Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

Submission to ct-logs of the final certificate when there is already a pre-certificate

293 views
Skip to first unread message

Tom Delmas

unread,
Apr 2, 2018, 12:27:16 PM4/2/18
to mozilla-dev-s...@lists.mozilla.org
Following the discussion on
https://community.letsencrypt.org/t/non-logging-of-final-certificates/58394

What is the position of Mozilla about the submission to ct-logs of the
final certificate when there is already a pre-certificate?

As it helps discover bugs (
https://twitter.com/_quirins/status/979788044994834434 ), it helps
accountability of CAs and it's easily enforceable, I feel that it should
be mandatory.


Alex Gaynor

unread,
Apr 2, 2018, 12:31:50 PM4/2/18
to Tom Delmas, mozilla-dev-s...@lists.mozilla.org
Mozilla currently doesn't have any policy with respect to Certificate
Transparency, so I think diving in on this particular point is putting the
cart before the horse :-)

Currently Firefox does not check/require SCT presence nor does the Mozilla
root program require certificates to be logged.

Alex
> _______________________________________________
> dev-security-policy mailing list
> dev-secur...@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>

Jakob Bohm

unread,
Apr 2, 2018, 7:50:35 PM4/2/18
to mozilla-dev-s...@lists.mozilla.org
If such a policy were to be enacted, an alternative to submitting the
final certificate should be to revoke the certificate in both a
published CRL and in OCSP. It would be counter to security to require
issuance in the few cases where misissuance is detected between CT
Pre-cert logging and actual issuance.


Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded

Matt Palmer

unread,
Apr 3, 2018, 10:27:43 PM4/3/18
to dev-secur...@lists.mozilla.org
On Tue, Apr 03, 2018 at 01:49:58AM +0200, Jakob Bohm via dev-security-policy wrote:
> On 02/04/2018 18:26, Tom Delmas wrote:
> If such a policy were to be enacted, an alternative to submitting the
> final certificate should be to revoke the certificate in both a
> published CRL and in OCSP. It would be counter to security to require
> issuance in the few cases where misissuance is detected between CT
> Pre-cert logging and actual issuance.

Logging the precert is considered demonstration of intent to issue, and is
considered misissuance to the exact same degree as actually issuing the
cert. So revoke or whatever, you still done goofed, and so you should be
checking for misissuance *before* you log the precert, not afterwards.

- Matt

Jakob Bohm

unread,
Apr 5, 2018, 3:05:46 PM4/5/18
to mozilla-dev-s...@lists.mozilla.org
Of cause, I am just saying we should not force CAs to make a misissuance
worse in the rare cases where they /actually/ spot the mistake between
precert signing and actual cert signing.

Remember, a precert generates only the danger that the cert might be
issued with an embedded CT proof, all other dangers only materialize if
and when the cert is actually issued.

Alex Gaynor

unread,
Apr 5, 2018, 3:08:09 PM4/5/18
to Jakob Bohm, mozilla-dev-s...@lists.mozilla.org
There's two separable questions here:

1) Should CAs log final certificates after they issue a certificate with
embedded SCTs: My answer, yes.
2) Should CAs issue final certificates if they discover they are misissued
after logging the pre-certificate.

The answers to (1) and (2) do not need to be the same.

Alex

On Thu, Apr 5, 2018 at 3:05 PM, Jakob Bohm via dev-security-policy <
dev-secur...@lists.mozilla.org> wrote:

> On 04/04/2018 04:27, Matt Palmer wrote:
>
> Of cause, I am just saying we should not force CAs to make a misissuance
> worse in the rare cases where they /actually/ spot the mistake between
> precert signing and actual cert signing.
>
> Remember, a precert generates only the danger that the cert might be
> issued with an embedded CT proof, all other dangers only materialize if
> and when the cert is actually issued.
>
>
>
> Enjoy
>
> Jakob
> --
> Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com
> Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10
> This public discussion message is non-binding and may contain errors.
> WiseMo - Remote Service Management for PCs, Phones and Embedded

Matt Palmer

unread,
Apr 5, 2018, 9:05:31 PM4/5/18
to dev-secur...@lists.mozilla.org
On Thu, Apr 05, 2018 at 09:05:07PM +0200, Jakob Bohm via dev-security-policy wrote:
> On 04/04/2018 04:27, Matt Palmer wrote:
> Of cause, I am just saying we should not force CAs to make a misissuance
> worse in the rare cases where they /actually/ spot the mistake between
> precert signing and actual cert signing.

Who is forcing CAs to misissue a certificate?

- Matt

Jakob Bohm

unread,
Apr 6, 2018, 12:04:27 AM4/6/18
to mozilla-dev-s...@lists.mozilla.org
Hopefully no one. I am just warning that a policy about CT logging of
certificates for which a pre-certificate has been CT logged needs to
be carefully phrased to avoid accidentally forcing CAs to misissue in
that situation.

Tim Shirley

unread,
Apr 6, 2018, 10:27:59 AM4/6/18
to Alex Gaynor, Jakob Bohm, mozilla-dev-s...@lists.mozilla.org
#2 seems like an obvious "no" to me as, at that point, you're only compounding a mistake and making that mistake actually usable in the public PKI if you proceed to issue the certificate. In practice I can't imagine this scenario coming up much, but the policy shouldn't mandate doing this.

I think there's a third scenario to consider, and that is a case where the final certificate was issued but needed to be revoked prior to being put into service. This might be because of mis-issuance, but it might just as easily be for another reason. For example, after obtaining the certificate but before installing it, the requestor may discover that the private key had been exposed and thus want to get a new certificate with a different key. If we required the final certificate to be CT-logged In that scenario, a certificate that was previously only known to the CA and the requestor would now be publicly-discoverable, and now the mandatory logging policy has made it easier for that exposed private key to be exploited. So, while there are certainly advantages to indiscriminately logging all final certificates, there are downsides to weigh as well, at least for ones not (yet?) deployed on publicly-accessible web servers.

On 4/5/18, 3:08 PM, "dev-security-policy on behalf of Alex Gaynor via dev-security-policy" <dev-security-policy-bounces+tshirley=trustw...@lists.mozilla.org on behalf of dev-secur...@lists.mozilla.org> wrote:

There's two separable questions here:

1) Should CAs log final certificates after they issue a certificate with
embedded SCTs: My answer, yes.
2) Should CAs issue final certificates if they discover they are misissued
after logging the pre-certificate.

The answers to (1) and (2) do not need to be the same.

Alex

On Thu, Apr 5, 2018 at 3:05 PM, Jakob Bohm via dev-security-policy <
dev-secur...@lists.mozilla.org> wrote:

> On 04/04/2018 04:27, Matt Palmer wrote:
>
>> On Tue, Apr 03, 2018 at 01:49:58AM +0200, Jakob Bohm via
>> dev-security-policy wrote:
>>
>>> On 02/04/2018 18:26, Tom Delmas wrote:
>>>
>>>> Following the discussion on
>>>> https://scanmail.trustwave.com/?c=4062&d=l_TG2r42aQmbn72ySdqaNlBjW-xvJAqoIpJG1bH1_Q&s=5&u=https%3a%2f%2fcommunity%2eletsencrypt%2eorg%2ft%2fnon-logging-of-final-cer
>>>> tificates/58394
>>>>
>>>> What is the position of Mozilla about the submission to ct-logs of the
>>>> final certificate when there is already a pre-certificate?
>>>>
>>>> As it helps discover bugs (
>>>> https://scanmail.trustwave.com/?c=4062&d=l_TG2r42aQmbn72ySdqaNlBjW-xvJAqoIsVD1OD1_w&s=5&u=https%3a%2f%2ftwitter%2ecom%2f%5fquirins%2fstatus%2f979788044994834434 ), it helps
>>>> accountability of CAs and it's easily enforceable, I feel that it should
>>>> be mandatory.
>>>>
>>>
>>> If such a policy were to be enacted, an alternative to submitting the
>>> final certificate should be to revoke the certificate in both a
>>> published CRL and in OCSP. It would be counter to security to require
>>> issuance in the few cases where misissuance is detected between CT
>>> Pre-cert logging and actual issuance.
>>>
>>
>> Logging the precert is considered demonstration of intent to issue, and is
>> considered misissuance to the exact same degree as actually issuing the
>> cert. So revoke or whatever, you still done goofed, and so you should be
>> checking for misissuance *before* you log the precert, not afterwards.
>>
>>
> Of cause, I am just saying we should not force CAs to make a misissuance
> worse in the rare cases where they /actually/ spot the mistake between
> precert signing and actual cert signing.
>
> Remember, a precert generates only the danger that the cert might be
> issued with an embedded CT proof, all other dangers only materialize if
> and when the cert is actually issued.
>
>
>
> Enjoy
>
> Jakob
> --
> Jakob Bohm, CIO, Partner, WiseMo A/S. https://scanmail.trustwave.com/?c=4062&d=l_TG2r42aQmbn72ySdqaNlBjW-xvJAqoIsMQ0OCqrA&s=5&u=https%3a%2f%2fwww%2ewisemo%2ecom
> Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10
> This public discussion message is non-binding and may contain errors.
> WiseMo - Remote Service Management for PCs, Phones and Embedded
> _______________________________________________
> dev-security-policy mailing list
> dev-secur...@lists.mozilla.org
> https://scanmail.trustwave.com/?c=4062&d=l_TG2r42aQmbn72ySdqaNlBjW-xvJAqoIsAQ1rX1pw&s=5&u=https%3a%2f%2flists%2emozilla%2eorg%2flistinfo%2fdev-security-policy
>
_______________________________________________
dev-security-policy mailing list
dev-secur...@lists.mozilla.org
https://scanmail.trustwave.com/?c=4062&d=l_TG2r42aQmbn72ySdqaNlBjW-xvJAqoIsAQ1rX1pw&s=5&u=https%3a%2f%2flists%2emozilla%2eorg%2flistinfo%2fdev-security-policy


Alex Gaynor

unread,
Apr 6, 2018, 10:31:13 AM4/6/18
to Tim Shirley, mozilla-dev-s...@lists.mozilla.org, Jakob Bohm
I think (3) shouldn't be considered any different from (1) -- they're only
meaningfully different if you make a lot of assumptions about how it's
stored and transported at every point from when the HSM signs the TBS to
the certificates final resting place (on someone's disk? in their email
inbox? in a sharepoint that's accidentally publicly accessible?). Once a
cert has been issued, and even more so after it's been transmitted to the
customer, we should not presume anything about how it's stored -- if only
because that'd be a massive burden on CAs, for limited-to-no benefit.

Alex

On Fri, Apr 6, 2018 at 10:27 AM, Tim Shirley <TShi...@trustwave.com> wrote:

> #2 seems like an obvious "no" to me as, at that point, you're only
> compounding a mistake and making that mistake actually usable in the public
> PKI if you proceed to issue the certificate. In practice I can't imagine
> this scenario coming up much, but the policy shouldn't mandate doing this.
>
> I think there's a third scenario to consider, and that is a case where the
> final certificate was issued but needed to be revoked prior to being put
> into service. This might be because of mis-issuance, but it might just as
> easily be for another reason. For example, after obtaining the certificate
> but before installing it, the requestor may discover that the private key
> had been exposed and thus want to get a new certificate with a different
> key. If we required the final certificate to be CT-logged In that
> scenario, a certificate that was previously only known to the CA and the
> requestor would now be publicly-discoverable, and now the mandatory logging
> policy has made it easier for that exposed private key to be exploited.
> So, while there are certainly advantages to indiscriminately logging all
> final certificates, there are downsides to weigh as well, at least for ones
> not (yet?) deployed on publicly-accessible web servers.
>
> On 4/5/18, 3:08 PM, "dev-security-policy on behalf of Alex Gaynor via
> dev-security-policy" <dev-security-policy-bounces+tshirley=
> trustw...@lists.mozilla.org on behalf of dev-security-policy@lists.
> mozilla.org> wrote:
>
> There's two separable questions here:
>
> 1) Should CAs log final certificates after they issue a certificate
> with
> embedded SCTs: My answer, yes.
> 2) Should CAs issue final certificates if they discover they are
> misissued
> after logging the pre-certificate.
>
> The answers to (1) and (2) do not need to be the same.
>
> Alex
>
> On Thu, Apr 5, 2018 at 3:05 PM, Jakob Bohm via dev-security-policy <
> dev-secur...@lists.mozilla.org> wrote:
>
> > On 04/04/2018 04:27, Matt Palmer wrote:
> >
> >> On Tue, Apr 03, 2018 at 01:49:58AM +0200, Jakob Bohm via
> >> dev-security-policy wrote:
> >>
> >>> On 02/04/2018 18:26, Tom Delmas wrote:
> >>>
> >>>> Following the discussion on
> >>>> https://scanmail.trustwave.com/?c=4062&d=l_
> TG2r42aQmbn72ySdqaNlBjW-xvJAqoIpJG1bH1_Q&s=5&u=https%3a%2f%2fcommunity%
> 2eletsencrypt%2eorg%2ft%2fnon-logging-of-final-cer
> >>>> tificates/58394
> >>>>
> >>>> What is the position of Mozilla about the submission to ct-logs
> of the
> >>>> final certificate when there is already a pre-certificate?
> >>>>
> >>>> As it helps discover bugs (
> >>>> https://scanmail.trustwave.com/?c=4062&d=l_
> TG2r42aQmbn72ySdqaNlBjW-xvJAqoIsVD1OD1_w&s=5&u=https%
> 3a%2f%2ftwitter%2ecom%2f%5fquirins%2fstatus%2f979788044994834434 ), it
> helps
> >>>> accountability of CAs and it's easily enforceable, I feel that it
> should
> >>>> be mandatory.
> >>>>
> >>>
> >>> If such a policy were to be enacted, an alternative to submitting
> the
> >>> final certificate should be to revoke the certificate in both a
> >>> published CRL and in OCSP. It would be counter to security to
> require
> >>> issuance in the few cases where misissuance is detected between CT
> >>> Pre-cert logging and actual issuance.
> >>>
> >>
> >> Logging the precert is considered demonstration of intent to issue,
> and is
> >> considered misissuance to the exact same degree as actually issuing
> the
> >> cert. So revoke or whatever, you still done goofed, and so you
> should be
> >> checking for misissuance *before* you log the precert, not
> afterwards.
> >>
> >>

Tim Shirley

unread,
Apr 6, 2018, 10:55:59 AM4/6/18
to Alex Gaynor, mozilla-dev-s...@lists.mozilla.org, Jakob Bohm
That may well be the conclusion, that the benefits of total disclosure outweigh the costs in this type of scenario. I just wanted to point out that there IS a cost to at least consider. Yes, the certificate might have been seen in transmission between the CA and the customer, yes the customer might have made it public themselves, inadvertently or purposely. I’m not saying there are any guarantees that only those 2 parties have seen it. But suppose I visited that site and discovered the private key sitting there in the root directory before the certificate had been installed. I *might* be able to get ahold of the cert to do bad things if it hasn’t been CT-logged, but I *definitely* can get ahold of it to do bad things if it has been.

From: Alex Gaynor <aga...@mozilla.com>
Date: Friday, April 6, 2018 at 10:31 AM
To: Tim Shirley <TShi...@trustwave.com>
Cc: Jakob Bohm <jb-mo...@wisemo.com>, "mozilla-dev-s...@lists.mozilla.org" <mozilla-dev-s...@lists.mozilla.org>
Subject: Re: Submission to ct-logs of the final certificate when there is already a pre-certificate

I think (3) shouldn't be considered any different from (1) -- they're only meaningfully different if you make a lot of assumptions about how it's stored and transported at every point from when the HSM signs the TBS to the certificates final resting place (on someone's disk? in their email inbox? in a sharepoint that's accidentally publicly accessible?). Once a cert has been issued, and even more so after it's been transmitted to the customer, we should not presume anything about how it's stored -- if only because that'd be a massive burden on CAs, for limited-to-no benefit.

Alex

On Fri, Apr 6, 2018 at 10:27 AM, Tim Shirley <TShi...@trustwave.com<mailto:TShi...@trustwave.com>> wrote:
#2 seems like an obvious "no" to me as, at that point, you're only compounding a mistake and making that mistake actually usable in the public PKI if you proceed to issue the certificate. In practice I can't imagine this scenario coming up much, but the policy shouldn't mandate doing this.

I think there's a third scenario to consider, and that is a case where the final certificate was issued but needed to be revoked prior to being put into service. This might be because of mis-issuance, but it might just as easily be for another reason. For example, after obtaining the certificate but before installing it, the requestor may discover that the private key had been exposed and thus want to get a new certificate with a different key. If we required the final certificate to be CT-logged In that scenario, a certificate that was previously only known to the CA and the requestor would now be publicly-discoverable, and now the mandatory logging policy has made it easier for that exposed private key to be exploited. So, while there are certainly advantages to indiscriminately logging all final certificates, there are downsides to weigh as well, at least for ones not (yet?) deployed on publicly-accessible web servers.

On 4/5/18, 3:08 PM, "dev-security-policy on behalf of Alex Gaynor via dev-security-policy" <dev-security-policy-bounces+tshirley=trustw...@lists.mozilla.org<mailto:trustw...@lists.mozilla.org> on behalf of dev-secur...@lists.mozilla.org<mailto:dev-secur...@lists.mozilla.org>> wrote:

There's two separable questions here:

1) Should CAs log final certificates after they issue a certificate with
embedded SCTs: My answer, yes.
2) Should CAs issue final certificates if they discover they are misissued
after logging the pre-certificate.

The answers to (1) and (2) do not need to be the same.

Alex

On Thu, Apr 5, 2018 at 3:05 PM, Jakob Bohm via dev-security-policy <
dev-secur...@lists.mozilla.org<mailto:dev-secur...@lists.mozilla.org>> wrote:

> On 04/04/2018 04:27, Matt Palmer wrote:
>
>> On Tue, Apr 03, 2018 at 01:49:58AM +0200, Jakob Bohm via
>> dev-security-policy wrote:
>>
>>> On 02/04/2018 18:26, Tom Delmas wrote:
>>>
>>>> Following the discussion on
>>>> https://scanmail.trustwave.com/?c=4062&d=l_TG2r42aQmbn72ySdqaNlBjW-xvJAqoIpJG1bH1_Q&s=5&u=https%3a%2f%2fcommunity%2eletsencrypt%2eorg%2ft%2fnon-logging-of-final-cer<https://scanmail.trustwave.com/?c=4062&d=poTH2rYio5k2e1uUbPmIpRArbuOBUOTSxorevloFbQ&s=5&u=https%3a%2f%2fcommunity%2eletsencrypt%2eorg%2ft%2fnon-logging-of-final-cer>
>>>> tificates/58394
>>>>
>>>> What is the position of Mozilla about the submission to ct-logs of the
>>>> final certificate when there is already a pre-certificate?
>>>>
>>>> As it helps discover bugs (
>>>> https://scanmail.trustwave.com/?c=4062&d=l_TG2r42aQmbn72ySdqaNlBjW-xvJAqoIsVD1OD1_w&s=5&u=https%3a%2f%2ftwitter%2ecom%2f%5fquirins%2fstatus%2f979788044994834434<https://scanmail.trustwave.com/?c=4062&d=poTH2rYio5k2e1uUbPmIpRArbuOBUOTSxt3bvwsFbw&s=5&u=https%3a%2f%2ftwitter%2ecom%2f%5fquirins%2fstatus%2f979788044994834434> ), it helps
>>>> accountability of CAs and it's easily enforceable, I feel that it should
>>>> be mandatory.
>>>>
>>>
>>> If such a policy were to be enacted, an alternative to submitting the
>>> final certificate should be to revoke the certificate in both a
>>> published CRL and in OCSP. It would be counter to security to require
>>> issuance in the few cases where misissuance is detected between CT
>>> Pre-cert logging and actual issuance.
>>>
>>
>> Logging the precert is considered demonstration of intent to issue, and is
>> considered misissuance to the exact same degree as actually issuing the
>> cert. So revoke or whatever, you still done goofed, and so you should be
>> checking for misissuance *before* you log the precert, not afterwards.
>>
>>
> Of cause, I am just saying we should not force CAs to make a misissuance
> worse in the rare cases where they /actually/ spot the mistake between
> precert signing and actual cert signing.
>
> Remember, a precert generates only the danger that the cert might be
> issued with an embedded CT proof, all other dangers only materialize if
> and when the cert is actually issued.
>
>
>
> Enjoy
>
> Jakob
> --
> Jakob Bohm, CIO, Partner, WiseMo A/S. https://scanmail.trustwave.com/?c=4062&d=l_TG2r42aQmbn72ySdqaNlBjW-xvJAqoIsMQ0OCqrA&s=5&u=https%3a%2f%2fwww%2ewisemo%2ecom<https://scanmail.trustwave.com/?c=4062&d=poTH2rYio5k2e1uUbPmIpRArbuOBUOTSxtuIuwtaPA&s=5&u=https%3a%2f%2fwww%2ewisemo%2ecom>
> Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10
> This public discussion message is non-binding and may contain errors.
> WiseMo - Remote Service Management for PCs, Phones and Embedded
> _______________________________________________
> dev-security-policy mailing list
> dev-secur...@lists.mozilla.org<mailto:dev-secur...@lists.mozilla.org>
> https://scanmail.trustwave.com/?c=4062&d=l_TG2r42aQmbn72ySdqaNlBjW-xvJAqoIsAQ1rX1pw&s=5&u=https%3a%2f%2flists%2emozilla%2eorg%2flistinfo%2fdev-security-policy<https://scanmail.trustwave.com/?c=4062&d=poTH2rYio5k2e1uUbPmIpRArbuOBUOTSxtiIvV4FNw&s=5&u=https%3a%2f%2flists%2emozilla%2eorg%2flistinfo%2fdev-security-policy>
>
_______________________________________________
dev-security-policy mailing list
dev-secur...@lists.mozilla.org<mailto:dev-secur...@lists.mozilla.org>
https://scanmail.trustwave.com/?c=4062&d=l_TG2r42aQmbn72ySdqaNlBjW-xvJAqoIsAQ1rX1pw&s=5&u=https%3a%2f%2flists%2emozilla%2eorg%2flistinfo%2fdev-security-policy<https://scanmail.trustwave.com/?c=4062&d=poTH2rYio5k2e1uUbPmIpRArbuOBUOTSxtiIvV4FNw&s=5&u=https%3a%2f%2flists%2emozilla%2eorg%2flistinfo%2fdev-security-policy>


0 new messages