Re: [FORGED] Re: How Certificates are Verified by Firefox

2019-12-04 Thread Ryan Sleevi via dev-security-policy
This is trivially detectable, and doesn't need to be addressed via any CA/B
Forum work.

This particular threat model is already part of other browser certificate
uses (e.g. HTTP Signed Exchanges) and already something (some) browsers
monitor. As Peter Bowen mentions, OCSP and CRLs are just as equal there.

On Wed, Dec 4, 2019 at 6:52 PM Matthew Hardeman  wrote:

> Not that anyone is presently doing or would do such a thing, but...
>
> Imagine a CA that wanted to offer up a user/browser tracking service to
> their subscriber customer.
>
> Is there any rule that prevents an issuing CA from having a "custom"
> (hiding an identifier for the end-entity certificate) AIA URL?  Such that
> when the browser AIA chases, it's disclosing the fact of the AIA chase as
> well as a user's IP address (and possibly some browser details) to the CA?
> One could easily do it with wildcard DNS and a per-end-entity cert host
> label for the AIA distribution point.
>
>
> On Wed, Dec 4, 2019 at 4:13 PM Ryan Sleevi via dev-security-policy <
> dev-security-policy@lists.mozilla.org> wrote:
>
>> Yes, I am one of the ones who actively disputes the notion that AIA
>> considered harmful.
>>
>> I'm (plesantly) surprised that any CA would be opposed to AIA (i.e.
>> supportive of "considered harmful", since it's inherently what gives them
>> the flexibility to make their many design mistakes in their PKI and still
>> have certificates work. The only way "considered harmful" would work is if
>> we actively remove the flexibility afforded CAs in this realm, which I'm
>> highly supportive of, but which definitely encourages more distinctive
>> PKIs
>> (i.e. more explicitly reducing the use of Web PKI in non-Web cases)
>>
>> Of course, AIA is also valuable in helping browsers push the web forward,
>> so I can see why "considered harmful" is useful, especially in that it
>> helps further the notion that root certificates are a thing of value (and
>> whose value should increase with age). AIA is one of the key tools to
>> helping prevent that, which we know is key to ensuring a more flexible,
>> and
>> agile, ecosystem.
>>
>> The flaw, of course, in a "considered harmful", is the notion that there's
>> One Chain or One Right Chain. That's not the world we have, nor have we
>> ever. The notion that there's One Right Chain for a TLS server to send
>> presumes there's One Right Set of CA Trust Anchors. And while that's
>> definitely a world we could pursue, I think we know from the past history
>> of CA incidents, there's incredible benefit to users to being able to
>> respond to CA security incidents differently, to remove trust in
>> deprecated/insecure things differently, and to set policies differently.
>> And so we can't expect servers to know the Right Chain because there isn't
>> One Right Chain, and AIA (or intermediate preloading with rapid updates)
>> can help address that.
>>
>> On Wed, Dec 4, 2019 at 5:02 PM Tim Hollebeek via dev-security-policy <
>> dev-security-policy@lists.mozilla.org> wrote:
>>
>> > Someone really should write up "AIA chasing considered harmful".  It was
>> > disputed at the TLS session at IETF 105, which shows that the reasoning
>> > behind it is not as widely understood as it needs to be, even among TLS
>> > experts.
>> >
>> > I'm very appreciative of Firefox's efforts in this area.  Leveraging the
>> > knowledge of all the publicly disclosed ICAs to improve chain-building
>> is
>> > an
>> > idea whose time has come.
>> >
>> > -Tim
>> >
>> > > -Original Message-
>> > > From: dev-security-policy <
>> dev-security-policy-boun...@lists.mozilla.org
>> > >
>> > On
>> > > Behalf Of Wayne Thayer via dev-security-policy
>> > > Sent: Monday, December 2, 2019 3:29 PM
>> > > To: Ben Laurie 
>> > > Cc: mozilla-dev-security-policy
>> > ;
>> > > Peter Gutmann 
>> > > Subject: Re: [FORGED] Re: How Certificates are Verified by Firefox
>> > >
>> > > Why not "AIA chasing considered harmful"? The current state of
>> affairs is
>> > that
>> > > most browsers [other than Firefox] will go and fetch the intermediate
>> if
>> > it's not
>> > > cached. This manifests itself as sites not working in Firefox, and
>> users
>> > switching
>> > > to other browsers.
>> > >
>> > > You may be further dismayed to learn that Firefox will soon implement
>> > > intermediate preloading [1] as a privacy-preserving alternative to AIA
>> > chasing.
>> > >
>> > > - Wayne
>> > >
>> > > [1]
>> > >
>> >
>> https://wiki.mozilla.org/Security/CryptoEngineering/Intermediate_Preloading
>> > > #Intermediate_CA_Preloading
>> > >
>> > > On Thu, Nov 28, 2019 at 1:39 PM Ben Laurie  wrote:
>> > >
>> > > >
>> > > >
>> > > > On Thu, 28 Nov 2019 at 20:22, Peter Gutmann
>> > > > 
>> > > > wrote:
>> > > >
>> > > >> Ben Laurie via dev-security-policy
>> > > >> 
>> > > >> writes:
>> > > >>
>> > > >> >In short: caching considered harmful.
>> > > >>
>> > > >> Or "cacheing considered necessary to make things work"?
>> > > >
>> > > >
>> > > > If you happen to visit a bazil

