Re: [certid] open issue: wildcards in component fragments

Martin Rex <mrex@sap.com> Fri, 08 October 2010 01:40 UTC

Return-Path: <mrex@sap.com>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6AD3F3A67A3 for <certid@core3.amsl.com>; Thu, 7 Oct 2010 18:40:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.863
X-Spam-Level:
X-Spam-Status: No, score=-9.863 tagged_above=-999 required=5 tests=[AWL=0.386, BAYES_00=-2.599, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ufBewRZVZ9-t for <certid@core3.amsl.com>; Thu, 7 Oct 2010 18:40:46 -0700 (PDT)
Received: from smtpde02.sap-ag.de (smtpde02.sap-ag.de [155.56.68.140]) by core3.amsl.com (Postfix) with ESMTP id 7DBFC3A679F for <certid@ietf.org>; Thu, 7 Oct 2010 18:40:45 -0700 (PDT)
Received: from mail.sap.corp by smtpde02.sap-ag.de (26) with ESMTP id o981fmMR008560 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Fri, 8 Oct 2010 03:41:48 +0200 (MEST)
From: Martin Rex <mrex@sap.com>
Message-Id: <201010080141.o981fldO021621@fs4113.wdf.sap.corp>
To: matt@mattmccutchen.net (Matt McCutchen)
Date: Fri, 8 Oct 2010 03:41:47 +0200 (MEST)
In-Reply-To: <1286500630.1912.43.camel@mattlaptop2.local> from "Matt McCutchen" at Oct 7, 10 09:17:10 pm
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
X-Scanner: Virus Scanner virwal08
X-SAP: out
Cc: certid@ietf.org
Subject: Re: [certid] open issue: wildcards in component fragments
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: mrex@sap.com
List-Id: Representation and verification of identity in certificates <certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Oct 2010 01:40:54 -0000

Matt McCutchen wrote:
> 
> On Thu, 2010-10-07 at 15:26 -0600, Peter Saint-Andre wrote:
> > The intended status of this document is BCP = Best Current Practice.
> > That "B" is in there for a reason. The question is: does allowing *oo
> > and f*o and foo* (and maybe even f*b*r) as wildcard fragments truly
> > represent a "best" current practice, or only "current" practice? It
> > doesn't strike me as a most excellent, effective, desirable, suitable,
> > appropriate, or useful practice, although I freely grant that it is in
> > common and general use at the present time.
> 
> I have never seen a certificate with a wildcard that is not a
> whole label on a public web site.

The idea behind writing documents such as rfc-2818 is, that implementers
don't have to do public opinion polls an apply heuristics, but instead
follow the implementation guidelines in the document.

It is pretty obvious that rfc-2818 meant to standardize substring wildcard
matching with a single wildcard character in the leftmost dns label.


What is _not_ clear, is whether rfc-2818 meant to also allow more
than one wildcard character in a CN-ID or DNS-ID, wildcards in
more than one DNS label or wildcards in other than the leftmost label.


I believe that shipping a TLS client that matches a server cert
with CN-ID or DNS-ID equal to "*.*.com" is neither reasonable nor
responsible, and it I don't care whether a negilgent CA issued
such a certificate on purpose or whether an attacker managed
to get such a cert issued--there were two bugs published that
made this possible: OID integer wraparound and embedded NUL chars
in the Subject DName, and a significant part of the installed
base does not check server certs for revocation (MSIE on XP/2003).

(The folks on domains such as "*.co.uk" or "*.co.tw" are in a
 slightly more difficult position).


-Martin