:24 AM Jakob Bohm via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: A policy of switching from positive to negative indicators of security differences is no justification to switch to NO indication.

Re: Fwd: Intent to Ship: Move Extended Validation Information out of the URL bar

2019-08-13 Thread Jakob Bohm via dev-security-policy
ks :evilpie for working on it!). We're planning to flip this pref to false in bug 1572936 <https://bugzilla.mozilla.org/show_bug.cgi?id=1572936>. Please let us know if you have any questions or concerns, Wayne & Johann Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://

Re: How to use Cross Certificates to support Root rollover

2019-08-05 Thread Jakob Bohm via dev-security-policy
more. ISRG / Let's Encrypt pursued something similar-but-different, but which had the functional goal of reducing their dependency on the IdenTrust root in favor of the ISRG root. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wise

Re: Comodo password exposed in GitHub allowed access to internal Comodo files

2019-07-29 Thread Jakob Bohm via dev-security-policy
s in 2019. Don't let embarrassing incidents like this happen to you. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 This public discussion message is non-binding and may contain errors. WiseMo -

Re: Nation State MITM CA's ?

2019-07-20 Thread Jakob Bohm via dev-security-policy
not trust them, no matter the source. I believe this is either done, or easy to add. On Friday, July 19, 2019 at 1:27:17 PM UTC-7, Jakob Bohm wrote: On 19/07/2019 21:13, andrey...@gmail.com wrote: I am confused. Since when Mozilla is under obligation to provide customized solutions for

Re: Nation State MITM CA's ?

2019-07-20 Thread Jakob Bohm via dev-security-policy
of secrecy from even the authorities. A large home to consider could be 4 generations living together, with 8 to 10 children and 4 spouses for each in each generation, but in relative poverty. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860

Re: Nation State MITM CA's ?

2019-07-19 Thread Jakob Bohm via dev-security-policy
malicious and user-helping systems. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 This public discussion message is non-binding and may contain errors. WiseMo - Remote Service Management for PCs

Re: Nation State MITM CA's ?

2019-07-19 Thread Jakob Bohm via dev-security-policy
Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 This public discussion message is non-binding and may contain errors. WiseMo - Remote Service Management for PCs, Phones and Embedded

Re: Expired Root CA in certdata.txt

2019-07-15 Thread Jakob Bohm via dev-security-policy
a.txt", this file is including Public CA certificates. So an expired certificate means that the key cannot be used anymore. I'm still not expressing this message as an issue, but an suggestion to update/remove those expired Public Keys from your certdata.txt. Enjoy Jakob -- Jakob

Re: Logotype extensions

2019-06-18 Thread Jakob Bohm via dev-security-policy
On 14/06/2019 18:54, Ryan Sleevi wrote: > On Fri, Jun 14, 2019 at 4:12 PM Jakob Bohm via dev-security-policy < > dev-security-policy@lists.mozilla.org> wrote: > >> In such a case, there are two obvious solutions: >> >> A. Trademark owner (prompted by applic

Re: Logotype extensions

2019-06-14 Thread Jakob Bohm via dev-security-policy
ot always possible if other legal issues take priority for the applicant, such as keeping their online webshop legally separate from their core IP assets). Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 1

Re: Does Heartbleed count for the purposes of BR 4.9.1.1 point 11? ("proven or demonstrated method")

2019-05-27 Thread Jakob Bohm via dev-security-policy
hed to safely handle the heartbeat TLS extension would typically be misdetected as vulnerable. Also, use of a HSM to store the private key would make it not compromised even if used with a vulnerable OpenSSL. So identifying affected certificates from the CA community side in such situations is us

Re: Certinomis Issues

2019-05-17 Thread Jakob Bohm via dev-security-policy
On 17/05/2019 07:21, Jakob Bohm wrote: > On 17/05/2019 01:39, Wayne Thayer wrote: >> On Thu, May 16, 2019 at 4:23 PM Wayne Thayer wrote: >> >> I will soon file a bug requesting removal of the “Certinomis - Root CA” >>> from NSS. >>> >> >> T

Re: Certinomis Issues

2019-05-16 Thread Jakob Bohm via dev-security-policy
certificates that expire on or before 2019-08-31, as those will be unaffected by a September distrust. - Exclude certificates issued after 2019-05-17 (today), as Certinomis should be aware of the likely distrust by tonight. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https

