Frank Hecker:
> Eddy Nigg (StartCom Ltd.) wrote:
>   
>> This particular part DOES bother you, because wild card certificates 
>> aren't controllable in the same way as regular ones. A seemingly 
>> innocent domain name can become a tool for phishing. For example 
>> *.domain.com matches paypal.domain.com and paypal-objects.domain.com,
>> something a CA can not control in these circumstances (you can't assume 
>> that a CA can adequately control wild card certificates as you mention 
>> above).  Wild card certificates shouldn't rely on domain validation 
>> only.
>>     
>
> To play devil's advocate here: 
Yes, I love real world examples! And this is such a serious issue and 
I'll try to play the devil myself...
> There are web hosting services that allow 
> customers to easily create their own subdomains under the hosting 
> service domain, e.g., "foo.hosting.com" where "hosting.com" is the 
> domain associated with the hosting service itself.
Correct. Another example are DNS server providers for dynamic IP 
addresses. They belong to the same family.
> If the hosting service uses a wildcard cert to allow those subdomains to use 
> SSL, and 
> allows customers to set up new subdomains with minimal oversight, how 
> does it help to have the wildcard cert to be identity-validated as 
> opposed to domain-validated? 

Good question and here the answer: In case of any misuse or fraudulent 
use - no matter what's the purpose including the scenario from above, 
the CA and also relying parties would KNOW the real identity of the 
domain name owner. This is the major reason why such certificates should 
be higher validated then DV. I view this similar to code signing 
certificates where there is no other indication such as a URL in the 
addressbar or an email address. Why aren't code siging certificates just 
email validated? I claim that the same applies  to wild card 
certificates, because they aren't controllable in the same as regular DV 
certificates. The subject line and URL in the addressbar don't have to 
match, but only partly!

> In either case people can set up domains 
> like paypal.hosting.com without the knowledge of the CA, since the CA is 
> (at best) vetting the identity of the hosting service and not the 
> identity of the hosting service's customer.
>   
And this is EXACTLY the core of the issue here! Should a request for 
such a certificate be made (like paypal.hosting.com), the CA has first 
of all the KNOWLEDGE about such a request and has the option to 
intervene during and after the process of issuance of said certificate. 
Not so if this is a wild card certificate and therefore the CA MUST 
obtain additional information (e.g. verify the identity and/or 
organization). This is a blank card which gives additional power and 
trust to the subscriber. This MUST be earned by proper validation.
> Also, I see no distinction in terms of security impact between someone 
> using a domain validated cert to set up a site like "paypal-host.com" 
> and someone setting up a site like "paypal.hosting.com" using a 
> domain-validated wildcard cert.
>   
The huge difference is, that such a certificate wouldn't be issued in 
first place. CAs have and should have proper measures in place to 
prevent this from happening in first place. Should such a certificate 
have been issued nevertheless, the CA has the KNOWLEDGE to intervene 
accordingly with all the resources at its disposal BEFORE harm can be done.

My assumption is of course, that we are talking about proper 
implementation of the CA business. CAs  do have provisions for such 
cases in their CPSs most of the time and implementations accordingly. 
CAs (should) monitor the issuance of certificates even in automated 
processes. This is where the difference comes in, because the same isn't 
possible with wild card certificates.
> Indeed, and regular domain-validated certificates (e.g., for 
> "paypal-host.com") can also be intended for fraudulent use. (For that 
> matter, so can identity-validated certs, since the applicant might have 
> forged their identity documents.) 

Perhaps also here there is the assumption that validation is properly 
done. It's obviously useless if one can just can send in the ID 
documents of your friend and no additional vetting is performed. This 
would be again a case for section 4 and 6 of the Mozilla CA policy!!!

> The key word here is "knowingly". This 
> language in the policy was intended to cover cases where CAs were 
> willing and knowing accomplices to fraud.
>   
Issuing certificates which claim to be validated without such vetting 
ever having performed is tantamount to KNOWINGLY and WILLINGLY 
contribute to a possible fraud. I claim that issuing wild card 
certificates without proper vetting as described above equals the same.

-- 
Regards 
 
Signer:         Eddy Nigg, StartCom Ltd. <http://www.startcom.org>
Jabber:         [EMAIL PROTECTED] <xmpp:[EMAIL PROTECTED]>
Blog:   Join the Revolution! <http://blog.startcom.org>
Phone:          +1.213.341.0390
 

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to