Re: [certid] Need to define "most specific RDN"
Nelson B Bolyard <nelson@bolyard.me> Sat, 17 July 2010 22:45 UTC
Return-Path: <nelson@bolyard.me>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id 0138B3A6A0B for <certid@core3.amsl.com>;
Sat, 17 Jul 2010 15:45:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.989
X-Spam-Level:
X-Spam-Status: No, score=-0.989 tagged_above=-999 required=5 tests=[AWL=-0.990,
BAYES_50=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AtGiuNvt8NhK for
<certid@core3.amsl.com>; Sat, 17 Jul 2010 15:45:33 -0700 (PDT)
Received: from smtpauth03.prod.mesa1.secureserver.net
(smtpauth03.prod.mesa1.secureserver.net [64.202.165.183]) by core3.amsl.com
(Postfix) with SMTP id 51E7D3A6A08 for <certid@ietf.org>;
Sat, 17 Jul 2010 15:45:22 -0700 (PDT)
Received: (qmail 20451 invoked from network); 17 Jul 2010 22:45:33 -0000
Received: from unknown (24.5.142.42) by smtpauth03.prod.mesa1.secureserver.net
(64.202.165.183) with ESMTP; 17 Jul 2010 22:45:33 -0000
Message-ID: <4C42328B.4070305@bolyard.me>
Date: Sat, 17 Jul 2010 15:45:31 -0700
From: Nelson B Bolyard <nelson@bolyard.me>
Organization: Network Security Services
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US;
rv:1.9.1b1pre) Gecko/20081004 Firefox/3.5 Firefox/3.5
MIME-Version: 1.0
To: certid@ietf.org
References: <201007170054.o6H0s28q023476@fs4113.wdf.sap.corp>
In-Reply-To: <201007170054.o6H0s28q023476@fs4113.wdf.sap.corp>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Subject: Re: [certid] Need to define "most specific RDN"
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates
<certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 17 Jul 2010 22:45:35 -0000
On 2010-07-16 17:54 PDT, Martin Rex wrote: > But I have a problem with words in a BCP that > are in clear violation of rfc-2119 section 6 last sencence > with the potential to cause interop problems and entirely without > a cause. Fair enough, but I challenge your implicit assertions that there is any "clear violation" or that they are "without cause". > What is the purpose of marking SAN critical other than having a > number of peers choke on it and reject it? It's hardly make a > cert more understandable. An implementation of PKI has no control > over what exactly an application does with a SAN. It is obviously to ensure that any relying party relies on the content of the SAN. An issuer DOES have control. It ensures that the relying party will NOT rely on the cert if it does not grok the SAN. >> 3) Make strong recommendations to stop using CN-IDs in subject > > Really bad idea, completely unnecesary and clear violation of > rfc-2116 section 6. Baloney. May I suggest you re-read that section of the RFC you most frequently cite? "Making strong recommendations" is not the same as "Imperative" or "MUST" and you know it. But further, section 6 allows imperatives for "behavior which has potential for causing harm". Allow subordinate CAs to issue certs that bypass the name constraints placed on them is most definitely "behavior which has potential for causing harm". > Im pretty sure that every one which strongly cares about this can > make his client ignore CN-IDs when at least one DNSName SAN is > present, so 2) is perfectly sufficient. Only after CAs stop issuing certs without SANs. I read Paul's message as saying that Digicert is issuing certs without SANs. (Paul, please correct me if that is mistaken.) >> 4) Stop using server-IDs in common names experimentally A great idea. Especially if the only affected products are really old cell phones that cannot handle modern web sites anyway. Continue to have special wifi.domain.TLD web sites for them, and let the rest of the Internet move ahead. > All the big players have implemented IPv6 and tested interop. > Why don't we shutdown the entire IPv4 internet to force the > users to use IPv6? Martin, you oppose experimentation? Do you want to live in the past forever? >> On the topic of name constraints: What if there are ways to push Name >> Constraints forward without necessarily having to wait for all legacy >> clients to die and all the niche clients to become compatible? Firefox already applies DNS name constraints to DNS names in SANs, and has for years. In a forthcoming version of Firefox, DNS name constraints WILL be applied to last Subject CN under the following circumstances: - The cert chain being verified is being verified for the purpose of being an SSL/TLS server certificate - the server cert has no SAN extension, or no DNS names in its SAN extension (in other words, under the same circumstances in which we would use the last Subject CN as a CN-ID for cert name matching purposes). The value of these name constraints is that they will enable CAs to issue subordinate CA certs to corporations without any fear that those corporations will issue false certs for their competitors. They also allow relying parties to constrain names in entire PKI trees subordinate to certain national CAs, thereby greatly reducing vulnerability to the compelled issuance of certificates for domains outside that CA's national country code domain(s). Without doubt, the threat of compelled issuance has been the single biggest threat to public confidence in PKI to have come along in years, and name constraints are one of the few ways we have of combating that threat. So, don't dismiss it lightly.
