Re: [certid] section 4.6 rewrite (aka: Bad certificate handling)

"Jim Schaad" <ietf@augustcellars.com> Thu, 30 September 2010 05:17 UTC

Return-Path: <ietf@augustcellars.com>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E54BC3A6D28 for <certid@core3.amsl.com>; Wed, 29 Sep 2010 22:17:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QhpppqLF2BeN for <certid@core3.amsl.com>; Wed, 29 Sep 2010 22:17:00 -0700 (PDT)
Received: from smtp1.pacifier.net (smtp1.pacifier.net [64.255.237.171]) by core3.amsl.com (Postfix) with ESMTP id 8E1833A6C27 for <certid@ietf.org>; Wed, 29 Sep 2010 22:17:00 -0700 (PDT)
Received: from TITUS (unknown [207.202.179.27]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: jimsch@nwlink.com) by smtp1.pacifier.net (Postfix) with ESMTP id 1ECE26EF7C; Wed, 29 Sep 2010 22:17:45 -0700 (PDT)
From: "Jim Schaad" <ietf@augustcellars.com>
To: "'Matt McCutchen'" <matt@mattmccutchen.net>, "'Peter Saint-Andre'" <stpeter@stpeter.im>
References: <4CA3AF50.6050101@KingsMountain.com> <006801cb6024$6049f5a0$20dde0e0$@augustcellars.com> <4CA3C022.8050202@stpeter.im> <1285809048.1917.42.camel@mattlaptop2.local>
In-Reply-To: <1285809048.1917.42.camel@mattlaptop2.local>
Date: Wed, 29 Sep 2010 22:25:24 -0700
Message-ID: <006b01cb605f$e2a7f9d0$a7f7ed70$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQGpqtf1DBfzG3HdU1/o9iR7FXwOzwKTMizaAiIBOD4CiiY6Z5Mzbmqg
Content-Language: en-us
Cc: 'IETF cert-based identity' <certid@ietf.org>
Subject: Re: [certid] section 4.6 rewrite (aka: Bad certificate handling)
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates <certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Sep 2010 05:17:02 -0000

If there is only one possible certification path then there is no difference between caching just the EE certificate and caching the entire chain.  However in the event that multiple certificate paths are possible there may be a difference in behavior.  It is possible that you would trust a specific trust anchor (or intermediate CA) to be more specific about getting things correct (sooner or later).  There may be differences in extensions which exist in the intermediate certificates which might lead to slightly different behavior in how the EE certificates are treated.  It is for these reasons that if an explicit mismatch exists then you might be more or less willing to trust the EE certificate based on a specific validation path but not on another validation path.

Jim


> -----Original Message-----
> From: Matt McCutchen [mailto:matt@mattmccutchen.net]
> Sent: Wednesday, September 29, 2010 6:11 PM
> To: Peter Saint-Andre
> Cc: Jim Schaad; 'IETF cert-based identity'
> Subject: Re: [certid] section 4.6 rewrite (aka: Bad certificate handling)
> 
> On Wed, 2010-09-29 at 16:39 -0600, Peter Saint-Andre wrote:
> > On 9/29/10 4:19 PM, Jim Schaad wrote:
> > > There was one case in the original text here that I was expecting to be
> > > kept.   This was the case of the chain of certificates being changed from
> > > when it was originally presented.  Given the suggestion that the
> > > chain is shown for advanced users (see 4.6.4) I am wondering about
> > > the fact that we are no longer looking at anything more that the
> > > terminal certificate at this point.
> >
> > Yes, that's important.
> 
> What is the benefit of caching the entire certification path?  What attacks does
> it prevent?  Mozilla PSM only caches the end-entity certificate, and if there is a
> problem with that approach, I would like to know about it.
> 
> --
> Matt