Re: Policy 2.5 Proposal: Add definition of "mis-issuance"

2017-06-01 Thread Matthew Hardeman via dev-security-policy
On Thursday, June 1, 2017 at 8:03:33 AM UTC-5, Gervase Markham wrote: > > My point is not that we are entirely indifferent to such problems, but > that perhaps the category of "mis-issuance" is the wrong one for such > errors. I guess it depends what we mean by "mis-issuance" - which is the > ent

On remedies for CAs behaving badly

2017-06-05 Thread Matthew Hardeman via dev-security-policy
Hi all, I thought it prudent in light of the recent response from Symantec regarding the Google Chrome proposal for remediation to raise the question of the possible remedies the community and the root programs have against a CA behaving badly (mis-issuances, etc.) Symantec makes a number of c

Re: Symantec response to Google proposal

2017-06-06 Thread Matthew Hardeman via dev-security-policy
I broadly echo many of the comments and thoughts of Martin Heaps earlier in this thread. Much of Symantec's response is disheartening, especially in the "inaccuracies": (the apparent dichotomy between how they have acted and their statement that they only employ the best people implementing bes

Re: Symantec response to Google proposal

2017-06-06 Thread Matthew Hardeman via dev-security-policy
On Tuesday, June 6, 2017 at 9:03:29 AM UTC-5, Gervase Markham wrote: > I'm slightly surprised to see no engagement here. Perhaps it would be > help to break it down. Symantec's specific requests for modification are > as follows (my interpretation): > > 1) Scope of Distrust > > Google proposal:

Re: New undisclosed intermediates

2017-06-06 Thread Matthew Hardeman via dev-security-policy
On Tuesday, June 6, 2017 at 4:14:00 AM UTC-5, Gervase Markham wrote: > On 05/06/17 14:29, Alex Gaynor wrote: > > As I've expressed before, I find it baffling that this still happens. > > I am also disappointed. I have half a mind to keep track of how often > this happens per CA, and impose a manda

Re: On remedies for CAs behaving badly

2017-06-06 Thread Matthew Hardeman via dev-security-policy
On Monday, June 5, 2017 at 11:17:17 AM UTC-5, Ryan Sleevi wrote: > While on paper the idea sounds quite good, it turns out to simply trade > technical complexity for complexity of the non-technical sort. As such, > it's best to focus on meaningful and actionable technical solutions. Ryan, I grea

Re: New undisclosed intermediates

2017-06-07 Thread Matthew Hardeman via dev-security-policy
On Wednesday, June 7, 2017 at 6:45:25 PM UTC-5, Jonathan Rudenberg wrote: > Yet another batch of undisclosed intermediates has shown up in CT: > > - > https://crt.sh/?sha256=f01c1aca392882af152e9f01ecccd0afddd8aa35bf895b003198b1e8c752ddb8 > - > https://crt.sh/?sha256=29d8ac29f9007a6ad7923fdade3

Re: New undisclosed intermediates

2017-06-08 Thread Matthew Hardeman via dev-security-policy
On Thursday, June 8, 2017 at 7:44:08 PM UTC-5, Ben Wilson wrote: > I don't believe that disclosure of root certificates is the responsibility > of a CA that has cross-certified a key. For instance, the CCADB interface > talks in terms of "Intermediate CAs". Root CAs are the responsibility of > br

Re: New undisclosed intermediates

2017-06-09 Thread Matthew Hardeman via dev-security-policy
For these self-signed roots which have a certificate subject and key which match to a different certificate which is in a trusted path (like an intermediate to a trusted root), the concern is that the mere existence of the certificate speaks to a signature produced by a private key which DOES ha

Re: New undisclosed intermediates

2017-06-09 Thread Matthew Hardeman via dev-security-policy
On Friday, June 9, 2017 at 11:52:53 AM UTC-5, Ryan Sleevi wrote: > So that would be an arguement for disclosing both self-signed and > self-issued certificates, and align with the "Disclose what the key does" > mentality. That was essentially the point I was trying to make. Of all the things to

Re: Private key corresponding to public key in trusted Cisco certificate embedded in executable

2017-06-19 Thread Matthew Hardeman via dev-security-policy
I wonder if the device intercepts DNS queries within the LAN for that address and substitutes in the IP of the appliance instead of 127.0.0.1. Is it often deployed as the customer premise NAT/router in addition to serving video purposes? I'm thinking they probably wanted some other devices or

Re: Private key corresponding to public key in trusted Cisco certificate embedded in executable

2017-06-19 Thread Matthew Hardeman via dev-security-policy
On Monday, June 19, 2017 at 11:40:22 PM UTC-5, Tom Ritter wrote: > So at what point does the CA become culpable to misissuance in a case > like this? Is it okay that we let them turn a blind eye to issuing or > reissuing certificates where they have a strong reason to believe the > private key will

Re: When are public applications embedding certificates pointing to 127.0.0.1 OK?

2017-06-20 Thread Matthew Hardeman via dev-security-policy
On Tuesday, June 20, 2017 at 2:15:57 PM UTC-5, annie nguyen wrote: > Dropbox, GitHub, Spotify and Discord (among others) have done the same > thing for years: they embed SSL certificates and private keys into their > applications so that, for example, open.spotify.com can talk to a local > instanc

Re: When are public applications embedding certificates pointing to 127.0.0.1 OK?

2017-06-21 Thread Matthew Hardeman via dev-security-policy
On Wednesday, June 21, 2017 at 1:43:18 AM UTC-5, jacob.hoff...@gmail.com wrote: > > It's been an on-going question for me, since the use case (as a software > > developer) is quite real: if you serve a site over HTTPS and it needs to > > communicate with a local client application then you need thi

Re: When are public applications embedding certificates pointing to 127.0.0.1 OK?

2017-06-21 Thread Matthew Hardeman via dev-security-policy
On Wednesday, June 21, 2017 at 4:59:01 AM UTC-5, Ryan Sleevi wrote: > > There are several distinct issues: > 127.0.0.0/8 (and the associated IPv6 reservations ::1/128) > "localhost" (as a single host) > "localhost" (as a TLD) > > The issues with localhost are (briefly) caught in > https://tools.

On GitHub, Leaked Keys, and getting practical about revocation

2017-06-21 Thread Matthew Hardeman via dev-security-policy
Hi all, I'm sure questions of certificates leaked to the public via GitHub and other file sharing / code sharing / deployment repository hosting and sharing sites have come up before, but last night I spent a couple of hours constructing various search criteria which I don't think were even esp

Re: When are public applications embedding certificates pointing to 127.0.0.1 OK?

2017-06-21 Thread Matthew Hardeman via dev-security-policy
On Wednesday, June 21, 2017 at 12:41:53 PM UTC-5, andre...@gmail.com wrote: > I feel like this is getting sort of off-topic. Web pages can communicate > directly with applications on the local machine regardless of whether they > abuse certificates in this way or not. (Such as, for example, by u

Regarding CA requirements as to technical infrastructure utilized in automated domain validations, etc. (if any)

2017-07-17 Thread Matthew Hardeman via dev-security-policy
Hi all, I was just reading through the baseline requirements -- specifically 3.2.2.4 and its children -- and noted that while there are particular standards as to the blessed methods of validation of authority & control for domain names (and host names within domain names), there is nothing spe

Re: Regarding CA requirements as to technical infrastructure utilized in automated domain validations, etc. (if any)

2017-07-18 Thread Matthew Hardeman via dev-security-policy
> Yes, however I don't think Matthew's concern was about systems owned by the > CA but rather systems proximate to them in the network. For example if the CA > purchases Internet service from a single local Internet Service Provider, the > BRs obviously don't require that this ISP have all the s

Re: Regarding CA requirements as to technical infrastructure utilized in automated domain validations, etc. (if any)

2017-07-20 Thread Matthew Hardeman via dev-security-policy
On Thursday, July 20, 2017 at 9:39:40 AM UTC-5, Gervase Markham wrote: > Your point, in the abstract, is a reasonable one, but so is your further > point about trade-offs. The only way we can really make progress is for > you to propose specific changes to the language, and we can then discuss > t

Re: Regarding CA requirements as to technical infrastructure utilized in automated domain validations, etc. (if any)

2017-07-20 Thread Matthew Hardeman via dev-security-policy
One (Hypothetical) Concrete Example of a Practical DNS Validation Attack: (Author's note: I've chosen for this example to utilize the Let's Encrypt CA as the Certificate Authority involved and I have chosen as a target for improper validation the domain eff.org. Neither of these is in any way

Re: Regarding CA requirements as to technical infrastructure utilized in automated domain validations, etc. (if any)

2017-07-20 Thread Matthew Hardeman via dev-security-policy
On Thursday, July 20, 2017 at 8:13:23 PM UTC-5, Nick Lamb wrote: > On Friday, 21 July 2017 01:13:15 UTC+1, Matthew Hardeman wrote: > > As easily as that, one could definitely get a certificate issued without > > breaking most of the internet, without leaving much of a trace, and without > > fai

