[cabf_validation] Final Minutes of the Validation Subcommittee Meeting on 2024-08-22

Corey Bonnell Corey.Bonnell at digicert.com
Mon Sep 9 12:28:35 UTC 2024


Here are the minutes for the 2024-08-22 meeting of the validation-sc, as recorded by Ryan Dickson and approved at the 2024-09-05 meeting.

 

Minutes of the Validation Subcommittee Meeting on 2024-08-22

 

Attendees: Aaron Gable (Let's Encrypt), Aaron Poulsen (Amazon), Abhishek Bhat (eMudhra), Andrea Holland (VikingCloud), Aneta Wojtczak-Iwanicka (Microsoft), Ben Wilson (Mozilla), Chris Clements (Google), Clint Wilson (Apple), Corey Bonnell (DigiCert), Corey Rasmussen (OATI), Dimitris Zacharopoulos (HARICA), Dustin Hollenback (Microsoft), Enrico Entschew (D-TRUST), Gurleen Grewal (Google), Jaime Hablutzel (OISTE Foundation), Janet Hines (VikingCloud), Johnny Reading (GoDaddy), Kiran Tummala (Microsoft), Li-Chun Chen (Chunghwa Telecom), Mads Henriksveen (Buypass AS), Mahua Chaudhuri (Microsoft), Michael Slaughter (Amazon), Michelle Coon (OATI), Nargis Mannan (VikingCloud), Paul van Brouwershaven (Entrust), Rebecca Kelly (SSL.com), Rollin Yu (TrustAsia), Ryan Dickson (Google), Scott Rea (eMudhra), Stephen Davidson (DigiCert), Sven Rajala (Keyfactor), Tobias Josefowitz (Opera Software AS), Trevoli Ponds-White (Amazon), Wayne Thayer (Fastly), Wendy Brown (US Federal PKI Management Authority)

 

Meeting Kickoff:

*	Corey greeted participants and noted recording has started
*	Ryan will take minutes
*	Corey read the note-well
*	Corey read the participants list (above)
*	The August 8, 2024 meeting minutes were approved due to no objections.
*	Question on minutes from Aaron: The participants list generated by the member tool wasn’t accurate after the meeting ended. Corey mentioned forcing the refresh is a good standard practice, but it’s not clear why the force refresh is needed. Dimitris encouraged Aaron to follow up with the Infrastructure WG or with Martijn directly. Scott also indicated similar issues in the past. Aaron also noticed refreshing changed the formatting of the list (hyphens removed). Wayne also volunteered to take note and raise with the Infrastructure WG during the next call.
*	Corey reviewed the Agenda, no updates.

 

Discussion and reminder for call for endorsers on Organization Name alignment ballot ( <https://lists.cabforum.org/pipermail/validation/2024-August/002006.html> https://lists.cabforum.org/pipermail/validation/2024-August/002006.html)

*	Martijn is seeking endorsers for the proposal, however was unable to join the call. If interested in endorsing, message Martijn or the list. 
*	No further discussion.

 

Discussion on language improvements for cPSUri and CRLDP ( <https://lists.cabforum.org/pipermail/validation/2024-August/002009.html> https://lists.cabforum.org/pipermail/validation/2024-August/002009.html)

*	Corey highlighted the thread and Pull Request where changes were being proposed and discussed. 
*	Corey mentioned some discussion on GitHub is ongoing focusing on defining the term “scheme.” 
*	Use of “URI Scheme" appears to have general consensus from many members on the call (including Clint, Corey, and Dimitris). Enrico will work on creating updated language. 
*	Next steps would be for the proposal to transition into the Server Certificate Working Group, Enrico agreed and will take action. 

