On 18/03/14 11:26, Ben Laurie wrote:
On 17 March 2014 23:40, Rick Andrews <[email protected]> wrote:
I have another question about the PRIVATE option. While planning the
implementation of CT with our teams, we first thought that we would use the
precertificate option as the default for all customers. Our hope was that most
customers wouldn't even need to be aware of CT; they would get some extra data
in their cert and there would be no change to deployment (I believe that was
the hope of the CT designers too).
However, the PRIVATE subdomain masking option made us rethink that. If a
customer wants to keep their fqdn private, they need to make that choice up
front, before we've issued the cert to them. If they don't choose PRIVATE up
front, their cert will get logged, and switching to PRIVATE after that would be
pointless because their fqdn would be public. But that means forcing the
customer to stop in the middle of the enrollment process, read up on CT, and
make an informed decision. We're finding it's difficult to get most people to
understand why they would choose SHA-2 instead of SHA-1, and educating them on
CT and its options is expected to be far more difficult.
So we're considering making PRIVATE the default option, or perhaps the only
option. It's arguably better for customers because it preserves a measure of
privacy and postpones the time when they have to understand all the details of
CT. It may be a little more challenging for a domain owner monitoring the logs,
because they'll only see the precerts with serial numbers and no fqdns, but
that's not much of a challenge. It makes our implementation simpler and
therefore easier to test and deploy.
Any feedback on this idea?
I expect we'll enable PRIVATE subdomain masking for many enterprise
accounts by default, for a preconfigured whitelist of registered domain
names.
For non-enterprise accounts, we might consider offering PRIVATE as an
"advanced option", but I don't think we'd enable it by default.
Interesting. I guess the difficulty would be in deciding how many
names to elide. For example, consider the uk.com domain vs.
example.com.
secret.example.uk.com should be registered as <PRIVATE>.example.uk.com
(since uk.com is effectively a TLD). However,
secret.verysecret.example.com should be <PRIVATE>.example.com.
The Public Suffix List solves this problem in a lot of cases. But,
since the PSL is not perfect, it'd perhaps be unwise to rely solely on
the PSL to make this decision.
Looking ahead, we can hope that whatever comes out of the IETF DBOUND
initiative will be sufficiently perfect to enable this to be safely
automated. :-)
Until then, I'll be more comfortable with a manually reviewed,
preconfigured whitelist of registered domain names.
So, not sure how you would avoid asking the customer something in this
case, either.
--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online
_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans