Hi Ben,
Comments inline.
> Should it instead say, "The recommended way to provide this is to ensure each certificate is logged to CT and then list the crt.sh fingerprint URL for each certificate in the format 'https://crt.sh/?q=[sha256 hash]', ...."?
The current language on the Wiki doesn’t explicitly “encourage” the use of crt.sh (one can list fingerprints and not provide them in a crt.sh URL), whereas this proposal does. Not to besmirch crt.sh (it’s a great tool), but I don’t think we should recommend the use of a single tool over an interoperable solution. Namely, we should encourage listing SHA256 fingerprints and leave it to the reader to supply those fingerprints to the tool of their choice, whether that be crt.sh, Censys, or something else.
> Should the SHA1 fingerprint also be allowed?
I think we should encourage the use of SHA256 fingerprints and discourage other hash algorithms. Popular tooling (crt.sh, Censys, etc.) supports SHA256 fingerprints, whereas support for other algorithms may not be as universal.
> What is the preferred method, and which other alternatives should be allowed for unambiguously reporting / locating the certificates or their "complete certificate data"?
An alternative method would be to allow the specification of a CT log’s base URI and the entry number of the affected certificate. Uptime of CT logs is monitored by at least one Root Program, which provides assurance that the certificate can be retrieved. Additionally, retrieving the certificate is done in a documented, standard manner (any CT client can fetch the certificate).
Thanks,
Corey
-- 
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaY5t3yMs2bVoGy-F%3D2_Tph__G%2BfLARXD3TxBZ7MJK97sw%40mail.gmail.com.
For those CA operators currently submitting crt.sh IDs, I would imagine the transition from ID to SHA256 hash would simplify the reporting process, and in turn, would be well received.
From a root program perspective, our interests are focused on allowing for an unambiguous method of identifying and facilitating access to problematic certificates. For some additional perspective, as I've been ramping up in my new role, I've appreciated how easy it's been to review historical incidents on Bugzilla and quickly follow crt.sh ID hyperlinks to the corresponding certificate records. If for whatever reason, crt.sh was unavailable or unavailable to serve specific records in the future (hopefully just a hypothetical situation), the historical value of past these discussions, at least as I've observed them, would be diminished. In this regard, the transition to using the SHA256 hash as an identifier from crt.sh ID would at least offer some degree of future-proofing.
+1 to Corey's comment regarding standardizing on SHA256.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/MW4PR17MB4729197679DA013A8677EBEDAA9B9%40MW4PR17MB4729.namprd17.prod.outlook.com.
We are thinking of removing the reference to the "crt.sh ID" and clarifying the instructions on providing the certificate fingerprints. Instead of the crt.sh database ID, for instance, crt.sh currently supports a lookup based on the SHA256 hash (https://crt.sh/?q=[sha256 hash]).
Should it instead say, "The recommended way to provide this is to ensure each certificate is logged to CT and then list the crt.sh fingerprint URL for each certificate in the format 'https://crt.sh/?q=[sha256 hash]', ...."?
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaahx1sifJ2uBKFiDn1Zvc1ijVohActmeHwxx2NCdW4TAg%40mail.gmail.com.