Re: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-24 Thread vdukhovni--- via dev-security-policy
On Tuesday, May 22, 2018 at 1:27:16 PM UTC-4, Ryan Sleevi wrote:
> On Tue, May 22, 2018 at 1:03 PM, Paul Wouters  wrote:
>
> > I know of 12400 512 bit RSA ZSK's in a total of about 6.5 million. And I
> > consider those to be an operational mistake.
> 
> http://tma.ifip.org/wordpress/wp-content/uploads/2017/06/tma2017_paper58.pdf
> has some fairly damning empirical data about the reliability of those
> records, which is not in line with your anecdata.

One of the reasons that the number of 512-bit keys is indeed now only ~12k (and 
gradually decreasing) is rooted in a passing comment in that paper: "The 
majority of them can be
attributed to a hosting provider below cz."

As it turns out, I played a role in remediating that problem: 
https://lists.dns-oarc.net/pipermail/dns-operations/2017-October/016880.html

My focus is more operational than academic, so instead of writing a paper, I 
posted to the dns-operations list, and not long after that post the folks at 
"wedos.cz" resigned all the zones in question with 1024-bit or better keys.  It 
remains to address the same issue at approximately three providers to 
essentially eliminate 512-bit keys from DNSSEC: 
https://twitter.com/VDukhovni/status/998341243800301568

So no, Pauls numbers are not "anecdata" and it is unwise to imply such a thing 
without knowing the full story.  The DANE survey is identifying, publicizing 
and driving remediation of various neglected aspects of DNSSEC operations, and 
the overall ecosystem is getting considerably healthier than it was back in 
2014.

-- 
  Viktor.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-23 Thread Matthew Hardeman via dev-security-policy
I believe that Paul Wouters has made a compelling case regarding the
current state of keying practices in DNSSEC deployment today.
There is sufficient cryptographic rigor to merit logging this data for
review of correct assessment as of the point in time at which certificate
issuance decisioning was made.

I concur in full with the assertions and positions of Paul Wouters and Nick
Lamb in the matters discussed in this thread up to this point.

I believe CAA validation checks should incorporate the DNSSEC data where
DNSSEC has been deployed.  I believe the logs recorded by a CA should
preserve that data which was relied upon in the issuance decisioning.

I have some concerns pertaining to the state of logging as would appear to
be alluded to by Jacob Hoffman-Andrews.  Specifically, I find some cause
for concern in the fragment "because it was not possible to associate
specific query/response pairs with the validation request that caused them
(for instance, consider NS referrals, CNAME indirection, and caching)".

This would appear to indicate that while Let's Encrypt may log either the
final response from their recursive resolver or some derivation of data
from the final response from their recursive resolver, Let's Encrypt may
not be logging _which_ particular entity within the DNS hierarchy they are
utilizing as the controlling CAA record - or at least, this language
suggests that for some circumstances they are not recording the underlying
delegations/reasons for which a given CAA record somewhere in the
DNS hierarchy was utilized when attempting to clear issuance for a given
domain label.  That becomes a bit concerning, as I would expect that a CA
relying on a CAA record at "
ok-sure.multiple-layers-of-indirection.my-crazy-dns-service.com" bearing
tag "issue" with value "letsencrypt.org" when authorizing issuance of a
certificate for dnsName "a.example.com" should be able to explain the chain
of facts which made that CAA record at that position within the
DNS hierarchy authoritative for the domain label in question.

There arises a potential further concern if this logging of DNS data upon
which a CA's decisions rely pertains to DNS queries for function beyond CAA
clearance.  For example, the DNS queries associated with domain control
validation over a given domain label.  Consider the software package
acme-dns which assists domain holders with delegating the ACME dns-01
validation records onto a specialized DNS server which responds with the
correct dynamic responses while allowing the underlying domain to have
static delegations for the TXT records back in the actual authoritative
zones of any number of domains that they don't want to migrate to dynamic
DNS services.  That's a great use case and should not be discouraged.
Neither, however, should it the case that the CA's logging only has the
response of the final result from the acme-dns server.  The logs should
contain the DNS query responses which connected that record served up by
the acme-dns server to the delegation that granted that authority to the
acme-dns server on behalf of the authorization domain name.

On Wed, May 23, 2018 at 11:25 AM, Paul Wouters via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> On Tue, 22 May 2018, Ryan Sleevi wrote:
>
>   I know of 12400 512 bit RSA ZSK's in a total of about 6.5 million.
>> And I
>>   consider those to be an operational mistake.
>>
>> http://tma.ifip.org/wordpress/wp-content/uploads/2017/06/tma
>> 2017_paper58.pdf has some fairly damning empirical data about the
>> reliability of those
>> records, which is not in line with your anecdata.
>>
>
> My "anecdata" is Viktor Dukhovni's constant monitoring of all known
> DNSSEC zones. It's data is current to a few days. The article you
> quote used data up to Jan 2017, so is 1.5 years old. Still, it only
> listed 275k out of 7M ZSK's being 512 bit RSA. I suspect it to be
> due to one or a few providers who used to do that, but clearly no
> longer do this since the current total is far lower at 12k out of
> roughly the same sample size of 7M. Calling this data anecdata
> isn't going to change anything other then my professional opinion
> of you.
>
> 512 bit RSA keys was never a real thing in DNSSEC. I packaged up the
> earliest versions of DNSSEC software for RHEL/CentOS/Fedora and it
> never did anything less then 1024 for ZSKs, which was changed to 2048
> bit on Mar 27 2014. KSK's were always 2048. I'm pretty sure the Debian
> and Ubuntu packagers also didn't reduce the default upstream ZSK
> keysizes to 512 bit.
>
> But I'd love to read your research on where people advised you to roll
> the ZSK at "24 - 72 hours" intervals. Do you have any links to
> presentations given at any technology conference like DNS-OARC, RIPE,
> IETF or ICANN?
>
>   I see no reason why not to log the entire chain to the root. The only
>>   exception being maliciously long chains, which you can easilly cap
>>   and error out on after fo

Re: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-23 Thread Paul Wouters via dev-security-policy

On Tue, 22 May 2018, Ryan Sleevi wrote:


  I know of 12400 512 bit RSA ZSK's in a total of about 6.5 million. And I
  consider those to be an operational mistake.

http://tma.ifip.org/wordpress/wp-content/uploads/2017/06/tma2017_paper58.pdf 
has some fairly damning empirical data about the reliability of those
records, which is not in line with your anecdata.


