On Wed, May 8, 2019 at 10:32 AM Ryan Sleevi <[email protected]> wrote:

>
> On Tue, May 7, 2019 at 7:48 PM Wayne Thayer via dev-security-policy <
> [email protected]> wrote:
>
>> To continue to participate in the Mozilla CA program, I recommend that we
>> require Certinomis to create a new hierarchy and demonstrate their ability
>> to competently operate their CA by going through a new root inclusion
>> request. I’d like to propose two options for their existing root:
>>
>>    1. Remove it from our root store in an upcoming Firefox release.
>>    2. Constrain it to use for gouv.fr domains in an upcoming Firefox
>> release.
>>
>> While there are only a few thousand unexpired TLS certificates (the root
>> is
>> not trusted for email) known to chain to this root, a few are in use by
>> major French government websites (e.g. ants.gouv.fr). I have suggested
>> option #2 to minimize disruption to those subscribers and relying parties.
>>
>> I will greatly appreciate everyone’s input on my recommendation and the
>> proposed options.
>>
>
> Thanks Wayne for ensuring the conversation progresses in a timely fashion.
>
> Your Option #2 does have precedent, both by Mozilla and by other browser
> vendors, so I can understand the appeal. Some of these incidents have been
> documented by Mozilla [1] in the context of past discussions about
> voluntary name constraints [2], which captured a lengthy discussion about
> some of the tradeoffs involved.
>
> I appreciate that your Option #2 is only proposed in the context of
> addressing compatibility risks. Other CA events have prompted similar
> analysis, with different vendors taking different approaches (e.g. [3] vs
> [4]/[5],  [6] v [7]). Despite these initial differences, it's worth noting
> that even in these cases of addressing potential compatibility issues, the
> industry uniformly aligned on ultimately removing trust in these CAs. It is
> unclear whether your Option #2 is proposing such a convergence, and when,
> or whether you see this as an indefinite proposition.
>
>
If we decide to take option 2, I'm open to suggestions about the length of
time we should continue to trust the root for issuance to gouv.fr domains,
but I don't expect the answer to be "forever". One approach would be to
require a relatively quick transition prior to the inclusion of a new
Certinomis root. Another is to set a date far enough in the future that we
believe it would be reasonable for Certinomis to have a new root included
and transition to it, allowing gouv.fr site to continue to rely on
Certinomis.

One thing to consider with the creation of allowlists, whether in the
> context of name constraints (e.g. India CCA, ANSSI) or in the context of
> specific domains and certificates (Apple and Google, respectively, in the
> context of WoSign/StartCom), an important factor to consider is not just
> the compatibility, but the risk and value of the domain(s) being protected.
> If the conclusion is that Certinomis' existing controls are insufficient to
> provide reliable security, and its operations are not robust enough to
> provide the assurances that the community and Mozilla users critically
> depend on, then it seems important to also consider the potential harm of
> misissued certificates for those domains
>
> In the case of India CCA, this was part of the Indian National Informatics
> Center (India NIC), which itself was the domain registry for these domains.
> Similarly, while AFNIC is the operator for the French TLDs, ANSSI was the
> French national computer security agency to protect government systems. In
> these cases, the allowlist effectively and specifically accomodated the
> government needs and oversight. In the case of Certinomis, it is unclear
> whether the French Government itself would want to delegate the control and
> protection of its critical systems to an organization that has suffered
> such repeated failures.
>
> Has there been any communication with the agencies tasked with this - most
> likely, ANSSI itself? For example, the same concerns that lead to
> contemplating "Option #1" may similarly lead the French government to
> replace their certificates, rather than run further risk of misissuance.
> Similarly, has there been any consideration to simply allowlist the limited
> existing certificates, with a clear sunset date, as an alternative to name
> constraining?
>
>
No, I have not attempted to contact these site operators, nor has the
option of allowlisting specific certificates been given any consideration.
I am not opposed to the idea of allowlisting specific certificates.

My overarching concern with any solution that does not eventually coverge
> at #1, if not begin there, is that it creates significant confusion about
> to what extent "legacy compatibility" is valued compared to "security". If
> such compatibility, with such a small number of sites, is such a concern,
> then as Jonathan Rudenberg has highlighted, it's useful to consider what
> other, additional steps, Mozilla and other browsers may wish to take to
> reduce the compatibility risk. As Jonathan rightly highlighted, one of the
> best ways to do this is a reduction in certificate lifetimes. Are there
> other steps that might be similarly productive to also consider, and in
> doing so, provide confidence that any Option #2 would, if adopted, be
> temporary, both specific to Certinomis and more generally as a mitigation
> strategy?
>
>
I share the concern that option #2 sends a confusing message. As Jonathan
stated, why should we distrust a CA for all but the most important websites
they secure?


>
> [1] https://wiki.mozilla.org/CA:NameConstraints
> [2]
> https://groups.google.com/d/msg/mozilla.dev.security.policy/pF4aVsF21ww/yKDhNpEt-2gJ
> [3]
> https://blog.mozilla.org/security/2016/10/24/distrusting-new-wosign-and-startcom-certificates/
> [4]
> https://security.googleblog.com/2016/10/distrusting-wosign-and-startcom.html
> [5] https://support.apple.com/en-us/HT204132
> [6]
> https://security.googleblog.com/2014/07/maintaining-digital-certificate-security.html
> [7]
> https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2014/2982792
>
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to