Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-11-20 Thread Wayne Thayer via dev-security-policy
On Thu, Nov 14, 2019 at 3:24 PM Wayne Thayer wrote: > On Fri, Nov 8, 2019 at 12:06 PM Ryan Sleevi wrote: > >> >> On Fri, Nov 8, 2019 at 1:54 PM Wayne Thayer via dev-security-policy < >> dev-security-policy@lists.mozilla.org> wrote: >> >>> A few more questions have come up about this change: >>>

Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-11-14 Thread Wayne Thayer via dev-security-policy
On Fri, Nov 8, 2019 at 12:06 PM Ryan Sleevi wrote: > > On Fri, Nov 8, 2019 at 1:54 PM Wayne Thayer via dev-security-policy < > dev-security-policy@lists.mozilla.org> wrote: > >> A few more questions have come up about this change: >> >> * Since mozilla::pkix doesn't currently support the RSA-PSS

Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-11-08 Thread Ryan Sleevi via dev-security-policy
On Fri, Nov 8, 2019 at 1:54 PM Wayne Thayer via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > A few more questions have come up about this change: > > * Since mozilla::pkix doesn't currently support the RSA-PSS encodings, why > would we include them in our policy? > They w

Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-11-08 Thread Wayne Thayer via dev-security-policy
A few more questions have come up about this change: * Since mozilla::pkix doesn't currently support the RSA-PSS encodings, why would we include them in our policy? * Related: would this detailed enumeration of requirements be better to place in the BRs than in Mozilla policy? * In that case i

Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-10-02 Thread Wayne Thayer via dev-security-policy
Thank you Ryan. Brian reviewed these changes back in May, so I've gone ahead and accepted them for the 2.7 policy update: https://github.com/mozilla/pkipolicy/commit/5657ecf650d70fd3c6ca5062bee360fd83da9d27 I'll consider this issue resolved unless there are further comments. - Wayne On Fri, May

RE: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-05-24 Thread Doug Beattie via dev-security-policy
Brian Smith Cc: Ryan Sleevi ; mozilla-dev-security-policy ; Wayne Thayer Subject: Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements On Wed, May 22, 2019 at 7:43 PM Brian Smith wrote: > Ryan Sleevi wrote: > >> >> >>> It would be easier to

Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-05-24 Thread Ryan Sleevi via dev-security-policy
On Wed, May 22, 2019 at 7:43 PM Brian Smith wrote: > Ryan Sleevi wrote: > >> >> >>> It would be easier to understand if this is true if the proposed text >>> cited the RFCs, like RFC 4055, that actually impose the requirements that >>> result in the given encodings. >>> >> >> Could you clarify,

Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-05-22 Thread Brian Smith via dev-security-policy
Ryan Sleevi wrote: > > >> It would be easier to understand if this is true if the proposed text >> cited the RFCs, like RFC 4055, that actually impose the requirements that >> result in the given encodings. >> > > Could you clarify, do you just mean adding references to each of the > example enco

Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-05-22 Thread Daniel McCarney via dev-security-policy
> Note that this is applicable for signatureAlgorithms as well (and the same > section of the RFC), and this is again something cablint picks up and zlint > misses. However, it seems CAs happened to already have revoked these > certificates - perhaps from internal linting efforts that looked at all

RE: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-05-22 Thread Arvid Vermote via dev-security-policy
zilla-dev-security-policy security-pol...@lists.mozilla.org>; Wayne Thayer > Subject: Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash > Requirements > > On Thu, May 9, 2019 at 4:48 PM Brian Smith wrote: > > > On Fri, Apr 26, 2019 at 11:39 AM Wayne Thayer wro

Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-05-21 Thread Ryan Sleevi via dev-security-policy
On Tue, May 21, 2019 at 3:32 PM Daniel McCarney wrote: > >> Of the 8 unrevoked, they're all issued by a single CA - GlobalSign - and >> are all RSA keys that lack the explicit NULL parameter, and thus violate >> the requirements of https://tools.ietf.org/html/rfc3279#section-2.3.1 > > >> These ar

Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-05-21 Thread Daniel McCarney via dev-security-policy
> > > Of the 8 unrevoked, they're all issued by a single CA - GlobalSign - and > are all RSA keys that lack the explicit NULL parameter, and thus violate > the requirements of https://tools.ietf.org/html/rfc3279#section-2.3.1 > These are flagged by cablint (but not zlint), so that is an opportuni

Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-05-21 Thread Ryan Sleevi via dev-security-policy
On Thu, May 9, 2019 at 4:48 PM Brian Smith wrote: > On Fri, Apr 26, 2019 at 11:39 AM Wayne Thayer wrote: > >> On Wed, Apr 24, 2019 at 10:02 AM Ryan Sleevi wrote: >> >>> Thank you David and Ryan! This appears to me to be a reasonable >>> improvement to our policy. >>> >> >> Brian: could I ask yo

Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-05-09 Thread Brian Smith via dev-security-policy
On Fri, Apr 26, 2019 at 11:39 AM Wayne Thayer wrote: > On Wed, Apr 24, 2019 at 10:02 AM Ryan Sleevi wrote: > >> Thank you David and Ryan! This appears to me to be a reasonable >> improvement to our policy. >> > > Brian: could I ask you to review the proposed change? > > >> This does not, however

Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-04-29 Thread Ryan Sleevi via dev-security-policy
On Fri, Apr 26, 2019 at 5:39 PM Wayne Thayer wrote: > This does not, however, address the last part of what Brian proposes - >> which is examining if, how many, and which CAs would fail to meet these >> encoding requirements today, either in their roots, subordinates, or leaf >> certificates. >>

Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-04-26 Thread Wayne Thayer via dev-security-policy
On Wed, Apr 24, 2019 at 10:02 AM Ryan Sleevi wrote: > > On Mon, Apr 22, 2019 at 6:20 PM Brian Smith wrote: > >> There are three (that I can think of) sources of confusion: >> >> 1. Is there any requirement that the signature algorithm that is used to >> sign a certificate be correlated in any wa

Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-04-24 Thread Ryan Sleevi via dev-security-policy
On Mon, Apr 22, 2019 at 6:20 PM Brian Smith wrote: > There are three (that I can think of) sources of confusion: > > 1. Is there any requirement that the signature algorithm that is used to > sign a certificate be correlated in any way to the algorithm of the public > key of the signed certificat

Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-04-22 Thread Brian Smith via dev-security-policy
Wayne Thayer wrote: > Brian Smith wrote: > >> Ryan Sleevi wrote: >> >>> Given that CAs have struggled with the relevant encodings, both for the >>> signatureAlgorithm and the subjectPublicKeyInfo field, I’m curious if >>> you’d >>> be open to instead enumerating the allowed (canonical) encodings

Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-04-04 Thread Jakob Bohm via dev-security-policy
On 04/04/2019 02:22, Wayne Thayer wrote: A number of ECC certificates that fail to meet the requirements of policy section 5.1 were recently reported [1]. There was a lack of awareness that Mozilla policy is more strict than the BRs in this regard. I've attempted to address that by adding this to

Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-04-04 Thread Wayne Thayer via dev-security-policy
On Thu, Apr 4, 2019 at 1:50 PM Brian Smith wrote: > Ryan Sleevi wrote: > >> Given that CAs have struggled with the relevant encodings, both for the >> signatureAlgorithm and the subjectPublicKeyInfo field, I’m curious if >> you’d >> be open to instead enumerating the allowed (canonical) encodings

Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-04-04 Thread Brian Smith via dev-security-policy
Ryan Sleevi wrote: > Given that CAs have struggled with the relevant encodings, both for the > signatureAlgorithm and the subjectPublicKeyInfo field, I’m curious if you’d > be open to instead enumerating the allowed (canonical) encodings for both. > This would address open Mozilla Problematic Prac

Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-04-03 Thread Ryan Sleevi via dev-security-policy
Thanks for raising this, Wayne. As mentioned on the issue, this heavily overlaps with the RSA combinations - and, of course, Mozilla policy being more strict than the BRs in forbidding DSA. Given that CAs have struggled with the relevant encodings, both for the signatureAlgorithm and the subjectP