21
edits
(→Response: While a concern was raised about the policies, it did not capture that the specific reason for Chrome's deployment delay was the engagement by Amazon with concrete proposals for additional policy flexibility that minimized risk) |
(→Against: Updated response to "Recourse" to make it clear it's not responding to the thread points, but also added notes about "Contoso's" use case and "hostile logging" if redaction is accepted) |
||
Line 73: | Line 73: | ||
===== Problems ===== | ===== Problems ===== | ||
Solutions which give the original Applicant 'veto' power means that attackers have power over defenders, which is the wrong balance of concerns. | |||
Solutions which do not allow the original Applicant to 'veto', thus ensuring defenders can mitigate against attackers, run into the complexities identified. The thread covers a number of ways in which the proposed mitigation fails to provide suitable recourse that balances the needs of site operators in the face of both hostile and 'unintentional'/'unauthorized' redaction, and fails to balance the needs of site operators in the face of 'hostile unredaction', which is why recourse is hard. | |||
=== Redaction Makes Clients More Complex === | === Redaction Makes Clients More Complex === | ||
Line 100: | Line 101: | ||
There are a variety of situations in which domain owners may lose visibility what certificates are authorized for their own hostnames, either through domain transfers or acquisitions, or through governance issues in sufficiently large enterprises. | There are a variety of situations in which domain owners may lose visibility what certificates are authorized for their own hostnames, either through domain transfers or acquisitions, or through governance issues in sufficiently large enterprises. | ||
=== Domain redaction is not sufficient === | |||
While redacting by subdomain labels can address some needs, one case that it does not address is unreleased or unlaunched products. For example, "Contoso Ltd" requires as part of corporate security policy that all of their organizations certificates come from "Contoso Ltd Managed CA". They have an exciting new product to launch, but have not yet announced it, and it will be launched at 'example.com'. Unless it was possible to redact to '(redacted).com', they any disclosure of an 'example.com' certificate being issued by "Contoso Ltd Managed CA" would reveal the affiliation. | |||
While Contoso could restructure their launch such that their product name is a subdomain of their existing domain, to do so would significantly limit their branding opportunities, and Contoso declared this unacceptable. | |||
=== Redaction is not a security control === | |||
Because the unredacted publicly-trusted certificates can be logged, at any time, to a CT log, their ability as a security control is limited to ensuring these certificates are never observed. Unlike DNS observations, which are not widely shared unless they end up within some form of index (such as Shodan or various search engines), and which can be removed or fade away over time, once added to CT logs, unredacted certificates can never be removed. | |||
https://crt.sh/redacted-precertificates already shows a number of examples of the equivalent public certificates having been disclosed via the existing CT log systems, and that's without systems such as browsers automatically submitting publicly trusted certificates to logs to ensure CA's compliance with stated policies. | |||
== Alternatives to Redaction == | == Alternatives to Redaction == |
edits