Re: [certid] DNSSEC-based name canonicalization
Peter Saint-Andre <stpeter@stpeter.im> Wed, 29 September 2010 20:31 UTC
Return-Path: <stpeter@stpeter.im>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id A25073A6D8F for <certid@core3.amsl.com>;
Wed, 29 Sep 2010 13:31:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.544
X-Spam-Level:
X-Spam-Status: No, score=-102.544 tagged_above=-999 required=5 tests=[AWL=0.055,
BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id peaC4vXUbVNF for
<certid@core3.amsl.com>; Wed, 29 Sep 2010 13:31:28 -0700 (PDT)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com
(Postfix) with ESMTP id 676CE3A6D20 for <certid@ietf.org>;
Wed, 29 Sep 2010 13:31:27 -0700 (PDT)
Received: from moveme.cisco.com (72-163-0-129.cisco.com [72.163.0.129])
(Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id
17B8D403DF; Wed, 29 Sep 2010 14:37:44 -0600 (MDT)
Message-ID: <4CA3A249.70601@stpeter.im>
Date: Wed, 29 Sep 2010 14:32:09 -0600
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US;
rv:1.9.1.12) Gecko/20100914 Thunderbird/3.0.8
MIME-Version: 1.0
To: mrex@sap.com
References: <201009170521.o8H5LxdZ003712@fs4113.wdf.sap.corp>
In-Reply-To: <201009170521.o8H5LxdZ003712@fs4113.wdf.sap.corp>
X-Enigmail-Version: 1.0.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Cc: certid@ietf.org
Subject: Re: [certid] DNSSEC-based name canonicalization
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates
<certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 Sep 2010 20:31:30 -0000
Interesting topic, but I see nothing in this branch of the discussion that necessitates changes to the I-D. Do correct me if I'm wrong. :) On 9/16/10 11:21 PM, Martin Rex wrote: > Matt McCutchen wrote: >> >> On Fri, 2010-09-17 at 00:34 +0200, Martin Rex wrote: >>> Cleanup of my prior message: >>> >>> >>> Matt McCutchen wrote: >>>> >>>> On Thu, 2010-09-16 at 07:27 +0200, Martin Rex wrote: >>>>> Clearly unsafe operations: >>>>> >>>>> - building a reference identifier from the result of a >>>>> DNS CNAME lookup >>>>> >>>>> (the use of DNSSEC does not make this safe) >>>> >>>> Why not? I'm not saying it's good practice, but I don't see an actual >>>> vulnerability. >>> >>> You need two characteristics: >>> >>> (1) _trustworty_ information source for a name transformation >>> (2) _protected_access_ to the information source >>> >>> DNSSEC meets (2) but not (1) >> >> Why not (1)? It should go without saying that by DNSSEC I meant "DNSSEC >> with a set of trustworthy trust anchors that will get us to the desired >> signed zone". From there, the DNS admin has full authority to say what >> certificates a client trying to connect to a host in her zone should >> accept. > > DNS needs to be available, fast, efficient and low-low-low cost. > > The cost of creating and maintaining DNS records with any trustworthyness > that is measurably distinct from zero, with the necessary expertise to > set up and devotion to practise scrutiny for every change to the data > is probably going to far exceed the funding of most, if not all DNS admins. > > Are there already workable procedures and APIs for software to > distinguish "normal" DNSSEC lookup results from "trustworthy" DNSSEC > lookup results with some level of portability? How and how often > would admins/consumers have to update and reconfirm every "trustworthy" > DNSSEC key they keep? > >> >> We could have a record, CERTNAME or something, that specifies the >> hostname for which the certificate should be valid (via keyassure or >> PKIX + server-id-check). I realize now that it would be dangerous to >> reinterpret CNAME for this purpose, just as it is dangerous to >> reinterpret CERT as making an assurance, but that is a separate issue. >> I still wouldn't advise doing it unless we come up with a compelling use >> case. > > DNS domains is a resource that is managed pretty arbitrary on a > first-come first-served basis. It has some loose "a domain is leased > to at most one entity at any single time" provision, that's it. > DNS is vital for the internet, so it needs to remain fast, > efficient and free, and all of that combined makes it hardly > usable to bootstrap an infrastructure of trust, with any meaningful > level of trust. > > The fraction of resources that web browsers accesses through HTTPS, > where the first HTTPS link is served through a page received via > HTTP in a completely untrusted fashion is mindboggling. > Example "ebay". What do you think: how many users that login > through the ebay sign-in page via HTTPS every day, have supplied > the URL of the signin page in a trusted&secure fashion, and > how many open http://www.ebay.<country> and click a link > on that page? > > How about online banking? An internet commerce that cares strongly > about security should serve only one single "301 Moved Permanently" > page with an HTTPS url on port 80, making it difficult to bookmark > anything else than a HTTPS urls to this site. > > "Secure" electronic commerce on the internet is often > like a handful of iron rings that are quickly attached to > each other with tiny rubber bands from the kitchen drawer > in order to give the impression of a chain. Occasionally, > some of these "chains" rip apart by their own weight alone.