Re: How Certificates are Verified by Firefox

2019-12-04 Thread Matthew Hardeman via dev-security-policy
I had thought that the OCSP privacy concerns were among the reasons for the
general decline in OCSP queries issued by browsers.  In addition, part of
the rationale for development and encouragement of deployment of OCSP
stapling.

On Wed, Dec 4, 2019 at 6:12 PM Peter Bowen  wrote:

> Why not use OCSP?
>
> On Wed, Dec 4, 2019 at 3:52 PM Matthew Hardeman via dev-security-policy <
> dev-security-policy@lists.mozilla.org> wrote:
>
>> Not that anyone is presently doing or would do such a thing, but...
>>
>> Imagine a CA that wanted to offer up a user/browser tracking service to
>> their subscriber customer.
>>
>> Is there any rule that prevents an issuing CA from having a "custom"
>> (hiding an identifier for the end-entity certificate) AIA URL?  Such that
>> when the browser AIA chases, it's disclosing the fact of the AIA chase as
>> well as a user's IP address (and possibly some browser details) to the CA?
>> One could easily do it with wildcard DNS and a per-end-entity cert host
>> label for the AIA distribution point.
>>
>>
>> On Wed, Dec 4, 2019 at 4:13 PM Ryan Sleevi via dev-security-policy <
>> dev-security-policy@lists.mozilla.org> wrote:
>>
>> > Yes, I am one of the ones who actively disputes the notion that AIA
>> > considered harmful.
>> >
>> > I'm (plesantly) surprised that any CA would be opposed to AIA (i.e.
>> > supportive of "considered harmful", since it's inherently what gives
>> them
>> > the flexibility to make their many design mistakes in their PKI and
>> still
>> > have certificates work. The only way "considered harmful" would work is
>> if
>> > we actively remove the flexibility afforded CAs in this realm, which I'm
>> > highly supportive of, but which definitely encourages more distinctive
>> PKIs
>> > (i.e. more explicitly reducing the use of Web PKI in non-Web cases)
>> >
>> > Of course, AIA is also valuable in helping browsers push the web
>> forward,
>> > so I can see why "considered harmful" is useful, especially in that it
>> > helps further the notion that root certificates are a thing of value
>> (and
>> > whose value should increase with age). AIA is one of the key tools to
>> > helping prevent that, which we know is key to ensuring a more flexible,
>> and
>> > agile, ecosystem.
>> >
>> > The flaw, of course, in a "considered harmful", is the notion that
>> there's
>> > One Chain or One Right Chain. That's not the world we have, nor have we
>> > ever. The notion that there's One Right Chain for a TLS server to send
>> > presumes there's One Right Set of CA Trust Anchors. And while that's
>> > definitely a world we could pursue, I think we know from the past
>> history
>> > of CA incidents, there's incredible benefit to users to being able to
>> > respond to CA security incidents differently, to remove trust in
>> > deprecated/insecure things differently, and to set policies differently.
>> > And so we can't expect servers to know the Right Chain because there
>> isn't
>> > One Right Chain, and AIA (or intermediate preloading with rapid updates)
>> > can help address that.
>> >
>> > On Wed, Dec 4, 2019 at 5:02 PM Tim Hollebeek via dev-security-policy <
>> > dev-security-policy@lists.mozilla.org> wrote:
>> >
>> > > Someone really should write up "AIA chasing considered harmful".  It
>> was
>> > > disputed at the TLS session at IETF 105, which shows that the
>> reasoning
>> > > behind it is not as widely understood as it needs to be, even among
>> TLS
>> > > experts.
>> > >
>> > > I'm very appreciative of Firefox's efforts in this area.  Leveraging
>> the
>> > > knowledge of all the publicly disclosed ICAs to improve
>> chain-building is
>> > > an
>> > > idea whose time has come.
>> > >
>> > > -Tim
>> > >
>> > > > -Original Message-
>> > > > From: dev-security-policy <
>> > dev-security-policy-boun...@lists.mozilla.org
>> > > >
>> > > On
>> > > > Behalf Of Wayne Thayer via dev-security-policy
>> > > > Sent: Monday, December 2, 2019 3:29 PM
>> > > > To: Ben Laurie 
>> > > > Cc: mozilla-dev-security-policy
>> > > ;
>> > > > Peter Gutmann 
>> > > > Subject: Re: [FORGED] Re: How Certificates are Verified by Firefox
>> > > >
>> > > > Why not "AIA chasing considered harmful"? The current state of
>> affairs
>> > is
>> > > that
>> > > > most browsers [other than Firefox] will go and fetch the
>> intermediate
>> > if
>> > > it's not
>> > > > cached. This manifests itself as sites not working in Firefox, and
>> > users
>> > > switching
>> > > > to other browsers.
>> > > >
>> > > > You may be further dismayed to learn that Firefox will soon
>> implement
>> > > > intermediate preloading [1] as a privacy-preserving alternative to
>> AIA
>> > > chasing.
>> > > >
>> > > > - Wayne
>> > > >
>> > > > [1]
>> > > >
>> > >
>> >
>> https://wiki.mozilla.org/Security/CryptoEngineering/Intermediate_Preloading
>> > > > #Intermediate_CA_Preloading
>> > > >
>> > > > On Thu, Nov 28, 2019 at 1:39 PM Ben Laurie  wrote:
>> > > >
>> > > > >
>> > > > >
>> > > > > On Thu, 28 Nov 2019 at 20:22, Peter Gutma

Re: How Certificates are Verified by Firefox

2019-12-04 Thread Peter Bowen via dev-security-policy
Why not use OCSP?

