Re: [certid] Need to define "most specific RDN"

Kaspar Brand <ietf-certid@velox.ch> Fri, 16 July 2010 05:29 UTC

Return-Path: <ietf-certid@velox.ch>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CAEC03A68EC for <certid@core3.amsl.com>; Thu, 15 Jul 2010 22:29:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.686
X-Spam-Level:
X-Spam-Status: No, score=-1.686 tagged_above=-999 required=5 tests=[AWL=0.913, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FvmdIc22GXlr for <certid@core3.amsl.com>; Thu, 15 Jul 2010 22:29:27 -0700 (PDT)
Received: from appendix.velox.ch (appendix.velox.ch [62.75.148.60]) by core3.amsl.com (Postfix) with ESMTP id 891943A68C2 for <certid@ietf.org>; Thu, 15 Jul 2010 22:29:27 -0700 (PDT)
Received: from cortex.velox.ch (84-75-163-235.dclient.hispeed.ch [84.75.163.235]) (authenticated bits=0) by appendix.velox.ch (8.14.4/8.14.4/2.0) with ESMTP id o6G5TadG003796 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK) for <certid@ietf.org>; Fri, 16 Jul 2010 07:29:37 +0200
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=velox.ch; s=appendix-177f; t=1279258177; bh=4qZ7z13YdueSQoCNp1FU8AZNeDU3scp8mlWzeipuuxo=; h=Message-ID:Date:From:MIME-Version:To:Subject:References: In-Reply-To:Content-Type:Content-Transfer-Encoding; b=OTgbQMaFX9OUlwsG0iTUvs7PNqBgj2G8FiLCqj4futHr9S90VnEo0jGkbo3PLzXTl e3zud7NciJlz8HTCt5l8Rb8OJcJuWijzx3se+ViPS4z5V65o67X30hmC4cACwEfDWN WS5Uz7VV4pHxczTQjQo8BPIXmxZFyqnzlvd/NN/Fn1aADUd39EUINN4JrezYwuxqFg m2+pMa2HFlHx3GOH26SPkSNHMPSLSjWxbMDNuG3ZovzQX4zkyDYDtf6NQsBWbb9CvY 8vJdD6SNow64YubY532fbvkfIlO5Qg7HYTjgOwVFx3XFHfo1zLw4EMjRJ+GCtO0+i1 E0moqQv75vqlA==
Message-ID: <4C3FEE41.5050209@velox.ch>
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=velox.ch; s=cortex-8a58; t=1279258176; bh=4qZ7z13YdueSQoCNp1FU8AZNeDU3scp8mlWzeipuuxo=; h=Date:From:MIME-Version:To:Subject:References:In-Reply-To: Content-Type:Content-Transfer-Encoding; b=pkluuKCPB6EgMVPytsMewaFIT+UJcHSj1JF8HECzDe7f3wJDxxV0i7dS2N3tLYwe0 Sex86qK2xpVLlAj8W/NmToDux4q4tWqs1skXpl4YY3KrqdzLiAHuU2ihTCeaGj3h0b 31dje8DkbEYWrUosJ2YFANQpapxVebPNQ7nIEqPmxlrWQ5GVQ3IFm9uN9JSqExMMyM 0CExDWt1xk8iS7CLe0a+gPwPsjo//4CH/C9fn+BTrh8RfYF/pEx8CX9xEyBl2d3Nm1 sBTJtc6GIrGETs/dkWLmSQ33H66KtyNaUBU+K3Y6Kw7j+ayJcZF2vDKcUAiXdxKzyS SKvjE7oQVvthA==
Date: Fri, 16 Jul 2010 07:29:37 +0200
From: Kaspar Brand <ietf-certid@velox.ch>
User-Agent: Thunderbird/3.x
MIME-Version: 1.0
To: certid@ietf.org
References: <201006301746.o5UHkIsE019133@fs4113.wdf.sap.corp> <4C2B843A.5010206@stpeter.im> <4C305B93.9090001@velox.ch> <201007061435.29786.ludwig.nussel@suse.de> <4C335CE5.1090608@edelweb.fr> <4C3421B3.3070404@velox.ch> <4C3B4F6E.80903@stpeter.im> <4C3DDC18.4020808@bolyard.me> <4C3E979B.4050401@velox.ch> <4C3FB02F.3090006@bolyard.me>
In-Reply-To: <4C3FB02F.3090006@bolyard.me>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Subject: Re: [certid] Need to define "most specific RDN"
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates <certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Jul 2010 05:29:30 -0000

On 16.07.2010 03:04, Nelson B Bolyard wrote:
> On 2010/07/14 22:07 PDT, Kaspar Brand wrote:
>> In any case, if you disregard CNs in the subject for name matching as
>> soon as there is a subjectAltName extension with at least one dNSName
>> (as draft-saintandre-tls-server-id-check-08 does), then it's becoming
>> a non-issue.
> 
> Yes, but as I read it, people here are proposing to open the spec to say
> that multiple CN-IDs are just as acceptable as multiple DNS names in a
> SAN.

Acceptable in the sense that a certificate with multiple CNs and no
subjectAltName extension is treated the same as a certificate with
multiple dNSName entries in the subjectAltName extension, yes. When it
comes to name constraints, this BCP document now says what cert parts an
implementation should take into account as potential identifiers,
effectively closing a gap which is left between RFC 5280 and RFC 2818.

> SANs are having enough trouble getting off the ground.  FAR too many
> people still think that CN-IDs are *THE* standard, and are utterly
> unaware of SANs.  If we raise multiple CN-IDs to a status they did not
> enjoy with RFC 2818, then there will remain no motivation to use SANs at
> all, and constraints will die.

I'm not sure if beating people to use SANs by putting fierce
requirements into a BCP document ("MUST NOT put server names into CN
attributes") is the right way to evangelize them.

> Today, the ONE motivation to use SANs is to get multiple DNS names into
> a cert.  And that brings with it the hope of constraints.  Take away
> that sole motivation, and constraints die.
> 
> Sorry, I'm repeating myself.  This constraints issue is very important.

I have a somewhat different view, but it's also getting a bit off-topic
for this thread, I think. Just one point to be aware of: name
constraints will only take off if *all* relevant TLS toolkits implement
them - otherwise trying to constrain intermediate CAs (through an
extension which some will just ignore) is pretty pointless.

>> I'm doubtful if adding a MUST NOT for CN-IDs (vs. a SHOULD NOT) would
>> have a considerable impact on future CA practices. Most of them probably
>> don't want to risk compatibility issues with legacy implementations
>> (which don't recognize the subjectAltName extension).
> 
> Can you name any browser or other important network client made in the
> last 8 years (since RFC 3280 was published) that does SSL3 and/or TLS
> but doesn't recognize DNS names in SANs?

"important" is a debatable term, but I'm pretty sure that as soon as you
leave the browser camp, you'll encounter quite a few... I didn't have to
search for a long time, actually: take wget as an example.

Kaspar