Re: Possible DigiCert in-addr.arpa Mis-issuance

2019-03-04 Thread Cynthia Revström via dev-security-policy

On 2019-03-04 20:23, Jeremy Rowley via dev-security-policy wrote:


2) Of the 3,000, the only certificate we found where the scope was not set
to be the scope of the WHOIS document was the one reported by Cynthia.


That is good to hear :)

- Cynthia

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: Possible DigiCert in-addr.arpa Mis-issuance

2019-03-04 Thread Jeremy Rowley via dev-security-policy
Technically, the same issue could exist on the system. However, co.uk is
actually blocked as a valid approval address by our system. In-addr.arpa was
not blocked. 

Here's a status update:
1) We identified 3000 certificates where the scope was changed by validation
staff based on a WHOIS document. 
2) Of the 3,000, the only certificate we found where the scope was not set
to be the scope of the WHOIS document was the one reported by Cynthia. 

The next step is to look at why we didn't block in-addr.arpa as an eligible
scope. We generally pull from the PSL, so I need to find out why
in-addr.arpa was not blocked.

Thanks!
Jeremy

-Original Message-
From: dev-security-policy  On
Behalf Of Cynthia Revström via dev-security-policy
Sent: Saturday, March 2, 2019 1:46 AM
To: George Macon 
Cc: mozilla-dev-security-pol...@lists.mozilla.org
Subject: Re: Possible DigiCert in-addr.arpa Mis-issuance

On 2019-03-02 01:49, George Macon via dev-security-policy wrote:

> One specific question on this point: Why did the software permit 
> setting the approval scope to a public suffix (as defined by inclusion 
> on the public suffix list)? Could validation agent action set the 
> approval scope to some other two-label public suffix like co.uk?

I think this is highly unlikely seeing as this was a human error and unlike
in-addr.arpa, people might know about .co.uk.

- Cynthia

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy



smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Possible DigiCert in-addr.arpa Mis-issuance

2019-03-02 Thread Gijs Kruitbosch via dev-security-policy

On 02/03/2019 08:45, Cynthia Revström wrote:

On 2019-03-02 01:49, George Macon via dev-security-policy wrote:


One specific question on this point: Why did the software permit setting
the approval scope to a public suffix (as defined by inclusion on the
public suffix list)? Could validation agent action set the approval
scope to some other two-label public suffix like co.uk?


I think this is highly unlikely seeing as this was a human error and 
unlike in-addr.arpa, people might know about .co.uk.


But the PSL is very large (by human, not machine, standards) and most 
humans will not be familiar with most/all of the entries on the list. 
Note for instance that (most/all of?) AWS is represented in one way or 
another, as are other hosting services that are much less well-known. It 
seems worth checking the PSL automatically, and it's curious that such 
checks were not present or did not prevent/discourage the agent from 
acting as they did.


(Note that I'm not overly familiar with the BR and various other 
guidelines, and under what circumstances issuance to entries in the PSL 
is/isn't permitted, but intuitively it seems like a red flag once we're 
talking about manual (rather than automatically verified) issuance.)


~ Gijs
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Possible DigiCert in-addr.arpa Mis-issuance

2019-03-02 Thread Cynthia Revström via dev-security-policy

On 2019-03-02 01:49, George Macon via dev-security-policy wrote:


One specific question on this point: Why did the software permit setting
the approval scope to a public suffix (as defined by inclusion on the
public suffix list)? Could validation agent action set the approval
scope to some other two-label public suffix like co.uk?


I think this is highly unlikely seeing as this was a human error and 
unlike in-addr.arpa, people might know about .co.uk.


- Cynthia

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Possible DigiCert in-addr.arpa Mis-issuance

2019-03-01 Thread George Macon via dev-security-policy
On 2/28/19 12:52 AM, Jeremy Rowley wrote:
> 4. The validation agent specified the approval scope as id-addr.arpa which is 
> normal for a domain approved by the admin listed in WHOIS. As a constructed 
> email, the approval scope should have been limited to the scope set by the 
> constructed address.

One specific question on this point: Why did the software permit setting
the approval scope to a public suffix (as defined by inclusion on the
public suffix list)? Could validation agent action set the approval
scope to some other two-label public suffix like co.uk?

-George Macon
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: Possible DigiCert in-addr.arpa Mis-issuance

2019-03-01 Thread Jeremy Rowley via dev-security-policy
Thanks Wayne

 

From: Wayne Thayer  
Sent: Friday, March 1, 2019 10:00 AM
To: Jeremy Rowley 
Cc: mozilla-dev-security-policy 
Subject: Re: Possible DigiCert in-addr.arpa Mis-issuance

 

https://bugzilla.mozilla.org/show_bug.cgi?id=1531817 has been created to track 
this issue.

 

On Wed, Feb 27, 2019 at 10:52 PM Jeremy Rowley via dev-security-policy 
mailto:dev-security-policy@lists.mozilla.org> > wrote:

Hi Cynthia, 

We've figured out what happened with your certificate but are still looking at 
whether other certificates were issued using the same process. I don't have 
enough information to file an incident report yet, but I wanted to give you the 
update I promised earlier. 

Basically, here's what happened:
1. A validation agent took an email address provided during a chat session with 
you and set that email as a WHOIS admin email address. This email qualified as 
a constructed email (admin@domain)
2. The system marked the WHOIS as unavailable for automated parsing (generally, 
this happens if we are being throttled or the WHOIS info is behind a CAPTCHA), 
which allows a validation agent to manually upload a WHOIS document
3. The WHOIS document uploaded was a screen capture of WHOIS information that 
did not match the domain being requested but was close enough that the 
mis-match went unnoticed. 
4. The validation agent specified the approval scope as id-addr.arpa which is 
normal for a domain approved by the admin listed in WHOIS. As a constructed 
email, the approval scope should have been limited to the scope set by the 
constructed address.
5. The validation agent specified that the email address listed in WHOIS 
matched the email address provided by you (admin@domain) and sent the email to 
authorize the legit cert
6 . When the validation completed successfully, the validation authorized your 
account for all certificates with the in-addr.arpa domain. This was because the 
scope was improperly set based on the validation agent's improper specification 
of the source of the email address. 
7. During the review, no one noticed that the WHOIS document did not match the 
verification email nor did anyone notice that the email used for verification 
was actually a constructed email instead of the WHOIS admin email.
8. The mis-issued certificate essentially "piggy-backed" on the previous 
verification because of the erroneous approval scope set by the validation 
staff.

Make sense? 

We shut down manual WHOIS verification while we figure out how to improve the 
process and eliminate validation mistakes like this. We'll post another update 
after we figure out how to improve the process and after the data review is 
complete.

Jeremy

-Original Message-
From: dev-security-policy mailto:dev-security-policy-boun...@lists.mozilla.org> > On Behalf Of Cynthia 
Revström via dev-security-policy
Sent: Tuesday, February 26, 2019 4:17 PM
To: Matthew Hardeman mailto:mharde...@gmail.com> >
Cc: dev-security-policy@lists.mozilla.org 
<mailto:dev-security-policy@lists.mozilla.org> ; b...@benjojo.co.uk 
<mailto:b...@benjojo.co.uk> 
Subject: Re: Possible DigiCert in-addr.arpa Mis-issuance

I am not so sure that is proper to have .arpa domains in the SANs.

But I think the larger issue I think is that this might allow for non 
in-addr.arpa domains to be used as well.

It was just that I just tried to get a cert for my domain for a test to see if 
that would be issued.

And upon verifying the domain via email, I saw that on the page linked in the 
email it had an option along the lines of "Authorize in-addr.arpa for all 
orders on account #123456" (not that exact text but the same meaning).

Now I am not sure if this would work, but I suspect if for example I got DNS 
control over cynthia.site.google.com <http://cynthia.site.google.com> , I could 
get a cert for google.com <http://google.com>  if this is a systemic issue and 
not just a one off.

