Article 6R0WM Google Calls for Halting Use of WHOIS for TLS Domain Verifications

Google Calls for Halting Use of WHOIS for TLS Domain Verifications

by
hubie
from SoylentNews on (#6R0WM)

upstart writes:

WHOIS data is unreliable. So why is it used in TLS certificate applications?:

Certificate authorities and browser makers are planning to end the use of WHOIS data verifying domain ownership following a report that demonstrated how threat actors could abuse the process to obtain fraudulently issued TLS certificates.

TLS certificates are the cryptographic credentials that underpin HTTPS connections, a critical component of online communications verifying that a server belongs to a trusted entity and encrypts all traffic passing between it and an end user. These credentials are issued by any one of hundreds of CAs (certificate authorities) to domain owners. The rules for how certificates are issued and the process for verifying the rightful owner of a domain are left to the CA/Browser Forum. One "base requirement rule" allows CAs to send an email to an address listed in the WHOIS record for the domain being applied for. When the receiver clicks an enclosed link, the certificate is automatically approved.

Researchers from security firm watchTowr recently demonstrated how threat actors could abuse the rule to obtain fraudulently issued certificates for domains they didn't own. The security failure resulted from a lack of uniform rules for determining the validity of sites claiming to provide official WHOIS records.

[...] The research didn't escape the notice of the CA/Browser Forum (CAB Forum). On Monday, a member representing Google proposed ending the reliance on WHOIS data for domain ownership verification "in light of recent events where research from watchTowr Labs demonstrated how threat actors could exploit WHOIS to obtain fraudulently issued TLS certificates."

The formal proposal calls for reliance on WHOIS data to "sunset" in early November. It establishes specifically that "CAs MUST NOT rely on WHOIS to identify Domain Contacts" and that "Effective November 1, 2024, validations using this [email verification] method MUST NOT rely on WHOIS to identify Domain Contact information."

Since Monday's submission, more than 50 follow-up comments have been posted. Many of the responses expressed support for the proposed change. Others have questioned the need for a change as proposed, given that the security failure watchTowr uncovered is known to affect only a single top-level domain.

[...] The proposed changes are formally in the discussion phase of deliberations. It's unclear when formal voting on the change will begin.

Previously: Rogue WHOIS Server Gives Researcher Superpowers No One Should Ever Have

Original Submission

Read more of this story at SoylentNews.

External Content
Source RSS or Atom Feed
Feed Location https://soylentnews.org/index.rss
Feed Title SoylentNews
Feed Link https://soylentnews.org/
Feed Copyright Copyright 2014, SoylentNews
Reply 0 comments