Re: [certid] open issue: wildcards in component fragments
Peter Saint-Andre <stpeter@stpeter.im> Tue, 12 October 2010 19:55 UTC
Return-Path: <stpeter@stpeter.im>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id 771E53A6A62 for <certid@core3.amsl.com>;
Tue, 12 Oct 2010 12:55:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.553
X-Spam-Level:
X-Spam-Status: No, score=-102.553 tagged_above=-999 required=5 tests=[AWL=0.046,
BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9aZZQZ2Pxpi5 for
<certid@core3.amsl.com>; Tue, 12 Oct 2010 12:55:31 -0700 (PDT)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com
(Postfix) with ESMTP id 4399C3A6A5B for <certid@ietf.org>;
Tue, 12 Oct 2010 12:55:31 -0700 (PDT)
Received: from dhcp-64-101-72-188.cisco.com (dhcp-64-101-72-188.cisco.com
[64.101.72.188]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with
ESMTPSA id 2FD5040337 for <certid@ietf.org>;
Tue, 12 Oct 2010 14:03:29 -0600 (MDT)
Message-ID: <4CB4BD7C.4000600@stpeter.im>
Date: Tue, 12 Oct 2010 13:56:44 -0600
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US;
rv:1.9.2.9) Gecko/20100915 Thunderbird/3.1.4
MIME-Version: 1.0
To: certid@ietf.org
References: <201010080200.o98208QR022569@fs4113.wdf.sap.corp> <4CB35AD1.1060808@stpeter.im>
<20101012100045.GA30760@redhat.com>
In-Reply-To: <20101012100045.GA30760@redhat.com>
X-Enigmail-Version: 1.1.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Subject: Re: [certid] open issue: wildcards in component fragments
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates
<certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Oct 2010 19:55:33 -0000
On 10/12/10 4:00 AM, Joe Orton wrote: > On Mon, Oct 11, 2010 at 12:43:29PM -0600, Peter Saint-Andre wrote: >> Speaking of which, someone contacted Jeff and me off-list about some >> research results showing that of a very large number of certificates >> presented by TLS-protected websites, less than 0.01% contain wildcards >> in component fragments. Given that minuscule level of deployment, I >> don't see good reasons to spend more cycles on the topic. > > The relative number of certs is less relevant than how widely those > certs are used, surely. I checked the "top 1m sites" database from: > > http://blog.johnath.com/2009/01/21/ssl-information-wants-to-be-free/ > > - 382860 total sites (hostnames) returned a cert > - 94438 of total sites used a wildcard cert (24%) > - 5% of total sites use the wildcard cert with CN=*.blogger.com > ... other blogging/mass-hosting sites similarly high usage > > Only a handful (5) use the "f*.example.com" form; all those were certs > issued by the GoDaddy and starfieldtech.com CAs. You claim that the number of certs is less relevant than how widely those certs are used. So, how widely used are the 5 (!) out of 382860 certificates that contain wildcard component fragments? The fact that those certificates were issued by GoDaddy and Starfield Technologies means nothing. > I support Martin's arguments that the "f*.example.com" form specified in > RFC 2818 should be supported. What do you mean by "should be supported"? I see several claims that one could make: 1. Existing software whose matching algorithms support wildcard component fragments should stay as-is. 1a. Any new software written to perform identity matching should also contain matching algorithms that support wildcard component fragment. 2. Existing application protocols (see Appendix A of this I-D) that allow wildcard component fragments should not be changed. 2a. Any new application protocols developed by the IETF (or other SDOs) should also allow wildcard component fragments. 3. Wildcard component fragments are a best current practice for both certificate issuance and certificate validation, and therefore any BCP produced by the IETF at this time should recommend that all application protocols should support wildcard component fragments (thus putting at least RFC 5922 out of compliance, since that spec doesn't even allow complete wildcard components). I support #1 (with the proviso that it's an implementation decision for the relevant software developers whether they want to simplify their matching algorithms, based on a cost-benefit analysis of code complexity vs. a degraded user experience for less than 0.01% of issued certificates). I think #1a depends on which application protocol the software is designed to use (e.g., HTTP vs. SIP) -- conform to the spec you're implementing. I think #2 is just fine (with the proviso that such application protocols might decide to update their specs in the future based on experience and discussion within the relevant technology community). I disagree with #2a because I think that wildcard component fragments are not a *best* current practice, and I disagree with #3 for the same reason. What are the positions of those who are arguing for supporting wildcard component fragments, and why? Peter -- Peter Saint-Andre https://stpeter.im/
- [certid] open issue: wildcards in component fragm… Peter Saint-Andre
- Re: [certid] open issue: wildcards in component f… ArkanoiD
- Re: [certid] open issue: wildcards in component f… Peter Saint-Andre
- Re: [certid] open issue: wildcards in component f… ArkanoiD
- Re: [certid] open issue: wildcards in component f… Peter Saint-Andre
- Re: [certid] open issue: wildcards in component f… Martin Rex
- Re: [certid] open issue: wildcards in component f… Matt McCutchen
- Re: [certid] open issue: wildcards in component f… Matt McCutchen
- Re: [certid] open issue: wildcards in component f… Martin Rex
- Re: [certid] open issue: wildcards in component f… Martin Rex
- Re: [certid] open issue: wildcards in component f… Peter Saint-Andre
- Re: [certid] open issue: wildcards in component f… Martin Rex
- Re: [certid] open issue: wildcards in component f… Peter Saint-Andre
- Re: [certid] open issue: wildcards in component f… Joe Orton
- Re: [certid] open issue: wildcards in component f… Matt McCutchen
- Re: [certid] open issue: wildcards in component f… Peter Saint-Andre
- Re: [certid] open issue: wildcards in component f… Jeffrey A. Williams
- Re: [certid] open issue: wildcards in component f… Peter Saint-Andre
- Re: [certid] open issue: wildcards in component f… Martin Rex
- Re: [certid] open issue: wildcards in component f… Matt McCutchen
- Re: [certid] open issue: wildcards in component f… Peter Saint-Andre
- Re: [certid] open issue: wildcards in component f… Matt McCutchen
- Re: [certid] open issue: wildcards in component f… Peter Saint-Andre
- Re: [certid] open issue: wildcards in component f… Martin Rex
- Re: [certid] open issue: wildcards in component f… Peter Saint-Andre
- Re: [certid] open issue: wildcards in component f… =JeffH
- Re: [certid] open issue: wildcards in component f… Peter Saint-Andre
- Re: [certid] open issue: wildcards in component f… Jeffrey A. Williams
- Re: [certid] open issue: wildcards in component f… Martin Rex
- Re: [certid] open issue: wildcards in component f… Peter Saint-Andre