Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-19 Thread Ryan Sleevi
On Fri, June 19, 2015 11:10 am, Brian Smith wrote: The current set of roots is already too big for small devices to reasonably manage, and that problem will get worse as more roots are added. Thus, small devices have to take a subset of Mozilla's/Microsoft's/Apple's roots. Without

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-19 Thread Gervase Markham
On 17/06/15 22:50, Brian Smith wrote: By small scope, I'm referring to CAs who limit their scope to a certain geographical region, language, or type of institution. I'm not sure how that neuters my objection. CAs who do more than DV will need to have local infrastructure in place for identity

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-18 Thread Dimitris Zacharopoulos
On 18/6/2015 12:50 πμ, Brian Smith wrote: I did, in my original message. HARICA's constraint includes *.org, which is much broader in scope than they intend to issue certificates for. dNSName constraints can't describe HARICA's scope. Cheers, Brian Hi Brian, It is very common for projects,

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-17 Thread Brian Smith
Gervase Markham g...@mozilla.org wrote: On 06/06/15 02:12, Brian Smith wrote: Richard Barnes rbar...@mozilla.com wrote: Small CAs are a bad risk/reward trade-off. Why do CAs with small scope even get added to Mozilla's root program in the first place? Why not just say your scope is

Re: Name-constraining government CAs, or not

2015-06-12 Thread Tom Ritter
Are https://technet.microsoft.com/en-us/library/cc751157.aspx and http://aka.ms/auditreqs the MSFT components (previously?) under NDA? Government CAs must restrict server authentication to .gov domains and may only issues other certificates to the ISO3166 country codes that the country has

Re: Name-constraining government CAs, or not

2015-06-12 Thread Peter Bowen
On Fri, Jun 12, 2015 at 3:46 PM, Tom Ritter t...@ritter.vg wrote: Are https://technet.microsoft.com/en-us/library/cc751157.aspx and http://aka.ms/auditreqs the MSFT components (previously?) under NDA? The published requirements are not under NDA. Microsoft released a draft version under NDA

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-11 Thread Gervase Markham
On 06/06/15 02:12, Brian Smith wrote: Richard Barnes rbar...@mozilla.com wrote: Small CAs are a bad risk/reward trade-off. Why do CAs with small scope even get added to Mozilla's root program in the first place? Why not just say your scope is too limited to be worthwhile for us to

Re: Name-constraining government CAs, or not

2015-06-11 Thread Gervase Markham
On 31/05/15 23:43, Ryan Sleevi wrote: I agree, this is the strongest argument against government CAs presented in this thread, and I wish this, rather than the musings of secret courts and maybe impossibles, was the core of your argument. These arguments apply not just to government CAs

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-10 Thread Hubert Kario
On Tuesday 09 June 2015 11:57:40 Rick Andrews wrote: On Tuesday, June 9, 2015 at 3:05:30 AM UTC-7, Hubert Kario wrote: True, OTOH, if a third party says that there was a misissuance, that means there was one. I disagree. Only the domain owner knows for sure what is a misissuance, and what

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-10 Thread Matt Palmer
On Tue, Jun 09, 2015 at 12:00:23PM -0700, Rick Andrews wrote: On Tuesday, June 9, 2015 at 7:45:05 AM UTC-7, Kurt Roeckx wrote: On 2015-06-09 15:26, Peter Kurrasch wrote: 3) How frequently might such tools run? Or to put it differently, how much time do I probably have between when I

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-10 Thread Matt Palmer
On Tue, Jun 09, 2015 at 08:26:55AM -0500, Peter Kurrasch wrote: 1) How to exclude domains from the search? For example I want to find gmail certs but exclude something like eggmail which could be a false positive. Constrain your search to domains which have a name part which is exactly

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-10 Thread Rob Stradling
On 10/06/15 01:54, Matt Palmer wrote: On Tue, Jun 09, 2015 at 10:44:58AM +0100, Rob Stradling wrote: On 09/06/15 04:05, Clint Wilson wrote: To further support your claims here, Chris, there are already tools coming out which actively monitor domains in CT logs and can be set up with

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-10 Thread Rick Andrews
I don't understand. The domain owner/admin is not a third party. -Rick On Jun 10, 2015, at 4:01 AM, Hubert Kario hka...@redhat.com wrote: On Tuesday 09 June 2015 11:57:40 Rick Andrews wrote: On Tuesday, June 9, 2015 at 3:05:30 AM UTC-7, Hubert Kario wrote: True, OTOH, if a third party

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-10 Thread Hubert Kario
On Wednesday 10 June 2015 07:28:06 Rick Andrews wrote: I don't understand. The domain owner/admin is not a third party. the third party in question was an entity running the CT service and since they can produce a certificate signed by a trusted CA as a proof of misissuance, the data itself

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-09 Thread Rob Stradling
On 09/06/15 04:05, Clint Wilson wrote: To further support your claims here, Chris, there are already tools coming out which actively monitor domains in CT logs and can be set up with notifications of misissuance: https://www.digicert.com/certificate-monitoring/

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-09 Thread Kurt Roeckx
On 2015-06-09 15:26, Peter Kurrasch wrote: 3) How frequently might such tools run? Or to put it differently, how much time do I probably have between when I issue a gmail cert and when someone figures it out (and of course how much longer before my illegitimate cert is no longer valid)? I

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-09 Thread Rick Andrews
On Tuesday, June 9, 2015 at 3:05:30 AM UTC-7, Hubert Kario wrote: True, OTOH, if a third party says that there was a misissuance, that means there was one. I disagree. Only the domain owner knows for sure what is a misissuance, and what isn't. It seems likely that I might turn over all known

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-09 Thread Rick Andrews
On Tuesday, June 9, 2015 at 7:45:05 AM UTC-7, Kurt Roeckx wrote: On 2015-06-09 15:26, Peter Kurrasch wrote: 3) How frequently might such tools run? Or to put it differently, how much time do I probably have between when I issue a gmail cert and when someone figures it out (and of course

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-09 Thread Kurt Roeckx
On Tue, Jun 09, 2015 at 12:00:23PM -0700, Rick Andrews wrote: On Tuesday, June 9, 2015 at 7:45:05 AM UTC-7, Kurt Roeckx wrote: On 2015-06-09 15:26, Peter Kurrasch wrote: 3) How frequently might such tools run? Or to put it differently, how much time do I probably have between when I

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-09 Thread Rick Andrews
On Tuesday, June 9, 2015 at 12:23:57 PM UTC-7, Kurt Roeckx wrote: On Tue, Jun 09, 2015 at 12:00:23PM -0700, Rick Andrews wrote: On Tuesday, June 9, 2015 at 7:45:05 AM UTC-7, Kurt Roeckx wrote: On 2015-06-09 15:26, Peter Kurrasch wrote: 3) How frequently might such tools run? Or to put it

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-08 Thread Chris Palmer
On Fri, Jun 5, 2015 at 8:04 AM, Peter Kurrasch fhw...@gmail.com wrote: Certificate Transparency gets us what we want, I think. CT works globally, and is safer, and significantly changes the trust equation: ‎ * Reduces to marginal/effectively destroys the attack value of mis-issuance Please

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-08 Thread Peter Kurrasch
My point is that you cannot say CT effectively destroys the attack value of mis-issuance and then as justification say that you are assuming someone will notice. This is the gap I'm talking about: the space between when a mis-issuance takes place and when someone notices. For the sake of

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-08 Thread Clint Wilson
To further support your claims here, Chris, there are already tools coming out which actively monitor domains in CT logs and can be set up with notifications of misissuance: https://www.digicert.com/certificate-monitoring/

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-05 Thread Peter Kurrasch
You have a lot of ideas in here, Richard! Asking the question what is the increased risk we face by introducing new CA's and new roots into the trust store? is a good idea. How we go about answering that gets tricky. It might be helpful to articulate some threat models facing CA's, both

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-05 Thread Brian Smith
Richard Barnes rbar...@mozilla.com wrote: Small CAs are a bad risk/reward trade-off. Why do CAs with small scope even get added to Mozilla's root program in the first place? Why not just say your scope is too limited to be worthwhile for us to include? One way to balance this equation

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-05 Thread Eric Mill
On Thu, Jun 4, 2015 at 9:18 PM, Chris Palmer pal...@google.com wrote: Certificate Transparency gets us what we want, I think. CT works globally, and is safer, and significantly changes the trust equation: * Reduces to marginal/effectively destroys the attack value of mis-issuance * Makes it

Re: CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-04 Thread Matt Palmer
Hi Richard, On Thu, Jun 04, 2015 at 02:44:00PM -0400, Richard Barnes wrote: The thing that was driving my earlier proposal with regard to name constraints was a feeling of imbalance. With every CA we add to our program we add risk for every site on the web. That cost is supposed to be

CA scope transparency (was Re: Name-constraining government CAs, or not)

2015-06-04 Thread Richard Barnes
I'd like to try to up-level some of the discussions we're having about name constraints, to see if we can find some higher-level consensus. The thing that was driving my earlier proposal with regard to name constraints was a feeling of imbalance. With every CA we add to our program we add risk

Re: Name-constraining government CAs, or not

2015-05-31 Thread Eric Mill
On Sun, May 31, 2015 at 6:43 PM, Ryan Sleevi ryan-mozdevsecpol...@sleevi.com wrote: On Sat, May 30, 2015 2:47 pm, Brian Smith wrote: The main sticks that browsers have in enforcing their CA policies is the threat of removal. However, such a threat seem completely empty when removal

Re: Name-constraining government CAs, or not

2015-05-31 Thread Ryan Sleevi
On Sat, May 30, 2015 2:47 pm, Brian Smith wrote: It seems reasonable to assume that governments that have publicly-trusted roots will provide essential government services from websites secured using certificates that depend on those roots staying publicly-trusted. Further, it is likely

Re: Name-constraining government CAs, or not

2015-05-31 Thread Peter Bowen
On Sun, May 31, 2015 at 3:43 PM, Ryan Sleevi ryan-mozdevsecpol...@sleevi.com wrote: On Sat, May 30, 2015 2:47 pm, Brian Smith wrote: IIRC, in the past, we've seen CAs that lapse in compliance with Mozilla's CA policies and that have claimed they cannot do the work to become compliant again

Re: Name-constraining government CAs, or not

2015-05-31 Thread Brian Smith
On Sun, May 31, 2015 at 12:43 PM, Ryan Sleevi ryan-mozdevsecpol...@sleevi.com wrote: However, that you later bring in the idea that government's may pass laws that make it illegal for browsers to take enforcement is, arguably, without merit or evidence. If we accept that governments may pass

Re: Name-constraining government CAs, or not

2015-05-30 Thread Brian Smith
Gervase Markham g...@mozilla.org wrote: 1) Is the security analysis relating to government CAs, as a class, different to that relating to commercial CAs? If so, how exactly? It seems reasonable to assume that governments that have publicly-trusted roots will provide essential government

Re: Name-constraining government CAs, or not

2015-05-22 Thread Gervase Markham
On 21/05/15 13:56, Peter Kurrasch wrote: ‎‎Returning to your original post, Gerv Thank you :-) So here is where the difference really lies between government and commercial CAs: control. Governments and, therefore, government CAs wield a level of control that commercial entities normally

Re: Name-constraining government CAs, or not

2015-05-21 Thread Gervase Markham
On 19/05/15 12:14, Matt Palmer wrote: The *leverage* that can be applied to any particular CA doesn't change based on who operates it. Regardless of the operator, the only leverage we have is removal of the CA's root certs from the trust store (or otherwise neutering them). That certain CAs

Re: Name-constraining government CAs, or not

2015-05-21 Thread Gervase Markham
On 19/05/15 13:14, Kurt Roeckx wrote: On 2015-05-14 17:25, Gervase Markham wrote: CAs currently in Mozilla's program which may fit one or more definitions of government CA are: It might be a little out of scope of your question, but maybe we should agree on what we think the (government)

Re: Name-constraining government CAs, or not

2015-05-19 Thread Ryan Sleevi
On Mon, May 18, 2015 10:39 pm, Eric Mill wrote: You said: I disagree that we, the browsers and standards bodies of the Internet have very different leverage [over governments than corporations]. My description above wasn't to lay out the ills of the world, but to describe why the kind of

Re: Name-constraining government CAs, or not

2015-05-19 Thread Kurt Roeckx
On 2015-05-19 12:04, Gervase Markham wrote: On 18/05/15 17:39, Kurt Roeckx wrote: On the other hand, if it covers the whole country, they can abuse it for domains in that country, but not for other domains. I'm not sure why you would find it acceptable that they can abuse it in their own

Re: Name-constraining government CAs, or not

2015-05-19 Thread Gervase Markham
On 19/05/15 02:15, Matt Palmer wrote: I disagree that we, the browsers and standards bodies of the Internet have very different leverage. In either case, if a CA misbehaves, their root certs can be pulled from the trust store (or otherwise neutered). That doesn't change because the CA is run

Re: Name-constraining government CAs, or not

2015-05-19 Thread Gervase Markham
On 18/05/15 17:39, Kurt Roeckx wrote: On the other hand, if it covers the whole country, they can abuse it for domains in that country, but not for other domains. I'm not sure why you would find it acceptable that they can abuse it in their own country. Some countries, AIUI, do not have an

Re: Name-constraining government CAs, or not

2015-05-19 Thread Kurt Roeckx
On 2015-05-14 17:25, Gervase Markham wrote: CAs currently in Mozilla's program which may fit one or more definitions of government CA are: It might be a little out of scope of your question, but maybe we should agree on what we think the (government) CAs should be able to do and what not.

Re: Name-constraining government CAs, or not

2015-05-18 Thread Gervase Markham
On 17/05/15 23:28, Peter Bowen wrote: I'll bite. What if Mozilla puts a simple rule in place? All CAs must either: - Have a WebTrust for BR and ETSI TS 102 042 assessment conducted by a assessor who meets the requirements of BR 8.2 or - Be named constrained The result of that would be

Re: Name-constraining government CAs, or not

2015-05-18 Thread Kurt Roeckx
On 2015-05-18 13:06, Matt Palmer wrote: On Mon, May 18, 2015 at 12:26:26PM +0200, Kurt Roeckx wrote: On 2015-05-14 17:25, Gervase Markham wrote: 2) If it is different, does name-constraining government CAs make things better, or not? I think it only makes sense to name constrain a government

Re: Name-constraining government CAs, or not

2015-05-18 Thread Gervase Markham
On 17/05/15 02:12, Ryan Sleevi wrote: I say this because knowing Gerv, and having participated with him on the call, I suspect that in part this is motivated by https://cabforum.org/2015/04/16/2015-04-16-minutes/ , in which Microsoft has suggested they'll require government CAs (definition not

Re: Name-constraining government CAs, or not

2015-05-18 Thread Gervase Markham
On 17/05/15 00:45, Eric Mill wrote: Governments are not subject to the same kind of leverage, accountability or market forces that corporations are. The legal constraints they operate under are different, your likelihood of prevailing in a legal action against them is different (and highly

Re: Name-constraining government CAs, or not

2015-05-18 Thread Gervase Markham
On 18/05/15 14:45, Gervase Markham wrote: On 17/05/15 23:28, Peter Bowen wrote: I'll bite. What if Mozilla puts a simple rule in place? All CAs must either: - Have a WebTrust for BR and ETSI TS 102 042 assessment conducted by a assessor who meets the requirements of BR 8.2 or - Be named

Re: Name-constraining government CAs, or not

2015-05-18 Thread Gervase Markham
Before I reply, can I say that this level of informed and considered debate is _exactly_ what I was looking for? Thanks to everyone who has participated so far. On 15/05/15 19:49, Ryan Sleevi wrote: - By introducing a demarcation of power/privilege by government or not (which still suffers from

Re: Name-constraining government CAs, or not

2015-05-18 Thread Eric Mill
On Tue, May 19, 2015 at 12:07 AM, Matt Palmer mpal...@hezmatt.org wrote: On Mon, May 18, 2015 at 10:32:05PM -0400, Eric Mill wrote: On Mon, May 18, 2015 at 9:15 PM, Matt Palmer mpal...@hezmatt.org wrote: I don't see the relevance of anything you wrote, to the perspective of we, the

Re: Name-constraining government CAs, or not

2015-05-18 Thread Matt Palmer
On Mon, May 18, 2015 at 10:32:05PM -0400, Eric Mill wrote: On Mon, May 18, 2015 at 9:15 PM, Matt Palmer mpal...@hezmatt.org wrote: I disagree that we, the browsers and standards bodies of the Internet have very different leverage. In either case, if a CA misbehaves, their root certs can

Re: Name-constraining government CAs, or not

2015-05-18 Thread Eric Mill
On Mon, May 18, 2015 at 9:15 PM, Matt Palmer mpal...@hezmatt.org wrote: I disagree that we, the browsers and standards bodies of the Internet have very different leverage. In either case, if a CA misbehaves, their root certs can be pulled from the trust store (or otherwise neutered). That

Re: Name-constraining government CAs, or not

2015-05-18 Thread Matt Palmer
On Mon, May 18, 2015 at 02:45:26PM +0100, Gervase Markham wrote: On 17/05/15 23:28, Peter Bowen wrote: This would seem to be a fairly simple rule. Indeed. However, this has not addressed my question about whether the security analysis for government CAs is different to that of commercial

Re: Name-constraining government CAs, or not

2015-05-18 Thread Kurt Roeckx
On 2015-05-14 17:25, Gervase Markham wrote: 2) If it is different, does name-constraining government CAs make things better, or not? I think it only makes sense to name constrain a government CA if the name constrained only covers government websites, and not all websites in the country.

Re: Name-constraining government CAs, or not

2015-05-18 Thread Matt Palmer
On Mon, May 18, 2015 at 12:26:26PM +0200, Kurt Roeckx wrote: On 2015-05-14 17:25, Gervase Markham wrote: 2) If it is different, does name-constraining government CAs make things better, or not? I think it only makes sense to name constrain a government CA if the name constrained only covers

Re: Name-constraining government CAs, or not

2015-05-17 Thread Peter Bowen
On Sun, May 17, 2015 at 5:48 PM, Ryan Sleevi ryan-mozdevsecpol...@sleevi.com wrote: On Sun, May 17, 2015 3:28 pm, Peter Bowen wrote: What if Mozilla puts a simple rule in place? All CAs must either: - Have a WebTrust for BR and ETSI TS 102 042 assessment conducted by a assessor who meets

Re: Name-constraining government CAs, or not

2015-05-17 Thread Ryan Sleevi
On Sun, May 17, 2015 6:06 pm, Peter Bowen wrote: I was assuming this discussion was based on the concept that Government CAs did not need to meet all the audit criteria. Otherwise why are we having it? Why indeed ;) As I mentioned in my reply to Eric, my own suspicion is that this

Re: Name-constraining government CAs, or not

2015-05-17 Thread Peter Bowen
On Sun, May 17, 2015 at 7:59 PM, Ryan Sleevi ryan-mozdevsecpol...@sleevi.com wrote: On Sun, May 17, 2015 6:06 pm, Peter Bowen wrote: I was assuming this discussion was based on the concept that Government CAs did not need to meet all the audit criteria. Otherwise why are we having it?

Re: Name-constraining government CAs, or not

2015-05-17 Thread Eric Mill
On Sat, May 16, 2015 at 6:12 PM, Ryan Sleevi ryan-mozdevsecpol...@sleevi.com wrote: On Sat, May 16, 2015 4:45 pm, Eric Mill wrote: Another factor is _why_ the government CA is applying to the trusted root program. If the government CA only intends to issue certs for its own

Re: Name-constraining government CAs, or not

2015-05-17 Thread Peter Bowen
On Thu, May 14, 2015 at 8:25 AM, Gervase Markham g...@mozilla.org wrote: The topic of name-constraining government CAs, probably to the TLD(s) of their territory(ies), has come up numerous times. I'd like to try and hash out, once and for all, whether we think this is actually a good idea, so

Re: Name-constraining government CAs, or not

2015-05-16 Thread Eric Mill
(I guess we're all wearing our affiliations on our backs, but disclosure: I'm a US federal government employee, but am not speaking on behalf of the USG, and don't have any professional affiliation with the US FPKI run out of the Treasury Department.) On Fri, May 15, 2015 at 11:49 AM, Ryan Sleevi

Re: Name-constraining government CAs, or not

2015-05-15 Thread Gervase Markham
On 15/05/15 00:01, Ryan Sleevi wrote: On Thu, May 14, 2015 9:02 am, David E. Ross wrote: With cyberwarfare constantly discussed in the news, U.S. Congress, and other venues, it appears to me that government CAs should indeed be restricted to the TLDs of their respective jurisdictions.

Re: Name-constraining government CAs, or not

2015-05-15 Thread Gervase Markham
On 14/05/15 17:02, David E. Ross wrote: There is an ongoing dispute between the U.S. and China whether the government in China is behind attacks on both government and commercial computer systems in the U.S. This is NOT to question the trustworthiness of the government of China but to give

Re: Name-constraining government CAs, or not

2015-05-15 Thread Matt Palmer
Everything that Ryan says below, is what I would have said if I were as eloquent. - Matt On Fri, May 15, 2015 at 11:49:39AM -0700, Ryan Sleevi wrote: On Fri, May 15, 2015 1:52 am, Gervase Markham wrote: On 15/05/15 00:01, Ryan Sleevi wrote: I think there's also the broader consideration

Re: Name-constraining government CAs, or not

2015-05-15 Thread Ryan Sleevi
On Fri, May 15, 2015 1:52 am, Gervase Markham wrote: On 15/05/15 00:01, Ryan Sleevi wrote: I think there's also the broader consideration of whether Mozilla's policy interests are served by promoting borders on the Internet, which David's proposal certainly does, but the broader question

Re: Name-constraining government CAs, or not

2015-05-14 Thread David E. Ross
On 5/14/2015 8:25 AM, Gervase Markham wrote: Hi everyone, The topic of name-constraining government CAs, probably to the TLD(s) of their territory(ies), has come up numerous times. I'd like to try and hash out, once and for all, whether we think this is actually a good idea, so we can