On Wed, Dec 4, 2019 at 3:52 PM Matthew Hardeman via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> Not that anyone is presently doing or would do such a thing, but...
>
> Imagine a CA that wanted to offer up a user/browser tracking service to
> their subscriber customer.
>
> Is there any rule that prevents an issuing CA from having a "custom"
> (hiding an identifier for the end-entity certificate) AIA URL?  Such that
> when the browser AIA chases, it's disclosing the fact of the AIA chase as
> well as a user's IP address (and possibly some browser details) to the CA?
> One could easily do it with wildcard DNS and a per-end-entity cert host
> label for the AIA distribution point.
>
>
> On Wed, Dec 4, 2019 at 4:13 PM Ryan Sleevi via dev-security-policy <
> dev-security-policy@lists.mozilla.org> wrote:
>
> > Yes, I am one of the ones who actively disputes the notion that AIA
> > considered harmful.
> >
> > I'm (plesantly) surprised that any CA would be opposed to AIA (i.e.
> > supportive of "considered harmful", since it's inherently what gives them
> > the flexibility to make their many design mistakes in their PKI and still
> > have certificates work. The only way "considered harmful" would work is
> if
> > we actively remove the flexibility afforded CAs in this realm, which I'm
> > highly supportive of, but which definitely encourages more distinctive
> PKIs
> > (i.e. more explicitly reducing the use of Web PKI in non-Web cases)
> >
> > Of course, AIA is also valuable in helping browsers push the web forward,
> > so I can see why "considered harmful" is useful, especially in that it
> > helps further the notion that root certificates are a thing of value (and
> > whose value should increase with age). AIA is one of the key tools to
> > helping prevent that, which we know is key to ensuring a more flexible,
> and
> > agile, ecosystem.
> >
> > The flaw, of course, in a "considered harmful", is the notion that
> there's
> > One Chain or One Right Chain. That's not the world we have, nor have we
> > ever. The notion that there's One Right Chain for a TLS server to send
> > presumes there's One Right Set of CA Trust Anchors. And while that's
> > definitely a world we could pursue, I think we know from the past history
> > of CA incidents, there's incredible benefit to users to being able to
> > respond to CA security incidents differently, to remove trust in
> > deprecated/insecure things differently, and to set policies differently.
> > And so we can't expect servers to know the Right Chain because there
> isn't
> > One Right Chain, and AIA (or intermediate preloading with rapid updates)
> > can help address that.
> >
> > On Wed, Dec 4, 2019 at 5:02 PM Tim Hollebeek via dev-security-policy <
> > dev-security-policy@lists.mozilla.org> wrote:
> >
> > > Someone really should write up "AIA chasing considered harmful".  It
> was
> > > disputed at the TLS session at IETF 105, which shows that the reasoning
> > > behind it is not as widely understood as it needs to be, even among TLS
> > > experts.
> > >
> > > I'm very appreciative of Firefox's efforts in this area.  Leveraging
> the
> > > knowledge of all the publicly disclosed ICAs to improve chain-building
> is
> > > an
> > > idea whose time has come.
> > >
> > > -Tim
> > >
> > > > -Original Message-
> > > > From: dev-security-policy <
> > dev-security-policy-boun...@lists.mozilla.org
> > > >
> > > On
> > > > Behalf Of Wayne Thayer via dev-security-policy
> > > > Sent: Monday, December 2, 2019 3:29 PM
> > > > To: Ben Laurie 
> > > > Cc: mozilla-dev-security-policy
> > > ;
> > > > Peter Gutmann 
> > > > Subject: Re: [FORGED] Re: How Certificates are Verified by Firefox
> > > >
> > > > Why not "AIA chasing considered harmful"? The current state of
> affairs
> > is
> > > that
> > > > most browsers [other than Firefox] will go and fetch the intermediate
> > if
> > > it's not
> > > > cached. This manifests itself as sites not working in Firefox, and
> > users
> > > switching
> > > > to other browsers.
> > > >
> > > > You may be further dismayed to learn that Firefox will soon implement
> > > > intermediate preloading [1] as a privacy-preserving alternative to
> AIA
> > > chasing.
> > > >
> > > > - Wayne
> > > >
> > > > [1]
> > > >
> > >
> >
> https://wiki.mozilla.org/Security/CryptoEngineering/Intermediate_Preloading
> > > > #Intermediate_CA_Preloading
> > > >
> > > > On Thu, Nov 28, 2019 at 1:39 PM Ben Laurie  wrote:
> > > >
> > > > >
> > > > >
> > > > > On Thu, 28 Nov 2019 at 20:22, Peter Gutmann
> > > > > 
> > > > > wrote:
> > > > >
> > > > >> Ben Laurie via dev-security-policy
> > > > >> 
> > > > >> writes:
> > > > >>
> > > > >> >In short: caching considered harmful.
> > > > >>
> > > > >> Or "cacheing considered necessary to make things work"?
> > > > >
> > > > >
> > > > > If you happen to visit a bazillion sites a day.
> > > > >
> > > > >
> > > > >> In particular:
> > > > >>
> > > > >> >caching them and filling in

Re: [FORGED] Re: How Certificates are Verified by Firefox

2019-12-04 Thread Matthew Hardeman via dev-security-policy
Not that anyone is presently doing or would do such a thing, but...

Imagine a CA that wanted to offer up a user/browser tracking service to
their subscriber customer.

