Re: [therightkey] [cabfpub] Updated Certificate Transparency + Extended Validation plan

Ryan Sleevi <sleevi@google.com> Wed, 05 February 2014 04:39 UTC

Return-Path: <sleevi@google.com>
X-Original-To: therightkey@ietfa.amsl.com
Delivered-To: therightkey@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6BD801A0026 for <therightkey@ietfa.amsl.com>; Tue, 4 Feb 2014 20:39:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.913
X-Spam-Level:
X-Spam-Status: No, score=-1.913 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-0.535, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TLAjsB8WcROA for <therightkey@ietfa.amsl.com>; Tue, 4 Feb 2014 20:39:42 -0800 (PST)
Received: from mail-qa0-x22a.google.com (mail-qa0-x22a.google.com [IPv6:2607:f8b0:400d:c00::22a]) by ietfa.amsl.com (Postfix) with ESMTP id 32CB81A0023 for <therightkey@ietf.org>; Tue, 4 Feb 2014 20:39:41 -0800 (PST)
Received: by mail-qa0-f42.google.com with SMTP id k4so14107903qaq.29 for <therightkey@ietf.org>; Tue, 04 Feb 2014 20:39:40 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=Ny/SxiWABFd96PyElcReUyRa7yzV8CDaE96dck+8ysk=; b=Yrmw0dW3GBMrwOOb57pECy1Yr13wXjO5uZR5D3OhADmck8nAgBvE2+ai1e50UwoFQM I8f0hKCYlg3rLcrp0ept6ut/pP3WdEFfeFNRZZvDRLsrmMjKjOkpahox4bQGVm2JKm4W BVzOMJ0/8S0/reTgVop2jpPRCKxrfGj/0c5qMKG4KAJe1/bQCcRf0I6YL1q63KMjQMDS wvPdlrWH0XQ7uY1sG5PupUcbK0lMmUegFtnncgOEgEYhKZP7fSOYdyV3sUQmL6JFkxLY H3g/lqpL8fPm+8PE25BriqDRw8mkXB8f+9nrib4l/EWPuTJ9LxVnWaZJJsk9rB/nsIi0 Vegg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=Ny/SxiWABFd96PyElcReUyRa7yzV8CDaE96dck+8ysk=; b=lLCW8ozEECD6vTHXRclWWbGmO8inHysdjtD9kAGLGn1qGFL0ikMmdHYha8AflTb7Mg QzQwcQWyhLIMhZxKxPNmwgZ7QCa42Yw8eNG2GBa41K963CZ120C+USwHTRtzfLl2sSuY XWMAgGdo2fUDNKKlOAGnAuux9AqaFmRfyvH/1pmm3+1755C9+6uTwOtDxT+L64pDIr9n e/BagPmSaOHXBGCYB2UhosUZl9vUr87j6RV+GqROQdqTAf+ffsTIkT098bsSi0aeKMcY J1czf/QAgAcRF4zomRTyFyO9R2Eunt4Ie/BcTtteO8fLabsGMHyRqa4pbmVEd2M46RFZ CbFA==
X-Gm-Message-State: ALoCoQmPmoyjxy/Z7j/0BJKFvNLrbzrEtTx7lb+Sx1h6fSSEmXzdisWydn04SJ5KbHWQnZr7vTyywbNQ/zFp1BnDNQbW2wnPlNZxn2q9nbF9ZPrn58xZvyQicxSWwx9ZgCklKJVXlBfmp/TtvdvMIc1vSZw3ypfPqidOuGSDyV6HLntAq7gYQaY6eXOdzBRJQDTiWGEvy0OS
MIME-Version: 1.0
X-Received: by 10.229.13.195 with SMTP id d3mr72380791qca.4.1391575180389; Tue, 04 Feb 2014 20:39:40 -0800 (PST)
Received: by 10.229.154.208 with HTTP; Tue, 4 Feb 2014 20:39:40 -0800 (PST)
In-Reply-To: <CF16FF48.6791A%wthayer@godaddy.com>
References: <CABrd9STwBDxwB1vtmS9Ozb5e_7D=zfOqkOBeAaT2HG7X-cw5gw@mail.gmail.com> <647dad549e3047e4a94c721a616f1dee@CO1PR02MB064.namprd02.prod.outlook.com> <CACvaWvYb-anrri8rzxNDee_UW4AKM7uNC7j7UwHqPRnK4oQiFw@mail.gmail.com> <CF16EFDA.678DA%wthayer@godaddy.com> <08b001cf221b$4cd7b4a0$e6871de0$@digicert.com> <CACvaWvbyUpWK2ODOzsUKWshdzdwK_=cXe5nLjkOHUSK_VmAAWg@mail.gmail.com> <CF16F6CD.678E6%wthayer@godaddy.com> <CACvaWvbPw98Ww=rCvgdeD4Gnk4yiiu555kpbGtF91Mi87hzHZg@mail.gmail.com> <CF16FF48.6791A%wthayer@godaddy.com>
Date: Tue, 04 Feb 2014 20:39:40 -0800
Message-ID: <CACvaWvZr2axa05kJ3fyBzm0TOzFaKcFNVrVW4xFp1CkrMXVp2w@mail.gmail.com>
From: Ryan Sleevi <sleevi@google.com>
To: Wayne Thayer <wthayer@godaddy.com>
Content-Type: multipart/alternative; boundary="001a1133624c4e42a404f1a15827"
Cc: therightkey <therightkey@ietf.org>, Ben Laurie <benl@google.com>, certificate-transparency <certificate-transparency@googlegroups.com>, Jeremy Rowley <jeremy.rowley@digicert.com>, CABFPub <public@cabforum.org>
Subject: Re: [therightkey] [cabfpub] Updated Certificate Transparency + Extended Validation plan
X-BeenThere: therightkey@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <therightkey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/therightkey>, <mailto:therightkey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/therightkey/>
List-Post: <mailto:therightkey@ietf.org>
List-Help: <mailto:therightkey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/therightkey>, <mailto:therightkey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Feb 2014 04:39:45 -0000

On Tue, Feb 4, 2014 at 8:31 PM, Wayne Thayer <wthayer@godaddy.com> wrote:

>
> On Tue, Feb 4, 2014 at 7:12 PM, Wayne Thayer <wthayer@godaddy.com> wrote:
>
>>
>> On Tue, Feb 4, 2014 at 6:38 PM, Jeremy Rowley <jeremy.rowley@digicert.com
>> > wrote:
>>
>>>  I’m confused as well.  Does that mean Android will start showing an EV
>>> indicator?
>>>
>>> *From:* therightkey [mailto:therightkey-bounces@ietf.org] *On Behalf Of
>>> *Wayne Thayer
>>> *Sent:* Tuesday, February 04, 2014 7:33 PM
>>> *To:* Ryan Sleevi
>>> *Cc:* therightkey@ietf.org; Ben Laurie;
>>> certificate-transparency@googlegroups.com; CABFPub
>>> *Subject:* Re: [therightkey] [cabfpub] Updated Certificate Transparency
>>> + Extended Validation plan
>>>
>>>
>>>
>>>  Hi Wayne,
>>>
>>> Considering we already do not indicate EV on Android, nor have we ever,
>>> I don't think this perceived loss of functionality is as significant as you
>>> may believe.
>>>
>>> Further, considering the very real and distinct performance
>>> characteristics of mobile (radio warmups, RTTs, initcwnds), the idea of
>>> fetching OCSP, or, worse, CRLs - especially when some CAs have CRLs that
>>> are quite large (20+ MB) - in order to assure the EV display is...
>>> non-ideal. So again, the EV indicator on mobile is not as strong or as
>>> present as it may be on desktop platforms.
>>>
>>>  In that case, what does this statement mean?
>>>
>>> Chrome for mobile platforms will cease to show EV indicators for
>>> certificates that are not CT qualified according to the criteria below.
>>>
>>
>>  It means that for any CAs that hope to be recognized as EV on Chrome
>> for mobile platforms (which include iOS), implementing CT by the dates
>> outlined is seen as a requirement for such treatment. We wanted to
>> specifically call attention to this - the whitelist is seen as a temporary
>> measure for Desktop, but given the unique characteristics of mobile
>> platforms, we're pursuing this requirement at a more aggressive pace.
>>
>>  While Chrome for Android - and the Chrome-based WebView, as the WebView
>> preceding it - do not provide special treatment for EV, any future plans
>> for EV indications on these platforms have incorporated the above
>> requirements and dates.
>>
>>
>>  In that case, my original objection stands – this policy retroactively
>> downgrades existing EV certificates if and when a mobile platform chooses
>> to implement an EV indicator. There are certainly times when it’s necessary
>> to apply a new policy to existing certificates to protect relying parties,
>> but IMO this isn’t one of them.
>>
>
>  Wayne,
>
>  While I appreciate your position, I am absolutely baffled as how you can
> present this as a "downgrade".
>
>  If and when Android supports EV, certificates that fail to meet this
> requirements will continue to appear exactly the same as they do today and
> they have in the past. Certificates which do conform to these program
> requirements will, presumably, be granted distinguishing UI. To the
> customer who purchased a certificate today, their certificate will continue
> to appear in that future world exactly how it appears today, presumably -
> providing them exactly what they expected.
>
>  I can only interpret your objection as an objection to root store
> programs requiring additional requirements above and beyond that of the EV
> Guidelines. I can only presume that you have similar objections to root
> store programs requiring additional requirements above and beyond the
> Baseline Requirements - as (to the best of my knowledge) - every root
> program already does today.
>
>
>  Ryan,
>
>  I believe that I have repeatedly stated my support for Google’s overall
> plan to implement CT, so please don't blow this discussion out of
> proportion by interpreting it as me objecting to anything and everything a
> root store operator chooses to do unilaterally. On the other hand, more
> coordination amongst root store operators would be great!
>
>
>  Could you perhaps quantify exactly what you see as the downgrade, given
> that such a hypothetical user experience (as again, EV is not presently
> implemented in Chrome for Android) does not change?
>
>
>  My concern is one of timing. Rather than letting perfectly good EV
> certificates expire naturally or be grandfathered in, they are treated as
> non-EV certificates under this policy. When I use the terms ‘downgrade’ and
> ‘retroactive', I am specifically referring to a policy in which some EV
> certificates issued prior to the implementation of the policy (retroactive)
> are treated as non-EV (downgrade). I now understand that there is currently
> no change in how they are displayed in Chrome for Android, but (1) the
> policy and your comments imply that there will be, and (2) however
> hypothetical it may be, a precedent is being set here.
>
>
I'm still not sure I follow the argument, so apologies for my ignorance. EV
treatment will only be granted to certificates that conform to these
policies. Are you imagining a scenario in which a certificate appears as EV
in Android (which again, is not a feature currently implemented), and then
later in the future, no longer does?

And I'm not sure what your view of the precedent is. Chrome has already
applied policies it believes are necessary to protect users - we no longer
treat internal host names as secure, for example, independent of the
Baseline Requirements 2015 sunset. Equally, we are aggressively proceeding
with ensuring that the security indicator is appropriate for certificates
that fail to meet minimum cryptographic requirements or validity dates.

A certificate which does not display as EV today, and which does not
display as EV tomorrow, does not particularly seem like a "downgrade"?


>  If this still doesn’t make sense, maybe we can discuss it at the CAB
> Forum meeting in a few weeks.
>
>  Also, can someone answer my question on point #5 in my original message?
>
>