On Wed, May 15, 2019 at 9:28 AM Ryan Hurst via dev-security-policy <
[email protected]> wrote:

> Pedro,
>
> That scenario is addressed by Wayne proposed change.
>
> That same change does not allow for applications that use GMail or there
> federated authentication providers to use client certificates without
> sending each user to the CA.
>

Ryan,

I must admit, I'm confused. Based on your concerns as I understand them,
either the scenario you're describing is already prohibited today (and thus
no change from existing policy), or its already permitted today and would
continue to be permitted with this change. I'm hoping you can succinctly
explain where we might disagree.

As Wayne mentioned, it's already covered in CA forbidden practices, so I do
not see how moving that existing language would meaningfully change things.
If the new language prohibits it, then so to does the old language.

However, I don't think the new or old language prohibits this. The flow
you've described is functionally a relationship between Google (as the
GMail operator) and the CA. Google requests certificates on the users'
behalf - much like a reseller does - and provides them to the user. The CA
validates that Google is authorized for the gmail.com domain for each of
these requests, potentially relying on previously completed domain
validations (e.g. the reuse of data), and then lets Google validate the
local-part as appropriate.

To be clear: I have serious and extensive reservations about the suggested
reliance on OAuth/OIDC in the context of validation, and the scenario
presented is one that I see incredible danger and harm in, if left at that
level. I do, however, agree there are secure deployments that can exist,
and likely does in the case you're describing - but I don't think we should
muddy those waters yet, because I think trying to capture explicitly what
you're proposing will require considerably more details. Hopefully, my
analysis above, of the principles of the validation process, demonstrate a
more reasonable and reliable level of assurance in the validation process.

Hopefully, this analysis avoids the emotive aspects of the previous posts,
and focuses purely on what technical steps are being provided. Perhaps I
overlooked something, but I don't see the requirement for 'ping' emails or
the like, so I do not understand why it's relevant to the policy
discussion. If I'm missing something, though, hopefully you'll be able to
point it out :)
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to