Re: Certinomis Issues

2019-05-09 Thread Jakob Bohm via dev-security-policy
ty.policy/RJHPWUd93xE/lyAX9Wz_AQAJ [3] https://crt.sh/?opt=cablint&id=160150786 Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 This public discussion message is non-binding and may contain errors. Wi

Re: Policy 2.7 Proposal: Exclude Policy Certification Authorities from EKU Requirement

2019-05-09 Thread Jakob Bohm via dev-security-policy
On 10/05/2019 05:25, Ryan Sleevi wrote: On Thu, May 9, 2019 at 10:44 PM Jakob Bohm via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: On 09/05/2019 16:35, Ryan Sleevi wrote: Given that the remark is that such a desire is common, perhaps you can provide some ex

Re: Policy 2.7 Proposal: Exclude Policy Certification Authorities from EKU Requirement

2019-05-09 Thread Jakob Bohm via dev-security-policy
On 09/05/2019 16:35, Ryan Sleevi wrote: > On Wed, May 8, 2019 at 10:36 PM Jakob Bohm via dev-security-policy < > dev-security-policy@lists.mozilla.org> wrote: > >> [ Note, I am arguing a neutral position on the specific proposal ] >> >> The common purpose of havi

Re: Policy 2.7 Proposal: Exclude Policy Certification Authorities from EKU Requirement

2019-05-08 Thread Jakob Bohm via dev-security-policy
termediaries) would also depend on the abilities of corporate software packages. >> Does this clarify why having a single "Org CA" would help in deployment >> in some enterprise environments? >> > > Yes. Hopefully my response demonstrates why, based on the preconditi

Re: Unretrievable CPS documents listed in CCADB

2019-05-03 Thread Jakob Bohm via dev-security-policy
find the CP/CPS for a CA. Linking directly to the document would help a lot. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 This public discussion message is non-binding and may contain errors. Wis

Re: Certinomis Issues

2019-05-01 Thread Jakob Bohm via dev-security-policy
ated by reference into EN 319 401 (the above quote is a statement of intent to include the BR requirements that existed when EN 319 401 was written). That said, Mozilla policy at the time may have explicitly stated that an EN 319 401 audit is/was sufficient for Mozilla inclusion purposes. Enjoy

Re: Policy 2.7 Proposal: Require EKUs in End-Entity Certificates

2019-04-16 Thread Jakob Bohm via dev-security-policy
e OID system) a different assigned OID such as 9.88.999. thus not overlapping. Thus no risk of conflicting uses unless someone breaks the basic OID rules. The actual risk (as illustrated by EV) is getting too many different OIDs for the same thing. Enjoy Jakob -- Jakob Bohm, CIO, Pa

Re: Arabtec Holding public key? [Weird Digicert issued cert]

2019-04-15 Thread Jakob Bohm via dev-security-policy
On 15-Apr-19 6:57 PM, Jakob Bohm via dev-security-policy wrote: Thanks for the explanation. Is it possible that a significant percentage of less-skilled users simply pasted in the wrong certificates by mistake, then wondered why their new certificates newer worked? Pasting in the wrong certifica

Re: Arabtec Holding public key? [Weird Digicert issued cert]

2019-04-15 Thread Jakob Bohm via dev-security-policy
ame. We've since disabled that system, although we didn't file any incident report (for the reasons discussed so far). -Original Message- From: dev-security-policy On Behalf Of Wayne Thayer via dev-security-policy Sent: Friday, April 12, 2019 10:39 AM To: Jakob Bohm Cc:

Re: Arabtec Holding public key? [Weird Digicert issued cert]

2019-04-11 Thread Jakob Bohm via dev-security-policy
the other certs looks like cross-sign for the Digicert root. Why still no response from Digicert? Has this been reported to them directly? Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 This pub

Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-04-04 Thread Jakob Bohm via dev-security-policy
cy/mCKvUmYUMb0/sqZVnFvKBwAJ [2] https://github.com/mozilla/pkipolicy/commit/3e38142acd28b152eca263e7528fac940efb20e2 [3] https://github.com/mozilla/pkipolicy/issues/5 [4] https://github.com/mozilla/pkipolicy/issues/170 Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søb

Re: Apple: Non-Compliant Serial Numbers

2019-04-01 Thread Jakob Bohm via dev-security-policy
time after their last actual use. 2h. Servers managed by teams that are busy with unrelated tasks at this time. 2o. Obscure servers that are rarely touched, causing practical problems locating the teams responsible. 2p. Anything else. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S.