- Cynthia

On 2019-02-27 00:10, Matthew Hardeman wrote:
> Is it even proper to have a SAN dnsName in in-addr.arpa ever?
>
> While in-addr.arpa IS a real DNS heirarchy under the .arpa TLD, it 
> rarely has anything other than PTR and NS records defined.
>
> Here this was clearly achieved by creating a CNAME record for 
> 69.168.110.79.in-addr.arpa pointed to cynthia.re <http://cynthia.re>  
> <http://cynthia.re>.
>
> I've never seen any software or documentation anywhere attempting to 
> utilize a reverse-IP formatted in-addr.arpa address as though it were 
> a normal host name for resolution.  I wonder whether this isn't a case 
> that should just be treated as an invalid domain for purposes of SAN 
> dnsName (like .local).
>
> On Tue, Feb 26, 2019 at 1:05 PM Jeremy Rowley via dev-security-policy 
>  <mailto:dev-security-policy@lists.mozilla.org> 
> <mailto:dev-security-policy@lists.mozilla.

Re: Possible DigiCert in-addr.arpa Mis-issuance

2019-03-01 Thread Wayne Thayer via dev-security-policy
https://bugzilla.mozilla.org/show_bug.cgi?id=1531817 has been created to
track this issue.

On Wed, Feb 27, 2019 at 10:52 PM Jeremy Rowley via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> Hi Cynthia,
>
> We've figured out what happened with your certificate but are still
> looking at whether other certificates were issued using the same process. I
> don't have enough information to file an incident report yet, but I wanted
> to give you the update I promised earlier.
>
> Basically, here's what happened:
> 1. A validation agent took an email address provided during a chat session
> with you and set that email as a WHOIS admin email address. This email
> qualified as a constructed email (admin@domain)
> 2. The system marked the WHOIS as unavailable for automated parsing
> (generally, this happens if we are being throttled or the WHOIS info is
> behind a CAPTCHA), which allows a validation agent to manually upload a
> WHOIS document
> 3. The WHOIS document uploaded was a screen capture of WHOIS information
> that did not match the domain being requested but was close enough that the
> mis-match went unnoticed.
> 4. The validation agent specified the approval scope as id-addr.arpa which
> is normal for a domain approved by the admin listed in WHOIS. As a
> constructed email, the approval scope should have been limited to the scope
> set by the constructed address.
> 5. The validation agent specified that the email address listed in WHOIS
> matched the email address provided by you (admin@domain) and sent the
> email to authorize the legit cert
> 6 . When the validation completed successfully, the validation authorized
> your account for all certificates with the in-addr.arpa domain. This was
> because the scope was improperly set based on the validation agent's
> improper specification of the source of the email address.
> 7. During the review, no one noticed that the WHOIS document did not match
> the verification email nor did anyone notice that the email used for
> verification was actually a constructed email instead of the WHOIS admin
> email.
> 8. The mis-issued certificate essentially "piggy-backed" on the previous
> verification because of the erroneous approval scope set by the validation
> staff.
>
> Make sense?
>
> We shut down manual WHOIS verification while we figure out how to improve
> the process and eliminate validation mistakes like this. We'll post another
> update after we figure out how to improve the process and after the data
> review is complete.
>
> Jeremy
>
> -Original Message-
> From: dev-security-policy 
> On Behalf Of Cynthia Revström via dev-security-policy
> Sent: Tuesday, February 26, 2019 4:17 PM
> To: Matthew Hardeman 
> Cc: dev-security-policy@lists.mozilla.org; b...@benjojo.co.uk
> Subject: Re: Possible DigiCert in-addr.arpa Mis-issuance
>
> I am not so sure that is proper to have .arpa domains in the SANs.
>
> But I think the larger issue I think is that this might allow for non
> in-addr.arpa domains to be used as well.
>
> It was just that I just tried to get a cert for my domain for a test to
> see if that would be issued.
>
> And upon verifying the domain via email, I saw that on the page linked in
> the email it had an option along the lines of "Authorize in-addr.arpa for
> all orders on account #123456" (not that exact text but the same meaning).
>
> Now I am not sure if this would work, but I suspect if for example I got
> DNS control over cynthia.site.google.com, I could get a cert for
> google.com if this is a systemic issue and not just a one off.
>
> - Cynthia
>
> On 2019-02-27 00:10, Matthew Hardeman wrote:
> > Is it even proper to have a SAN dnsName in in-addr.arpa ever?
> >
> > While in-addr.arpa IS a real DNS heirarchy under the .arpa TLD, it
> > rarely has anything other than PTR and NS records defined.
> >
> > Here this was clearly achieved by creating a CNAME record for
> > 69.168.110.79.in-addr.arpa pointed to cynthia.re <http://cynthia.re>.
> >
> > I've never seen any software or documentation anywhere attempting to
> > utilize a reverse-IP formatted in-addr.arpa address as though it were
> > a normal host name for resolution.  I wonder whether this isn't a case
> > that should just be treated as an invalid domain for purposes of SAN
> > dnsName (like .local).
> >
> > On Tue, Feb 26, 2019 at 1:05 PM Jeremy Rowley via dev-security-policy
> >  > <mailto:dev-security-policy@lists.mozilla.org>> wrote:
> >
> > Thanks Cynthia. We are investigating and will report back shortly.
> > 
> > From: dev-

Re: Possible DigiCert in-addr.arpa Mis-issuance

2019-03-01 Thread Jakob Bohm via dev-security-policy
On 01/03/2019 01:04, Matthew Hardeman wrote:
> In addition to the GDPR concerns over WHOIS and RDAP data, reliance upon
> these data sources has a crucial differentiation from other domain
> validation methods.
> 
> Specifically, the WHOIS/RDAP data sources are entirely "off-path" with
> respect to how a browser will locate and access a given site.  To my way of
> thinking, this renders these mechanisms functionally inferior to an
> "on-path" mechanism, such as reliances upon demonstrated change control
> over an authoritative DNS record or even demonstration content change
> control over a website.
> 
> Since domain validation is, in theory, about validating that the party to
> whom a certificate is to be issued has demonstrated control over the
> subject of the desired name(s) or the name space of the desired name(s), it
> seems clear that "off-path" validation is less valuable as a security
> measure.
> 

And there, you completely misunderstood the purpose.  The purpose of 
domain validation is to determine if the certificate application is 
(directly or indirectly) authorized by the domain registrant. 
 Technical control (via the various automated methods) is a proxy to 
this information, but not as close to the truth as WHOIS validations 
(provided either is done securely).

The panic mishandling of GDPR concerns by ICANN (something that 
continues in the current process to make a "permanent" solution) has 
essentially crippled all useful purposes of the WHOIS/RDAP database.
Including making it near impossible to do domain ownership (as opposed 
to mere control) validation impossible except for a few national 
TLDs that continue to provide open WHOIS.

I sincerely hope that ICANN cleans up its misunderstandings and 
reopens WHOIS, at least for domain owners that request this (it 
currently can't be done because registrars are vary of implementing 
the temporary specification of how to do that, as a new spec is in 
the works).

Therefore WHOIS validation should remain valid, but only if the 
actual registry/registrar provides authoritative computer readable 
data for the domain in question.  (Thus having to do OCR or similar 
of a picture of text is not acceptable, and neither are manually 
entered entries).

In particular "substitute WHOIS" lookups via manual steps that 
don't result in the validation computers directly reading the data 
from the registrar/registry server should not be allowed.

There are many ways this can be done technically, ranging from a 
straightforward WHOIS lookup from multiple network vantage points 
to a process where a special web browser is used to authenticate 
through CAPTCHAs etc. until the validation system automatically 
captures and parses the "known correct" textual web response 
from a known registrar/registry url.

This in turn means that IV, OV and EV certs will often need to use 
other means of associating the domain control with the certificate 
applicant entity.  For example one or more challenge values/pins 
can be securely provided to the real world entity validated, then 
used in the protocol for validating domain control.  But this still 
only validates domain control, not legitimacy of domain authority.


