Re: [certid] Fwd: secdir review of draft-saintandre-tls-server-id-check-09

Phillip Hallam-Baker <hallam@gmail.com> Thu, 16 September 2010 14:11 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2E6353A6A3D for <certid@core3.amsl.com>; Thu, 16 Sep 2010 07:11:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.09
X-Spam-Level:
X-Spam-Status: No, score=-1.09 tagged_above=-999 required=5 tests=[AWL=-0.906, BAYES_40=-0.185, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N3KO8h1s5Bhc for <certid@core3.amsl.com>; Thu, 16 Sep 2010 07:11:26 -0700 (PDT)
Received: from mail-ww0-f44.google.com (mail-ww0-f44.google.com [74.125.82.44]) by core3.amsl.com (Postfix) with ESMTP id AB7F23A6B4E for <certid@ietf.org>; Thu, 16 Sep 2010 07:11:11 -0700 (PDT)
Received: by wwe15 with SMTP id 15so264836wwe.13 for <certid@ietf.org>; Thu, 16 Sep 2010 07:11:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:received:in-reply-to :references:date:message-id:subject:from:to:cc:content-type; bh=BClFqxyCgXhc7tE/o8DTYb170mdozaFPSZoRWUywdec=; b=Jo0IWdMc/RwHAroWQnKjVPy8M/bx+8GWTzfpVLcMq0Or6KhT1IvPHqPv6AlUvjYx/4 /TSd0LWcqeq5DJj9BaGoVbDWwn2dEn3JR/4FQvfKm59ZsQaRmMUTC91Ts1q3/HRjVBUT XPyYd/F5K2OdNbfsaC2oQ3Xus2aX38FnKDY1E=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=LR1xl9qo2QvN8E7rtn2ll3WAsmqu6osRYEE9x5Qv4t4d2BBQ0eCyuv5BRB9ghHgmik WlJmHdXEpl3zzmqb6P9WPFpObv57PmoWz1yM38wvgRW8vbh0U4CNNOiGbpY+7RMppXN+ ul2fzgTz0fTrE2n0iySwS4VzeOTuTLWh0Kddc=
MIME-Version: 1.0
Received: by 10.227.138.141 with SMTP id a13mr2728631wbu.208.1284646296583; Thu, 16 Sep 2010 07:11:36 -0700 (PDT)
Received: by 10.216.163.195 with HTTP; Thu, 16 Sep 2010 07:11:36 -0700 (PDT)
In-Reply-To: <1284615555.5722.92.camel@mattlaptop2.local>
References: <201009160527.o8G5RoxM013370@fs4113.wdf.sap.corp> <1284615555.5722.92.camel@mattlaptop2.local>
Date: Thu, 16 Sep 2010 10:11:36 -0400
Message-ID: <AANLkTinjf_CSj+ofF9u08CrsOzbE0Q4KNLSpKy8=Jfc5@mail.gmail.com>
From: Phillip Hallam-Baker <hallam@gmail.com>
To: Matt McCutchen <matt@mattmccutchen.net>
Content-Type: multipart/alternative; boundary=00163646bb322b82060490610620
Cc: certid@ietf.org
Subject: Re: [certid] Fwd: secdir review of draft-saintandre-tls-server-id-check-09
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates <certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Sep 2010 14:11:31 -0000

The question in my view is what you intend to do with the certificate
information.

Let us consider some outsourcing cases:

A)  Alice writes a blog, she has her own DNS name and the Web site is hosted
as a virtual Web server on a machine with 1000 other blogs

B) Bob writes a blog, but he rents use of a whole machine, not just a
virtual partition.

C) Carol writes a blog and also sells T-shirts with witty slogans on that
people buy through a hosted checkout.

D) Doug runs a business with a large e-commerce shop and manages the credit
card data directly.


Question, which ones of these should be using SSL?
Answer, all of them.

Question, which identity should the application client be presenting to the
user.
Answer: Doug is the only party that has a corporate identity.
Alice, Bob and Carol probably don't want to reveal their personal identity
so the only identity we have that we can present is a domain name.


The reason I raise this is that I see several possible conclusions that can
result from cert processing query:

1) Organizational Validation or Extended Validation that establishes
accountability.

2) Certificate is bound to the domain name on which the resolution process
was begun

3) Certificate is bound to a domain name to which the resolution points

4) There is no particular connection between the cert and the domain name.


Which outcome is sufficient depends on whether your objective is to turn on
use of crypto or tell the user that they are safe.

Another point to bear in mind is that applications are not necessarily
applying the traditional SSL model in which the application looks at the
information provided by the Web site and determines if that meets a
particular safety threshold and the user is responsible for working out if
they are safe or not.

For the past five years or so, the model that has been emerging is one in
which the application takes data from multiple sources and fuses them to
establish a safety evaluation. For example, if a domain name is on the
Anti-Phishing Working Group suspicious URL list, the browser might well want
to block access regardless of whether the Web Site has a certificate or not.


So rather than having a spec state what is 'safe' and what is not. We really
need to look at how many potential points of vulnerability have accumulated.

Running Web servers and running DNS servers 24/7 is complex and time
consuming. There are clear economies of scale. So people are inevitably
going to outsource.

The number of potential points of vulnerability are a consequence of the
outsourcing and not the use of CNAME. The use of CNAME is merely a
consequence of the easiest way to implement outsourcing.

More points of vulnerability does not correspond to higher risk. What
matters is the vulnerability of the weakest link in a chain (or the weakest
critical path in a redundant mesh).



On Thu, Sep 16, 2010 at 1:39 AM, Matt McCutchen <matt@mattmccutchen.net>wrote;wrote:

> On Thu, 2010-09-16 at 07:27 +0200, Martin Rex wrote:
> > Clearly unsafe operations:
> >
> >   - building a reference identifier from the result of a
> >     DNS CNAME lookup
>
> > (the use of DNSSEC does not make this safe)
>
> Why not?  I'm not saying it's good practice, but I don't see an actual
> vulnerability.
>
> I agree with everything else you said; nicely put.
>
> --
> Matt
>
> _______________________________________________
> certid mailing list
> certid@ietf.org
> https://www.ietf.org/mailman/listinfo/certid
>



-- 
Website: http://hallambaker.com/