Re: Policy 2.7 Proposal: Clarify Meaning of "Technically Constrained"

2019-03-29 Thread Jakob Bohm via dev-security-policy
s if some hypothetical kind of wildcard EE cert). This of cause remains applicable to all the kinds of identities recognized and regulated by the Mozilla root program, which currently happens to be server domain, EV organization, and e-mail address identities. I realize that the BR meani

Re: Applicability of SHA-1 Policy to Timestamping CAs

2019-03-25 Thread Jakob Bohm via dev-security-policy
On 25/03/2019 23:42, Wayne Thayer wrote: > My general sense is that we should be doing more to discourage the use of > SHA-1 rather than less. I've just filed an issue [1] to consider a ban on > SHA-1 S/MIME certificates in the future. > > On Mon, Mar 25, 2019 at 10:54 A

Re: GRCA Incident: BR Compliance and Document Signing Certificates

2019-03-25 Thread Jakob Bohm via dev-security-policy
l cannot be easily fixed/upgraded to remove the problem. If there is no such problematic tool in the target environment, GRCA could (like other CAs in the Mozilla root program) make a list of needed specific EKU oids and include them all in their certificate template. Enjoy Jakob -- Jakob Bo

Re: Applicability of SHA-1 Policy to Timestamping CAs

2019-03-25 Thread Jakob Bohm via dev-security-policy
y issued sequentially named new issuing CAs for these purposes at regular intervals (perhaps annually), however this is against current Mozilla Policy if the root is still in the Mozilla program (as an anchor for SHA2 WebPKI or e-mail certs). Enjoy Jakob -- Jakob Bohm, CIO, Partn

Re: CFCA certificate with invalid domain

2019-03-18 Thread Jakob Bohm via dev-security-policy
thus no one could have proven control of that domain. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 This public discussion message is non-binding and may contain errors. WiseMo - Remote Service

Re: A modest proposal for a better BR 7.1

2019-03-12 Thread Jakob Bohm via dev-security-policy
ng scheme is to collect all / most of the issued serial numbers, extract the bit positions that are random according the the CPS, then run statistical tests to check if they do indeed form a plausible output from a CSRNG. Note 4: In addition to external statistical tests, the auditor of t

Re: The current and future role of national CAs in the root program

2019-03-08 Thread Jakob Bohm via dev-security-policy
e discussion certainly has been raised by a lot of people. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 This public discussion message is non-binding and may contain errors. WiseMo - Remo

Re: The current and future role of national CAs in the root program

2019-03-07 Thread Jakob Bohm via dev-security-policy
such that there will be a useful basis for discussion of whatever should or should not be done long term, once the specific single case has been handled. I did not wake this sleeping dog, it was barking and yanking its chain all week. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https

The current and future role of national CAs in the root program

2019-03-07 Thread Jakob Bohm via dev-security-policy
he countries in which Telia-Sonera is the incumbent Telco (Finland, Sweden and Åland). This overall issue was touched repeatedly in the thread, especially point 3 above, but the earliest I could find was in Message ID posted on Fri, 22 Feb 2019 23:45:39 UTC by "cooperq" On 07/

EJBCA defaulting to 63 bit serial numbers

2019-03-07 Thread Jakob Bohm via dev-security-policy
Kushner from EJBCA and a discovery that Google Trust Services was also hit with this issue to the tune of 100K non-compliant certificates. On 07/03/2019 18:59, Jakob Bohm wrote: > This thread is intended to be a catalog of general issues that come/came > up at various points in the Dark

General issues that came up in the DarkMatter discussion(s)

2019-03-07 Thread Jakob Bohm via dev-security-policy
. Once again, no further mentions of Darkmatter in this thread are allowed, keep those in the actual Darkmatter threads. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 This public discussion message is non

Re: DarkMatter Concerns

2019-03-05 Thread Jakob Bohm via dev-security-policy
forum use a completely different such text than my private e-mail communication. As a lawyer you should be able to draft such a text much better than my own feeble attempt. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, De

Re: Public CA:certs with unregistered FQDN mis-issuance

2019-03-01 Thread Jakob Bohm via dev-security-policy
Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 This public discussion message is non-binding and may contain errors. WiseMo - Remote Service Management for PCs, Phones and Emb

Re: Possible DigiCert in-addr.arpa Mis-issuance

2019-03-01 Thread Jakob Bohm via dev-security-policy
quire >> membership in the CA/Browser Forum should, on their face, be rejected - a >> CA should not have to join the Forum in order to be a CA. >> >> I do agree, however, that the use of WHOIS data continues to show >> problematic incidents - whether it's with OC

Re: T-Systems invalid SANs

2019-02-27 Thread Jakob Bohm via dev-security-policy
;opt=cablint,x509lint,zlint Are duplicate SANs forbidden by any standard? (it's obviously wasteful, but RFC3280 seems to implicitly allow it). Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 This

Re: CA ownership checking [DarkMatter Concerns]

2019-02-27 Thread Jakob Bohm via dev-security-policy
e vaults. We really don't want to publish a hit list of whom criminal gangs (etc.) should target with violence, kidnapping, blackmail etc. when they want to get malicious certificates for use against high value targets. 4. If a CA still practices the "off-site split key sec

Re: Possible DigiCert in-addr.arpa Mis-issuance

2019-02-27 Thread Jakob Bohm via dev-security-policy
ssuance. It's also not clear if in-addr.arpa should even be issuable. I would like to take a moment to thank Ben Cartwright-Cox and igloo5 in pointing out this violation. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denma

Re: DarkMatter Concerns

2019-02-25 Thread Jakob Bohm via dev-security-policy
Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 This public discussion message is non-binding and may contain errors. WiseMo - Remote Service Management for PCs, Phones and Embedded

Re: Firefox Revocation Documentation

2019-02-20 Thread Jakob Bohm via dev-security-policy
rver software packages without upstream stapling support. 3. Don't forget Thunderbird (technically no longer a primary Mozilla product, but still a major use of Mozilla certificate infrastructure). Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformerv

Re: Blog: Why Does Mozilla Maintain Our Own Root Certificate Store?

2019-02-18 Thread Jakob Bohm via dev-security-policy
On 19/02/2019 04:04, Ryan Sleevi wrote: > On Mon, Feb 18, 2019 at 4:59 PM Jakob Bohm via dev-security-policy < > dev-security-policy@lists.mozilla.org> wrote: > >> On 14/02/2019 23:31, Wayne Thayer wrote: >>> This may be of interest: >>> >>> >

Re: Blog: Why Does Mozilla Maintain Our Own Root Certificate Store?

2019-02-18 Thread Jakob Bohm via dev-security-policy
, replacing the Mozilla root store by relying on the OS root store would cut off its own feet. - Some participants in the community actively refuse to support use of the Mozilla root store in other open source initiatives. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https

Re: Certificate issued with OU > 64

2019-02-18 Thread Jakob Bohm via dev-security-policy
On 15/02/2019 19:33, Ryan Sleevi wrote: > On Fri, Feb 15, 2019 at 12:01 PM Jakob Bohm via dev-security-policy < > dev-security-policy@lists.mozilla.org> wrote: > >> Indeed, the report states that the bug was in the pre-issuance checking >> software. >> >

Re: Certificate issued with OU > 64

2019-02-15 Thread Jakob Bohm via dev-security-policy
problem in substantial technical detail, so that we can understand how the fixes will address, and so that the community at large can be aware of systemic risks or patterns and ensure that, regardless of what PKI software they use, so that the ecosystem can itself improve. Please continue

Re: P-384 and ecdsa-with-SHA512: is it allowed?

2019-02-11 Thread Jakob Bohm via dev-security-policy
-384. Using the same P-384 ECDSA key pair with both SHA-384 and SHA-3-384 might be within some readings of the FIPS, but would still be vulnerable to the issue above (imagine a pre-image weakness being found in either hash algorithm, all signatures with such a key would then become suspec

Re: GoDaddy Underscore Revocation Disclosure

2019-02-08 Thread Jakob Bohm via dev-security-policy
procedural delay. As pointed out in other recent cases, CA software must allow revoking a certificate without making it publicly valid first, in case Scenario B happens. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +4

  1   2   3   4   5   6   7   >