Re: [certid] section 4.6 rewrite (aka: Bad certificate handling)

Matt McCutchen <matt@mattmccutchen.net> Thu, 30 September 2010 01:10 UTC

Return-Path: <matt@mattmccutchen.net>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4A7ED3A6B49 for <certid@core3.amsl.com>; Wed, 29 Sep 2010 18:10:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.558
X-Spam-Level:
X-Spam-Status: No, score=-2.558 tagged_above=-999 required=5 tests=[AWL=0.041, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m+Zn9zNKdYEE for <certid@core3.amsl.com>; Wed, 29 Sep 2010 18:10:26 -0700 (PDT)
Received: from homiemail-a61.g.dreamhost.com (caiajhbdcbbj.dreamhost.com [208.97.132.119]) by core3.amsl.com (Postfix) with ESMTP id A5C793A69AB for <certid@ietf.org>; Wed, 29 Sep 2010 18:10:04 -0700 (PDT)
Received: from homiemail-a61.g.dreamhost.com (localhost [127.0.0.1]) by homiemail-a61.g.dreamhost.com (Postfix) with ESMTP id 740A157806C; Wed, 29 Sep 2010 18:10:49 -0700 (PDT)
DomainKey-Signature: a=rsa-sha1; c=nofws; d=mattmccutchen.net; h=subject:from :to:cc:in-reply-to:references:content-type:date:message-id :mime-version:content-transfer-encoding; q=dns; s= mattmccutchen.net; b=YeTQ97XzmY2NXS2EmsI+geN17vgeswrWx6mpLb8Xlcz +ZSoIMfn3r03vno3TceoNvW8TWR3AZGCX0QQNW7+Rldm2/eSSZQQbjSGAXy83lwG I5KlBpaWuaDAtAXA77mlJwOvJzYLUCyr7ql3RUGlUMjsiEpuVSnx75gQVhciGW+c =
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=mattmccutchen.net; h= subject:from:to:cc:in-reply-to:references:content-type:date :message-id:mime-version:content-transfer-encoding; s= mattmccutchen.net; bh=864vxqRS7QeRFpnPmCwI6DUOaX0=; b=SKvj429tb4 22Nkc6U8NMab4uWRz9ktxk4NZ44Pv49TFVI5xAApcAZIiW8RVOgpncsc6x/tD6AL LlAm5j+jGTff/LgoXT6J8O6uNquuemBDa4LAAobjISQCc2muoYh5amur+QGtZLsB 4XP+K3tegn7ks1lE+PaeHqpVHmkHetng0=
Received: from [129.2.249.209] (ml2.student.umd.edu [129.2.249.209]) (Authenticated sender: matt@mattmccutchen.net) by homiemail-a61.g.dreamhost.com (Postfix) with ESMTPA id 1EBF9578073; Wed, 29 Sep 2010 18:10:49 -0700 (PDT)
From: Matt McCutchen <matt@mattmccutchen.net>
To: Peter Saint-Andre <stpeter@stpeter.im>
In-Reply-To: <4CA3C022.8050202@stpeter.im>
References: <4CA3AF50.6050101@KingsMountain.com> <006801cb6024$6049f5a0$20dde0e0$@augustcellars.com> <4CA3C022.8050202@stpeter.im>
Content-Type: text/plain; charset="UTF-8"
Date: Wed, 29 Sep 2010 21:10:48 -0400
Message-ID: <1285809048.1917.42.camel@mattlaptop2.local>
Mime-Version: 1.0
X-Mailer: Evolution 2.30.4
Content-Transfer-Encoding: 7bit
Cc: Jim Schaad <ietf@augustcellars.com>, 'IETF cert-based identity' <certid@ietf.org>
Subject: Re: [certid] section 4.6 rewrite (aka: Bad certificate handling)
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates <certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Sep 2010 01:10:38 -0000

On Wed, 2010-09-29 at 16:39 -0600, Peter Saint-Andre wrote:
> On 9/29/10 4:19 PM, Jim Schaad wrote:
> > There was one case in the original text here that I was expecting to be
> > kept.   This was the case of the chain of certificates being changed from
> > when it was originally presented.  Given the suggestion that the chain is
> > shown for advanced users (see 4.6.4) I am wondering about the fact that we
> > are no longer looking at anything more that the terminal certificate at this
> > point.
> 
> Yes, that's important.

What is the benefit of caching the entire certification path?  What
attacks does it prevent?  Mozilla PSM only caches the end-entity
certificate, and if there is a problem with that approach, I would like
to know about it.

-- 
Matt