Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security considerations for future-dated OCSP responses and stolen private keys. #386

Merged
merged 2 commits into from
Feb 6, 2019

Conversation

jyasskin
Copy link
Member

If a CA mis-issues a certificate for a domain, this specification provides a way
to detect the mis-issuance and mitigate harm within approximately two weeks.
Specifically, because all signed exchanges must include a
`SignedCertificateTimestampList` ({{?RFC6962}}, the mis-issued certificate will
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

s/will/should/

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's stronger than "should". How about "a CT log has promised to publish the mis-issued certificate within"?

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

SGTM! Yeah, just wanted to call out 'expected'/'required' from 'actual' behaviour :)

Clients could use systems like {{CRLSets}} and {{OneCrl}} to revoke the
intermediate certificate that signed the future-dated OCSP responses.

### Stolen private keys
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure if this PR is the best place to address it, but it does heavily overlap with the OCSP analysis you provided and the discussion of short-lived certs; namely, the security considerations of validation risks to certificates.

Grossly oversimplifying:

  • Because these certificates can be used without being on path, then exploits in validation practices become more useful
  • OCSP is reactive, once an issue is detected
  • CAA (and lifetimes) are useful in ensuring robustness at time of issuance
  • These methods (CAA, OCSP, reduced lifetime) are existing issues that the ecosystem faces; the only difference is in the calculus about being on-path, hence stronger mitigations than the status-quo

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Oh, and I mention it here because private key compromise and validation compromise are similar in the capabilities they grant, with key compromise being less detectable.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That's a good unifying point. I'm going to send another PR to talk about it after the CAA requirement is merged.

@jyasskin jyasskin merged commit 290c673 into WICG:master Feb 6, 2019
@jyasskin jyasskin deleted the future-dated-ocsp branch February 6, 2019 19:20
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants