Re: [Acme] AD Review: draft-ietf-acme-tls-alpn-05

Ilari Liusvaara <ilariliusvaara@welho.com> Wed, 26 December 2018 15:33 UTC

Return-Path: <ilariliusvaara@welho.com>
X-Original-To: acme@ietfa.amsl.com
Delivered-To: acme@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 641131274D0 for <acme@ietfa.amsl.com>; Wed, 26 Dec 2018 07:33:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p4ucP0R-WZhq for <acme@ietfa.amsl.com>; Wed, 26 Dec 2018 07:33:19 -0800 (PST)
Received: from welho-filter2.welho.com (welho-filter2.welho.com [83.102.41.24]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DF9E11271FF for <acme@ietf.org>; Wed, 26 Dec 2018 07:33:18 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by welho-filter2.welho.com (Postfix) with ESMTP id 0C189CFF69; Wed, 26 Dec 2018 17:33:16 +0200 (EET)
X-Virus-Scanned: Debian amavisd-new at pp.htv.fi
Received: from welho-smtp2.welho.com ([IPv6:::ffff:83.102.41.85]) by localhost (welho-filter2.welho.com [::ffff:83.102.41.24]) (amavisd-new, port 10024) with ESMTP id IqSJw5xbPyIO; Wed, 26 Dec 2018 17:33:15 +0200 (EET)
Received: from LK-Perkele-VII (87-92-19-27.bb.dnainternet.fi [87.92.19.27]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by welho-smtp2.welho.com (Postfix) with ESMTPSA id 5CC3227B; Wed, 26 Dec 2018 17:33:13 +0200 (EET)
Date: Wed, 26 Dec 2018 17:33:13 +0200
From: Ilari Liusvaara <ilariliusvaara@welho.com>
To: Eric Rescorla <ekr@rtfm.com>
Cc: IETF ACME <acme@ietf.org>
Message-ID: <20181226153313.GA7576@LK-Perkele-VII>
References: <CABcZeBPCM1qc+z0FM4iB-DeGGuKg-V4CCxUWzs+RTuYhXJrJvw@mail.gmail.com> <20181226145625.GB6893@LK-Perkele-VII> <CABcZeBPNw13m41DTMv6iPGWkAxgSbLQ6_Tt8ZZtik9p0e7FYZQ@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
In-Reply-To: <CABcZeBPNw13m41DTMv6iPGWkAxgSbLQ6_Tt8ZZtik9p0e7FYZQ@mail.gmail.com>
User-Agent: Mutt/1.10.1 (2018-07-13)
Sender: ilariliusvaara@welho.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/acme/jO9aUSw_Lm6q1WYfbL0grmTVSAg>
Subject: Re: [Acme] AD Review: draft-ietf-acme-tls-alpn-05
X-BeenThere: acme@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Automated Certificate Management Environment <acme.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/acme>, <mailto:acme-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/acme/>
List-Post: <mailto:acme@ietf.org>
List-Help: <mailto:acme-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/acme>, <mailto:acme-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Dec 2018 15:33:21 -0000

On Wed, Dec 26, 2018 at 07:14:44AM -0800, Eric Rescorla wrote:
> On Wed, Dec 26, 2018 at 6:56 AM Ilari Liusvaara <ilariliusvaara@welho.com>
> wrote:
> 
> > On Mon, Dec 24, 2018 at 12:47:30PM -0800, Eric Rescorla wrote:
> > >
> > > S 4.
> > > >      properly segregates control of those names to the users that own
> > > >      them.  This means that if User A registers Host A and User B
> > > >      registers Host B the server should not allow a TLS request using a
> > > >      SNI value for Host A to be served by User B or Host B to be
> > served by
> > > >      User A.  If the server allows User B to serve this request it
> > allows
> > > >      them to illegitimately validate control of Host A to the ACME
> > server.
> > >
> > > Isn't this the property you say doesn't hold in S 6 below. As I
> > > understand it, the rationale for this design is that people who opt in
> > > to acme-tls/1 won't do this, no?
> >
> > No. This is a different property than one mentioned in S6. This is due
> > to different SNI used.
> >
> 
> That appears to be what S 6 says as well:
> 
>    domain names they controlled (i.e. if User A registered Host A and
>    User B registered Host B with a service provider that User A wouldn't
>    be able to respond to SNI traffic for Host B).  This turns out not to
> 
> So at minimum some improved text is required here.

Oh, that text in S6 looks to be incorrect.

Maybe something like (some further wordsmithing needed):

When the TLS SNI challenge was designed it was assumed that a user
would only be able to respond to TLS traffic via SNI for domain names
they controlled (i.e. User A would only be able to register Host A if
they controlled the domain name for Host A).


TLS-SNI needs stronger properties than coherent FCFS registration of
names for security. Specifically, it needs some mechanism that prevents
the registration of validation names.


-Ilari