On Sun, Oct 21, 2018 at 09:37:18AM +0000, Tobias Fiebig wrote:
> Dear all,
> At the IETF in Montreal, I presented findings on security issues with
> domain validation in ACME, and were encouraged to write a short draft
> outlining attacks and possible defenses. We now created a first
> draft, which outlines the general structure and contents we are
> aiming for, see https://datatracker.ietf.org/doc/draft-fiebig-acme-esecacme.
> We are looking forward to your input on our plans. 

Some quick comments / questions.

- With IP/Resource-use-after-free, how often are all the resources
  abandoned (making the site completely non-operative) versus only some
  resources abandoned (so it at least intermittently works)?

  It seems that if it is only some resources have been abandoned, one
  could try multiple validations with random target addresses, which is
  highly likely to discover inconsistent address record sets.

- If DNSSEC fails ("bogus"), the CA should not issue at all.

- Private keys get lost all the time. Any sort of manual effort from
  the part of CA to recover is not acceptable for any sort of CA with
  large volume-to-size ratio.

  Additionally, one has to be careful that the PoP mechanism is
  cryptographically kosher. For example, using TLS key for JWS is not
  kosher. Most of these mechanisms would require ACME extensions
  anyway. With exception of taking the public key from CSR, but that
  appears only after all validations have completed.

  Then there are those that think rotating signature keys is somehow
  "essential" to security.

- EV is probably excessive bar for additional validation. For example,
  AFAIK, natural persons can not get EV certificates, only legal
  persons can.

- Preceptions of GDPR are creating problems linking DNS names to real
  world identities. CA/Browser forum is discussing additional
  validation methods to essentially put data once found from WHOIS to
  DNS because GDPR drove multiple provoders to censor the WHOIS data.

- There is no E-Mail verification for ACME.

- Deploying DNSSEC can be pretty high bar (unfortunately).

- Deploying TLSA is even higher bar, due to requirement to hold down
  keys on change. This is not supported by most ACME clients. It
  would also impact container setups.

- If site truly changes ownership, it should be treated as new
  site for validation. Because it is a new site, despite having
  the same name as site that once existed.

- Some additional hardening options for CAA could actually be useful.
  Unfortunately, most deployment here is blocked due to bugs in
  RFC6844.

  E.g., public key pinning on issuance via CAA (I had that idea
  a while back, in order to limit the damage compromised
  certificate automation could cause). Or expanding TLSA records
  to such sets.


-Ilari

_______________________________________________
Acme mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/acme

Reply via email to