Re: [certid] Comments on draft-saintandre-tls-server-id-check-03

=JeffH <Jeff.Hodges@KingsMountain.com> Wed, 12 May 2010 23:23 UTC

Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 09E183A6928 for <certid@core3.amsl.com>; Wed, 12 May 2010 16:23:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.07
X-Spam-Level:
X-Spam-Status: No, score=-0.07 tagged_above=-999 required=5 tests=[AWL=-1.005, BAYES_50=0.001, IP_NOT_FRIENDLY=0.334, J_CHICKENPOX_17=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9ARDLZAru2x0 for <certid@core3.amsl.com>; Wed, 12 May 2010 16:23:39 -0700 (PDT)
Received: from outbound-mail-313.bluehost.com (cpoproxy3-pub.bluehost.com [67.222.54.6]) by core3.amsl.com (Postfix) with SMTP id A39E63A68F0 for <certid@ietf.org>; Wed, 12 May 2010 16:23:39 -0700 (PDT)
Received: (qmail 16099 invoked by uid 0); 12 May 2010 23:23:29 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by cpoproxy3.bluehost.com with SMTP; 12 May 2010 23:23:29 -0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=kingsmountain.com; h=Received:Message-ID:Date:From:User-Agent:MIME-Version:To:Subject:Content-Type:Content-Transfer-Encoding:X-Identified-User; b=lIjFkC1jKnHytQgnI3hhoWNsZv6asNIaUygYpTES4rNYe2holBLOnrJNT96EXn5ajmtQnjiQyy6oEIoCQQtNJrkLa0WwokcacwqC2RTjTBKTN+PP5pUlIF46P3tYRApP;
Received: from outbound4.ebay.com ([216.113.168.128] helo=[10.244.49.154]) by box514.bluehost.com with esmtpsa (SSLv3:AES256-SHA:256) (Exim 4.69) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1OCLGz-0003g4-HS for certid@ietf.org; Wed, 12 May 2010 17:23:29 -0600
Message-ID: <4BEB3870.10904@KingsMountain.com>
Date: Wed, 12 May 2010 16:23:28 -0700
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Thunderbird 2.0.0.24 (X11/20100411)
MIME-Version: 1.0
To: IETF cert-based identity <certid@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 216.113.168.128 authed with jeff.hodges+kingsmountain.com}
Subject: Re: [certid] Comments on draft-saintandre-tls-server-id-check-03
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates <certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 May 2010 23:23:41 -0000

 > From: ArkanoiD <ark@eltex.net>
 >
 > It does not really answer the question, we should analyse certificates seen
 > "in the wild" ;-)
 >
 > On Wed, May 12, 2010 at 03:58:23PM -0700, Love H?rnquist ?strand wrote:
 >>
 >> 12 maj 2010 kl. 15:37 skrev Peter Saint-Andre:
 >>
 >> >> So I'm not sure right now what to say about that. I suspect we can still
 >> >> stipulate that the only RDN having attr type of CN that we'll pay
 >> >> attention to is the one at the far end of the RDN sequence comprising
 >> >> the DN.
 >> >
 >> > We can stipulate that, but is it realistic?
 >>
 >> Yes, since that's what RFC 2818 said.


in essence I'm agreed with ArkanoiD.

In particular here's what RFC 2818 sez (in section 3.1 Server Identity)..

    If a subjectAltName extension of type dNSName is present, that MUST
    be used as the identity. Otherwise, the (most specific) Common Name
    field in the Subject field of the certificate MUST be used. ...

..which is ambiguous because X.501 does not explicitly state which RDN in the 
DN sequence is the most specific (it's implied) and there allegedly exist 
non-trivial slices of current practice don't necessarily follow that 
stipulation anyway (for whatever reasons).

Also, we should note that the current rev of "CA/Browser Forum: Guidelines For 
The Issuance And Management Of Extended Validation Certificates (version 1.2)" 
<http://cabforum.org/Guidelines_v1_2.pdf> specifies using CN (commonName) 
containing the host domain name /or/ dNSName in subjectAlternativeName (see 
section 8.1.1(2) therein), rather than deprecating use of subject:commonName 
(in that doc's notation). that doc also doesn't specify where in the DN's RDN 
sequence an RDN of type commonName should/must be placed.

(so we have some evangelizing to do with the CABForum folk...)

=JeffH