Re: [certid] Bad certificate handling

"Jeffrey A. Williams" <jwkckid1@ix.netcom.com> Sun, 26 September 2010 18:08 UTC

Return-Path: <jwkckid1@ix.netcom.com>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6D5823A69BD for <certid@core3.amsl.com>; Sun, 26 Sep 2010 11:08:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.335
X-Spam-Level:
X-Spam-Status: No, score=-0.335 tagged_above=-999 required=5 tests=[AWL=-0.336, BAYES_50=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nuyXYRWPtfCX for <certid@core3.amsl.com>; Sun, 26 Sep 2010 11:08:08 -0700 (PDT)
Received: from elasmtp-scoter.atl.sa.earthlink.net (elasmtp-scoter.atl.sa.earthlink.net [209.86.89.67]) by core3.amsl.com (Postfix) with ESMTP id 38E283A688F for <certid@ietf.org>; Sun, 26 Sep 2010 11:08:08 -0700 (PDT)
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=dk20050327; d=ix.netcom.com; b=DmpcBusgcOKb+r5y9xv+E8YxTIe2ztVd6aB7W7GYOOuciCyRNuYoeWflOGPSt+O4; h=Message-ID:Date:From:Reply-To:To:Subject:Cc:Mime-Version:Content-Type:Content-Transfer-Encoding:X-Mailer:X-ELNK-Trace:X-Originating-IP;
Received: from [209.86.224.36] (helo=elwamui-hybrid.atl.sa.earthlink.net) by elasmtp-scoter.atl.sa.earthlink.net with esmtpa (Exim 4.67) (envelope-from <jwkckid1@ix.netcom.com>) id 1OzveW-0007M4-Cv; Sun, 26 Sep 2010 14:08:44 -0400
Received: from 99.93.224.206 by webmail.earthlink.net with HTTP; Sun, 26 Sep 2010 14:08:44 -0400
Message-ID: <63723.1285524524347.JavaMail.root@elwamui-hybrid.atl.sa.earthlink.net>
Date: Sun, 26 Sep 2010 13:08:44 -0500 (GMT-05:00)
From: "Jeffrey A. Williams" <jwkckid1@ix.netcom.com>
To: Matt McCutchen <matt@mattmccutchen.net>, mrex@sap.com
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-Mailer: EarthLink Zoo Mail 1.0
X-ELNK-Trace: c8e3929e1e9c87a874cfc7ce3b1ad11381c87f5e51960688c9a28a52eb16ba2b256e11ca41d6788b350badd9bab72f9c350badd9bab72f9c350badd9bab72f9c
X-Originating-IP: 209.86.224.36
Cc: certid@ietf.org
Subject: Re: [certid] Bad certificate handling
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: "Jeffrey A. Williams" <jwkckid1@ix.netcom.com>
List-Id: Representation and verification of identity in certificates <certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 26 Sep 2010 18:08:10 -0000

Matt and all,


-----Original Message-----
>From: Matt McCutchen <matt@mattmccutchen.net>
>Sent: Sep 26, 2010 10:21 AM
>To: mrex@sap.com
>Cc: certid@ietf.org
>Subject: Re: [certid] Bad certificate handling
>
>On Sat, 2010-09-25 at 02:22 +0200, Martin Rex wrote:
>> Section 5.1.4 here:
>> 
>>     http://www.w3.org/TR/wsc-ui/#selfsignedcerts
>> 
>> is much closer what I this would be useful and sensible.
>> 
>> "Pinning" of certs is useful for both, certs that validate fine
>> and certs that do not validate for the two reasons "not trusted"
>> and "server-id-mismatch".
>
>Once again
>(http://www.ietf.org/mail-archive/web/certid/current/msg00338.html), the
>purpose of pinning is to make it possible to connect to servers with
>unverifiable certificates, not to replace the public-CA trust model,
>which is much more difficult to do properly.  The definition of
>"strongly TLS-protected" (http://www.w3.org/TR/wsc-ui/#def-strong-tls)
>includes validated certificates regardless of whether there is a pinned
>certificate.
>
>> What is the idea behind visualizing the full chain?
>> 
>> I've seen the same in 5.1.4 of the WSC-UI document but there's
>> no rationale given and I can not think of one.  If the purpose is
>> memorizing and "pinning" a server cert, there is no point in
>> visualizing the certificate chain.
>> 
>> Either there is no trust, then the chain can be crafted to look
>> like anything,
>
>Not necessarily.  There are some CAs I don't want to enable
>unconditionally as trust anchors, but whose certificates I am willing to
>accept after additional manual verification.  In that case, I would
>check the fingerprint of the top certificate of the presented chain
>against the one I expect.  But you're right that "forcing the user to
>view the entire certification path" may have no real security benefit in
>general, though it sounds impressive.

  You have reiterated two problems here.  One which you refer to
indirectly is that in effect some, if not many CA's have issued
CERTS under questionable circumstances, or have had their CERT
database corrupted/hacked and the currently registered CERTS may
have been compermised in some way.  The second which in a way related
to the first, that being a requirement for the user to view the 
entire certification path, as that path may lead to at any point
a false positive.  Ergo, Self signing CERTS for me anyway given
that the 'Trust Anchors' are of questionable trustworthyness or
may come into such a status without the users prior knowledge
or awareness, is much more comfortable verification consideration,
but of course this my not always be the case.
>
>-- 
>Matt
>
>_______________________________________________
>certid mailing list
>certid@ietf.org
>https://www.ietf.org/mailman/listinfo/certid

Regards,
Jeffrey A. Williams
Spokesman for INEGroup LLA. - (Over 300k members/stakeholders and growing, strong!)
"Obedience of the law is the greatest freedom" -
   Abraham Lincoln

"Credit should go with the performance of duty and not with what is very
often the accident of glory" - Theodore Roosevelt

"If the probability be called P; the injury, L; and the burden, B; liability
depends upon whether B is less than L multiplied by
P: i.e., whether B is less than PL."
United States v. Carroll Towing  (159 F.2d 169 [2d Cir. 1947]
===============================================================
Updated 1/26/04
CSO/DIR. Internet Network Eng. SR. Eng. Network data security IDNS. div. of
Information Network Eng.  INEG. INC.
ABA member in good standing member ID 01257402 E-Mail jwkckid1@ix.netcom.com
Phone: 214-244-4827