My "anecdata" is Viktor Dukhovni's constant monitoring of all known
DNSSEC zones. It's data is current to a few days. The article you
quote used data up to Jan 2017, so is 1.5 years old. Still, it only
listed 275k out of 7M ZSK's being 512 bit RSA. I suspect it to be
due to one or a few providers who used to do that, but clearly no
longer do this since the current total is far lower at 12k out of
roughly the same sample size of 7M. Calling this data anecdata
isn't going to change anything other then my professional opinion
of you.

512 bit RSA keys was never a real thing in DNSSEC. I packaged up the
earliest versions of DNSSEC software for RHEL/CentOS/Fedora and it
never did anything less then 1024 for ZSKs, which was changed to 2048
bit on Mar 27 2014. KSK's were always 2048. I'm pretty sure the Debian
and Ubuntu packagers also didn't reduce the default upstream ZSK
keysizes to 512 bit.

But I'd love to read your research on where people advised you to roll
the ZSK at "24 - 72 hours" intervals. Do you have any links to
presentations given at any technology conference like DNS-OARC, RIPE,
IETF or ICANN?


  I see no reason why not to log the entire chain to the root. The only
  exception being maliciously long chains, which you can easilly cap
  and error out on after following about 50 DS records?

"Why not" is not a very compelling argument, especially given the complexity 
involved, and the return to value being low (and itself being inconsistent
with other matters) 


CAs are in the business of verification, auditing and issuing security
certificates. If they cannot log why they made a certain decision in
the past based on the then gathered cryptographic material available,
they are simply not trustworthy at their job. Asking us to accept
"you should just trust we did the right DNSSEC checks in the past"
is pretty weak for a security institution, especially when you need
to resolve a dispute about a CAA record that was present at the time
but failed to prevent a certificate from being issued.

And if you cannot store a few kb of data per certificate (not) issued
based on a CAA record, then surely you're not mature enough to be in
the business of certifying and auditing anything.

Paul
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-23 Thread Tim Hollebeek via dev-security-policy
Right, this is a fair and excellent summary, and there are things I would 
improve about my responses if I had access to a time machine.  Constraints on 
my time are pretty brutal right now, and that does not always allow me to 
express myself as well as I would like.

 

I perceived, possibly incorrectly, a hesitation that adding at least some 
information about DNSSEC lookups would blow up the size of log files and would 
be difficult at scale.  Our discussion internally reached the conclusion that 
we’re supportive of requiring even more extensive CAA logging, even if it is 
expensive.  At Let’s Encrypt’s scale and our scale, that’s an important 
concern, and we think it should be publicly discussed (Comodo’s perspective 
would be interesting too).  So that’s what I was thinking and ended up saying 
really, really badly.

 

Your discussion here is excellent and worthy of a longer term discussion.  I 
was thinking more along the lines of “are there any appropriate quick fixes we 
might want to consider?”  The answer may be no.  But I do find it dangerous 
that minimal compliance with the current requirement can lead to situations 
like this.  That alone makes me want to improve the requirement.

 

And while I’m on the subject, since it’s related: Jeremy and I do have a new 
policy of trying to err on the side of publicly oversharing internal 
information and deliberations, whenever we can.  We think it’s the right thing 
to do.

 

-Tim

 

I definitely think we've gone off the rails here, so I want to try to right the 
cart here. You jumped in on a thread talking about DNSSEC providing smoking 
guns [1] - which is a grandstanding bad idea. It wasn't yours, but it's one 
that you jumped into the middle of the discussion, and began offering other 
interpretations (such as it being about disk space [2]), when the concern was 
precisely about trying to find a full cryptographic proof that can be stable 
over the lifetime of the certificate - which for Let's Encrypt is 90 days, but 
for some CAs, is up to 825-days [3].

 

As a systemic improvement, I think we're in violent agreement about the goal - 
which is to make sure that when things go wrong, there are reliable ways to 
identify where and why they went wrong - and perhaps simply in disagreement on 
the means and ways to effect that. You posited that the original motivation was 
that this specifically could not occur - but I don't think that was actually 
shared or expressed, precisely because there were going to be inherent limits 
to that information. I provided examples of where and how, under the existing 
BRs, that the steps taken are both consistent with and, arguably, above and 
beyond, what is required elsewhere - which is not to say we should not strive 
for more, but is to put down the notion from (other) contributors that somehow 
there's been less here.

 

I encouraged you to share more of your thinking, precisely because this is what 
allows us to collectively evaluate the fitness for purpose [4] - and the 
potential risks that well-intentioned changes can pose [5]. I don't think it 
makes sense to anchor on the CAA aspect as the basis to improve [6], when the 
real risk is the validation methods themselves. If our intent is to provide 
full data for diagnostic purposes, then how far does that rabbit hole go - do 
HTTP file-based validations need to record their DNS lookup chains? Their IP 
flows? Their BGP peer broadcasts? The question of this extreme rests on what is 
it we're trying to achieve - and the same issue here (namely, CAA being 
misparsed) could just as equally apply to HTTP streams, to WHOIS dataflows, or 
to BGP peers.

 

That's why I say it's systemic, and why I say that we should figure out what it 
is we're trying to achieve - and misguided framing [1] does not help further 
that.

 

[1] 
https://groups.google.com/d/msg/mozilla.dev.security.policy/7AcHi_MgKWE/7L2_zfgfCwAJ

[2] 
https://groups.google.com/d/msg/mozilla.dev.security.policy/7AcHi_MgKWE/gUT3t7B1CwAJ

[3] 
https://groups.google.com/d/msg/mozilla.dev.security.policy/7AcHi_MgKWE/O7QTGmInCwAJ

[4] 
https://groups.google.com/d/msg/mozilla.dev.security.policy/7AcHi_MgKWE/juHBkWV4CwAJ

[5] 
https://groups.google.com/d/msg/mozilla.dev.security.policy/7AcHi_MgKWE/O5rwCV96CwAJ

[6] 
https://groups.google.com/d/msg/mozilla.dev.security.policy/7AcHi_MgKWE/lpU2dpl8CwAJ

 

 

On Wed, May 23, 2018 at 11:29 AM, Tim Hollebeek via dev-security-policy 
mailto:dev-security-policy@lists.mozilla.org> > wrote:

You’re free to misattribute whatever motives you want to me.  They’re not true. 
 In fact, I would like to call on you yet again to cease speculating and 
imputing malicious motives onto well-intentioned posts.