- [certid] Need to define "most specific RDN" Paul Hoffman
- Re: [certid] Need to define "most specific RDN" Peter Saint-Andre
- Re: [certid] Need to define "most specific RDN" Bruno Harbulot
- Re: [certid] Need to define "most specific RDN" Paul Hoffman
- Re: [certid] Need to define "most specific RDN" Peter Sylvester
- Re: [certid] Need to define "most specific RDN" Kaspar Brand
- Re: [certid] Need to define "most specific RDN" Kurt Zeilenga
- Re: [certid] Need to define "most specific RDN" Peter Sylvester
- Re: [certid] Need to define "most specific RDN" Peter Saint-Andre
- Re: [certid] Need to define "most specific RDN" Martin Rex
- Re: [certid] Need to define "most specific RDN" Peter Saint-Andre
- Re: [certid] Need to define "most specific RDN" Love Hörnquist Åstrand
- Re: [certid] Need to define "most specific RDN" Peter Saint-Andre
- Re: [certid] Need to define "most specific RDN" =JeffH
- Re: [certid] Need to define "most specific RDN" Kaspar Brand
- Re: [certid] Need to define "most specific RDN" Ludwig Nussel
- Re: [certid] Need to define "most specific RDN" Peter Sylvester
- Re: [certid] Need to define "most specific RDN" Kaspar Brand
- Re: [certid] Need to define "most specific RDN" Peter Saint-Andre
- Re: [certid] Need to define "most specific RDN" Kaspar Brand
- Re: [certid] Need to define "most specific RDN" Paul Hoffman
- Re: [certid] Need to define "most specific RDN" Kaspar Brand
- Re: [certid] Need to define "most specific RDN" Nelson B Bolyard
- Re: [certid] Need to define "most specific RDN" Kaspar Brand
- Re: [certid] Need to define "most specific RDN" Martin Rex
- Re: [certid] Need to define "most specific RDN" Nelson B Bolyard
- Re: [certid] Need to define "most specific RDN" Kaspar Brand
- Re: [certid] Need to define "most specific RDN" Ludwig Nussel
- Re: [certid] Need to define "most specific RDN" Nelson B Bolyard
- Re: [certid] Need to define "most specific RDN" Paul Tiemann
- Re: [certid] Need to define "most specific RDN" Martin Rex
- Re: [certid] Need to define "most specific RDN" Nelson B Bolyard
- Re: [certid] Need to define "most specific RDN" Kaspar Brand
- Re: [certid] Need to define "most specific RDN" Martin Rex
- Re: [certid] Need to define "most specific RDN" Martin Rex
- Re: [certid] Need to define "most specific RDN" Shumon Huque
- Re: [certid] Need to define "most specific RDN" Martin Rex
- Re: [certid] Need to define "most specific RDN" Shumon Huque
- Re: [certid] Need to define "most specific RDN" Peter Sylvester
- Re: [certid] Need to define "most specific RDN" Peter Saint-Andre
- Re: [certid] Need to define "most specific RDN" Peter Saint-Andre
- Re: [certid] Name constraints and legacy clients Matt McCutchen
- Re: [certid] Name constraints and legacy clients Matt McCutchen
- Re: [certid] Name constraints and legacy clients Paul Tiemann