Re: [certid] Fwd: secdir review of draft-saintandre-tls-server-id-check-09
Phillip Hallam-Baker <hallam@gmail.com> Thu, 16 September 2010 14:11 UTC
Return-Path: <hallam@gmail.com>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id 2E6353A6A3D for <certid@core3.amsl.com>;
Thu, 16 Sep 2010 07:11:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.09
X-Spam-Level:
X-Spam-Status: No, score=-1.09 tagged_above=-999 required=5 tests=[AWL=-0.906,
BAYES_40=-0.185, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N3KO8h1s5Bhc for
<certid@core3.amsl.com>; Thu, 16 Sep 2010 07:11:26 -0700 (PDT)
Received: from mail-ww0-f44.google.com (mail-ww0-f44.google.com
[74.125.82.44]) by core3.amsl.com (Postfix) with ESMTP id AB7F23A6B4E for
<certid@ietf.org>; Thu, 16 Sep 2010 07:11:11 -0700 (PDT)
Received: by wwe15 with SMTP id 15so264836wwe.13 for <certid@ietf.org>;
Thu, 16 Sep 2010 07:11:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma;
h=domainkey-signature:mime-version:received:received:in-reply-to
:references:date:message-id:subject:from:to:cc:content-type;
bh=BClFqxyCgXhc7tE/o8DTYb170mdozaFPSZoRWUywdec=;
b=Jo0IWdMc/RwHAroWQnKjVPy8M/bx+8GWTzfpVLcMq0Or6KhT1IvPHqPv6AlUvjYx/4
/TSd0LWcqeq5DJj9BaGoVbDWwn2dEn3JR/4FQvfKm59ZsQaRmMUTC91Ts1q3/HRjVBUT
XPyYd/F5K2OdNbfsaC2oQ3Xus2aX38FnKDY1E=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma;
h=mime-version:in-reply-to:references:date:message-id:subject:from:to
:cc:content-type;
b=LR1xl9qo2QvN8E7rtn2ll3WAsmqu6osRYEE9x5Qv4t4d2BBQ0eCyuv5BRB9ghHgmik
WlJmHdXEpl3zzmqb6P9WPFpObv57PmoWz1yM38wvgRW8vbh0U4CNNOiGbpY+7RMppXN+
ul2fzgTz0fTrE2n0iySwS4VzeOTuTLWh0Kddc=
MIME-Version: 1.0
Received: by 10.227.138.141 with SMTP id a13mr2728631wbu.208.1284646296583;
Thu, 16 Sep 2010 07:11:36 -0700 (PDT)
Received: by 10.216.163.195 with HTTP; Thu, 16 Sep 2010 07:11:36 -0700 (PDT)
In-Reply-To: <1284615555.5722.92.camel@mattlaptop2.local>
References: <201009160527.o8G5RoxM013370@fs4113.wdf.sap.corp>
<1284615555.5722.92.camel@mattlaptop2.local>
Date: Thu, 16 Sep 2010 10:11:36 -0400
Message-ID: <AANLkTinjf_CSj+ofF9u08CrsOzbE0Q4KNLSpKy8=Jfc5@mail.gmail.com>
From: Phillip Hallam-Baker <hallam@gmail.com>
To: Matt McCutchen <matt@mattmccutchen.net>
Content-Type: multipart/alternative; boundary=00163646bb322b82060490610620
Cc: certid@ietf.org
Subject: Re: [certid] Fwd: secdir review of
draft-saintandre-tls-server-id-check-09
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates
<certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Sep 2010 14:11:31 -0000
The question in my view is what you intend to do with the certificate information. Let us consider some outsourcing cases: A) Alice writes a blog, she has her own DNS name and the Web site is hosted as a virtual Web server on a machine with 1000 other blogs B) Bob writes a blog, but he rents use of a whole machine, not just a virtual partition. C) Carol writes a blog and also sells T-shirts with witty slogans on that people buy through a hosted checkout. D) Doug runs a business with a large e-commerce shop and manages the credit card data directly. Question, which ones of these should be using SSL? Answer, all of them. Question, which identity should the application client be presenting to the user. Answer: Doug is the only party that has a corporate identity. Alice, Bob and Carol probably don't want to reveal their personal identity so the only identity we have that we can present is a domain name. The reason I raise this is that I see several possible conclusions that can result from cert processing query: 1) Organizational Validation or Extended Validation that establishes accountability. 2) Certificate is bound to the domain name on which the resolution process was begun 3) Certificate is bound to a domain name to which the resolution points 4) There is no particular connection between the cert and the domain name. Which outcome is sufficient depends on whether your objective is to turn on use of crypto or tell the user that they are safe. Another point to bear in mind is that applications are not necessarily applying the traditional SSL model in which the application looks at the information provided by the Web site and determines if that meets a particular safety threshold and the user is responsible for working out if they are safe or not. For the past five years or so, the model that has been emerging is one in which the application takes data from multiple sources and fuses them to establish a safety evaluation. For example, if a domain name is on the Anti-Phishing Working Group suspicious URL list, the browser might well want to block access regardless of whether the Web Site has a certificate or not. So rather than having a spec state what is 'safe' and what is not. We really need to look at how many potential points of vulnerability have accumulated. Running Web servers and running DNS servers 24/7 is complex and time consuming. There are clear economies of scale. So people are inevitably going to outsource. The number of potential points of vulnerability are a consequence of the outsourcing and not the use of CNAME. The use of CNAME is merely a consequence of the easiest way to implement outsourcing. More points of vulnerability does not correspond to higher risk. What matters is the vulnerability of the weakest link in a chain (or the weakest critical path in a redundant mesh). On Thu, Sep 16, 2010 at 1:39 AM, Matt McCutchen <matt@mattmccutchen.net>wrote;wrote: > On Thu, 2010-09-16 at 07:27 +0200, Martin Rex wrote: > > Clearly unsafe operations: > > > > - building a reference identifier from the result of a > > DNS CNAME lookup > > > (the use of DNSSEC does not make this safe) > > Why not? I'm not saying it's good practice, but I don't see an actual > vulnerability. > > I agree with everything else you said; nicely put. > > -- > Matt > > _______________________________________________ > certid mailing list > certid@ietf.org > https://www.ietf.org/mailman/listinfo/certid > -- Website: http://hallambaker.com/
- [certid] Fwd: secdir review of draft-saintandre-t… Peter Saint-Andre
- Re: [certid] Fwd: secdir review of draft-saintand… Henry B. Hotz
- Re: [certid] Fwd: secdir review of Martin Rex
- Re: [certid] Fwd: secdir review of draft-saintand… Matt McCutchen
- Re: [certid] Fwd: secdir review of draft-saintand… Matt McCutchen
- Re: [certid] Fwd: secdir review of Martin Rex
- Re: [certid] Fwd: secdir review of draft-saintand… Matt McCutchen
- Re: [certid] Fwd: secdir review of draft-saintand… Phillip Hallam-Baker
- Re: [certid] Fwd: secdir review of Martin Rex
- Re: [certid] Fwd: secdir review of Henry B. Hotz
- Re: [certid] Fwd: secdir review of Martin Rex
- Re: [certid] Fwd: secdir review of Martin Rex
- [certid] DNSSEC-based name canonicalization Matt McCutchen
- [certid] Wildcards for serving untrusted web cont… Matt McCutchen
- Re: [certid] DNSSEC-based name canonicalization Martin Rex
- Re: [certid] DNSSEC-based name canonicalization Peter Gutmann
- Re: [certid] secdir review of draft-saintandre-tl… Peter Saint-Andre
- Re: [certid] Fwd: secdir review of draft-saintand… Peter Saint-Andre
- Re: [certid] [secdir] secdir review of draft-sain… Peter Saint-Andre
- Re: [certid] secdir review of draft-saintandre-tl… Barry Leiba
- Re: [certid] Fwd: secdir review of draft-saintand… Barry Leiba
- Re: [certid] secdir review of draft-saintandre-tl… Peter Saint-Andre
- Re: [certid] [secdir] secdir review of draft-sain… Peter Saint-Andre
- Re: [certid] [secdir] secdir review of draft-sain… Jeffrey Hutzelman
- Re: [certid] [secdir] secdir review of draft-sain… Jeffrey Hutzelman
- Re: [certid] [secdir] secdir review of draft-sain… Peter Saint-Andre
- Re: [certid] [secdir] secdir review of draft-sain… ArkanoiD
- Re: [certid] [TLS] [secdir] secdir review of draf… Marsh Ray
- Re: [certid] [TLS] [secdir] secdir review of draf… Jeffrey A. Williams
- Re: [certid] [TLS] [secdir] secdir review of draf… Marsh Ray
- Re: [certid] [TLS] [secdir] secdir Martin Rex
- Re: [certid] [TLS] [secdir] secdir review of draf… Richard L. Barnes
- Re: [certid] [TLS] [secdir] secdir review of draf… Marsh Ray
- [certid] Bad certificate handling Matt McCutchen
- Re: [certid] [TLS] [secdir] secdir review of Martin Rex
- Re: [certid] [TLS] [secdir] secdir review of Robert Relyea
- Re: [certid] [TLS] [secdir] secdir review of draf… =JeffH
- Re: [certid] [TLS] [secdir] secdir review of Nicolas Williams
- Re: [certid] DNSSEC-based name canonicalization Peter Saint-Andre