The CAA logging requirements failed in this instance.  How do we make them 
better?  I’ll repeat that this isn’t a criticism of Let’s Encrypt, other than 
they had a bug like many of us have.  Mozilla wants this to be a place where we 
can reflect on incidents

Re: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-23 Thread Ryan Sleevi via dev-security-policy
Tim,

I definitely think we've gone off the rails here, so I want to try to right
the cart here. You jumped in on a thread talking about DNSSEC providing
smoking guns [1] - which is a grandstanding bad idea. It wasn't yours, but
it's one that you jumped into the middle of the discussion, and began
offering other interpretations (such as it being about disk space [2]),
when the concern was precisely about trying to find a full cryptographic
proof that can be stable over the lifetime of the certificate - which for
Let's Encrypt is 90 days, but for some CAs, is up to 825-days [3].

As a systemic improvement, I think we're in violent agreement about the
goal - which is to make sure that when things go wrong, there are reliable
ways to identify where and why they went wrong - and perhaps simply in
disagreement on the means and ways to effect that. You posited that the
original motivation was that this specifically could not occur - but I
don't think that was actually shared or expressed, precisely because there
were going to be inherent limits to that information. I provided examples
of where and how, under the existing BRs, that the steps taken are both
consistent with and, arguably, above and beyond, what is required elsewhere
- which is not to say we should not strive for more, but is to put down the
notion from (other) contributors that somehow there's been less here.

I encouraged you to share more of your thinking, precisely because this is
what allows us to collectively evaluate the fitness for purpose [4] - and
the potential risks that well-intentioned changes can pose [5]. I don't
think it makes sense to anchor on the CAA aspect as the basis to improve
[6], when the real risk is the validation methods themselves. If our intent
is to provide full data for diagnostic purposes, then how far does that
rabbit hole go - do HTTP file-based validations need to record their DNS
lookup chains? Their IP flows? Their BGP peer broadcasts? The question of
this extreme rests on what is it we're trying to achieve - and the same
issue here (namely, CAA being misparsed) could just as equally apply to
HTTP streams, to WHOIS dataflows, or to BGP peers.

That's why I say it's systemic, and why I say that we should figure out
what it is we're trying to achieve - and misguided framing [1] does not
help further that.

[1]
https://groups.google.com/d/msg/mozilla.dev.security.policy/7AcHi_MgKWE/7L2_zfgfCwAJ
[2]
https://groups.google.com/d/msg/mozilla.dev.security.policy/7AcHi_MgKWE/gUT3t7B1CwAJ
[3]
https://groups.google.com/d/msg/mozilla.dev.security.policy/7AcHi_MgKWE/O7QTGmInCwAJ
[4]
https://groups.google.com/d/msg/mozilla.dev.security.policy/7AcHi_MgKWE/juHBkWV4CwAJ
[5]
https://groups.google.com/d/msg/mozilla.dev.security.policy/7AcHi_MgKWE/O5rwCV96CwAJ
[6]
https://groups.google.com/d/msg/mozilla.dev.security.policy/7AcHi_MgKWE/lpU2dpl8CwAJ


On Wed, May 23, 2018 at 11:29 AM, Tim Hollebeek via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> You’re free to misattribute whatever motives you want to me.  They’re not
> true.  In fact, I would like to call on you yet again to cease speculating
> and imputing malicious motives onto well-intentioned posts.
>
>
>
> The CAA logging requirements failed in this instance.  How do we make them
> better?  I’ll repeat that this isn’t a criticism of Let’s Encrypt, other
> than they had a bug like many of us have.  Mozilla wants this to be a place
> where we can reflect on incidents and improve requirements.
>
>
>
> I’m not looking for something that is full cryptographic proof, that’s
> can’t be made to work.  What are the minimum logging requirements so that
> CAA logs can be used to reliably identify affected certificates when CAA
> bugs happen?  That’s the discussion going on internally here.  Love to hear
> other thoughts on this issue.
>
>
>
> Also, we’re trying to be increasingly transparent about what goes on at
> DigiCert.  I believe we’re the only CA that publishes what we will deliver
> *next* sprint.  I would actually like to share much MORE information than
> we currently do, and have authorization to do so, but the current climate
> is not conducive to that.
>
>
>
> The fact that I tend to get attacked in response to my sharing of internal
> thinking and incomplete ideas is not helpful or productive.  It will
> unfortunately just cause us to have to stop being as transparent.
>
>
>
> -Tim
>
>
>
> I am opposed to unnecessary grand-standing and hand-wringing, when
> demonstrably worse things are practiced.
>
>
>
>
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>
>
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-23 Thread Tim Hollebeek via dev-security-policy
You’re free to misattribute whatever motives you want to me.  They’re not true. 
 In fact, I would like to call on you yet again to cease speculating and 
imputing malicious motives onto well-intentioned posts.

 

The CAA logging requirements failed in this instance.  How do we make them 
better?  I’ll repeat that this isn’t a criticism of Let’s Encrypt, other than 
they had a bug like many of us have.  Mozilla wants this to be a place where we 
can reflect on incidents and improve requirements.

 

I’m not looking for something that is full cryptographic proof, that’s can’t be 
made to work.  What are the minimum logging requirements so that CAA logs can 
be used to reliably identify affected certificates when CAA bugs happen?  
That’s the discussion going on internally here.  Love to hear other thoughts on 
this issue.

 

Also, we’re trying to be increasingly transparent about what goes on at 
DigiCert.  I believe we’re the only CA that publishes what we will deliver 
*next* sprint.  I would actually like to share much MORE information than we 
currently do, and have authorization to do so, but the current climate is not 
conducive to that.

 

The fact that I tend to get attacked in response to my sharing of internal 
thinking and incomplete ideas is not helpful or productive.  It will 
unfortunately just cause us to have to stop being as transparent.

 

-Tim

 

I am opposed to unnecessary grand-standing and hand-wringing, when demonstrably 
worse things are practiced.