Re: Regarding CA requirements as to technical infrastructure utilized in automated domain validations, etc. (if any)

2017-07-20 Thread Matthew Hardeman via dev-security-policy
On Thursday, July 20, 2017 at 3:32:29 PM UTC-5, Ryan Sleevi wrote: > Broadly, yes, but there's unfortunately a shade of IP issues that make it > more difficult to contribute as directly as Gerv proposed. Gerv may accept > any changes to the Mozilla side, but if the goal is to modify the Baseline >

Re: Regarding CA requirements as to technical infrastructure utilized in automated domain validations, etc. (if any)

2017-07-21 Thread Matthew Hardeman via dev-security-policy
It seems that a group of Princeton researchers just presented a live theoretical* misissuance by Let's Encrypt. They did a sub-prefix hijack via a technique other than those I described here and achieved issuance while passing-through traffic for other destination within the IP space of the hij

Re: Regarding CA requirements as to technical infrastructure utilized in automated domain validations, etc. (if any)

2017-07-24 Thread Matthew Hardeman via dev-security-policy
On Monday, July 24, 2017 at 2:49:20 AM UTC-5, Gervase Markham wrote: > On 20/07/17 21:31, Ryan Sleevi wrote: > > Broadly, yes, but there's unfortunately a shade of IP issues that make it > > more difficult to contribute as directly as Gerv proposed. Gerv may accept > > any changes to the Mozilla si

Re: Regarding CA requirements as to technical infrastructure utilized in automated domain validations, etc. (if any)

2017-07-25 Thread Matthew Hardeman via dev-security-policy
On Tuesday, July 25, 2017 at 1:00:39 PM UTC-5, birg...@princeton.edu wrote: > We have been considering research in this direction. PEERING controls several > ASNs and may let us use them more liberally with some convincing. We also > have the ASN from Princeton that could be used with cooperation

Re: Certificates with invalidly long serial numbers

2017-08-07 Thread Matthew Hardeman via dev-security-policy
It is what it is, I'm sure, but that definition in RFC5280 is rather tortured and leads to ambiguity as to whether or not the leading 0x00 is. In fact, I would say that it is not part of the integer value but rather an explicit sign flag required by the encoding mechanism. Wouldn't it have bee

Re: StartCom cross-signs disclosed by Certinomis

2017-08-07 Thread Matthew Hardeman via dev-security-policy
To play the devil's advocate... If everything is as Mr. Leroy of Certinomis points out, I don't see the problem with the cross-sign. In that version of events, the vast majority of the issues in the new PKI (test certs, etc) had already been revoked and measures put in place to prevent that so

Re: Certificates issued with HTTPS OCSP responder URL (IdenTrust)

2017-08-07 Thread Matthew Hardeman via dev-security-policy
> Do we really want the CA community to be filled with bureaucratic > enforcement of harsh punishments for every slight misstep? This is the > important question that any organization (in this case this community) > needs to ask itself whenever new surveillance abilities make it possible > to cat

Re: Certificates with invalidly long serial numbers

2017-08-07 Thread Matthew Hardeman via dev-security-policy
On Monday, August 7, 2017 at 5:20:13 PM UTC-5, Ryan Sleevi wrote: > This is entirely unnecessary and would present serious stability issues due > to backwards compatibility. > > It may not be appropriate for this thread - discussing specific misissuances > - but there is zero benefit from exten

Re: Certificates with invalidly long serial numbers

2017-08-08 Thread Matthew Hardeman via dev-security-policy
It seems this thread has diverged a bit from its stated purpose, the determination of the question of mis-issuance of a set of certificates which have (possibly) longer than allowed serial numbers. I raised a question as to the history of the selection of the 20 bytes limit for serial numbers a

Re: Misissued certificates

2017-08-10 Thread Matthew Hardeman via dev-security-policy
I don't know whether it was noticed or if it matters to anyone, but I did note that for at least one of these certificates, particularly the one at https://crt.sh/?id=92235996 , that the sole SAN dnsName for the certificate is ev-expired.identrustssl.com. The cert also had a whopping 24 hours o

Re: Misissued certificates

2017-08-10 Thread Matthew Hardeman via dev-security-policy
Similarly, the cert at https://crt.sh/?id=92235998 has SAN dnsName of ev-valid.identrustssl.com It has a normal 2 year validity period. Which again sounds like a certificate administratively created to serve as a test point certificate for the root programs.