 

Discussion on language improvements for EV Registration Number ( <https://lists.cabforum.org/pipermail/validation/2024-August/002008.html> https://lists.cabforum.org/pipermail/validation/2024-August/002008.html)

*	Corey discussed recent feedback on the thread from Clint, and that the idea might require a forward-looking effective date.
*	Clint indicated consistent formatting of an attribute being included in Subject DNs would be helpful. A short effective date to require the recommended format appears to be a good middle ground. 
*	Corey indicated he’d iterate and contemplate an effective date 3-6 months into the future. 
*	Wayne re-visited the idea of having a lint available to accompany a potential future ballot. 
*	Aaron offered a summary of past discussion (lints not required, but encouraged to accompany a ballot that updates profiles). 
*	Wayne suggested as part of the future effective date, we should contemplate how long it might take to write a lint. 
*	Corey also highlighted challenges with creating a lint that accurately detects potential mis-issuance. More investigation is required.
*	Dimitris shared a reminder that in the past there were discussions within the SCWG that offered potential improvement for more consistent methods of identifying organizations. Perhaps if pursued, those ideas could solve the challenge being addressed by this proposal. 
*	Corey indicated this ballot arose out of an incident that appeared to be due to a misinterpretation of the existing language. He agreed the group should have a broader conversation on how to handle Organization ID moving forward.

 

Threat modeling DNS-based domain validation (method #7) using the STRIDE model ( <https://en.wikipedia.org/wiki/STRIDE_model> https://en.wikipedia.org/wiki/STRIDE_model)

*	On previous calls, various participants had different ideas on what was permitted during the DCV process. There also appeared to exist assumptions that were not universally shared. 
*	Through the STRIDE exercise, the goal is to establish a common understanding and perspective.
*	The main reason for STRIDE is that it was used successfully in the past within the subcommittee. 
*	There was some discussion on whether STRIDE was most appropriate, but no further discussion on list about a better threat modeling framework that might be better suited for the group.
*	No comments or objections related to using STRIDE, the group will proceed with this model. 
*	Corey highlighted the existence of a video previously shared by Trev in NetSec that summarized STRIDE and how to sequence steps of the analysis.  
*	High-level steps:

*	Step 1: Model the system (components and interactions between components)

*	Challenge: We’ll need to come up with a model that’s applicable to all CAs, despite possible differences between them.

*	Step 2: Come up with list of attacks on the system
*	Step 3: Come up with list of mitigations

*	The group discussed the best approach for operationalizing the framework.

*	Slaughter supported use of a Google Doc
*	Corey suggested we create a blank doc and make the URL accessible on the Wiki

*	We started using the model

*	Slaughter asked what we should consider the scope. Corey suggested strictly Method 7. Dimitris indicated we aren’t questioning the underlying security properties of DNS, in general.
*	Corey suggested the scope should be a system that performs Method 7, and study the interactions of the components of that system. At that point, we can identify interactions and define them as in or out of scope.
*	Tobi indicated the challenge is the DNS protocol itself and how it’s used by resolvers, and the idea of outsourcing the core functionality of what a CA has to provide before issuing certificates. In his opinion, this doesn’t translate into what the STRIDE model describes. He does not believe the framework will be useful. 
*	The group briefly debated the value of the STRIDE model.
*	Tobi: Whatever part of the system actually makes the requests to the authoritative name server of the domains in question — that are used to determine if validation has passed or not — in the proposal from Google Trust Services, that could be a third-party resolver — and in my perspective, that can only be a name server or some other implementation on the CA side. No other part of the system factors into it.
*	Slaughter: Scoping - you want to scope this to when the CA creates a DNS query to something? 
*	Tobi: There are two distinct DNS protocols. They have the same name, they use the same packet format, but they are different. One is for requests to authoritative name servers and those responses. The other is for requests to resolvers. Some people here are suggesting that a CA could make a request to the resolver, the resolver does all the work, give you a single response back, and the CA would make a determination on the response. This is a different version of the protocol than the one used to talk to authoritative name servers. My concern is primarily in the addition of the DNS protocol spoken between authoritative name servers and resolvers. That is where I see the problem that in my opinion makes it not a viable option to use 3rd parties for DNS resolution in domain validation. If anyone wants to model anything in response to my concern, I don’t think STRIDE is a useful model.
*	Dimitris: I agree with Tobi, we should not allow delegated resolvers. This model will help us prove that. Maybe along the way we’ll find other threats that we may deem unacceptable. The reason for the proposal was to help explore unknown threats.
*	Tobi: I don’t see the assets we’d be discussing defined. 
*	Dimitris: In my mind, any rogue resolver between a CA and the authoritative name server could alter the results. The framing could be as simple as that.
*	Slaughter: In modeling terms, this is an abstract asset. For example, maintaining the integrity of the Web PKI.
*	Tobi: The asset is the correctness of issued certificates.
*	Corey re-framed the discussion. Defining the system components is a good start to begin evaluating this. I see this as a way of identifying potential problems with Method 7 that we might be able to improve by updating the BRs. It’s about identifying concrete improvements to bolster security. 
*	Tobi: I think it contemplates extending the scope of DNS validation which should not be allowed. When we say in the BRs that we need to check DNS, it’s unfortunate that it could be misinterpreted as allowing a CA to simply check a resolver, rather than the authoritative resolver. I have a problem expanding the scope to include that - it would be a distraction. This practice should not be considered acceptable to begin with. 
*	Slaughter: To make sure I understand, the mitigation is to only query authoritative name servers. This mitigates a threat that is available when you query recursive resolvers. 
*	Tobi: Correct, you don’t know if a recursive resolver is telling the truth. It’s not trusted to be authoritative. This is fundamentally always true, unless when operated by the CA. 
*	Slaughter: Summarizes - top-level threat - use of a 3rd-party recursive resolver can result in tampered or forged DNS responses being returned and relied upon during DCV.
*	[Corey began defining entities and components in the doc, and we discussed possible assumptions.]
*	Slaughter: Back to the threat, any recursive resolver can result in tampered/forged resolvers. I believe what Tobi is implying is that there are steps a CA can perform to mitigate that threat. 
*	Tobi agreed that there are many mitigations possible. 
*	[We iterated on the doc.]
*	Tobi: If you say you can use a third-party resolver, it means you can use any third-party resolver. And that is definitely a threat for the use case a CA is relying on for certificate issuance.
*	Corey: A similar issue is if you use a 1st party resolver and have no mitigations in place to prevent attacks. 
*	Tobi: No. Because a third-party can lie to you. It’s not the same. 
*	Corey: A first party resolver could be grossly misconfigured, we have no requirements for these systems. You can still have bad security outcomes. There’s a difference in who controls it.
*	Tobi: It’s still a threat, but it’s a different threat.
*	Slaughter: Both threats require different mitigations and should be addressed separately.
*	Corey: We're running out of time. There's an opportunity to clean-up the doc, I’ll share the URL on the Wiki and we can pick it up here at the next meeting.

 

Meeting Adjourned

 

-- 
You received this message because you are subscribed to the Google Groups "Management (CA/B Forum)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to management+unsubscribe at groups.cabforum.org <mailto:management+unsubscribe at groups.cabforum.org> .
To view this discussion on the web visit https://groups.google.com/a/groups.cabforum.org/d/msgid/management/CADEW5O-HoNg%3DEvkG6RxMnTk8V_2RAaOv%3DAzh-K4ApWT_2aVVyA%40mail.gmail.com <https://groups.google.com/a/groups.cabforum.org/d/msgid/management/CADEW5O-HoNg%3DEvkG6RxMnTk8V_2RAaOv%3DAzh-K4ApWT_2aVVyA%40mail.gmail.com?utm_medium=email&utm_source=footer> .

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/validation/attachments/20240909/fce19e36/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 5231 bytes
Desc: not available
URL: <http://lists.cabforum.org/pipermail/validation/attachments/20240909/fce19e36/attachment-0001.p7s>


More information about the Validation mailing list