Is there any rule that prevents an issuing CA from having a "custom"
(hiding an identifier for the end-entity certificate) AIA URL?  Such that
when the browser AIA chases, it's disclosing the fact of the AIA chase as
well as a user's IP address (and possibly some browser details) to the CA?
One could easily do it with wildcard DNS and a per-end-entity cert host
label for the AIA distribution point.


On Wed, Dec 4, 2019 at 4:13 PM Ryan Sleevi via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> Yes, I am one of the ones who actively disputes the notion that AIA
> considered harmful.
>
> I'm (plesantly) surprised that any CA would be opposed to AIA (i.e.
> supportive of "considered harmful", since it's inherently what gives them
> the flexibility to make their many design mistakes in their PKI and still
> have certificates work. The only way "considered harmful" would work is if
> we actively remove the flexibility afforded CAs in this realm, which I'm
> highly supportive of, but which definitely encourages more distinctive PKIs
> (i.e. more explicitly reducing the use of Web PKI in non-Web cases)
>
> Of course, AIA is also valuable in helping browsers push the web forward,
> so I can see why "considered harmful" is useful, especially in that it
> helps further the notion that root certificates are a thing of value (and
> whose value should increase with age). AIA is one of the key tools to
> helping prevent that, which we know is key to ensuring a more flexible, and
> agile, ecosystem.
>
> The flaw, of course, in a "considered harmful", is the notion that there's
> One Chain or One Right Chain. That's not the world we have, nor have we
> ever. The notion that there's One Right Chain for a TLS server to send
> presumes there's One Right Set of CA Trust Anchors. And while that's
> definitely a world we could pursue, I think we know from the past history
> of CA incidents, there's incredible benefit to users to being able to
> respond to CA security incidents differently, to remove trust in
> deprecated/insecure things differently, and to set policies differently.
> And so we can't expect servers to know the Right Chain because there isn't
> One Right Chain, and AIA (or intermediate preloading with rapid updates)
> can help address that.
>
> On Wed, Dec 4, 2019 at 5:02 PM Tim Hollebeek via dev-security-policy <
> dev-security-policy@lists.mozilla.org> wrote:
>
> > Someone really should write up "AIA chasing considered harmful".  It was
> > disputed at the TLS session at IETF 105, which shows that the reasoning
> > behind it is not as widely understood as it needs to be, even among TLS
> > experts.
> >
> > I'm very appreciative of Firefox's efforts in this area.  Leveraging the
> > knowledge of all the publicly disclosed ICAs to improve chain-building is
> > an
> > idea whose time has come.
> >
> > -Tim
> >
> > > -Original Message-
> > > From: dev-security-policy <
> dev-security-policy-boun...@lists.mozilla.org
> > >
> > On
> > > Behalf Of Wayne Thayer via dev-security-policy
> > > Sent: Monday, December 2, 2019 3:29 PM
> > > To: Ben Laurie 
> > > Cc: mozilla-dev-security-policy
> > ;
> > > Peter Gutmann 
> > > Subject: Re: [FORGED] Re: How Certificates are Verified by Firefox
> > >
> > > Why not "AIA chasing considered harmful"? The current state of affairs
> is
> > that
> > > most browsers [other than Firefox] will go and fetch the intermediate
> if
> > it's not
> > > cached. This manifests itself as sites not working in Firefox, and
> users
> > switching
> > > to other browsers.
> > >
> > > You may be further dismayed to learn that Firefox will soon implement
> > > intermediate preloading [1] as a privacy-preserving alternative to AIA
> > chasing.
> > >
> > > - Wayne
> > >
> > > [1]
> > >
> >
> https://wiki.mozilla.org/Security/CryptoEngineering/Intermediate_Preloading
> > > #Intermediate_CA_Preloading
> > >
> > > On Thu, Nov 28, 2019 at 1:39 PM Ben Laurie  wrote:
> > >
> > > >
> > > >
> > > > On Thu, 28 Nov 2019 at 20:22, Peter Gutmann
> > > > 
> > > > wrote:
> > > >
> > > >> Ben Laurie via dev-security-policy
> > > >> 
> > > >> writes:
> > > >>
> > > >> >In short: caching considered harmful.
> > > >>
> > > >> Or "cacheing considered necessary to make things work"?
> > > >
> > > >
> > > > If you happen to visit a bazillion sites a day.
> > > >
> > > >
> > > >> In particular:
> > > >>
> > > >> >caching them and filling in missing ones means that failure to
> > > >> >present correct cert chains is common behaviour.
> > > >>
> > > >> Which came first?  Was cacheing a response to broken chains or
> broken
> > > >> chains a response to cacheing?
> > > >>
> > > >> Just trying to sort out cause and effect.
> > > >>
> > > >
> > > > Pretty sure if broken chains caused browsers to not show pages, then
> > > > there woul

