Re: [certid] It is not always a good idea to enforce CN check as leaf RDN only
Bruno Harbulot <Bruno.Harbulot@manchester.ac.uk> Thu, 18 March 2010 11:07 UTC
Return-Path: <Bruno.Harbulot@manchester.ac.uk>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id 3FCF23A683E for <certid@core3.amsl.com>;
Thu, 18 Mar 2010 04:07:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.145
X-Spam-Level: *
X-Spam-Status: No,
score=1.145 tagged_above=-999 required=5 tests=[BAYES_40=-0.185,
DNS_FROM_OPENWHOIS=1.13, J_CHICKENPOX_110=0.6, J_CHICKENPOX_12=0.6,
J_CHICKENPOX_13=0.6, J_CHICKENPOX_14=0.6, J_CHICKENPOX_18=0.6,
J_CHICKENPOX_28=0.6, J_CHICKENPOX_29=0.6, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1fARZz4tS1-O for
<certid@core3.amsl.com>; Thu, 18 Mar 2010 04:07:23 -0700 (PDT)
Received: from clarity.mcc.ac.uk (clarity.mcc.ac.uk [130.88.200.144]) by
core3.amsl.com (Postfix) with ESMTP id B91993A67E9 for <certid@ietf.org>;
Thu, 18 Mar 2010 04:07:22 -0700 (PDT)
Received: from kelvin.its.manchester.ac.uk ([130.88.25.195]) by
clarity.mcc.ac.uk with esmtps (TLSv1:AES256-SHA:256) (Exim 4.69 (FreeBSD))
(envelope-from <Bruno.Harbulot@manchester.ac.uk>) id 1NsDZc-000Ggg-LW for
certid@ietf.org; Thu, 18 Mar 2010 11:07:32 +0000
Received: from 94-192-243-24.zone6.bethere.co.uk ([94.192.243.24]:50896
helo=mymachine) by kelvin.its.manchester.ac.uk with esmtpsa
(TLSv1:AES256-SHA:256) (Exim 4.69) (envelope-from
<Bruno.Harbulot@manchester.ac.uk>) id 1NsDZc-000807-Dv for certid@ietf.org;
Thu, 18 Mar 2010 11:07:32 +0000
Message-ID: <4BA20973.90204@manchester.ac.uk>
Date: Thu, 18 Mar 2010 11:07:31 +0000
From: Bruno Harbulot <Bruno.Harbulot@manchester.ac.uk>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US;
rv:1.9.1.8) Gecko/20100227 Lightning/1.0b1 Thunderbird/3.0.3
MIME-Version: 1.0
To: certid@ietf.org
References: <20100317134327.GA14163@eltex.net> <4BA1A532.9090107@stpeter.im>
In-Reply-To: <4BA1A532.9090107@stpeter.im>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Authenticated-Sender: Bruno Harbulot from 94-192-243-24.zone6.bethere.co.uk
(mymachine) [94.192.243.24]:50896
X-Authenticated-From: Bruno.Harbulot@manchester.ac.uk
X-UoM: Scanned by the University Mail System. See
http://www.itservices.manchester.ac.uk/email/filtering/information/ for
details.
Subject: Re: [certid] It is not always a good idea to enforce CN check as
leaf RDN only
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates
<certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Mar 2010 11:07:25 -0000
On 18/03/2010 03:59, Peter Saint-Andre wrote:
> On 3/17/10 7:43 AM, ArkanoiD wrote:
>
>> Many self-signed certificates seem to have an email address as leaf
>> RDN.
>
> This I-D does not cover self-signed certs, only CA-issued certs.
I'm not sure this I-D should treat self-signed certs completely
differently from CA-issued certs. Self-signed certs could be considered
as a special case of CA-issued certs.
I think the logic of verifying the identity of the server ought to be
separate from the logic of verifying trust in a certificate (although
the latter could impose constraints on the former depending on policies).
This problem isn't just for self-signed certificate.
For you information, the UK e-Science CA [1] emits certificates for
hosts with an e-mail address as leaf RDN, for example ('openssl x509'
notation -> leaf is right-most):
C=UK, O=eScience, OU=Authority, L=CLRC, CN=ca.grid-support.ac.uk,
emailAddress=ca@grid-support.ac.uk
All the host certificates I've seen for this CA have an e-mail address
as leaf.
Independently, I recently got a certificate like this, issued by the
JANET CA [2] (compatible with most browsers out of the box):
- Subject: CN=foafssl.vidar.ngs.manchester.ac.uk, C=GB, L=Manchester,
O=The University of Manchester, OU=Research Computing Services,
CN=foafssl.ngs.manchester.ac.uk
- X509v3 Subject Alternative Name:
DNS:foafssl.ngs.manchester.ac.uk,
DNS:foafssl.vidar.ngs.manchester.ac.uk
While I must admit I was surprised to see a CN either side, it doesn't
really matter; it's still fine with the RFC 2818 rule and the fact that
the host name is also in the Subject DN's CNs is irrelevant:
> If a subjectAltName extension of type dNSName is present, that MUST
> be used as the identity. Otherwise, the (most specific) Common Name
> field in the Subject field of the certificate MUST be used. Although
> the use of the Common Name is existing practice, it is deprecated and
> Certification Authorities are encouraged to use the dNSName instead.
However, the wording in draft-saintandre-tls-server-id-check-03 seems to
suggest it could really not be acceptable to have the host name in the
CN at all if it's not in the leaf, irrespectively of whether the CN is
going to be checked because there's a subjectAltName in this case (it
somehow depends on the interpretation of "represent" here):
> The certificate MUST NOT represent the server's domain name in an
> identity of Common Name (CN) where the CN is in something other
> than the "leaf" (left-most) position within the Relative
> Distinguished Names (RDNs) of the subjectName.
More fundamentally, this rule would break compatibility with the
existing specifications (RFC 2818 in the case of HTTPS). While I think
this draft is a good idea in principle, for harmonising the host name
verification across protocols and having a few new features, I can't see
what's wrong with RFC 2818's model in this case.
If non-leaf CN's really is a problem, the draft should make a strong
case for banning them, as it would introduce further constrains on the
existing rules, and potentially break compatibility.
Best wishes,
Bruno.
[1] https://ca.grid-support.ac.uk/
[2] http://www.ja.net/services/jcs/index.html
- [certid] It is not always a good idea to enforce … ArkanoiD
- Re: [certid] It is not always a good idea to enfo… Peter Saint-Andre
- Re: [certid] It is not always a good idea to enfo… ArkanoiD
- Re: [certid] It is not always a good idea to enfo… Joe Orton
- Re: [certid] It is not always a good idea to enfo… Bruno Harbulot
- Re: [certid] It is not always a good idea to enfo… Bil Corry
- Re: [certid] It is not always a good idea to enfo… Peter Saint-Andre
- Re: [certid] It is not always a good idea to enfo… Alexey Melnikov
- [certid] open issue: self-signed certs Peter Saint-Andre
- Re: [certid] open issue: self-signed certs Bil Corry
- Re: [certid] open issue: self-signed certs Kurt Zeilenga
- Re: [certid] open issue: self-signed certs Bruno Harbulot
- Re: [certid] It is not always a good idea to enfo… Michael Ströder