Re: Certificates with common names not present in their SANs

2017-08-10 Thread Matthew Hardeman via dev-security-policy
Didn't someone recently float the argument that the native u-label was required by local regulation / custom (in China) to be included and so they stuffed it into the CN? ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https:/

Re: Certificates with less than 64 bits of entropy

2017-08-10 Thread Matthew Hardeman via dev-security-policy
On Thursday, August 10, 2017 at 11:27:53 AM UTC-5, Nick Lamb wrote: > The truth is that there is no positive test for randomness, any work in this > area is going to end up needing a judgement call, so I think inconveniencing > the CAs even a small amount with such a policy change just to make a

Re: 2017.08.10 Let's Encrypt Unicode Normalization Compliance Incident

2017-08-11 Thread Matthew Hardeman via dev-security-policy
I see both sides on this matter. On the one hand, certlint/cablint catches lots of obvious problems, mostly with ridiculous certificate profiles or manual special purpose issuances. Certainly, there's a lot of bad issuance that having it in the blocking path might help with... but... If one

Re: PROCERT issuing certificates with non-random serial numbers

2017-08-17 Thread Matthew Hardeman via dev-security-policy
Just from the posted serial numbers, it looks almost like the high order bits may represent 32 bits of random, which is still far short of the requirement. Perhaps they intended a 48 bit sequential counter after a 32 bit random, or intended a 64 bit random followed by a 16 bit sequential counter

Re: CAA Certificate Problem Report

2017-09-13 Thread Matthew Hardeman via dev-security-policy
I concur in full with Nick Lamb's comments and positions on this matter. There is no reasonable short cut to actually doing the DNSSEC thing if we want to usefully intertwine those technologies at all. There IS significant benefit in enforcing complete DNSSEC validation for (all) the domain val

Re: CAA Certificate Problem Report

2017-09-13 Thread Matthew Hardeman via dev-security-policy
On Tuesday, September 12, 2017 at 5:36:56 AM UTC-5, Gervase Markham wrote: > > As the drafter of the section :-), my intent was to make it so that if a > site owner were concerned about the possibility that their CAA record or > DNS could be spoofed, they could use DNSSEC to solve the problem. I

Re: CAA Certificate Problem Report

2017-09-19 Thread Matthew Hardeman via dev-security-policy
On Tuesday, September 19, 2017 at 8:02:36 AM UTC-5, Gervase Markham wrote: > I'd be interested in your engagement on my brief threat modelling; it > seems to me that DNSSEC only adds value in the scenario where an > attacker has some control of CA Foo's issuance process, but not enough > to overri

Re: CAA Certificate Problem Report

2017-09-19 Thread Matthew Hardeman via dev-security-policy
On Tuesday, September 19, 2017 at 10:37:20 AM UTC-5, Gervase Markham wrote: > On 19/09/17 14:58, Nick Lamb wrote: > > An attacker only has to _prefer_ one particular CA for any reason, > > > Yep, fair. > > Gerv Quite true. In the example scenario that I have just posted, such preference might

Re: Public trust of VISA's CA

2017-09-19 Thread Matthew Hardeman via dev-security-policy
On Tuesday, September 19, 2017 at 10:13:26 AM UTC-5, Gervase Markham wrote: > >From the above, we see that Visa only issues certificates to their own > customers/clients, and not to the public. They believe that this permits > them to keep confidential details of the certificates which they wish t

Re: CAA reporting support and tests?

2017-09-25 Thread Matthew Hardeman via dev-security-policy
Has there been any serious discussion of the potential benefit of CAA reporting for certificate issuance attempts? I'm aware of what the spec says and the SHOULD language, etc... I'm not a CA and don't represent one. I do, however, think that it's easier to get buy-in for changes to CA infrast

Re: PROCERT issues

2017-09-27 Thread Matthew Hardeman via dev-security-policy
On Wednesday, September 27, 2017 at 11:56:27 AM UTC-5, Kathleen Wilson wrote: > What action items do you all think PROCERT should complete before they can be > re-included in Mozilla's root store? > What do you think should happen if PROCERT completes those action items > before their PSCProcer

Re: PROCERT issues

2017-09-28 Thread Matthew Hardeman via dev-security-policy
On Thu, Sep 28, 2017 at 11:50 AM, Gervase Markham wrote: > > The nature of trust is that it's harder to regain than it is to gain in > the first place. Just ask someone who's been the victim of adultery - or > someone who is a now-repentant adulterer. Rightly or wrongly, people get > a first chan

Re: Proposed change to CA contact policy

2017-10-09 Thread Matthew Hardeman via dev-security-policy
On Monday, October 9, 2017 at 8:33:39 AM UTC-7, Nick Lamb wrote: > One nice thing about the current situation is that CAs are permitted (though > not obliged) to arrange robustness against technical failure. > > If the only official way to contact Honest Achmed's CA is to email > achmed@honestc

