On Tue, Mar 10, 2020 at 4:25 PM bif via dev-security-policy <
[email protected]> wrote:

> Matt,
>
> Voluntarily providing CSR is not an ideal way to prove key compromise,
> because you could've simply found this CSR somewhere (I know, I know, super
> unlikely with your Subject... but still could happen.)
>

That seems to be making the perfect the enemy of the good. This seems like
a perfectly reasonable thing to allow and accept. If we're concerned about
someone "might" having done something as a reason to reject it, it seems
like we'd need another pass through the BRs validation methods - e.g. to
remove the non-IANA-reserved mail addresses.

I don't disagree that this is a possibility, but the probability of this
possibility seems incredibly low, and the risk of a CA deciding to revoke
on this basis seems immeasurably better than the risk of deciding to not
revoke.


> And while "compromised" is way too short (one can sign up to 32 bytes
> using it as a nonce in regular TLS session) to prove the key compromise, in
> the absence of the actual compromised private key, about the only way to
> ensure the possession is to get the reporter to sign some data chosen by
> the CA. It very well may be a random CN in the CSR, or plain old openssl
> dgst.
>

I'm concerned about CAs disproportionately adding burdens to reporters of
compromise. For example, your 'compromised' case doesn't really make sense.
The string 'compromised', or even the hash of the string 'compromised',
would not in and of itself be a sufficient TLS transcript. I agree with you
that one can't simply /look/ for the string 'compromised' in the unsigned
data, where that signed data is a TLS transcript, but that's not what you
really described, and that distinction seems important.

I also disgree with, and have concerns with, the CA being able to direct
the signing of the data. I think the ecosystem learned a lot from the
Heartbleed scenario, of "We're not affected, we're not affected... oh crap,
we're affected".

I'm sympathetic to CAs wanting to filter out the noise of shoddy reports
and shenanigans, but I'm also highly suspicious of CAs that put too
unreasonable an onus on reporters. It seems, in the key compromise case,
the benefit of the doubt should largely deal with the reporter. If we saw
some quantifiable increase in hijinks and misrevocations, there are a
myriad of ways to deal with that. The most effective of these reasons seems
to be facilitating rapid replacement of certificates, rather than
preferring ossification.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to