> Although I'm aware that the BRs bless a number of methods, it's also clear
> that methods have been excluded by the Mozilla root program before.  Is it
> time to consider further winnowing down the accepted methods?
> 
> On Thu, Feb 28, 2019 at 5:43 AM Ryan Sleevi via dev-security-policy <
> dev-security-policy@lists.mozilla.org> wrote:
> 
>> On Thu, Feb 28, 2019 at 6:21 AM Nick Lamb via dev-security-policy <
>> dev-security-policy@lists.mozilla.org> wrote:
>>
>>> On Thu, 28 Feb 2019 05:52:14 +
>>> Jeremy Rowley via dev-security-policy
>>>  wrote:
>>>
>>> Hi Jeremy,
>>>
 4. The validation agent specified the approval scope as id-addr.arpa
>>>
>>> I assume this is a typo by you not the agent, for in-addr.arpa ?
>>>
>>> Meanwhile, and without prejudice to the report itself once made:
>>>
 2. The system marked the WHOIS as unavailable for automated parsing
 (generally, this happens if we are being throttled or the WHOIS info
 is behind a CAPTCHA), which allows a validation agent to manually
 upload a WHOIS document
>>>
>>> This is a potentially large hole in issuance checks based on WHOIS.
>>>
>>> Operationally the approach taken ("We can't get it to work, press on")
>>> makes sense, but if we take a step back there's obvious potential for
>>> nasty security surprises like this one.
>>>
>>> There has to be something we can do here, I will spitball something in
>>> a next paragraph just to have something to start with, but to me if it
>>> turns out we can't improve on basically "sometimes it doesn't work so
>>> we just shrug and move on" we need to start thinking about deprecating
>>> this approach altogether. Not just for DigiCert, for everybody.
>>>
>>> - Spitball: What if the CA/B went to the registries, at least the big
>>>

Re: Possible DigiCert in-addr.arpa Mis-issuance

2019-02-28 Thread Matthew Hardeman via dev-security-policy
On Wednesday, February 27, 2019 at 8:54:35 AM UTC-6, Jakob Bohm wrote:

> One hypothetical use would be to secure BGP traffic, as certificates
> with IpAddress SANs are less commonly supported.

The networking / interconnection world has already worked out the trust 
hierarchy for the RPKI scheme.  As there are a number of global RIRs who are 
the authoritative source of ASN and IP space information, they've elected to 
themselves be the Root CAs involved.  Its an interesting infrastructure.  You 
can learn more about it here:

https://www.arin.net/resources/rpki/index.html
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Possible DigiCert in-addr.arpa Mis-issuance

2019-02-28 Thread Matthew Hardeman via dev-security-policy
In addition to the GDPR concerns over WHOIS and RDAP data, reliance upon
these data sources has a crucial differentiation from other domain
validation methods.

Specifically, the WHOIS/RDAP data sources are entirely "off-path" with
respect to how a browser will locate and access a given site.  To my way of
thinking, this renders these mechanisms functionally inferior to an
"on-path" mechanism, such as reliances upon demonstrated change control
over an authoritative DNS record or even demonstration content change
control over a website.

Since domain validation is, in theory, about validating that the party to
whom a certificate is to be issued has demonstrated control over the
subject of the desired name(s) or the name space of the desired name(s), it
seems clear that "off-path" validation is less valuable as a security
measure.

Although I'm aware that the BRs bless a number of methods, it's also clear
that methods have been excluded by the Mozilla root program before.  Is it
time to consider further winnowing down the accepted methods?

On Thu, Feb 28, 2019 at 5:43 AM Ryan Sleevi via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> On Thu, Feb 28, 2019 at 6:21 AM Nick Lamb via dev-security-policy <
> dev-security-policy@lists.mozilla.org> wrote:
>
> > On Thu, 28 Feb 2019 05:52:14 +
> > Jeremy Rowley via dev-security-policy
> >  wrote:
> >
> > Hi Jeremy,
> >
> > > 4. The validation agent specified the approval scope as id-addr.arpa
> >
> > I assume this is a typo by you not the agent, for in-addr.arpa ?
> >
> > Meanwhile, and without prejudice to the report itself once made:
> >
> > > 2. The system marked the WHOIS as unavailable for automated parsing
> > > (generally, this happens if we are being throttled or the WHOIS info
> > > is behind a CAPTCHA), which allows a validation agent to manually
> > > upload a WHOIS document
> >
> > This is a potentially large hole in issuance checks based on WHOIS.
> >
> > Operationally the approach taken ("We can't get it to work, press on")
> > makes sense, but if we take a step back there's obvious potential for
> > nasty security surprises like this one.
> >
> > There has to be something we can do here, I will spitball something in
> > a next paragraph just to have something to start with, but to me if it
> > turns out we can't improve on basically "sometimes it doesn't work so
> > we just shrug and move on" we need to start thinking about deprecating
> > this approach altogether. Not just for DigiCert, for everybody.
> >
> > - Spitball: What if the CA/B went to the registries, at least the big
> >   ones, and said we need this, strictly for this defined purpose, give
> >   us either reliable WHOIS, or RDAP, or direct database access or
> >   _something_ we can automate to do these checks ? The nature of CA/B
> >   may mean that it's not appropriate to negotiate paying for this
> >   (pressuring suppliers to all agree to offer members the same rates is
> >   just as much a problem as all agreeing what you'll charge customers)
> >   but it should be able to co-ordinate making sure members get access,
> >   and that it isn't opened up to dubious data resellers that the
> >   registries don't want rifling through their database.
> >
>
> Unfortunately, this is not really viable. The CA/Browser Forum maintains
> relationships with ICANN, as do individual members. While this, on its
> face, seems reasonable, there are practical, business, and legal concerns
> that prevent this from being viable. Further, proposals which would require
> membership in the CA/Browser Forum should, on their face, be rejected - a
> CA should not have to join the Forum in order to be a CA.
>
> I do agree, however, that the use of WHOIS data continues to show
> problematic incidents - whether it's with OCR issues or manual entry - and
> suspect a more meaningful solution is to move away from this model
> entirely. The recently approved methods to the BRs for expressing contact
> information via the DNS directly is one such approach. The GDPR issues
> surrounding WHOIS and RDAP have already led it to be compelling in its own
> right.
>
> Most importantly, you are on the right path of questions, though - which is
> we should examine such incidents systemically and look for improvements,
> and not convince ourselves that the status quo is the best possible
> solution :)
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Possible DigiCert in-addr.arpa Mis-issuance

2019-02-28 Thread Daniel McCarney via dev-security-policy
>
> I believe the list was merely a crt.sh query of all unexpired certificates
> with a dNSName ending in "in-addr.arpa":
> https://crt.sh/?dNSName=%25.in-addr.arpa=expired


Any list for this general issue should also consider unexpired certificates
with a dNSName ending in "ip6.arpa" to cover the IPv6 reverse zone in
addition to the IPv4 one. I noticed there are similar interesting
wildcards/host nodes under the ip6.arpa zone when I was writing a linter[0]
for this.

[0] - https://github.com/zmap/zlint/pull/260

On Wed, Feb 27, 2019 at 10:05 PM Corey Bonnell via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> On Wednesday, February 27, 2019 at 10:43:15 AM UTC-5, Tim Hollebeek wrote:
> > > On 27/02/2019 00:10, Matthew Hardeman wrote:
> > > > Is it even proper to have a SAN dnsName in in-addr.arpa ever?
> > > >
> > > > While in-addr.arpa IS a real DNS heirarchy under the .arpa TLD, it
> > > > rarely has anything other than PTR and NS records defined.
> > > >
> > >
> > > While there is no current use, and the test below was obviously
> somewhat
> > > contrived (and seems to have triggered a different issue), one cannot
> rule
> > > out
> > > the possibility of a need appearing in the future.
> >
> > At least the last time this came up a few years ago, there were actually
> a
> > significant number of webservers running under in-addr.arpa, with Comodo
> and
> > LE certificates (as well as a handful of others).  I believe Corey
> posted a
> > list.
> >
> > Exactly what they were doing there is an open question, and when I
> asked, no
> > one responded.  I'm still very curious as to why some people seem to
> actually
> > be running servers there, or if it's just a side-effect of misconfigured
> > CNAMEs causing them to appear to be there, or similar.
> >
> > -Tim
>
> Hi Tim,
> As you said, I vaguely recall this coming up in some discussion (perhaps
> in the CAB Forum Validation Subcommittee?) but nothing was concluded. I
> believe the list was merely a crt.sh query of all unexpired certificates
> with a dNSName ending in "in-addr.arpa":
> https://crt.sh/?dNSName=%25.in-addr.arpa=expired
>
> The query results are definitely worth a look as there are some unexpected
> findings, such as wildcards (such as "*.0.195.206.in-addr.arpa") and host
> nodes (such as "www.175.232.77.in-addr.arpa", etc.) under in-addr.arpa.
> Several of the domain names starting with "www" actually appear to resolve
> to an IP address with a web server running. Definitely an interesting
> (ab)use of the reverse zones.
>
> Thanks,
> Corey
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Possible DigiCert in-addr.arpa Mis-issuance

