Is there feedback about the number of TLDs and possible certificate volumes that might be affected by this attack?

The majority of validations performed by CAs using WHOIS is done in gTLDs which have decent rules for monitoring and supervising their operators. The biggest issue is with ccTLDs, which in majority work ok. Unfortunately, most of them do not disclose email contact information, making them unusable for Domain Validation.

Why are we causing such a large disturbance as if the Global Internet is unsafe by this attack when the impact is 1 or 2 vanity TLDs for which mitigations exist (like, use a better library or use the latest updated list from IANA)?

I also agree with deprecating this method but we could do it in a planned and controlled fashion. Not all validations with this method are flawed, as it is currently presented.

Also, the deprecation date of November 1, 2024 is too soon. Even if we consider the 7+7=14 days to pass a ballot, there are 30 days of the IPR review process making this extremely close to the Nov 1, 2024 deadline. It is also difficult for all CAs to update their RA systems to stop re-using existing validation evidence in such a short timeframe.

Do the authors feel this ballot is super urgent and need such an aggressive timeline? Is there any additional information for the potential impact of this attack compared to the other "healthy" cc/gTLDs? Would you consider an effective date closer to February or March 2025?


Thank you,
Dimitris.


On 16/9/2024 7:16 μ.μ., Ryan Dickson via Servercert-wg wrote:

Purpose of Ballot SC-080 V1:

This Ballot proposes updates to the Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates(i.e., TLS BRs) related to sunsetting the use of WHOIS when identifying Domain Contacts.


Background:


In light of recent events where research from WatchTowr Labs demonstrated how threat actors could exploit WHOIS to obtain fraudulently issued TLS certificates [1] and follow-on discussions in MDSP [2][3], we drafted an introductory proposal [4] to sunset the use of WHOIS for identifying Domain Contacts.


The proposal sets a prohibition against relying on WHOIS to identify Domain Contacts beginning 11/1/2024. At the same time, it also prohibits use of DCV reuse where WHOIS was used as the source of truth for a Domain Contact.



Proposal Revision History:

  * Pre-Ballot Version #1 [4]

Previous Versions of this Ballot:

  * N/A


References:

[1] https://labs.watchtowr.com/we-spent-20-to-achieve-rce-and-accidentally-became-the-admins-of-mobi/

[2] https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/FuOi_uhQB6U

[3] https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/mAl9XjieSkA

[4] https://github.com/cabforum/servercert/pull/548

[5] https://docs.google.com/spreadsheets/d/1IXL8Yk12gPQs8GXiosXCPLPgATJilaiVy-f9SbsMA28/edit?gid=268412787#gid=268412787



The following motion has been proposed by Ryan Dickson and Chris Clements of Google (Chrome Root Program) and endorsed by Arvid Vermote (GlobalSign) and Pedro Fuentes (OISTE).


— Motion Begins —

This ballot modifies the “Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates” (“Baseline Requirements”), based on Version 2.0.7.

MODIFY the Baseline Requirements as specified in the following Redline:

https://github.com/cabforum/servercert/compare/ba28d04894d69c8fac62850b9d0de5061658c7c5..356799f0dcfe11deb0a375a11233403236ab72c9

— Motion Ends —

This ballot proposes a Final Maintenance Guideline. The procedure for approval of this ballot is as follows:

Discussion (7 days)

- Start: 2024-09-16 16:00:00 UTC

- End no earlier than: 2024-09-23 16:00:00 UTC

Vote for approval (7 days)

- Start: TBD

- End: TBD



_______________________________________________
Servercert-wg mailing list
[email protected]
https://lists.cabforum.org/mailman/listinfo/servercert-wg
_______________________________________________
Servercert-wg mailing list
[email protected]
https://lists.cabforum.org/mailman/listinfo/servercert-wg

Reply via email to