Re: [FORGED] Re: How Certificates are Verified by Firefox

2019-12-04 Thread Ryan Sleevi via dev-security-policy
Yes, I am one of the ones who actively disputes the notion that AIA
considered harmful.

I'm (plesantly) surprised that any CA would be opposed to AIA (i.e.
supportive of "considered harmful", since it's inherently what gives them
the flexibility to make their many design mistakes in their PKI and still
have certificates work. The only way "considered harmful" would work is if
we actively remove the flexibility afforded CAs in this realm, which I'm
highly supportive of, but which definitely encourages more distinctive PKIs
(i.e. more explicitly reducing the use of Web PKI in non-Web cases)

Of course, AIA is also valuable in helping browsers push the web forward,
so I can see why "considered harmful" is useful, especially in that it
helps further the notion that root certificates are a thing of value (and
whose value should increase with age). AIA is one of the key tools to
helping prevent that, which we know is key to ensuring a more flexible, and
agile, ecosystem.

The flaw, of course, in a "considered harmful", is the notion that there's
One Chain or One Right Chain. That's not the world we have, nor have we
ever. The notion that there's One Right Chain for a TLS server to send
presumes there's One Right Set of CA Trust Anchors. And while that's
definitely a world we could pursue, I think we know from the past history
of CA incidents, there's incredible benefit to users to being able to
respond to CA security incidents differently, to remove trust in
deprecated/insecure things differently, and to set policies differently.
And so we can't expect servers to know the Right Chain because there isn't
One Right Chain, and AIA (or intermediate preloading with rapid updates)
can help address that.

On Wed, Dec 4, 2019 at 5:02 PM Tim Hollebeek via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> Someone really should write up "AIA chasing considered harmful".  It was
> disputed at the TLS session at IETF 105, which shows that the reasoning
> behind it is not as widely understood as it needs to be, even among TLS
> experts.
>
> I'm very appreciative of Firefox's efforts in this area.  Leveraging the
> knowledge of all the publicly disclosed ICAs to improve chain-building is
> an
> idea whose time has come.
>
> -Tim
>
> > -Original Message-
> > From: dev-security-policy  >
> On
> > Behalf Of Wayne Thayer via dev-security-policy
> > Sent: Monday, December 2, 2019 3:29 PM
> > To: Ben Laurie 
> > Cc: mozilla-dev-security-policy
> ;
> > Peter Gutmann 
> > Subject: Re: [FORGED] Re: How Certificates are Verified by Firefox
> >
> > Why not "AIA chasing considered harmful"? The current state of affairs is
> that
> > most browsers [other than Firefox] will go and fetch the intermediate if
> it's not
> > cached. This manifests itself as sites not working in Firefox, and users
> switching
> > to other browsers.
> >
> > You may be further dismayed to learn that Firefox will soon implement
> > intermediate preloading [1] as a privacy-preserving alternative to AIA
> chasing.
> >
> > - Wayne
> >
> > [1]
> >
> https://wiki.mozilla.org/Security/CryptoEngineering/Intermediate_Preloading
> > #Intermediate_CA_Preloading
> >
> > On Thu, Nov 28, 2019 at 1:39 PM Ben Laurie  wrote:
> >
> > >
> > >
> > > On Thu, 28 Nov 2019 at 20:22, Peter Gutmann
> > > 
> > > wrote:
> > >
> > >> Ben Laurie via dev-security-policy
> > >> 
> > >> writes:
> > >>
> > >> >In short: caching considered harmful.
> > >>
> > >> Or "cacheing considered necessary to make things work"?
> > >
> > >
> > > If you happen to visit a bazillion sites a day.
> > >
> > >
> > >> In particular:
> > >>
> > >> >caching them and filling in missing ones means that failure to
> > >> >present correct cert chains is common behaviour.
> > >>
> > >> Which came first?  Was cacheing a response to broken chains or broken
> > >> chains a response to cacheing?
> > >>
> > >> Just trying to sort out cause and effect.
> > >>
> > >
> > > Pretty sure if broken chains caused browsers to not show pages, then
> > > there wouldn't be broken chains.
> > >
> > > --
> > > I am hiring! Formal methods, UX, SWE ... verified s/w and h/w.
> > > #VerifyAllTheThings.
> > >
> > > https://g.co/u58vjr https://g.co/adjusu *(Google internal)*
> > >
> > ___
> > dev-security-policy mailing list
> > dev-security-policy@lists.mozilla.org
> > https://lists.mozilla.org/listinfo/dev-security-policy
>
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: [FORGED] Re: How Certificates are Verified by Firefox

2019-12-04 Thread Tim Hollebeek via dev-security-policy
Someone really should write up "AIA chasing considered harmful".  It was
disputed at the TLS session at IETF 105, which shows that the reasoning
behind it is not as widely understood as it needs to be, even among TLS
experts.

I'm very appreciative of Firefox's efforts in this area.  Leveraging the
knowledge of all the publicly disclosed ICAs to improve chain-building is an
idea whose time has come.

-Tim

> -Original Message-
> From: dev-security-policy 
On
> Behalf Of Wayne Thayer via dev-security-policy
> Sent: Monday, December 2, 2019 3:29 PM
> To: Ben Laurie 
> Cc: mozilla-dev-security-policy
;
> Peter Gutmann 
> Subject: Re: [FORGED] Re: How Certificates are Verified by Firefox
> 
> Why not "AIA chasing considered harmful"? The current state of affairs is
that
> most browsers [other than Firefox] will go and fetch the intermediate if
it's not
> cached. This manifests itself as sites not working in Firefox, and users
switching
> to other browsers.
> 
> You may be further dismayed to learn that Firefox will soon implement
> intermediate preloading [1] as a privacy-preserving alternative to AIA
chasing.
> 
> - Wayne
> 
> [1]
>
https://wiki.mozilla.org/Security/CryptoEngineering/Intermediate_Preloading
> #Intermediate_CA_Preloading
> 
> On Thu, Nov 28, 2019 at 1:39 PM Ben Laurie  wrote:
> 
> >
> >
> > On Thu, 28 Nov 2019 at 20:22, Peter Gutmann
> > 
> > wrote:
> >
> >> Ben Laurie via dev-security-policy
> >> 
> >> writes:
> >>
> >> >In short: caching considered harmful.
> >>
> >> Or "cacheing considered necessary to make things work"?
> >
> >
> > If you happen to visit a bazillion sites a day.
> >
> >
> >> In particular:
> >>
> >> >caching them and filling in missing ones means that failure to
> >> >present correct cert chains is common behaviour.
> >>
> >> Which came first?  Was cacheing a response to broken chains or broken
> >> chains a response to cacheing?
> >>
> >> Just trying to sort out cause and effect.
> >>
> >
> > Pretty sure if broken chains caused browsers to not show pages, then
> > there wouldn't be broken chains.
> >
> > --
> > I am hiring! Formal methods, UX, SWE ... verified s/w and h/w.
> > #VerifyAllTheThings.
> >
> > https://g.co/u58vjr https://g.co/adjusu *(Google internal)*
> >
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy



smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Proposal: Add section 5.1 to the Common CCADB Policy

2019-12-04 Thread Kathleen Wilson via dev-security-policy

All,

Section 5.1 has been added to the CCADB Policy.

https://www.ccadb.org/policy#51-audit-statement-content

Please let me know if you see any problems with the addition.

Thanks,
Kathleen

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy