On Tuesday, October 25, 2016 at 4:56:57 PM UTC-7, Nick Lamb wrote:
> Is it possible for someone to write up the details of the non-compliant issuances and so on ? I would find it much easier to comment on the particulars of 1311200 if they were more specific.
This doesn't seem relevant; that is, the specifics of 1311200 are irrelevant, so much as we're discussing BR non-compliance. Even if the issues are seen as technically trivial, we have an inconsistency the deserves some degree of guidance.
> Unless I'm missing something, these constrained certificates pose a much smaller risk under our expected threat model for SHA-1.
I think you're missing a key purpose of the sunset date of 1/1/2016, which perhaps wasn't as clearly communicated outside the Forum.
The purpose of having a date for no new issuance, and distinct from full distrust of SHA-1, was to allow a graduated fade-out without having a giant flag day of disruption, which would then also suffer from the first-mover problem due to browsers non-uniform schedules.
That is, had we simply stated 1/1/2017 as the date SHA-1 was turned off, we would have seen continued issuance up to that day. As a result, turning it off would have broken huge numbers of sites - and for compatibility reasons, been re-enabled. This isn't theoretical either - we saw this both with attempts to deprecate MD5 (which lacked such a schedule) and with Mozilla's attempts to disable new SHA-1 certificates.
So I think the remaining discussion of the technical details of a SHA-1 collision are largely immaterial, because the point I was making about it, and apologies for not being clearer on this, was that some of the things we deprecate in the CA/Browser Forum so that browsers can eventually remove support for the (insecure) thing, while minimizing disruption/breakage of sites.
As a further example, consider the requirement that a subjectAltName field be present, and that the CN field, if present, contains a value represented in the SAN. The entire purpose of such a requirement is to ensure that the technical representation of authorized hosts uses an unambiguous representation (which dNSName and iPAddress are), rather than the ambiguous heuristic of CN. This goal itself was expressed as far back as 1999, in RFC 2818, but it still took 15 years after that (2014) before it actually became standard practice of CAs, and only then, because of the Baseline Requirements.
In spite of this, we still see CAs issuing certs lacking a SAN, which potentially means applications still need to support these certs (for another ~3 years). While Mozilla has taken steps to phase this practice out, they're only doing it on the basis of a notBefore of *this* year, in order to minimize breakage.
So we certainly know that Mozilla's policies are, in some ways, designed to minimize the number of errors that users are presented with, by allowing a gradual fade out of insecure or undesirable practices. A change in the BRs is, in theory, supposed to be fully reflected in all valid certificates within 39 months of the effective date, after which time, application software vendors can remove support.
An interpretation that suggests TCSCs don't have to abide by these policies - which Mozilla policy implies, but the BRs prohibit - means that any such deprecations do not apply to TCSCs, and as a consequence, such things bear a greater compatibility risk when they are removed. If we imagine a world with millions of TCSCs - something that the TLS WG has expressed interest in, in the past - potentially means breakage for millions of sites, and means that the path of deprecating things via the CA/Browser Forum may no longer be a viable solution to minimizing user disruption.
Does that more concretely express the concerns, which are more fundamental than specifics about commonNames or SHA-1?
> Finally, as I understand it the hypothetical SHA-1 TSCSs would be revoked along with any other still extant SHA-1 certificates by the issuing CA, before the planned Firefox 51 public release. So I don't think this would imperil the planned action in Firefox 51. Am I wrong about that ?
Yes. There is no obligation or expectation, presently communicated, to revoke extant certificates. Indeed, CAs were adamantly opposed to such a requirement. So these certificates will still very much be valid.