 



smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-22 Thread Nick Lamb via dev-security-policy
On 21 May 2018 14:59, Ryan Sleevi  wrote:Given the TTLs and the key sizes in use on DNSSEC records, why do you believe this?This is a smoking gun because it's extremely strong circumstantial evidence. Why else would these records exist except that in fact the "victim" published these DNS records at the time of (or shortly before) issuance?As with a real smoking gun there certainly could be other explanations, but the most obvious (that these were the genuine query answers) will usually be correct.If the reality is that fake records were supplied by a MitM using cracked 512 bit keys in order to fool the CA, the name owner victim is humiliated perhaps but they can take action to secure their names with a better key in future. And the Ecosystem gets a free warning as to the safety (rather otherwise) of short keys.If we suppose the CA systematically produced these fake records afterwards to justify a mis-issuance I'd say that's quite a credibility jump from the level of shenanigans we've gotten used to from CAs and it depends upon their victim having a short key for it to even be possible.These both sound like reasons to increase RSA keylengths for any names that are important for you, not justifications for inadequate logging.___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-22 Thread vdukhovni--- via dev-security-policy
On Tuesday, May 22, 2018 at 1:32:51 PM UTC-4, vduk...@gmail.com wrote:
> On Tuesday, May 22, 2018 at 1:04:31 PM UTC-4, Paul Wouters wrote:
> > On Tue, 22 May 2018, Ryan Sleevi via dev-security-policy wrote:
> > 
> > > However, what does this buy us? Considering that the ZSKs are 
> > > intentionally
> > > designed to be frequently rotated (24 - 72 hours), thus permitting weaker
> > > key sizes (RSA-512),
> > 
> > I don't know anyone who believes or uses these timings or key sizes. It
> > might be done as an _attack_ but it would be a very questionable
> > deployment.
> > 
> > I know of 12400 512 bit RSA ZSK's in a total of about 6.5 million. And I
> > consider those to be an operational mistake.
> 
> These are "legacy" zones where ~3 operators are having some trouble getting 
> better keys in place, but the swamp is slowly getting drained, a few months 
> back the total was ~12900, out of a smaller overall total.  ZSKs are 
> predominantly 1024-bit, with a noticeably large minority using 1280 bits.  
> Latest stats:
> 
>   https://lists.dns-oarc.net/pipermail/dns-operations/2018-May/017628.html

As for ZSK lifetime, among still extant domains the average (last seen - first 
seen) time of no longer published ZSKs is 59 days.  This is strongly indicative 
of a 60-day cycle at the larger DNSSEC-hosting providers.  The sample size is 
"5187051" retired ZSKs.

The standard deviation is 34 days. So we can estimate that most ZSKs are 
rotated in 30-90 days.  The sample size is ~5.2 million domains.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-22 Thread vdukhovni--- via dev-security-policy
On Tuesday, May 22, 2018 at 1:04:31 PM UTC-4, Paul Wouters wrote:
> On Tue, 22 May 2018, Ryan Sleevi via dev-security-policy wrote:
> 
> > However, what does this buy us? Considering that the ZSKs are intentionally
> > designed to be frequently rotated (24 - 72 hours), thus permitting weaker
> > key sizes (RSA-512),
> 
> I don't know anyone who believes or uses these timings or key sizes. It
> might be done as an _attack_ but it would be a very questionable
> deployment.
> 
> I know of 12400 512 bit RSA ZSK's in a total of about 6.5 million. And I
> consider those to be an operational mistake.

These are "legacy" zones where ~3 operators are having some trouble getting 
better keys in place, but the swamp is slowly getting drained, a few months 
back the total was ~12900, out of a smaller overall total.  ZSKs are 
predominantly 1024-bit, with a noticeably large minority using 1280 bits.  
Latest stats:

  https://lists.dns-oarc.net/pipermail/dns-operations/2018-May/017628.html

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-22 Thread Ryan Sleevi via dev-security-policy
On Tue, May 22, 2018 at 1:03 PM, Paul Wouters  wrote:

> On Tue, 22 May 2018, Ryan Sleevi via dev-security-policy wrote:
>
> However, what does this buy us? Considering that the ZSKs are intentionally
>> designed to be frequently rotated (24 - 72 hours), thus permitting weaker
>> key sizes (RSA-512),
>>
>
> I don't know anyone who believes or uses these timings or key sizes. It
> might be done as an _attack_ but it would be a very questionable
> deployment.
>
> I know of 12400 512 bit RSA ZSK's in a total of about 6.5 million. And I
> consider those to be an operational mistake.


http://tma.ifip.org/wordpress/wp-content/uploads/2017/06/tma2017_paper58.pdf
has some fairly damning empirical data about the reliability of those
records, which is not in line with your anecdata.


>
>
> However, let us not pretend that recording the bytes-on-the-wire DNS
>> responses, including for DNSSEC, necessarily helps us achieve some goal
>> about repudiation. Rather, it helps us identify issues such as what LE
>> highlighted - a need for quick and efficient information scanning to
>> discover possible impact - which is hugely valuable in its own right, and
>> is an area where I am certain that a majority of CAs are woefully lagging
>> in. That LE recorded this at all, beyond simply "checked DNS", is more of
>> a
>> credit than a disservice, and a mitigating factor more than malfeasance.
>>
>
> I see no reason why not to log the entire chain to the root. The only
> exception being maliciously long chains, which you can easilly cap
> and error out on after following about 50 DS records?


"Why not" is not a very compelling argument, especially given the
complexity involved, and the return to value being low (and itself being
inconsistent with other matters)
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-22 Thread Ryan Sleevi via dev-security-policy
I think your position is both misguided and unrealistic, and I think you're
using it as an opportunity to pursue a technical issue, when there is both
a systemic issue at play (and can be demonstrated through all validation
methods) and a fundamental misunderstanding as to the value it would
provided.

I'm glad you find the technical explanation a wall of text. Bad ideas do
take disproportionately more effort to shoot down then they do to propose.
That is an unfortunate asymmetric cost, and one the Web PKI has had to bear
for quite some time.

I'm not opposed to systemic improvements. I am opposed to unnecessary
grand-standing and hand-wringing, when demonstrably worse things are
practiced.

On Tue, May 22, 2018 at 12:51 PM, Tim Hollebeek 
wrote:

> What that wall of text completely misses is the point I and others have
> been trying to make.
>
>
>
> The logs have to have enough information so you don’t end up in the
> situation Let’s Encrypt is currently, and unfortunately, in.  Yes, what
> they did is compliant, and that’s exactly what most concerns me.  It’s not
> about Let’s Encrypt, which just appears to have made a mistake, it
> happens.  It’s about whether the rules need to be improved to reduce the
> likelihood of another CA ending up in the same situation.
>
>
>
> As a separate issue, we’re looking into making sure we never end up in
> that situation, and as you say, other CAs should be too.  We always reserve
> the right to do things that vastly exceed minimal compliance.
>
>
>
> That should be something you should support, instead of producing
> increasingly long and condescending walls of text.  I know how DNSSEC works.
>
>
>
> -Tim
>
>
>
> *From:* Ryan Sleevi [mailto:r...@sleevi.com]
> *Sent:* Tuesday, May 22, 2018 12:43 PM
> *To:* Tim Hollebeek 
> *Cc:* r...@sleevi.com; Nick Lamb ;
> mozilla-dev-security-policy ;
> Jacob Hoffman-Andrews 
> *Subject:* Re: 2018.05.18 Let's Encrypt CAA tag value case sensitivity
> incident
>
>
>
>
>
>
>
> On Tue, May 22, 2018 at 12:14 PM, Tim Hollebeek <
> tim.holleb...@digicert.com> wrote:
>
> What precisely was the antecedent of “this” in your message?  Re-reading
> it, I’m not clear which sentence you were referring to.
>
>
>
> The only reasons I can think of for not keeping DNSSEC signed RRs are
> storage and/or performance, and we think those concerns should not be the
> driving force in logging requirements (within reason).
>
>
>
> Are there other good reasons not to keep the DNSSEC signed RRs associated
> with DNSSEC CAA lookups?
>
>
>
> I believe you are operating on a flawed understanding of the value of
> DNSSEC for forensic purposes, given the statement that "I absolutely would
> expect Let's Encrypt to produce DNSSEC signed RRs that match up to their
> story. The smoking gun for such scenarios exists, and CAs are, or should
> be, under no illusions that it's their job to produce it."
>
>
>
> To me, this demonstrates a flawed, naive understanding of DNSSEC, and in
> particular, its value in forensic post-issuance claims, and also a flawed
> understanding about how DNS works, in a way that, as proposed, would be
> rather severely damaging to good operation and expected use of DNS. While
> it's easy to take shots on the basis of this, or to claim that the only
> reason not to store is because disk space, it would be better to take a
> step back before making those claims.
>
>
>
> DNSSEC works as short-lived signatures, in which the proper operation of
> DNSSEC is accounted for through frequent key rotation. DNS works through
> relying on factors such as TTLs to serve as effective safeguards against
> overloading the DNS system, and its hierarchal distribution allows for
> effective scaling of that system.
>
>
>
> A good primer to DNSSEC can be had at https://www.cloudflare.com/
> dns/dnssec/how-dnssec-works/ , although I'm sure many other introductory
> texts would suffice to highlight the problem.
>
>
>
> Let us start with a naive claim that the CA should be able to produce the
> entire provenance chain for the DNSSEC-signed leaf record. This would be
> the chain of KSKs, ZSKs, the signed RRSets, as well as the DS records,
> disabling caching for all of these (or, presumably, duplicating it such
> that the .com KSK and ZSK are recorded for millions of certs).
>
>
>
> However, what does this buy us? Considering that the ZSKs are
> intentionally designed to be frequently rotated (24 - 72 hours), thus
> permitting weaker key sizes (RSA-512), a provenance chain ultimately merely
> serves to establish, in practice, one of a series of 512-bit RSA
> signatures. Are we to believe that

Re: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-22 Thread Paul Wouters via dev-security-policy

On Tue, 22 May 2018, Ryan Sleevi via dev-security-policy wrote:


However, what does this buy us? Considering that the ZSKs are intentionally
designed to be frequently rotated (24 - 72 hours), thus permitting weaker
key sizes (RSA-512),


I don't know anyone who believes or uses these timings or key sizes. It
might be done as an _attack_ but it would be a very questionable
deployment.

I know of 12400 512 bit RSA ZSK's in a total of about 6.5 million. And I
consider those to be an operational mistake.


However, let us not pretend that recording the bytes-on-the-wire DNS
responses, including for DNSSEC, necessarily helps us achieve some goal
about repudiation. Rather, it helps us identify issues such as what LE
highlighted - a need for quick and efficient information scanning to
discover possible impact - which is hugely valuable in its own right, and
is an area where I am certain that a majority of CAs are woefully lagging
in. That LE recorded this at all, beyond simply "checked DNS", is more of a
credit than a disservice, and a mitigating factor more than malfeasance.


I see no reason why not to log the entire chain to the root. The only
exception being maliciously long chains, which you can easilly cap
and error out on after following about 50 DS records?

Paul
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-22 Thread Tim Hollebeek via dev-security-policy
What that wall of text completely misses is the point I and others have been 
trying to make.

 

The logs have to have enough information so you don’t end up in the situation 
Let’s Encrypt is currently, and unfortunately, in.  Yes, what they did is 
compliant, and that’s exactly what most concerns me.  It’s not about Let’s 
Encrypt, which just appears to have made a mistake, it happens.  It’s about 
whether the rules need to be improved to reduce the likelihood of another CA 
ending up in the same situation.

 

As a separate issue, we’re looking into making sure we never end up in that 
situation, and as you say, other CAs should be too.  We always reserve the 
right to do things that vastly exceed minimal compliance.

 

That should be something you should support, instead of producing increasingly 
long and condescending walls of text.  I know how DNSSEC works.

 

-Tim

 

From: Ryan Sleevi [mailto:r...@sleevi.com] 
Sent: Tuesday, May 22, 2018 12:43 PM
To: Tim Hollebeek 
Cc: r...@sleevi.com; Nick Lamb ; mozilla-dev-security-policy 
; Jacob Hoffman-Andrews 

Subject: Re: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

 

 

 

On Tue, May 22, 2018 at 12:14 PM, Tim Hollebeek mailto:tim.holleb...@digicert.com> > wrote:

What precisely was the antecedent of “this” in your message?  Re-reading it, 
I’m not clear which sentence you were referring to.

 

The only reasons I can think of for not keeping DNSSEC signed RRs are storage 
and/or performance, and we think those concerns should not be the driving force 
in logging requirements (within reason).

 

Are there other good reasons not to keep the DNSSEC signed RRs associated with 
DNSSEC CAA lookups?

 

I believe you are operating on a flawed understanding of the value of DNSSEC 
for forensic purposes, given the statement that "I absolutely would expect 
Let's Encrypt to produce DNSSEC signed RRs that match up to their story. The 
smoking gun for such scenarios exists, and CAs are, or should be, under no 
illusions that it's their job to produce it."

 

To me, this demonstrates a flawed, naive understanding of DNSSEC, and in 
particular, its value in forensic post-issuance claims, and also a flawed 
understanding about how DNS works, in a way that, as proposed, would be rather 
severely damaging to good operation and expected use of DNS. While it's easy to 
take shots on the basis of this, or to claim that the only reason not to store 
is because disk space, it would be better to take a step back before making 
those claims.

 

DNSSEC works as short-lived signatures, in which the proper operation of DNSSEC 
is accounted for through frequent key rotation. DNS works through relying on 
factors such as TTLs to serve as effective safeguards against overloading the 
DNS system, and its hierarchal distribution allows for effective scaling of 
that system.

 

A good primer to DNSSEC can be had at 
https://www.cloudflare.com/dns/dnssec/how-dnssec-works/ , although I'm sure 
many other introductory texts would suffice to highlight the problem.

 

Let us start with a naive claim that the CA should be able to produce the 
entire provenance chain for the DNSSEC-signed leaf record. This would be the 
chain of KSKs, ZSKs, the signed RRSets, as well as the DS records, disabling 
caching for all of these (or, presumably, duplicating it such that the .com KSK 
and ZSK are recorded for millions of certs).

 

However, what does this buy us? Considering that the ZSKs are intentionally 
designed to be frequently rotated (24 - 72 hours), thus permitting weaker key 
sizes (RSA-512), a provenance chain ultimately merely serves to establish, in 
practice, one of a series of 512-bit RSA signatures. Are we to believe that 
these 512-bit signatures, on whose keys have explicitly expired, are somehow a 
smoking gun? Surely not, that'd be laughably ludicrous - and yet that is 
explicitly what you propose in the quoted text.

 

So, again I ask, what is it you're trying to achieve? Are you trying to provide 
an audit trail? If so, what LE did is fully conformant with that, and any CA 
that wishes to disagree should look inward, and see whether their audit trail 
records actual phone calls (versus records of such phone calls), whether their 
filing systems store the actual records (versus scanned copies of those 
records), whether all mail is delivered certified delivery, and how they recall 
the results of that certified delivery.

 

However, let us not pretend that recording the bytes-on-the-wire DNS responses, 
including for DNSSEC, necessarily helps us achieve some goal about repudiation. 
Rather, it helps us identify issues such as what LE highlighted - a need for 
quick and efficient information scanning to discover possible impact - which is 
hugely valuable in its own right, and is an area where I am certain that a 
majority of CAs are woefully lagging in. That LE recorded this at all, beyon

Re: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-22 Thread Ryan Sleevi via dev-security-policy
On Tue, May 22, 2018 at 12:14 PM, Tim Hollebeek 
wrote:

> What precisely was the antecedent of “this” in your message?  Re-reading
> it, I’m not clear which sentence you were referring to.
>
>
>
> The only reasons I can think of for not keeping DNSSEC signed RRs are
> storage and/or performance, and we think those concerns should not be the
> driving force in logging requirements (within reason).
>
>
>
> Are there other good reasons not to keep the DNSSEC signed RRs associated
> with DNSSEC CAA lookups?
>

I believe you are operating on a flawed understanding of the value of
DNSSEC for forensic purposes, given the statement that "I absolutely would
expect Let's Encrypt to produce DNSSEC signed RRs that match up to their
story. The smoking gun for such scenarios exists, and CAs are, or should
be, under no illusions that it's their job to produce it."

To me, this demonstrates a flawed, naive understanding of DNSSEC, and in
particular, its value in forensic post-issuance claims, and also a flawed
understanding about how DNS works, in a way that, as proposed, would be
rather severely damaging to good operation and expected use of DNS. While
it's easy to take shots on the basis of this, or to claim that the only
reason not to store is because disk space, it would be better to take a
step back before making those claims.

DNSSEC works as short-lived signatures, in which the proper operation of
DNSSEC is accounted for through frequent key rotation. DNS works through
relying on factors such as TTLs to serve as effective safeguards against
overloading the DNS system, and its hierarchal distribution allows for
effective scaling of that system.

A good primer to DNSSEC can be had at
https://www.cloudflare.com/dns/dnssec/how-dnssec-works/ , although I'm sure
many other introductory texts would suffice to highlight the problem.

Let us start with a naive claim that the CA should be able to produce the
entire provenance chain for the DNSSEC-signed leaf record. This would be
the chain of KSKs, ZSKs, the signed RRSets, as well as the DS records,
disabling caching for all of these (or, presumably, duplicating it such
that the .com KSK and ZSK are recorded for millions of certs).

However, what does this buy us? Considering that the ZSKs are intentionally
designed to be frequently rotated (24 - 72 hours), thus permitting weaker
key sizes (RSA-512), a provenance chain ultimately merely serves to
establish, in practice, one of a series of 512-bit RSA signatures. Are we
to believe that these 512-bit signatures, on whose keys have explicitly
expired, are somehow a smoking gun? Surely not, that'd be laughably
ludicrous - and yet that is explicitly what you propose in the quoted text.

So, again I ask, what is it you're trying to achieve? Are you trying to
provide an audit trail? If so, what LE did is fully conformant with that,
and any CA that wishes to disagree should look inward, and see whether
their audit trail records actual phone calls (versus records of such phone
calls), whether their filing systems store the actual records (versus
scanned copies of those records), whether all mail is delivered certified
delivery, and how they recall the results of that certified delivery.

However, let us not pretend that recording the bytes-on-the-wire DNS
responses, including for DNSSEC, necessarily helps us achieve some goal
about repudiation. Rather, it helps us identify issues such as what LE
highlighted - a need for quick and efficient information scanning to
discover possible impact - which is hugely valuable in its own right, and
is an area where I am certain that a majority of CAs are woefully lagging
in. That LE recorded this at all, beyond simply "checked DNS", is more of a
credit than a disservice, and a mitigating factor more than malfeasance.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-22 Thread Tim Hollebeek via dev-security-policy
What precisely was the antecedent of “this” in your message?  Re-reading it, 
I’m not clear which sentence you were referring to.

 

The only reasons I can think of for not keeping DNSSEC signed RRs are storage 
and/or performance, and we think those concerns should not be the driving force 
in logging requirements (within reason).

 

Are there other good reasons not to keep the DNSSEC signed RRs associated with 
DNSSEC CAA lookups?

 

-Tim



smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-22 Thread Ryan Sleevi via dev-security-policy
On Tue, May 22, 2018 at 11:17 AM, Tim Hollebeek 
wrote:

>
> > Given the TTLs and the key sizes in use on DNSSEC records, why do you
> believe
> > this?
>
> DigiCert is not sympathetic to disk space as a reason to not keep
> sufficient
> information
> in order to detect misissuance due to CAA failures.
>
> In fact, inspired by this issue, we are taking a look internally at what we
> log, and
> considering the feasibility of logging even more information, including
> full
> DNSSEC
> signed RRs.
>

Hi Tim,

I'm not sure why you mentioned disk space - could you help me understand
why you brought that up?

It doesn't actually seem to respond to the question - which is the TTLs and
key sizes of DNSSEC records affect both the verifiability of such
information and its ability to be used for non-repudiation (which is
ostensibly the goal of such record keeping)

I think your response presently rather severely misunderstands DNSSEC or
what the implications of what you propose mean, but I look forward to
DigiCert actually sharing what it proposes to do, so that the community can
discuss whether it reasonably achieves those goals with a proposed
implementation. Otherwise, we are arguably no different from where we are
today, in which CAs do what they believe is reasonable for one purpose, but
perhaps fail to achieve that in light of potential risks.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-22 Thread Tim Hollebeek via dev-security-policy

> Given the TTLs and the key sizes in use on DNSSEC records, why do you
believe
> this?

DigiCert is not sympathetic to disk space as a reason to not keep sufficient
information
in order to detect misissuance due to CAA failures.

In fact, inspired by this issue, we are taking a look internally at what we
log, and
considering the feasibility of logging even more information, including full
DNSSEC 
signed RRs.

-Tim



smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-21 Thread Eric Mill via dev-security-policy
On Mon, May 21, 2018, 9:07 AM Nick Lamb via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> As a lowly relying party, I have to say I'd expect better here.
>
> In particular, if example.com says their DNSSEC signed CAA forbade Let's
> Encrypt from issuing, and Let's Encrypt says otherwise, I absolutely would
> expect Let's Encrypt to produce DNSSEC signed RRs that match up to their
> story. The smoking gun for such scenarios exists, and CAs are, or should
> be, under no illusions that it's their job to produce it.
>
> A log entry that says "CAA: check OK" is worthless for exactly the reason
> this thread exists, record the RRs themselves, byte for byte.
>

FWIW, I don't think Let's Encrypt was saying that they just store "OK", but
that they store a parsed representation of the record rather than the raw
RR.

I understand you're asking for the raw RR to be stored, and that seems like
a reasonable request and (especially now) a reasonable interpretation of
the BRs. But your message might have left the impression that LE only
stored an OK/not-OK bit, which isn't how I read LE's email or code.


> We've seen banks taking this sort of shortcut in the past and it did them
> no favour with me. I want to see the EMV transaction signature that proves
> a correct PIN was used, not a blurry print from some mainframe with an
> annotation that says "A 4 in this column indicates PIN confirmed".
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-21 Thread Matthew Hardeman via dev-security-policy
I concur with Mr. Lamb's position.

I agree not only with respect to DNSSEC signatures but to the entire query
and RR set upon which the CAs decisions relied.

I do acknowledge the challenge that Mr. Hoffman-Andrews surfaced: that it
may involve significant effort to correlate the various queries and
responses which underpin the higher level queries that the CA software
makes to their recursive resolver.



On Mon, May 21, 2018 at 8:06 AM, Nick Lamb via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> As a lowly relying party, I have to say I'd expect better here.
>
> In particular, if example.com says their DNSSEC signed CAA forbade Let's
> Encrypt from issuing, and Let's Encrypt says otherwise, I absolutely would
> expect Let's Encrypt to produce DNSSEC signed RRs that match up to their
> story. The smoking gun for such scenarios exists, and CAs are, or should
> be, under no illusions that it's their job to produce it.
>
> A log entry that says "CAA: check OK" is worthless for exactly the reason
> this thread exists, record the RRs themselves, byte for byte.
>
> We've seen banks taking this sort of shortcut in the past and it did them
> no favour with me. I want to see the EMV transaction signature that proves
> a correct PIN was used, not a blurry print from some mainframe with an
> annotation that says "A 4 in this column indicates PIN confirmed".
>
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>
>
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-21 Thread Ryan Sleevi via dev-security-policy
On Mon, May 21, 2018 at 9:06 AM, Nick Lamb via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> As a lowly relying party, I have to say I'd expect better here.
>
> In particular, if example.com says their DNSSEC signed CAA forbade Let's
> Encrypt from issuing, and Let's Encrypt says otherwise, I absolutely would
> expect Let's Encrypt to produce DNSSEC signed RRs that match up to their
> story. The smoking gun for such scenarios exists, and CAs are, or should
> be, under no illusions that it's their job to produce it.
>

Given the TTLs and the key sizes in use on DNSSEC records, why do you
believe this?


> A log entry that says "CAA: check OK" is worthless for exactly the reason
> this thread exists, record the RRs themselves, byte for byte.
>
> We've seen banks taking this sort of shortcut in the past and it did them
> no favour with me. I want to see the EMV transaction signature that proves
> a correct PIN was used, not a blurry print from some mainframe with an
> annotation that says "A 4 in this column indicates PIN confirmed".
>
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-21 Thread Nick Lamb via dev-security-policy
As a lowly relying party, I have to say I'd expect better here.In particular, if example.com says their DNSSEC signed CAA forbade Let's Encrypt from issuing, and Let's Encrypt says otherwise, I absolutely would expect Let's Encrypt to produce DNSSEC signed RRs that match up to their story. The smoking gun for such scenarios exists, and CAs are, or should be, under no illusions that it's their job to produce it.A log entry that says "CAA: check OK" is worthless for exactly the reason this thread exists, record the RRs themselves, byte for byte.We've seen banks taking this sort of shortcut in the past and it did them no favour with me. I want to see the EMV transaction signature that proves a correct PIN was used, not a blurry print from some mainframe with an annotation that says "A 4 in this column indicates PIN confirmed".___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-21 Thread Tim Hollebeek via dev-security-policy
Ok.  My biggest concern is not you guys, who are pretty security conscious,
but whether we need to improve the language to make it more clear that the
logging has to be sufficient so that in the event of a bug in the CAA logic,
it is possible to determine which issued certificates are affected and how.

It may be hard to come up with such language, but that was the intent of the
language that was currently there, and if it failed to adequately express
that and needs improvement, we should consider improvements.

-Tim

> -Original Message-
> From: dev-security-policy [mailto:dev-security-policy-
> bounces+tim.hollebeek=digicert@lists.mozilla.org] On Behalf Of
> jacob.hoffmanandrews--- via dev-security-policy
> Sent: Friday, May 18, 2018 2:05 PM
> To: mozilla-dev-security-pol...@lists.mozilla.org
> Subject: Re: 2018.05.18 Let's Encrypt CAA tag value case sensitivity
incident
> 
> On Friday, May 18, 2018 at 10:52:25 AM UTC-7, Tim Hollebeek wrote:
> > > Our logging of the CAA records processed does not provide the case
> > > information we need to determine whether other issuances were
> > > affected by this bug.
> >
> > We put a requirement in the BRs specifically so this problem could not
occur:
> >
> > "The CA SHALL log all actions taken, if any, consistent with its
> > processing practice."
> 
> To be clear, we do log every CAA lookup
> (https://clicktime.symantec.com/a/1/3HdZcXUFLJSV752s3qQoA0A6fzGR2WGY
> aa8Vb4eW0is=?d=2Gn0FYgiBMMDYQjPk2an9e5zCmdH8aOEM_a2k8A8ew7ArD
> v0URhjtIEPzgzNAA47eRfCIlwMe3ctM0pXRF0VTUqLXosrX-
> i7uR64LKqy873Aqy3Mii7JCWLQHOPpQWcNp3FWnBu624ZZQANcMTNtqbgJea
> RmalbiW1vABzoOte0IZNRfmkmQES8Nr67RP515OPIifYcBpDbj7_SzCddoRw_Im
> KUgkD70LCvR8NLdXBfk2_bpdPsIPd2MYiWXCpp3qWI_1_XQ9z_eyC1QGzTtcxOF
> DLgSe4rRoyLJQqTaoooPKFGFUX_3SIzP6bjz_SEXUqSWbBz7XRVk1YrZczQFl1NM
> N2BdjOE5nsDTre28cQDZNQ-1dOqbirW3-
> CbCQwcvVjIQBfy3i8vCqAUh4xoVlvk16SNfyCeF3pFZYJ_TtcaaO9Tr8cUp9RHfdwC
> 20jfPFtyRHXscZwhVP2Lfucn9JLErK7kbSczQrqe3GrqCICQf27hRDOnBq5_C&u=ht
> tps%3A%2F%2Fgithub.com%2Fletsencrypt%2Fboulder%2Fblob%2Fmaster%2Fv
> a%2Fcaa.go%23L47). However, we do it at too high a level of abstraction:
It
> doesn't contain the unprocessed return values from DNS. We plan to improve
> that as part of our remediation.
> 
> Our ideal would be to log all DNS traffic associated with each issuance,
> including A, , TXT, and CAA lookups. We initially experimented with
this
> by capturing the full verbose output from our recursive resolver, but
concluded
> that it was not usable for investigations because it was not possible to
associate
> specific query/response pairs with the validation request that caused them
(for
> instance, consider NS referrals, CNAME indirection, and caching). I think
this is
> definitely an area of improvement we could pursue in the DNS ecosystem
that
> would be particularly beneficial for CAs.
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://clicktime.symantec.com/a/1/OveGoqfqvlk5eSNt6tWZIf0e1XY5TBocWaY
> xmYcWV4s=?d=2Gn0FYgiBMMDYQjPk2an9e5zCmdH8aOEM_a2k8A8ew7ArDv0
> URhjtIEPzgzNAA47eRfCIlwMe3ctM0pXRF0VTUqLXosrX-
> i7uR64LKqy873Aqy3Mii7JCWLQHOPpQWcNp3FWnBu624ZZQANcMTNtqbgJea
> RmalbiW1vABzoOte0IZNRfmkmQES8Nr67RP515OPIifYcBpDbj7_SzCddoRw_Im
> KUgkD70LCvR8NLdXBfk2_bpdPsIPd2MYiWXCpp3qWI_1_XQ9z_eyC1QGzTtcxOF
> DLgSe4rRoyLJQqTaoooPKFGFUX_3SIzP6bjz_SEXUqSWbBz7XRVk1YrZczQFl1NM
> N2BdjOE5nsDTre28cQDZNQ-1dOqbirW3-
> CbCQwcvVjIQBfy3i8vCqAUh4xoVlvk16SNfyCeF3pFZYJ_TtcaaO9Tr8cUp9RHfdwC
> 20jfPFtyRHXscZwhVP2Lfucn9JLErK7kbSczQrqe3GrqCICQf27hRDOnBq5_C&u=ht
> tps%3A%2F%2Flists.mozilla.org%2Flistinfo%2Fdev-security-policy


smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-18 Thread jacob.hoffmanandrews--- via dev-security-policy
On Friday, May 18, 2018 at 10:52:25 AM UTC-7, Tim Hollebeek wrote:
> > Our logging of the CAA records processed does not provide the case
> > information we need to determine whether other issuances were affected by
> > this bug.
> 
> We put a requirement in the BRs specifically so this problem could not occur:
> 
> "The CA SHALL log all actions taken, if any, consistent with its processing 
> practice."

To be clear, we do log every CAA lookup 
(https://github.com/letsencrypt/boulder/blob/master/va/caa.go#L47). However, we 
do it at too high a level of abstraction: It doesn't contain the unprocessed 
return values from DNS. We plan to improve that as part of our remediation.

Our ideal would be to log all DNS traffic associated with each issuance, 
including A, , TXT, and CAA lookups. We initially experimented with this by 
capturing the full verbose output from our recursive resolver, but concluded 
that it was not usable for investigations because it was not possible to 
associate specific query/response pairs with the validation request that caused 
them (for instance, consider NS referrals, CNAME indirection, and caching). I 
think this is definitely an area of improvement we could pursue in the DNS 
ecosystem that would be particularly beneficial for CAs.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-18 Thread Tim Hollebeek via dev-security-policy
> Our logging of the CAA records processed does not provide the case
> information we need to determine whether other issuances were affected by
> this bug.

We put a requirement in the BRs specifically so this problem could not occur:

"The CA SHALL log all actions taken, if any, consistent with its processing 
practice."

-Tim


smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-18 Thread Jonathan Rudenberg via dev-security-policy
Oops, I missed item 1, disregard :)

On Fri, May 18, 2018, at 13:45, Jonathan Rudenberg via dev-security-policy 
wrote:
> On Fri, May 18, 2018, at 13:00, josh--- via dev-security-policy wrote:
> > 2. Performing a scan of current CAA records for the domain names we have 
> > issued for in the past 90 days, specifically looking for tags in CAA 
> > records with non-lowercase characters. We’ll examine such instances on a 
> > case-by-case basis to determine the appropriate action.
> 
> Do you log the full CAA record set (if any) for each authorized domain? 
> If so, can you use those instead of the "current" records to find 
> potentially unauthorized issuance?
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: 2018.05.18 Let's Encrypt CAA tag value case sensitivity incident

2018-05-18 Thread Jonathan Rudenberg via dev-security-policy
On Fri, May 18, 2018, at 13:00, josh--- via dev-security-policy wrote:
> 2. Performing a scan of current CAA records for the domain names we have 
> issued for in the past 90 days, specifically looking for tags in CAA 
> records with non-lowercase characters. We’ll examine such instances on a 
> case-by-case basis to determine the appropriate action.

Do you log the full CAA record set (if any) for each authorized domain? If so, 
can you use those instead of the "current" records to find potentially 
unauthorized issuance?
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy