[certid] DNSSEC-based name canonicalization
Matt McCutchen <matt@mattmccutchen.net> Fri, 17 September 2010 03:12 UTC
Return-Path: <matt@mattmccutchen.net>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id 88FA73A6ADD for <certid@core3.amsl.com>;
Thu, 16 Sep 2010 20:12:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5
tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vkgYzhuL7P53 for
<certid@core3.amsl.com>; Thu, 16 Sep 2010 20:12:46 -0700 (PDT)
Received: from homiemail-a60.g.dreamhost.com (caiajhbdcagg.dreamhost.com
[208.97.132.66]) by core3.amsl.com (Postfix) with ESMTP id 0FF403A6BB5 for
<certid@ietf.org>; Thu, 16 Sep 2010 20:12:45 -0700 (PDT)
Received: from homiemail-a60.g.dreamhost.com (localhost [127.0.0.1]) by
homiemail-a60.g.dreamhost.com (Postfix) with ESMTP id BE8343BC063;
Thu, 16 Sep 2010 20:13:10 -0700 (PDT)
DomainKey-Signature: a=rsa-sha1; c=nofws; d=mattmccutchen.net; h=subject:from
:to:cc:in-reply-to:references:content-type:date:message-id
:mime-version:content-transfer-encoding; q=dns; s= mattmccutchen.net;
b=uEBnanV93cVAYAuNbvS5hC1hxVxq2eP1TRSay763UfS
Z2H17MlcfLx2ind74Zx3IX0ySCley9D8nk8cNFk8kEorGp1o3eQSI9GU8Ce7GzHm
K2sqhVmPilnVP9ga7JX9ikT6BxtOQxibVuTHDWzApjUmiYR9kivH1IgATALkBIjY =
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=mattmccutchen.net;
h= subject:from:to:cc:in-reply-to:references:content-type:date
:message-id:mime-version:content-transfer-encoding; s= mattmccutchen.net;
bh=Q0sIp8FyZUSEem1B++ArwIKJXvg=;
b=PGiJ5FVBeP mhwankb4maEb7MKbMBmVn70yD0kjj8DCT/D9YUEwGM5lREZeUE5dXp+R3PpsPa8q
NlbpbZueEohjVOqWioxdSt6ogzqGE/9Pynhko0Ak1sxe2xir0luZYBASUmLdwl1E
j0d6bHP1YiwSDXY/l3cuB4g1f7g1kjE04=
Received: from [129.2.249.209] (ml2.student.umd.edu [129.2.249.209])
(Authenticated sender: matt@mattmccutchen.net) by
homiemail-a60.g.dreamhost.com (Postfix) with ESMTPA id 7C0843BC062;
Thu, 16 Sep 2010 20:13:10 -0700 (PDT)
From: Matt McCutchen <matt@mattmccutchen.net>
To: Martin Rex <mrex@sap.com>
In-Reply-To: <201009162234.o8GMYJZg010452@fs4113.wdf.sap.corp>
References: <201009162234.o8GMYJZg010452@fs4113.wdf.sap.corp>
Content-Type: text/plain; charset="UTF-8"
Date: Thu, 16 Sep 2010 23:13:09 -0400
Message-ID: <1284693189.5722.209.camel@mattlaptop2.local>
Mime-Version: 1.0
X-Mailer: Evolution 2.30.4
Content-Transfer-Encoding: 7bit
Cc: certid@ietf.org
Subject: [certid] DNSSEC-based name canonicalization
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates
<certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Sep 2010 03:12:48 -0000
On Fri, 2010-09-17 at 00:34 +0200, Martin Rex wrote: > Cleanup of my prior message: > > > Matt McCutchen wrote: > > > > On Thu, 2010-09-16 at 07:27 +0200, Martin Rex wrote: > > > Clearly unsafe operations: > > > > > > - building a reference identifier from the result of a > > > DNS CNAME lookup > > > > > > (the use of DNSSEC does not make this safe) > > > > Why not? I'm not saying it's good practice, but I don't see an actual > > vulnerability. > > You need two characteristics: > > (1) _trustworty_ information source for a name transformation > (2) _protected_access_ to the information source > > DNSSEC meets (2) but not (1) Why not (1)? It should go without saying that by DNSSEC I meant "DNSSEC with a set of trustworthy trust anchors that will get us to the desired signed zone". From there, the DNS admin has full authority to say what certificates a client trying to connect to a host in her zone should accept. We could have a record, CERTNAME or something, that specifies the hostname for which the certificate should be valid (via keyassure or PKIX + server-id-check). I realize now that it would be dangerous to reinterpret CNAME for this purpose, just as it is dangerous to reinterpret CERT as making an assurance, but that is a separate issue. I still wouldn't advise doing it unless we come up with a compelling use case. -- Matt
- [certid] Fwd: secdir review of draft-saintandre-t… Peter Saint-Andre
- Re: [certid] Fwd: secdir review of draft-saintand… Henry B. Hotz
- Re: [certid] Fwd: secdir review of Martin Rex
- Re: [certid] Fwd: secdir review of draft-saintand… Matt McCutchen
- Re: [certid] Fwd: secdir review of draft-saintand… Matt McCutchen
- Re: [certid] Fwd: secdir review of Martin Rex
- Re: [certid] Fwd: secdir review of draft-saintand… Matt McCutchen
- Re: [certid] Fwd: secdir review of draft-saintand… Phillip Hallam-Baker
- Re: [certid] Fwd: secdir review of Martin Rex
- Re: [certid] Fwd: secdir review of Henry B. Hotz
- Re: [certid] Fwd: secdir review of Martin Rex
- Re: [certid] Fwd: secdir review of Martin Rex
- [certid] DNSSEC-based name canonicalization Matt McCutchen
- [certid] Wildcards for serving untrusted web cont… Matt McCutchen
- Re: [certid] DNSSEC-based name canonicalization Martin Rex
- Re: [certid] DNSSEC-based name canonicalization Peter Gutmann
- Re: [certid] secdir review of draft-saintandre-tl… Peter Saint-Andre
- Re: [certid] Fwd: secdir review of draft-saintand… Peter Saint-Andre
- Re: [certid] [secdir] secdir review of draft-sain… Peter Saint-Andre
- Re: [certid] secdir review of draft-saintandre-tl… Barry Leiba
- Re: [certid] Fwd: secdir review of draft-saintand… Barry Leiba
- Re: [certid] secdir review of draft-saintandre-tl… Peter Saint-Andre
- Re: [certid] [secdir] secdir review of draft-sain… Peter Saint-Andre
- Re: [certid] [secdir] secdir review of draft-sain… Jeffrey Hutzelman
- Re: [certid] [secdir] secdir review of draft-sain… Jeffrey Hutzelman
- Re: [certid] [secdir] secdir review of draft-sain… Peter Saint-Andre
- Re: [certid] [secdir] secdir review of draft-sain… ArkanoiD
- Re: [certid] [TLS] [secdir] secdir review of draf… Marsh Ray
- Re: [certid] [TLS] [secdir] secdir review of draf… Jeffrey A. Williams
- Re: [certid] [TLS] [secdir] secdir review of draf… Marsh Ray
- Re: [certid] [TLS] [secdir] secdir Martin Rex
- Re: [certid] [TLS] [secdir] secdir review of draf… Richard L. Barnes
- Re: [certid] [TLS] [secdir] secdir review of draf… Marsh Ray
- [certid] Bad certificate handling Matt McCutchen
- Re: [certid] [TLS] [secdir] secdir review of Martin Rex
- Re: [certid] [TLS] [secdir] secdir review of Robert Relyea
- Re: [certid] [TLS] [secdir] secdir review of draf… =JeffH
- Re: [certid] [TLS] [secdir] secdir review of Nicolas Williams
- Re: [certid] DNSSEC-based name canonicalization Peter Saint-Andre