- [certid] Fwd: secdir review of draft-saintandre-t… Peter Saint-Andre
- Re: [certid] Fwd: secdir review of draft-saintand… Henry B. Hotz
- Re: [certid] Fwd: secdir review of Martin Rex
- Re: [certid] Fwd: secdir review of draft-saintand… Matt McCutchen
- Re: [certid] Fwd: secdir review of draft-saintand… Matt McCutchen
- Re: [certid] Fwd: secdir review of Martin Rex
- Re: [certid] Fwd: secdir review of draft-saintand… Matt McCutchen
- Re: [certid] Fwd: secdir review of draft-saintand… Phillip Hallam-Baker
- Re: [certid] Fwd: secdir review of Martin Rex
- Re: [certid] Fwd: secdir review of Henry B. Hotz
- Re: [certid] Fwd: secdir review of Martin Rex
- Re: [certid] Fwd: secdir review of Martin Rex
- [certid] DNSSEC-based name canonicalization Matt McCutchen
- [certid] Wildcards for serving untrusted web cont… Matt McCutchen
- Re: [certid] DNSSEC-based name canonicalization Martin Rex
- Re: [certid] DNSSEC-based name canonicalization Peter Gutmann
- Re: [certid] secdir review of draft-saintandre-tl… Peter Saint-Andre
- Re: [certid] Fwd: secdir review of draft-saintand… Peter Saint-Andre
- Re: [certid] [secdir] secdir review of draft-sain… Peter Saint-Andre
- Re: [certid] secdir review of draft-saintandre-tl… Barry Leiba
- Re: [certid] Fwd: secdir review of draft-saintand… Barry Leiba
- Re: [certid] secdir review of draft-saintandre-tl… Peter Saint-Andre
- Re: [certid] [secdir] secdir review of draft-sain… Peter Saint-Andre
- Re: [certid] [secdir] secdir review of draft-sain… Jeffrey Hutzelman
- Re: [certid] [secdir] secdir review of draft-sain… Jeffrey Hutzelman
- Re: [certid] [secdir] secdir review of draft-sain… Peter Saint-Andre
- Re: [certid] [secdir] secdir review of draft-sain… ArkanoiD
- Re: [certid] [TLS] [secdir] secdir review of draf… Marsh Ray
- Re: [certid] [TLS] [secdir] secdir review of draf… Jeffrey A. Williams
- Re: [certid] [TLS] [secdir] secdir review of draf… Marsh Ray
- Re: [certid] [TLS] [secdir] secdir Martin Rex
- Re: [certid] [TLS] [secdir] secdir review of draf… Richard L. Barnes
- Re: [certid] [TLS] [secdir] secdir review of draf… Marsh Ray
- [certid] Bad certificate handling Matt McCutchen
- Re: [certid] [TLS] [secdir] secdir review of Martin Rex
- Re: [certid] [TLS] [secdir] secdir review of Robert Relyea
- Re: [certid] [TLS] [secdir] secdir review of draf… =JeffH
- Re: [certid] [TLS] [secdir] secdir review of Nicolas Williams
- Re: [certid] DNSSEC-based name canonicalization Peter Saint-Andre