2019-02-28 Thread Ryan Sleevi via dev-security-policy
On Thu, Feb 28, 2019 at 6:21 AM Nick Lamb via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> On Thu, 28 Feb 2019 05:52:14 +
> Jeremy Rowley via dev-security-policy
>  wrote:
>
> Hi Jeremy,
>
> > 4. The validation agent specified the approval scope as id-addr.arpa
>
> I assume this is a typo by you not the agent, for in-addr.arpa ?
>
> Meanwhile, and without prejudice to the report itself once made:
>
> > 2. The system marked the WHOIS as unavailable for automated parsing
> > (generally, this happens if we are being throttled or the WHOIS info
> > is behind a CAPTCHA), which allows a validation agent to manually
> > upload a WHOIS document
>
> This is a potentially large hole in issuance checks based on WHOIS.
>
> Operationally the approach taken ("We can't get it to work, press on")
> makes sense, but if we take a step back there's obvious potential for
> nasty security surprises like this one.
>
> There has to be something we can do here, I will spitball something in
> a next paragraph just to have something to start with, but to me if it
> turns out we can't improve on basically "sometimes it doesn't work so
> we just shrug and move on" we need to start thinking about deprecating
> this approach altogether. Not just for DigiCert, for everybody.
>
> - Spitball: What if the CA/B went to the registries, at least the big
>   ones, and said we need this, strictly for this defined purpose, give
>   us either reliable WHOIS, or RDAP, or direct database access or
>   _something_ we can automate to do these checks ? The nature of CA/B
>   may mean that it's not appropriate to negotiate paying for this
>   (pressuring suppliers to all agree to offer members the same rates is
>   just as much a problem as all agreeing what you'll charge customers)
>   but it should be able to co-ordinate making sure members get access,
>   and that it isn't opened up to dubious data resellers that the
>   registries don't want rifling through their database.
>

Unfortunately, this is not really viable. The CA/Browser Forum maintains
relationships with ICANN, as do individual members. While this, on its
face, seems reasonable, there are practical, business, and legal concerns
that prevent this from being viable. Further, proposals which would require
membership in the CA/Browser Forum should, on their face, be rejected - a
CA should not have to join the Forum in order to be a CA.

I do agree, however, that the use of WHOIS data continues to show
problematic incidents - whether it's with OCR issues or manual entry - and
suspect a more meaningful solution is to move away from this model
entirely. The recently approved methods to the BRs for expressing contact
information via the DNS directly is one such approach. The GDPR issues
surrounding WHOIS and RDAP have already led it to be compelling in its own
right.

Most importantly, you are on the right path of questions, though - which is
we should examine such incidents systemically and look for improvements,
and not convince ourselves that the status quo is the best possible
solution :)
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Possible DigiCert in-addr.arpa Mis-issuance

2019-02-28 Thread Nick Lamb via dev-security-policy
On Thu, 28 Feb 2019 05:52:14 +
Jeremy Rowley via dev-security-policy
 wrote:

Hi Jeremy,

> 4. The validation agent specified the approval scope as id-addr.arpa

I assume this is a typo by you not the agent, for in-addr.arpa ?

Meanwhile, and without prejudice to the report itself once made:

> 2. The system marked the WHOIS as unavailable for automated parsing
> (generally, this happens if we are being throttled or the WHOIS info
> is behind a CAPTCHA), which allows a validation agent to manually
> upload a WHOIS document

This is a potentially large hole in issuance checks based on WHOIS.

Operationally the approach taken ("We can't get it to work, press on")
makes sense, but if we take a step back there's obvious potential for
nasty security surprises like this one.

There has to be something we can do here, I will spitball something in
a next paragraph just to have something to start with, but to me if it
turns out we can't improve on basically "sometimes it doesn't work so
we just shrug and move on" we need to start thinking about deprecating
this approach altogether. Not just for DigiCert, for everybody.

- Spitball: What if the CA/B went to the registries, at least the big
  ones, and said we need this, strictly for this defined purpose, give
  us either reliable WHOIS, or RDAP, or direct database access or
  _something_ we can automate to do these checks ? The nature of CA/B
  may mean that it's not appropriate to negotiate paying for this
  (pressuring suppliers to all agree to offer members the same rates is
  just as much a problem as all agreeing what you'll charge customers)
  but it should be able to co-ordinate making sure members get access,
  and that it isn't opened up to dubious data resellers that the
  registries don't want rifling through their database.

My argument to the registries would be that this is a service for their
customers. Unlike the data resellers, either the registry customer, or
some agent of theirs is asking you to authenticate their registration,
so giving you access makes sense as part of what the registry does for
its customers anyway.

> 7. During the review, no one noticed that the WHOIS document did not
> match the verification email nor did anyone notice that the email
> used for verification was actually a constructed email instead of the
> WHOIS admin email

So, reviews are good, but this review was not very effective. Valuable
to consider in the final report why not and how that can be improved.

Just to be clear though, are you sure "no one noticed" ? It can happen
that in review processes somebody does notice the issue, but they
are persuaded or persuade themselves that it's fine. A British railway
incident occurred when the person transcribing a document effectively
"moved" a railway crossing. Manual reviewers did see it, and so did the
controllers responsible for managing the crossing, but both persuaded
themselves that the movement must be a correction and approved it.

With the crossing now shown in the wrong place, instructions authorising
use of the crossing were no longer protected by the controller's view
of the movement of trains, this resulted in a "near miss" and thanks to
the victim's persistence in demanding it be properly investigated
fortunately accident investigators visited the crossing, found the
mistake and had things corrected before anyone died.

Nick.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: Possible DigiCert in-addr.arpa Mis-issuance

2019-02-27 Thread Jeremy Rowley via dev-security-policy
Hi Cynthia, 

We've figured out what happened with your certificate but are still looking at 
whether other certificates were issued using the same process. I don't have 
enough information to file an incident report yet, but I wanted to give you the 
update I promised earlier. 

Basically, here's what happened:
1. A validation agent took an email address provided during a chat session with 
you and set that email as a WHOIS admin email address. This email qualified as 
a constructed email (admin@domain)
2. The system marked the WHOIS as unavailable for automated parsing (generally, 
this happens if we are being throttled or the WHOIS info is behind a CAPTCHA), 
which allows a validation agent to manually upload a WHOIS document
3. The WHOIS document uploaded was a screen capture of WHOIS information that 
did not match the domain being requested but was close enough that the 
mis-match went unnoticed. 
4. The validation agent specified the approval scope as id-addr.arpa which is 
normal for a domain approved by the admin listed in WHOIS. As a constructed 
email, the approval scope should have been limited to the scope set by the 
constructed address.
5. The validation agent specified that the email address listed in WHOIS 
matched the email address provided by you (admin@domain) and sent the email to 
authorize the legit cert
6 . When the validation completed successfully, the validation authorized your 
account for all certificates with the in-addr.arpa domain. This was because the 
scope was improperly set based on the validation agent's improper specification 
of the source of the email address. 
7. During the review, no one noticed that the WHOIS document did not match the 
verification email nor did anyone notice that the email used for verification 
was actually a constructed email instead of the WHOIS admin email.
8. The mis-issued certificate essentially "piggy-backed" on the previous 
verification because of the erroneous approval scope set by the validation 
staff.

Make sense? 

We shut down manual WHOIS verification while we figure out how to improve the 
process and eliminate validation mistakes like this. We'll post another update 
after we figure out how to improve the process and after the data review is 
complete.

Jeremy

-Original Message-
From: dev-security-policy  On 
Behalf Of Cynthia Revström via dev-security-policy
Sent: Tuesday, February 26, 2019 4:17 PM
To: Matthew Hardeman 
Cc: dev-security-policy@lists.mozilla.org; b...@benjojo.co.uk
Subject: Re: Possible DigiCert in-addr.arpa Mis-issuance

I am not so sure that is proper to have .arpa domains in the SANs.

But I think the larger issue I think is that this might allow for non 
in-addr.arpa domains to be used as well.

It was just that I just tried to get a cert for my domain for a test to see if 
that would be issued.

And upon verifying the domain via email, I saw that on the page linked in the 
email it had an option along the lines of "Authorize in-addr.arpa for all 
orders on account #123456" (not that exact text but the same meaning).