Re: RSA key generation vulnerability in Infineon firmware

2017-10-16 Thread Matthew Hardeman via dev-security-policy
This is an interesting one. The same researchers also published some spooky research last year in which they're able to fingerprint an RSA public key and determine the probability that a given library or device generated the key pair. Which is scary. If they're able to reliably fingerprint tha

Efficient test for weak RSA keys generated in Infineon TPMs / smartcards

2017-10-16 Thread Matthew Hardeman via dev-security-policy
The authors of the paper on the weak RSA keys generated by Infineon TPMs and smart cards have published code in multiple languages / platforms that provide for an efficient test for weakness by way of the Infineon TPM bug. Perhaps this should be a category of issue identified by the crt.sh engin

Re: ROCA fingerprints found on crt.sh (was Re: Efficient test for weak RSA keys generated in Infineon TPMs / smartcards)

2017-10-18 Thread Matthew Hardeman via dev-security-policy
On Wednesday, October 18, 2017 at 4:15:03 AM UTC-5, Rob Stradling wrote: > The list is at https://misissued.com/batch/28/ > > Many of these are Qualified/EUTL certs rather than anything to do with > the WebPKI. Only about half of them chain to roots that are trusted by NSS. > It's really inte

Re: Incident Report : GoDaddy certificates with ROCA Fingerprint

2017-10-27 Thread Matthew Hardeman via dev-security-policy
I can not help but notice that the host names of the certificates involved rather strongly suggest that a series of device or embedded server is creating these CSRs / utilizing these certificates. As you mentioned, some users subsequently requested certs for the same keys already previously uti

Re: Possible future re-application from WoSign (now WoTrus)

2017-11-22 Thread Matthew Hardeman via dev-security-policy
Hi, I touched on my thoughts on this matter a bit before. This is really about trust. I think several factors must be weighed here: 1. Is "trust" really required of a CA in a soon-to-be post-mandatory-CT-log world? If some level of trust is required, then: 2. Can we say that the QiHoo 360 /

Re: Possible future re-application from WoSign (now WoTrus)

2017-11-22 Thread Matthew Hardeman via dev-security-policy
I think Ryan's commentary reflects, again, that the discussion here seems to be about trust. In that spirit, I put forth some questions of hypotheticals to provoke further contemplation and discussion: 1. Presume that QiHoo 360 / WoTrus / WoTrust / StartCom actually purchased one of the small bu

Re: Possible future re-application from WoSign (now WoTrus)

2017-11-22 Thread Matthew Hardeman via dev-security-policy
On Wed, Nov 22, 2017 at 12:00 PM, Ryan Sleevi wrote: > > Given that WoSign's CP/CPS itself was met by standard boilerplate, I would > pose that it is insufficient - the past behaviour as a predictor of future > behaviour means that the existing documentation approaches are insufficient > to make

Re: Possible future re-application from WoSign (now WoTrus)

2017-11-22 Thread Matthew Hardeman via dev-security-policy
In defense of WoSign/WoTrus/StartCom's parent company, QiHoo 360... While I don't personally attach a great value to the ethics of the owning entity of the CA/proposed CA, for those who do or would attach such importance, I would like to point out that the various vulnerabilities and security rese

Re: Possible future re-application from WoSign (now WoTrus)

2017-11-22 Thread Matthew Hardeman via dev-security-policy
On Wed, Nov 22, 2017 at 3:34 PM, Nick Lamb via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > > I don't see any reason why we would want to take that risk. > > It's not easy to spin up a new CA, but it's also not rocket surgery. > Why should we prefer to re-admit a previousl

Re: Possible future re-application from WoSign (now WoTrus)

2017-11-24 Thread Matthew Hardeman via dev-security-policy
On Friday, November 24, 2017 at 6:07:44 AM UTC-6, Gervase Markham wrote: > While I do not want to make this discussion entirely about specific > people, as Mozilla's investigator of the issues at the time I am > satisfied that WoSign's actions at the time were taken with full > knowledge - that is

Re: Possible future re-application from WoSign (now WoTrus)

2017-11-24 Thread Matthew Hardeman via dev-security-policy
On Friday, November 24, 2017 at 5:36:20 PM UTC-6, Tom wrote: > For information, WoSign/WoTrus can already sells WoSign-branded EV > certificates accepted by major trusts stores, Mozilla's included. > > The intermediate certificate "WoSign EV SSL Pro CA" ( > https://crt.sh/?id=146206939 ) is sig

Re: Possible future re-application from WoSign (now WoTrus)

2017-11-27 Thread Matthew Hardeman via dev-security-policy
The position that WoTrus (and apparently QiHoo 360) take(s) here does seem to clarify a matter involving the reinclusion. It sounds like they are insisting that Richard Wang would be part of the plan and would, in fact, retain a position of material control and responsibility in the post-reinclusi

Re: Possible future re-application from WoSign (now WoTrus)

2017-11-28 Thread Matthew Hardeman via dev-security-policy
On Mon, Nov 27, 2017 at 3:07 PM, adisor19--- via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > > After seeing the forced shutdown of StartCom, I see no reason to allow > them back in. Richard Wang is back in his role as CEO and everything is > back to square one except all

Fwd: CA generated keys

2017-12-11 Thread Matthew Hardeman via dev-security-policy
The (I believe) meritorious point that Mr. Hollebeek raises mainly pertains to embedded devices. As the IoT craze heats up, I keep seeing platforms ship with unfinished OS stacks, missing drivers, etc. A lot of hardware in the field is shipping with decent dedicated entropy sources on board coupl

Re: On the value of EV

2017-12-11 Thread Matthew Hardeman via dev-security-policy
That's not clear at all. Someone other than the famous Stripe, Inc. has -- without violating BR rules or requirements -- a proper EV certificate showing (correctly) entity name Stripe, Inc. That this exists suggests that EV is harmful if the target is normal everyday people. Making the abstract

Fwd: On the value of EV

2017-12-11 Thread Matthew Hardeman via dev-security-policy
(Reposting as I accidentally replied directly to OP ). Part of this discussion will necessarily have to include who the intended and potential beneficiaries of EV certificate status are: 1. Is it the common web end user? If so, EV either needs to go or be massively changed. 2. Is it for the ki

Re: On the value of EV

2017-12-11 Thread Matthew Hardeman via dev-security-policy
On Mon, Dec 11, 2017 at 1:37 PM, Ryan Sleevi wrote: > > > On Mon, Dec 11, 2017 at 2:31 PM, Matthew Hardeman via dev-security-policy > wrote: > >> (Reposting as I accidentally replied directly to OP ). >> >> Part of this discussion will necessarily have t

Re: On the value of EV

2017-12-11 Thread Matthew Hardeman via dev-security-policy
The question that I have is whether the community might consider it in-scope to discuss enhancements (even fixes) to EV to arrive at assurance commensurate to its handling. Matt Hardeman On Mon, Dec 11, 2017 at 2:09 PM, Ryan Sleevi via dev-security-policy < dev-security-policy@lists.mozilla.org>

Re: On the value of EV

2017-12-11 Thread Matthew Hardeman via dev-security-policy
roken web security frameworks of the past. Now that both me and Ian > have demonstrated the fundamental issues with EV and the way its displayed > in the UI, it's only time until the REAL phishing starts with EV. > > James > > On Mon, Dec 11, 2017 at 8:29 PM, Matthew Hardeman

Re: On the value of EV

2017-12-11 Thread Matthew Hardeman via dev-security-policy
- If the fundamental certificate does deserve the UI treatment, then > demonstrate why it does. You seem to be in agreement that the present form > of legal identity is insufficient for the presumed use case, so I'm hoping > you can close the gap in my understanding on why something is > simultaneo

Re: On the value of EV

2017-12-11 Thread Matthew Hardeman via dev-security-policy
On Mon, Dec 11, 2017 at 2:53 PM, Ryan Sleevi wrote: > > > It feels like, to some extent, this is a question about whether we should > point out the Emperor has no clothes if we don't have clothes to offer him. > It'd be great if they was wearing some, I agree - the Emperor does need > clothes. But

Re: On the value of EV

2017-12-11 Thread Matthew Hardeman via dev-security-policy
While I understand that it may formally be beyond the scope formally to consider this in discussion with EV UI handling, I think some consideration to ecosystem harm is appropriate here. If we eliminate EV UI, we have reduced the scope of WebPKI to domain validated certificates (in any pragmatic s

Re: On the value of EV

2017-12-11 Thread Matthew Hardeman via dev-security-policy
On Mon, Dec 11, 2017 at 5:03 PM, Ryan Sleevi via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > On Monday, December 11, 2017 at 5:47:50 PM UTC-5, Matthew Hardeman wrote: > > While I understand that it may formally be beyond the scope formally to > > consider this in discussi

Re: On the value of EV

2017-12-11 Thread Matthew Hardeman via dev-security-policy
What I dislike about this particular rationale is that I presupposes we should architect web security such as to avoid enhancements which have value to anyone the least common denominator. Is the average user (actually, the bottom rung of the concentration of values around the average, I suppose)

Re: On the value of EV

2017-12-11 Thread Matthew Hardeman via dev-security-policy
On Monday, December 11, 2017 at 5:00:14 PM UTC-6, Ryan Sleevi wrote: > > That Kentucky registration for Stripe, Inc. -- Is it completely fraudulent > > as to registered agent, business address, etc? If it's not, then the > > certificate and underlying entity serve as an archived investigative ent

Re: On the value of EV

2017-12-11 Thread Matthew Hardeman via dev-security-policy
On Monday, December 11, 2017 at 5:37:34 PM UTC-6, Ryan Sleevi wrote: > Yes. > > If something is not valuable for billions of users, if it is not > trustworthy for billions of users, it should not occupy the cognitive or > visual model billions of users rely on. > Perish the thought that a UI el

Re: CA generated keys

2017-12-13 Thread Matthew Hardeman via dev-security-policy
In principle, I support Mr. Sleevi's position, practically I lean toward Mr. Thayer's and Mr. Hollebeek's position. Sitting on my desk are not less than 3 reference designs. At least two of them have decent hardware RNG capabilities. What's noteworthy is the garbage software stack, kernel suppor

Re: CA generated keys

2017-12-13 Thread Matthew Hardeman via dev-security-policy
> I appreciate your reply, but that seems to be backwards looking rather than > forwards looking. That is, it looks and assumes static-RSA ciphersuites are > acceptable, and thus the entropy risk to TLS is mitigated by client-random > to this terrible TLS-server devices, and the issue to mitigate i

Re: CA generated keys

2017-12-13 Thread Matthew Hardeman via dev-security-policy
> As an unrelated but funny aside, I once heard about a expensive, high > assurance device with a embedded bi-stable circuit for producing high quality > hardware random numbers. As part of a rigorous validation and review process > in order to guarantee product quality, the instability was no

Re: CA generated keys

2017-12-13 Thread Matthew Hardeman via dev-security-policy
On Wednesday, December 13, 2017 at 12:50:38 PM UTC-6, Ryan Sleevi wrote: > On Wed, Dec 13, 2017 at 1:24 PM, Matthew Hardeman > wrote: > > > As I pointed out, it can be demonstrated that quality ECDHE exchanges can > > happen assuming a stateful DPRNG with a decent starting entropy corpus. > > >

Re: On the value of EV

2017-12-13 Thread Matthew Hardeman via dev-security-policy
On Monday, December 11, 2017 at 6:01:25 PM UTC-6, Ryan Sleevi wrote: > > Not really - what matters is that the user insists they got had via a > > phishing link or other process - that can certainly be verified after the > > fact > > > No. Why's that? This is how investigations begin. > > -

Re: On the value of EV

2017-12-13 Thread Matthew Hardeman via dev-security-policy
On Wednesday, December 13, 2017 at 2:46:10 PM UTC-6, Gervase Markham wrote: > My concern with this argument is that it's susceptible to the criticism > that Adam Langley made of revocation checking: > https://www.imperialviolet.org/2012/02/05/crlsets.html > > "So [EV identity is] like a seat-belt

Re: On the value of EV

2017-12-13 Thread Matthew Hardeman via dev-security-policy
On Tuesday, December 12, 2017 at 3:52:40 PM UTC-6, Ryan Sleevi wrote: > Yes. This is the foundation and limit of Web Security. > > https://en.wikipedia.org/wiki/Same-origin_policy > > This is what is programatically enforced. Anything else either requires new > technology to technically enforce

Re: On the value of EV

2017-12-13 Thread Matthew Hardeman via dev-security-policy
On Wednesday, December 13, 2017 at 3:42:38 PM UTC-6, Ryan Sleevi wrote: > > Would Ian have requested a certificate for Stripe, Inc. if his full name > > were also in that certificate? Maybe, maybe not. But anyone investigating > > that certificate would need do no extra work to know what individ

Re: On the value of EV

2017-12-13 Thread Matthew Hardeman via dev-security-policy
On Wednesday, December 13, 2017 at 5:08:05 PM UTC-6, Matt Palmer wrote: > > There is a "curatorship", if you will, engaged by the site author. If > > there are sub-resources loaded in, whether they are EV or not, it is the > > root page author's place to "take responsibility" for the contents of

Re: [FORGED] Re: CA generated keys

2017-12-13 Thread Matthew Hardeman via dev-security-policy
On Wednesday, December 13, 2017 at 5:52:16 PM UTC-6, Peter Gutmann wrote: > >Sitting on my desk are not less than 3 reference designs. At least two of > >them have decent hardware RNG capabilities. > > My code runs on a lot (and I mean a *lot*) of embedded, virtually none of > which has hardwa

Re: On the value of EV

2017-12-13 Thread Matthew Hardeman via dev-security-policy
On Wednesday, December 13, 2017 at 11:09:44 PM UTC-6, Matt Palmer wrote: > > Before that, though, a quick word from our sponsor, Elephant-Be-Gone Amulets > of America, Inc. No elephants in America, you say? See, they're 100% > effective! Get yours today! Of relevance on this point, I'm quite

Beyond EV: Thoughts on trust and actionable trust signals

2017-12-14 Thread Matthew Hardeman via dev-security-policy
All, Recent events and a body of historical research have of late been causing questions among a great many respected security researchers and browser UI guys about the benefits of browser UI signal for EV certificates. I'd like to start a discussion tangent to that ongoing dialogue. Regardless o

Re: On the value of EV

2017-12-14 Thread Matthew Hardeman via dev-security-policy
On Wednesday, December 13, 2017 at 2:46:10 PM UTC-6, Gervase Markham wrote: > My concern with this argument is that it's susceptible to the criticism > that Adam Langley made of revocation checking: > https://www.imperialviolet.org/2012/02/05/crlsets.html > > "So [EV identity is] like a seat-belt

Re: On the value of EV

2017-12-14 Thread Matthew Hardeman via dev-security-policy
On Thursday, December 14, 2017 at 5:50:40 PM UTC-6, Matthew Hardeman wrote: > Route hijacking your way to what would appear as a proper domain validation > is practical for even a modestly resourceful adversary. I suspect that the > only reason more spectacular demonstration of certs issuing pu

Re: On the value of EV

2017-12-14 Thread Matthew Hardeman via dev-security-policy
That attack was by hacking the target's domain registrar account. Others have done that as well, including against a Brazilian bank. The right attacker would not even need that - they could just hijack traffic headed to the IP address of the real DNS server in question.

Investigating validations & issuances - The high value IP space BGP Hijacks on 2017-12-12

2017-12-14 Thread Matthew Hardeman via dev-security-policy
Has anyone started looking into CA issuances -- or even more importantly -- CA domain validations performed successfully and yet without issuing a certificate (say, wanting to cache the validation) for the brief periods in which much of the internet saw alternative target destinations for a grea

Re: Investigating validations & issuances - The high value IP space BGP Hijacks on 2017-12-12

2017-12-15 Thread Matthew Hardeman via dev-security-policy
re requests in the future (where we would > require responses within a certain time period.) > > -tom > > On 14 December 2017 at 22:16, Matthew Hardeman via dev-security-policy > wrote: > > Has anyone started looking into CA issuances -- or even more importantly > -- CA domain

Re: On the value of EV

2017-12-15 Thread Matthew Hardeman via dev-security-policy
On Friday, December 15, 2017 at 8:08:44 AM UTC-6, Ryan Sleevi wrote: > James’ research has showed the ease at which it is possible to use the UI > afforded EV to mislead users - fundamentally, a form of phishing, > exploiting the misunderstanding about what EV is it guarantees. > > Ian’s research

Re: On the value of EV

2017-12-15 Thread Matthew Hardeman via dev-security-policy
On Friday, December 15, 2017 at 1:50:38 PM UTC-6, Ryan Sleevi wrote: > I'm not sure I made those statements, but would be happy to clarify the > confusion. Indeed, as I tried to call out, there are a subset of users who > are looking at it and relying on it - although it cannot be relied upon - >

Re: On the value of EV

2017-12-15 Thread Matthew Hardeman via dev-security-policy
On Friday, December 15, 2017 at 3:08:32 PM UTC-6, Ryan Sleevi wrote: > Respectfully, this is the tiger-repelling rock. We can't show that any > tigers attacked, therefore, we should keep telling users they need > tiger-repelling rocks. And oh, by the way, they take away attention from > solutions

Re: CA generated keys

2017-12-15 Thread Matthew Hardeman via dev-security-policy
On Friday, December 15, 2017 at 3:21:54 PM UTC-6, Ryan Hurst wrote: > Unfortunately, the PKCS#12 format, as supported by UAs and Operating Systems > is not a great candidate for the role of carrying keys anymore. You can see > my blog post on this topic here: http://unmitigatedrisk.com/?p=543 >

<    1   2   3