Re: [certid] Please explicitly disallow unvetted info in subject names

Bruno Harbulot <Bruno.Harbulot@manchester.ac.uk> Thu, 10 June 2010 17:38 UTC

Return-Path: <Bruno.Harbulot@manchester.ac.uk>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D89CB28C12A for <certid@core3.amsl.com>; Thu, 10 Jun 2010 10:38:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.999
X-Spam-Level:
X-Spam-Status: No, score=-3.999 tagged_above=-999 required=5 tests=[BAYES_50=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 74Y0LB2H2YWs for <certid@core3.amsl.com>; Thu, 10 Jun 2010 10:38:57 -0700 (PDT)
Received: from clarity.mcc.ac.uk (clarity.mcc.ac.uk [130.88.200.144]) by core3.amsl.com (Postfix) with ESMTP id 460243A67F6 for <certid@ietf.org>; Thu, 10 Jun 2010 10:38:57 -0700 (PDT)
Received: from rankine.its.manchester.ac.uk ([130.88.25.196]) by clarity.mcc.ac.uk with esmtps (TLSv1:AES256-SHA:256) (Exim 4.69 (FreeBSD)) (envelope-from <Bruno.Harbulot@manchester.ac.uk>) id 1OMliT-000OgH-83; Thu, 10 Jun 2010 18:38:57 +0100
Received: from pulsar.rcs.manchester.ac.uk ([130.88.1.47]:50938 helo=mymachine) by rankine.its.manchester.ac.uk with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.69) (envelope-from <Bruno.Harbulot@manchester.ac.uk>) id 1OMliT-0006v7-34; Thu, 10 Jun 2010 18:38:57 +0100
Message-ID: <4C112330.5060309@manchester.ac.uk>
Date: Thu, 10 Jun 2010 18:38:56 +0100
From: Bruno Harbulot <Bruno.Harbulot@manchester.ac.uk>
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.9) Gecko/20100423 Lightning/1.0b1 Thunderbird/3.0.4
MIME-Version: 1.0
To: mrex@sap.com
References: <201006101434.o5AEY4NX011362@fs4113.wdf.sap.corp>
In-Reply-To: <201006101434.o5AEY4NX011362@fs4113.wdf.sap.corp>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Authenticated-Sender: Bruno Harbulot from pulsar.rcs.manchester.ac.uk (mymachine) [130.88.1.47]:50938
X-Authenticated-From: Bruno.Harbulot@manchester.ac.uk
Cc: certid@ietf.org
Subject: Re: [certid] Please explicitly disallow unvetted info in subject names
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates <certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Jun 2010 17:38:59 -0000

Hi,

On 10/06/10 15:34, Martin Rex wrote:
> Nelson B Bolyard wrote:
>>
>> There are a large number of CAs that follow the practice of vetting SOME
>> of the information they put into cert subject names, but not all, and in
>> fact deliberately making no attempt to vet certain attributes at all.
>>
>> Examples known to me include:
>>
>> OU names: typically not vetted at all
>>
>> CNs other than the last (most specific) one, if it is a DNS name.
>>
>> Maybe it's pointless to try, but can we write into this RFC that conforming
>> certs contain NO unvetted attributes in the subject name nor in any Subject
>> Alt Name attributes?
>>
>> Since CAs seem to have such a strong desire to do so, maybe we should invent
>> a new extension: unvetted subject alt names, where they can put whatever
>> nonsense they want, and apps that care to use only vetted info
>> can ignore.  It MUST NOT be a critical extension.  On the other hand, the
>> correct processing of that extension should be defined to ignore it (:-)
>> so that all apps may claim to properly handle it, even if it is critical.
>
>
> This description of what some CAs are doing is completely bogus.
>
> CAs vouch and are liable for every single bit in the ToBeSigned part
> of a certificate, no matter what stupid things they claim in any weird
> and ineffective "certificate practice statement" (CPS).
>
> A CA that doesn't is not a CA, but instead a hackers foot in your door.
>
> This applies equally to all components of the subject DName, and
> all X.509v3 extensions, such as all subjectAltNames, all keyUsages,
> all extendedKeyUsages, all BasicConstraints, AIA, CRL distribution points,
> and whatever else there is.
>
> Blindly copying without validation any data from the PKCS#10 request
> into the certificate that they sign would be simply irresponsible and
> an act of gross negligence.

Agreed, but there's only so much the vetting can achieve. Vetting a 
piece of information depends on what it entails. Without knowing how 
some information is going to be used, the concept of vetting can be a 
bit loose.

Vetting CN=the.host.name or subjectAltName=DNS:the.host.name is quite 
clear because CAs know more or less what it's going to be used for.
The DNS system is a rather well-defined global ID system. Beyond that, 
not much is guaranteed in terms of naming.
It starts to be a bit vague even for certificates for users. Should a CA 
vet "CN=Bill Gates", "CN=William Gates", "CN=William Henry Gates", etc? 
There are a people who share the same name, even if you include the 
middle names.

If you get something like "O=Apple", is it going to be Apple 
(computers), Apple (Beatles) or Apple (http://www.apple.co.uk/).

Definition of identity and name verification is doable with a 
hierarchical system like the DNS. Everything else will depend on the CAs 
policies as to how the do the initial verification of the identity.


I think vetting a piece of information really depends on its semantics, 
and that can be a very difficult problem.
Considering that O= or OU= aren't really used for things other than 
vaguely informative purposes, I'm not sure it would make sense to 
disallow using them to put some informative but only vaguely verified 
piece of information.


Best wishes,

Bruno.