Re: [certid] user overrides

Peter Saint-Andre <stpeter@stpeter.im> Fri, 11 June 2010 21:12 UTC

Return-Path: <stpeter@stpeter.im>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EFEA83A6A4B for <certid@core3.amsl.com>; Fri, 11 Jun 2010 14:12:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.918
X-Spam-Level:
X-Spam-Status: No, score=-0.918 tagged_above=-999 required=5 tests=[AWL=-0.919, BAYES_50=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9Uw9xRyo5k+o for <certid@core3.amsl.com>; Fri, 11 Jun 2010 14:12:04 -0700 (PDT)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 4FF563A6A20 for <certid@ietf.org>; Fri, 11 Jun 2010 14:12:04 -0700 (PDT)
Received: from dhcp-64-101-72-121.cisco.com (dhcp-64-101-72-121.cisco.com [64.101.72.121]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 5570E40E14; Fri, 11 Jun 2010 15:12:06 -0600 (MDT)
Message-ID: <4C12A6A5.9060404@stpeter.im>
Date: Fri, 11 Jun 2010 15:12:05 -0600
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.9) Gecko/20100317 Thunderbird/3.0.4
MIME-Version: 1.0
To: "Thomson, Martin" <Martin.Thomson@andrew.com>
References: <4C104CC3.8070602@stpeter.im> <4C10516B.1000400@stpeter.im> <8B0A9FCBB9832F43971E38010638454F03E7F1FAC4@SISPE7MB1.commscope.com>
In-Reply-To: <8B0A9FCBB9832F43971E38010638454F03E7F1FAC4@SISPE7MB1.commscope.com>
X-Enigmail-Version: 1.0.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms030501090207060806050809"
Cc: IETF cert-based identity <certid@ietf.org>
Subject: Re: [certid] user overrides
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates <certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Jun 2010 21:12:06 -0000

On 6/9/10 11:45 PM, Thomson, Martin wrote:
> Yes, it would be counter-productive to increase scope arbitrarily.
> 
> Let's just drop anything about the "why".  The rathole that opens is
> scary deep.

/me pulls back from the edge of the abyss...

> I'm not looking for anything on validation either.  What concerns me
> is that a) the implications of the override are not articulated; and
> b) this "pinning" or override function applies to certificates
> regardless of their RFC5280-determined validity; 

That sounds too broad. I don't think we want to let a "pinned"
certificate off the hook regarding all aspects of PKIX-validity. All
we're saying is that the user has explicitly approved this certificate
as acceptable for this application server, despite an identity mismatch.

> and c) your
> readership isn't being told any of this, most are working it out for
> themselves.

Yes, and that's not good, so we need to clarify things.

> Perhaps I can offer text for 3.6.3.1:
> 
> A cached or "pinned" certificate need not be valid according to
> [PKIX].  A server that presents a pinned certificate is found to
> match based solely on its ability to prove that it possesses the
> private key that corresponds to the public key in the certificate.

Again, I think that's probably too lenient.

Peter

-- 
Peter Saint-Andre
https://stpeter.im/