Now I am not sure if this would work, but I suspect if for example I got DNS 
control over cynthia.site.google.com, I could get a cert for google.com if this 
is a systemic issue and not just a one off.

- Cynthia

On 2019-02-27 00:10, Matthew Hardeman wrote:
> Is it even proper to have a SAN dnsName in in-addr.arpa ever?
>
> While in-addr.arpa IS a real DNS heirarchy under the .arpa TLD, it 
> rarely has anything other than PTR and NS records defined.
>
> Here this was clearly achieved by creating a CNAME record for 
> 69.168.110.79.in-addr.arpa pointed to cynthia.re <http://cynthia.re>.
>
> I've never seen any software or documentation anywhere attempting to 
> utilize a reverse-IP formatted in-addr.arpa address as though it were 
> a normal host name for resolution.  I wonder whether this isn't a case 
> that should just be treated as an invalid domain for purposes of SAN 
> dnsName (like .local).
>
> On Tue, Feb 26, 2019 at 1:05 PM Jeremy Rowley via dev-security-policy 
>  <mailto:dev-security-policy@lists.mozilla.org>> wrote:
>
> Thanks Cynthia. We are investigating and will report back shortly.
> 
> From: dev-security-policy
>  <mailto:dev-security-policy-boun...@lists.mozilla.org>> on behalf
> of Cynthia Revström via dev-security-policy
>  <mailto:dev-security-policy@lists.mozilla.org>>
> Sent: Tuesday, February 26, 2019 12:02:20 PM
> To: dev-security-policy@lists.mozilla.org
>     <mailto:dev-security-policy@lists.mozilla.org>
> Cc: b...@benjojo.co.uk <mailto:b...@benjojo.co.uk>
> Subject: Possible DigiCert in-addr.arpa Mis-issuance
>
> Hello dev.security.policy
>
>
> Apologies if I have made any mistakes in how I post, this 

Re: Possible DigiCert in-addr.arpa Mis-issuance

2019-02-27 Thread Matthew Hardeman via dev-security-policy
On Wed, Feb 27, 2019 at 9:04 AM Nick Lamb  wrote:

>
> It does feel as though ARPA should consider adding a CAA record to
> in-addr.arpa and similar hierarchies that don't want certificates,
> denying all CAs, as a defence in depth measure.
>

Unless I significantly misunderstand CAA, this mechanism would not
necessarily be effective.

The normal mode of operation is that at the in-addr.arpa zone delegates sub
zones, for example 199.in-addr.arpa to the relevant RIR via an NS record.
Further, the relevant RIR would delegate sub zones of that zone via NS
records to an IP space holder, for example 88.99.199.in-addr.arpa would
have NS records configured on the RIR name servers which would refer to the
authoritative DNS servers serving the IP space holder for 199.99.88.0/24.

As such, superseding CAA records which would allow issuance could be added
back into those hierarchies by the DNS admins of those zones.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: Possible DigiCert in-addr.arpa Mis-issuance

2019-02-27 Thread Jeremy Rowley via dev-security-policy
Well yes, assuming the validation person overrides the safeguards and randomly 
changes the scope of the domain validation to something other than what the 
system specifies. We're still looking into how this happened and if the 
validation agent did this in any other case. 

-Original Message-
From: dev-security-policy  On 
Behalf Of Cynthia Revström via dev-security-policy
Sent: Wednesday, February 27, 2019 8:45 AM
To: dev-security-policy@lists.mozilla.org
Subject: Re: Possible DigiCert in-addr.arpa Mis-issuance

Okay that seems like an issue as to me that says that this could have happened 
to any domain and not just in-addr.arpa?

- Cynthia

On 2019-02-27 01:55, Jeremy Rowley via dev-security-policy wrote:
>  From our side, a validation agent weirdly scoped the domain, saying that the 
> domain was approved using an email to ad...@in-addr.arpa. However, the email 
> clearly went to ad...@5.168.110.79.in-addr.arpa. We're looking to see 1) how 
> did the validation staff override the domain approval scope and 2) did anyone 
> in validation ever do this before. Once we complete that search, we'll be 
> able to file a bug report and give you more information on what exactly went 
> wrong.
>
> .arpa is in IANA's root zone per https://www.iana.org/domains/root/db.
>
> Jeremy
>
> -Original Message-
> From: dev-security-policy 
>  On Behalf Of Cynthia 
> Revström via dev-security-policy
> Sent: Tuesday, February 26, 2019 4:17 PM
> To: Matthew Hardeman 
> Cc: dev-security-policy@lists.mozilla.org; b...@benjojo.co.uk
> Subject: Re: Possible DigiCert in-addr.arpa Mis-issuance
>
> I am not so sure that is proper to have .arpa domains in the SANs.
>
> But I think the larger issue I think is that this might allow for non 
> in-addr.arpa domains to be used as well.
>
> It was just that I just tried to get a cert for my domain for a test to see 
> if that would be issued.
>
> And upon verifying the domain via email, I saw that on the page linked in the 
> email it had an option along the lines of "Authorize in-addr.arpa for all 
> orders on account #123456" (not that exact text but the same meaning).
>
> Now I am not sure if this would work, but I suspect if for example I got DNS 
> control over cynthia.site.google.com, I could get a cert for google.com if 
> this is a systemic issue and not just a one off.
>
> - Cynthia
>
> On 2019-02-27 00:10, Matthew Hardeman wrote:
>> Is it even proper to have a SAN dnsName in in-addr.arpa ever?
>>
>> While in-addr.arpa IS a real DNS heirarchy under the .arpa TLD, it 
>> rarely has anything other than PTR and NS records defined.
>>
>> Here this was clearly achieved by creating a CNAME record for 
>> 69.168.110.79.in-addr.arpa pointed to cynthia.re <http://cynthia.re>.
>>
>> I've never seen any software or documentation anywhere attempting to 
>> utilize a reverse-IP formatted in-addr.arpa address as though it were 
>> a normal host name for resolution.  I wonder whether this isn't a 
>> case that should just be treated as an invalid domain for purposes of 
>> SAN dnsName (like .local).
>>
>> On Tue, Feb 26, 2019 at 1:05 PM Jeremy Rowley via dev-security-policy 
>> > <mailto:dev-security-policy@lists.mozilla.org>> wrote:
>>
>>  Thanks Cynthia. We are investigating and will report back shortly.
>>  
>>  From: dev-security-policy
>>  >  <mailto:dev-security-policy-boun...@lists.mozilla.org>> on behalf
>>  of Cynthia Revström via dev-security-policy
>>  >  <mailto:dev-security-policy@lists.mozilla.org>>
>>  Sent: Tuesday, February 26, 2019 12:02:20 PM
>>  To: dev-security-policy@lists.mozilla.org
>>  <mailto:dev-security-policy@lists.mozilla.org>
>>  Cc: b...@benjojo.co.uk <mailto:b...@benjojo.co.uk>
>>  Subject: Possible DigiCert in-addr.arpa Mis-issuance
>>
>>  Hello dev.security.policy
>>
>>
>>  Apologies if I have made any mistakes in how I post, this is my first
>>  time posting here. Anyway:
>>
>>
>>  I have managed to issue a certificate with a FQDN in the SAN that I do
>>  not have control of via Digicert.
>>
>>
>>  The precert is here: https://crt.sh/?id=1231411316
>>
>>  SHA256:
>>  651B68C520492A44A5E99A1D6C99099573E8B53DEDBC69166F60685863B390D1
>>
>>
>>  I have notified Digicert who responded back with a generic response
>>  followed by the certificate being revoked through OCSP. However I
>>  believe that this should be wider investigated, since this cert was

Re: Possible DigiCert in-addr.arpa Mis-issuance

2019-02-27 Thread Cynthia Revström via dev-security-policy
Okay that seems like an issue as to me that says that this could have 
happened to any domain and not just in-addr.arpa?


- Cynthia

On 2019-02-27 01:55, Jeremy Rowley via dev-security-policy wrote:

 From our side, a validation agent weirdly scoped the domain, saying that the 
domain was approved using an email to ad...@in-addr.arpa. However, the email 
clearly went to ad...@5.168.110.79.in-addr.arpa. We're looking to see 1) how 
did the validation staff override the domain approval scope and 2) did anyone 
in validation ever do this before. Once we complete that search, we'll be able 
to file a bug report and give you more information on what exactly went wrong.

.arpa is in IANA's root zone per https://www.iana.org/domains/root/db.

Jeremy

-Original Message-
From: dev-security-policy  On 
Behalf Of Cynthia Revström via dev-security-policy
Sent: Tuesday, February 26, 2019 4:17 PM
To: Matthew Hardeman 
Cc: dev-security-policy@lists.mozilla.org; b...@benjojo.co.uk
Subject: Re: Possible DigiCert in-addr.arpa Mis-issuance

I am not so sure that is proper to have .arpa domains in the SANs.

But I think the larger issue I think is that this might allow for non 
in-addr.arpa domains to be used as well.

It was just that I just tried to get a cert for my domain for a test to see if 
that would be issued.

And upon verifying the domain via email, I saw that on the page linked in the email it 
had an option along the lines of "Authorize in-addr.arpa for all orders on account 
#123456" (not that exact text but the same meaning).

Now I am not sure if this would work, but I suspect if for example I got DNS 
control over cynthia.site.google.com, I could get a cert for google.com if this 
is a systemic issue and not just a one off.

- Cynthia

On 2019-02-27 00:10, Matthew Hardeman wrote:

Is it even proper to have a SAN dnsName in in-addr.arpa ever?

While in-addr.arpa IS a real DNS heirarchy under the .arpa TLD, it
rarely has anything other than PTR and NS records defined.

Here this was clearly achieved by creating a CNAME record for
69.168.110.79.in-addr.arpa pointed to cynthia.re <http://cynthia.re>.

I've never seen any software or documentation anywhere attempting to
utilize a reverse-IP formatted in-addr.arpa address as though it were
a normal host name for resolution.  I wonder whether this isn't a case
that should just be treated as an invalid domain for purposes of SAN
dnsName (like .local).

On Tue, Feb 26, 2019 at 1:05 PM Jeremy Rowley via dev-security-policy
mailto:dev-security-policy@lists.mozilla.org>> wrote:

 Thanks Cynthia. We are investigating and will report back shortly.
 
 From: dev-security-policy
 mailto:dev-security-policy-boun...@lists.mozilla.org>> on behalf
 of Cynthia Revström via dev-security-policy
 mailto:dev-security-policy@lists.mozilla.org>>
 Sent: Tuesday, February 26, 2019 12:02:20 PM
 To: dev-security-policy@lists.mozilla.org
 <mailto:dev-security-policy@lists.mozilla.org>
 Cc: b...@benjojo.co.uk <mailto:b...@benjojo.co.uk>
     Subject: Possible DigiCert in-addr.arpa Mis-issuance

 Hello dev.security.policy


 Apologies if I have made any mistakes in how I post, this is my first
 time posting here. Anyway:


 I have managed to issue a certificate with a FQDN in the SAN that I do
 not have control of via Digicert.


 The precert is here: https://crt.sh/?id=1231411316

 SHA256:
 651B68C520492A44A5E99A1D6C99099573E8B53DEDBC69166F60685863B390D1


 I have notified Digicert who responded back with a generic response
 followed by the certificate being revoked through OCSP. However I
 believe that this should be wider investigated, since this cert was
 issued by me adding 69.168.110.79.in-addr.arpa to my SAN, a DNS area
 that I do control though reverse DNS.


 When I verified 5.168.110.79.in-addr.arpa (same subdomain), I noticed
 that the whole of in-addr.arpa became validated on my account, instead
 of just my small section of it (168.110.79.in-addr.arpa at best).


 To test if digicert had just in fact mis-validated a FQDN, I
 tested with
 the reverse DNS address of 192.168.1.1, and it worked and Digicert
 issued me a certificate with 1.1.168.192.in-addr.arpa on it.


 Is there anything else dev.security.policy needs to do with this? This
 seems like a clear case of mis issuance. It's also not clear if
 in-addr.arpa should even be issuable.


 I would like to take a moment to thank Ben Cartwright-Cox and
 igloo5
 in pointing out this violation.


 Regards

 Cynthia Revström

 ___
 dev-security-policy mailing list
 dev-security-policy@lists.mozilla.org
 <mailto:dev-security-policy@lists.mozilla.org>
 https://lists.mozilla.org/listinfo/dev-security-policy
 _

RE: Possible DigiCert in-addr.arpa Mis-issuance

2019-02-27 Thread Tim Hollebeek via dev-security-policy

> On 27/02/2019 00:10, Matthew Hardeman wrote:
> > Is it even proper to have a SAN dnsName in in-addr.arpa ever?
> >
> > While in-addr.arpa IS a real DNS heirarchy under the .arpa TLD, it
> > rarely has anything other than PTR and NS records defined.
> >
>
> While there is no current use, and the test below was obviously somewhat
> contrived (and seems to have triggered a different issue), one cannot rule 
> out
> the possibility of a need appearing in the future.

At least the last time this came up a few years ago, there were actually a 
significant number of webservers running under in-addr.arpa, with Comodo and 
LE certificates (as well as a handful of others).  I believe Corey posted a 
list.

Exactly what they were doing there is an open question, and when I asked, no 
one responded.  I'm still very curious as to why some people seem to actually 
be running servers there, or if it's just a side-effect of misconfigured 
CNAMEs causing them to appear to be there, or similar.

-Tim


smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Possible DigiCert in-addr.arpa Mis-issuance

2019-02-27 Thread Ryan Sleevi via dev-security-policy
On Wed, Feb 27, 2019 at 8:04 PM Nick Lamb via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> On Tue, 26 Feb 2019 17:10:49 -0600
> Matthew Hardeman via dev-security-policy
>  wrote:
>
> > Is it even proper to have a SAN dnsName in in-addr.arpa ever?
>
> It does feel as though ARPA should consider adding a CAA record to
> in-addr.arpa and similar hierarchies that don't want certificates,
> denying all CAs, as a defence in depth measure.


Alternatively, and perhaps more comprehensively, it may be better to ensure
that those Special Use Domains that are either delegated to or reserved by
IANA or the IESG can only have certificates issued by those respective
organizations.

These are enumerated prosaically at
https://www.iana.org/domains/reserved for those reserved by policy, and
https://www.iana.org/assignments/special-use-domain-names/special-use-domain-names.xhtml
is a registry of those reserved by relevant standards.

This approach is already taken with regards to IP addresses, and more
comprehensively avoids ambiguity. It has the benefit of defaulting secure -
by not requiring a domain holder (including IANA) to somehow take special
action to protect existing practice. Should concrete use cases present
themselves - of which BGP is not one (see BGPsec for more details) - then
those can be relaxed on a case by case basis. The .onion Domain is an
example of a pre-existing relaxation.

This would still permit .arpa certificates - specific language would be
needed (and should be done) to either prohibit or apply the same
consistency to as IP certificates - but would otherwise close a class of
“obvious” errors. The suggestion was intentionally not a blanket ban, as
IANA/ICANN does and has obtained legitimate certificates for the example
domains in the past.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Possible DigiCert in-addr.arpa Mis-issuance

2019-02-27 Thread Nick Lamb via dev-security-policy
On Tue, 26 Feb 2019 17:10:49 -0600
Matthew Hardeman via dev-security-policy
 wrote:

> Is it even proper to have a SAN dnsName in in-addr.arpa ever?

It does feel as though ARPA should consider adding a CAA record to
in-addr.arpa and similar hierarchies that don't want certificates,
denying all CAs, as a defence in depth measure.

Nick.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Possible DigiCert in-addr.arpa Mis-issuance

2019-02-27 Thread Jakob Bohm via dev-security-policy

On 27/02/2019 00:10, Matthew Hardeman wrote:

Is it even proper to have a SAN dnsName in in-addr.arpa ever?

While in-addr.arpa IS a real DNS heirarchy under the .arpa TLD, it rarely
has anything other than PTR and NS records defined.



While there is no current use, and the test below was obviously
somewhat contrived (and seems to have triggered a different issue),
one cannot rule out the possibility of a need appearing in the
future.

One hypothetical use would be to secure BGP traffic, as certificates
with IpAddress SANs are less commonly supported.



Here this was clearly achieved by creating a CNAME record for
69.168.110.79.in-addr.arpa pointed to cynthia.re.

I've never seen any software or documentation anywhere attempting to
utilize a reverse-IP formatted in-addr.arpa address as though it were a
normal host name for resolution.  I wonder whether this isn't a case that
should just be treated as an invalid domain for purposes of SAN dnsName
(like .local).

On Tue, Feb 26, 2019 at 1:05 PM Jeremy Rowley via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:


Thanks Cynthia. We are investigating and will report back shortly.

From: dev-security-policy 
on behalf of Cynthia Revström via dev-security-policy <
dev-security-policy@lists.mozilla.org>
Sent: Tuesday, February 26, 2019 12:02:20 PM
To: dev-security-policy@lists.mozilla.org
Cc: b...@benjojo.co.uk
Subject: Possible DigiCert in-addr.arpa Mis-issuance

Hello dev.security.policy


Apologies if I have made any mistakes in how I post, this is my first
time posting here. Anyway:


I have managed to issue a certificate with a FQDN in the SAN that I do
not have control of via Digicert.


The precert is here: https://crt.sh/?id=1231411316

SHA256: 651B68C520492A44A5E99A1D6C99099573E8B53DEDBC69166F60685863B390D1


I have notified Digicert who responded back with a generic response
followed by the certificate being revoked through OCSP. However I
believe that this should be wider investigated, since this cert was
issued by me adding 69.168.110.79.in-addr.arpa to my SAN, a DNS area
that I do control though reverse DNS.


When I verified 5.168.110.79.in-addr.arpa (same subdomain), I noticed
that the whole of in-addr.arpa became validated on my account, instead
of just my small section of it (168.110.79.in-addr.arpa at best).


To test if digicert had just in fact mis-validated a FQDN, I tested with
the reverse DNS address of 192.168.1.1, and it worked and Digicert
issued me a certificate with 1.1.168.192.in-addr.arpa on it.


Is there anything else dev.security.policy needs to do with this? This
seems like a clear case of mis issuance. It's also not clear if
in-addr.arpa should even be issuable.


I would like to take a moment to thank Ben Cartwright-Cox and igloo5
in pointing out this violation.





Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: Possible DigiCert in-addr.arpa Mis-issuance

2019-02-26 Thread Jeremy Rowley via dev-security-policy
>From our side, a validation agent weirdly scoped the domain, saying that the 
>domain was approved using an email to ad...@in-addr.arpa. However, the email 
>clearly went to ad...@5.168.110.79.in-addr.arpa. We're looking to see 1) how 
>did the validation staff override the domain approval scope and 2) did anyone 
>in validation ever do this before. Once we complete that search, we'll be able 
>to file a bug report and give you more information on what exactly went wrong. 

.arpa is in IANA's root zone per https://www.iana.org/domains/root/db.

Jeremy

-Original Message-
From: dev-security-policy  On 
Behalf Of Cynthia Revström via dev-security-policy
Sent: Tuesday, February 26, 2019 4:17 PM
To: Matthew Hardeman 
Cc: dev-security-policy@lists.mozilla.org; b...@benjojo.co.uk
Subject: Re: Possible DigiCert in-addr.arpa Mis-issuance

I am not so sure that is proper to have .arpa domains in the SANs.

But I think the larger issue I think is that this might allow for non 
in-addr.arpa domains to be used as well.

It was just that I just tried to get a cert for my domain for a test to see if 
that would be issued.

And upon verifying the domain via email, I saw that on the page linked in the 
email it had an option along the lines of "Authorize in-addr.arpa for all 
orders on account #123456" (not that exact text but the same meaning).

Now I am not sure if this would work, but I suspect if for example I got DNS 
control over cynthia.site.google.com, I could get a cert for google.com if this 
is a systemic issue and not just a one off.

- Cynthia

On 2019-02-27 00:10, Matthew Hardeman wrote:
> Is it even proper to have a SAN dnsName in in-addr.arpa ever?
>
> While in-addr.arpa IS a real DNS heirarchy under the .arpa TLD, it 
> rarely has anything other than PTR and NS records defined.
>
> Here this was clearly achieved by creating a CNAME record for 
> 69.168.110.79.in-addr.arpa pointed to cynthia.re <http://cynthia.re>.
>
> I've never seen any software or documentation anywhere attempting to 
> utilize a reverse-IP formatted in-addr.arpa address as though it were 
> a normal host name for resolution.  I wonder whether this isn't a case 
> that should just be treated as an invalid domain for purposes of SAN 
> dnsName (like .local).
>
> On Tue, Feb 26, 2019 at 1:05 PM Jeremy Rowley via dev-security-policy 
>  <mailto:dev-security-policy@lists.mozilla.org>> wrote:
>
> Thanks Cynthia. We are investigating and will report back shortly.
> 
> From: dev-security-policy
>  <mailto:dev-security-policy-boun...@lists.mozilla.org>> on behalf
> of Cynthia Revström via dev-security-policy
>  <mailto:dev-security-policy@lists.mozilla.org>>
> Sent: Tuesday, February 26, 2019 12:02:20 PM
> To: dev-security-policy@lists.mozilla.org
>     <mailto:dev-security-policy@lists.mozilla.org>
> Cc: b...@benjojo.co.uk <mailto:b...@benjojo.co.uk>
> Subject: Possible DigiCert in-addr.arpa Mis-issuance
>
> Hello dev.security.policy
>
>
> Apologies if I have made any mistakes in how I post, this is my first
> time posting here. Anyway:
>
>
> I have managed to issue a certificate with a FQDN in the SAN that I do
> not have control of via Digicert.
>
>
> The precert is here: https://crt.sh/?id=1231411316
>
> SHA256:
> 651B68C520492A44A5E99A1D6C99099573E8B53DEDBC69166F60685863B390D1
>
>
> I have notified Digicert who responded back with a generic response
> followed by the certificate being revoked through OCSP. However I
> believe that this should be wider investigated, since this cert was
> issued by me adding 69.168.110.79.in-addr.arpa to my SAN, a DNS area
> that I do control though reverse DNS.
>
>
> When I verified 5.168.110.79.in-addr.arpa (same subdomain), I noticed
> that the whole of in-addr.arpa became validated on my account, instead
> of just my small section of it (168.110.79.in-addr.arpa at best).
>
>
> To test if digicert had just in fact mis-validated a FQDN, I
> tested with
> the reverse DNS address of 192.168.1.1, and it worked and Digicert
> issued me a certificate with 1.1.168.192.in-addr.arpa on it.
>
>
> Is there anything else dev.security.policy needs to do with this? This
> seems like a clear case of mis issuance. It's also not clear if
> in-addr.arpa should even be issuable.
>
>
> I would like to take a moment to thank Ben Cartwright-Cox and
> igloo5
> in pointing out this violation.
>
>
> Regards
>
> Cynthia Revström
>
> ___
> dev-security-policy mailing list

Re: Possible DigiCert in-addr.arpa Mis-issuance

2019-02-26 Thread Cynthia Revström via dev-security-policy

I am not so sure that is proper to have .arpa domains in the SANs.

But I think the larger issue I think is that this might allow for non 
in-addr.arpa domains to be used as well.


It was just that I just tried to get a cert for my domain for a test to 
see if that would be issued.


And upon verifying the domain via email, I saw that on the page linked 
in the email it had an option along the lines of "Authorize in-addr.arpa 
for all orders on account #123456" (not that exact text but the same 
meaning).


Now I am not sure if this would work, but I suspect if for example I got 
DNS control over cynthia.site.google.com, I could get a cert for 
google.com if this is a systemic issue and not just a one off.


- Cynthia

On 2019-02-27 00:10, Matthew Hardeman wrote:

Is it even proper to have a SAN dnsName in in-addr.arpa ever?

While in-addr.arpa IS a real DNS heirarchy under the .arpa TLD, it 
rarely has anything other than PTR and NS records defined.


Here this was clearly achieved by creating a CNAME record for 
69.168.110.79.in-addr.arpa pointed to cynthia.re <http://cynthia.re>.


I've never seen any software or documentation anywhere attempting to 
utilize a reverse-IP formatted in-addr.arpa address as though it were 
a normal host name for resolution.  I wonder whether this isn't a case 
that should just be treated as an invalid domain for purposes of SAN 
dnsName (like .local).


On Tue, Feb 26, 2019 at 1:05 PM Jeremy Rowley via dev-security-policy 
<mailto:dev-security-policy@lists.mozilla.org>> wrote:


Thanks Cynthia. We are investigating and will report back shortly.

From: dev-security-policy
mailto:dev-security-policy-boun...@lists.mozilla.org>> on behalf
of Cynthia Revström via dev-security-policy
mailto:dev-security-policy@lists.mozilla.org>>
Sent: Tuesday, February 26, 2019 12:02:20 PM
To: dev-security-policy@lists.mozilla.org
<mailto:dev-security-policy@lists.mozilla.org>
Cc: b...@benjojo.co.uk <mailto:b...@benjojo.co.uk>
Subject: Possible DigiCert in-addr.arpa Mis-issuance

Hello dev.security.policy


Apologies if I have made any mistakes in how I post, this is my first
time posting here. Anyway:


I have managed to issue a certificate with a FQDN in the SAN that I do
not have control of via Digicert.


The precert is here: https://crt.sh/?id=1231411316

SHA256:
651B68C520492A44A5E99A1D6C99099573E8B53DEDBC69166F60685863B390D1


I have notified Digicert who responded back with a generic response
followed by the certificate being revoked through OCSP. However I
believe that this should be wider investigated, since this cert was
issued by me adding 69.168.110.79.in-addr.arpa to my SAN, a DNS area
that I do control though reverse DNS.


When I verified 5.168.110.79.in-addr.arpa (same subdomain), I noticed
that the whole of in-addr.arpa became validated on my account, instead
of just my small section of it (168.110.79.in-addr.arpa at best).


To test if digicert had just in fact mis-validated a FQDN, I
tested with
the reverse DNS address of 192.168.1.1, and it worked and Digicert
issued me a certificate with 1.1.168.192.in-addr.arpa on it.


Is there anything else dev.security.policy needs to do with this? This
seems like a clear case of mis issuance. It's also not clear if
in-addr.arpa should even be issuable.


I would like to take a moment to thank Ben Cartwright-Cox and
igloo5
in pointing out this violation.


Regards

Cynthia Revström

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
<mailto:dev-security-policy@lists.mozilla.org>
https://lists.mozilla.org/listinfo/dev-security-policy
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
<mailto:dev-security-policy@lists.mozilla.org>
https://lists.mozilla.org/listinfo/dev-security-policy


___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Possible DigiCert in-addr.arpa Mis-issuance

2019-02-26 Thread Matthew Hardeman via dev-security-policy
Is it even proper to have a SAN dnsName in in-addr.arpa ever?

While in-addr.arpa IS a real DNS heirarchy under the .arpa TLD, it rarely
has anything other than PTR and NS records defined.

Here this was clearly achieved by creating a CNAME record for
69.168.110.79.in-addr.arpa pointed to cynthia.re.

I've never seen any software or documentation anywhere attempting to
utilize a reverse-IP formatted in-addr.arpa address as though it were a
normal host name for resolution.  I wonder whether this isn't a case that
should just be treated as an invalid domain for purposes of SAN dnsName
(like .local).

On Tue, Feb 26, 2019 at 1:05 PM Jeremy Rowley via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> Thanks Cynthia. We are investigating and will report back shortly.
> 
> From: dev-security-policy 
> on behalf of Cynthia Revström via dev-security-policy <
> dev-security-policy@lists.mozilla.org>
> Sent: Tuesday, February 26, 2019 12:02:20 PM
> To: dev-security-policy@lists.mozilla.org
> Cc: b...@benjojo.co.uk
> Subject: Possible DigiCert in-addr.arpa Mis-issuance
>
> Hello dev.security.policy
>
>
> Apologies if I have made any mistakes in how I post, this is my first
> time posting here. Anyway:
>
>
> I have managed to issue a certificate with a FQDN in the SAN that I do
> not have control of via Digicert.
>
>
> The precert is here: https://crt.sh/?id=1231411316
>
> SHA256: 651B68C520492A44A5E99A1D6C99099573E8B53DEDBC69166F60685863B390D1
>
>
> I have notified Digicert who responded back with a generic response
> followed by the certificate being revoked through OCSP. However I
> believe that this should be wider investigated, since this cert was
> issued by me adding 69.168.110.79.in-addr.arpa to my SAN, a DNS area
> that I do control though reverse DNS.
>
>
> When I verified 5.168.110.79.in-addr.arpa (same subdomain), I noticed
> that the whole of in-addr.arpa became validated on my account, instead
> of just my small section of it (168.110.79.in-addr.arpa at best).
>
>
> To test if digicert had just in fact mis-validated a FQDN, I tested with
> the reverse DNS address of 192.168.1.1, and it worked and Digicert
> issued me a certificate with 1.1.168.192.in-addr.arpa on it.
>
>
> Is there anything else dev.security.policy needs to do with this? This
> seems like a clear case of mis issuance. It's also not clear if
> in-addr.arpa should even be issuable.
>
>
> I would like to take a moment to thank Ben Cartwright-Cox and igloo5
> in pointing out this violation.
>
>
> Regards
>
> Cynthia Revström
>
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Possible DigiCert in-addr.arpa Mis-issuance

2019-02-26 Thread Jeremy Rowley via dev-security-policy
Thanks Cynthia. We are investigating and will report back shortly.

From: dev-security-policy  on 
behalf of Cynthia Revström via dev-security-policy 

Sent: Tuesday, February 26, 2019 12:02:20 PM
To: dev-security-policy@lists.mozilla.org
Cc: b...@benjojo.co.uk
Subject: Possible DigiCert in-addr.arpa Mis-issuance

Hello dev.security.policy


Apologies if I have made any mistakes in how I post, this is my first
time posting here. Anyway:


I have managed to issue a certificate with a FQDN in the SAN that I do
not have control of via Digicert.


The precert is here: https://crt.sh/?id=1231411316

SHA256: 651B68C520492A44A5E99A1D6C99099573E8B53DEDBC69166F60685863B390D1


I have notified Digicert who responded back with a generic response
followed by the certificate being revoked through OCSP. However I
believe that this should be wider investigated, since this cert was
issued by me adding 69.168.110.79.in-addr.arpa to my SAN, a DNS area
that I do control though reverse DNS.


When I verified 5.168.110.79.in-addr.arpa (same subdomain), I noticed
that the whole of in-addr.arpa became validated on my account, instead
of just my small section of it (168.110.79.in-addr.arpa at best).


To test if digicert had just in fact mis-validated a FQDN, I tested with
the reverse DNS address of 192.168.1.1, and it worked and Digicert
issued me a certificate with 1.1.168.192.in-addr.arpa on it.


Is there anything else dev.security.policy needs to do with this? This
seems like a clear case of mis issuance. It's also not clear if
in-addr.arpa should even be issuable.


I would like to take a moment to thank Ben Cartwright-Cox and igloo5
in pointing out this violation.


Regards

Cynthia Revström

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Possible DigiCert in-addr.arpa Mis-issuance

2019-02-26 Thread Cynthia Revström via dev-security-policy

Hello dev.security.policy


Apologies if I have made any mistakes in how I post, this is my first 
time posting here. Anyway:



I have managed to issue a certificate with a FQDN in the SAN that I do 
not have control of via Digicert.



The precert is here: https://crt.sh/?id=1231411316

SHA256: 651B68C520492A44A5E99A1D6C99099573E8B53DEDBC69166F60685863B390D1


I have notified Digicert who responded back with a generic response 
followed by the certificate being revoked through OCSP. However I 
believe that this should be wider investigated, since this cert was 
issued by me adding 69.168.110.79.in-addr.arpa to my SAN, a DNS area 
that I do control though reverse DNS.



When I verified 5.168.110.79.in-addr.arpa (same subdomain), I noticed 
that the whole of in-addr.arpa became validated on my account, instead 
of just my small section of it (168.110.79.in-addr.arpa at best).



To test if digicert had just in fact mis-validated a FQDN, I tested with 
the reverse DNS address of 192.168.1.1, and it worked and Digicert 
issued me a certificate with 1.1.168.192.in-addr.arpa on it.



Is there anything else dev.security.policy needs to do with this? This 
seems like a clear case of mis issuance. It's also not clear if 
in-addr.arpa should even be issuable.



I would like to take a moment to thank Ben Cartwright-Cox and igloo5 
in pointing out this violation.



Regards

Cynthia Revström

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy