Re: [certid] Review of draft-saintandre-tls-server-id-check
Peter Saint-Andre <stpeter@stpeter.im> Mon, 13 September 2010 17:03 UTC
Return-Path: <stpeter@stpeter.im>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id 432193A6A72; Mon, 13 Sep 2010 10:03:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.576
X-Spam-Level:
X-Spam-Status: No, score=-102.576 tagged_above=-999 required=5 tests=[AWL=0.023,
BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LQgVMQcbDWYY;
Mon, 13 Sep 2010 10:03:01 -0700 (PDT)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com
(Postfix) with ESMTP id D4E823A6A2C; Mon, 13 Sep 2010 10:03:00 -0700 (PDT)
Received: from dhcp-64-101-72-245.cisco.com (dhcp-64-101-72-245.cisco.com
[64.101.72.245]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with
ESMTPSA id 935B7400EE; Mon, 13 Sep 2010 11:07:31 -0600 (MDT)
Message-ID: <4C8E595C.2090409@stpeter.im>
Date: Mon, 13 Sep 2010 11:03:24 -0600
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US;
rv:1.9.1.12) Gecko/20100824 Thunderbird/3.0.7
MIME-Version: 1.0
To: Shumon Huque <shuque@isc.upenn.edu>
References: <20100908195349.GA4292@isc.upenn.edu>
<C8ADC7ED.EBA4%stefan@aaa-sec.com> <20100909182253.GB3460@isc.upenn.edu>
<4C8E4C6B.3040803@stpeter.im> <20100913165259.GA9709@isc.upenn.edu>
In-Reply-To: <20100913165259.GA9709@isc.upenn.edu>
X-Enigmail-Version: 1.0.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Cc: Bernard Aboba <bernard_aboba@hotmail.com>,
Stefan Santesson <stefan@aaa-sec.com>,
IETF cert-based identity <certid@ietf.org>, ietf@ietf.org,
daedulus@btconnect.com
Subject: Re: [certid] Review of draft-saintandre-tls-server-id-check
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates
<certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Sep 2010 17:03:02 -0000
On 9/13/10 10:52 AM, Shumon Huque wrote: > On Mon, Sep 13, 2010 at 10:08:11AM -0600, Peter Saint-Andre wrote: >> On 9/9/10 12:22 PM, Shumon Huque wrote: >>> On Wed, Sep 08, 2010 at 11:08:29PM +0200, Stefan Santesson wrote: >>>> The only thing the client need to do is to verify that the domain name >>>> provided in the input to the lookup matches the host names provided in the >>>> output. It can then safely use the host names in the SRV record as reference >>>> identifiers IF the SRV-ID in the server certificate matches the the >>>> reference identifier. >>> >>> This only works if the certificate matching rules say something >>> like "match the SRVName AND also match the DNS resolved target >>> hostname in dNSName". If a client attempts to match _only_ the DNS >>> resolved hostname without DNSSEC, there is a security problem. >>> >>> The question is: what should the certificate matching rules say >>> when encountering a certificate with multiple identity types? >>> Right now the draft approximately says "find a match" (ie. find >>> ANY match), rather than match some logically AND'ed combination of >>> identity types. >>> >>> http://tools.ietf.org/html/draft-saintandre-tls-server-id-check-09#section-4 >> >> Hi Shumon, >> >> As I see it, this I-D is attempting to capture best current practices >> regarding the issuance and checking of certificates containing >> application server identities. > > Yes, but whether they are actually "current" best practices is > debatable. I certainly would like them to become best practices. > For example I don't believe any existing commercial CAs issue > certificates with the SRVName or URI SAN name forms. As far as I know, at least one CA will issue certificates with the SRVName form (for XMPP certificates). We could ask some folks in the SIP community if any CAs issue certificates with the URI form (see draft-ietf-sip-certs). >> Do we have evidence that any existing >> certification authorities issue certificates containing both an SRVname >> for the source domain (e.g., example.com) and dNSName for the target >> domain (e.g., apphosting.example.net)? Do we have evidence that any >> existing application clients perform such checks? If not, I would >> consider such complications to be out of scope for this I-D. > > I think the question is whether we have examples of applications > that need to verify "combinations" of subjectaltname name forms in > certificates. Stefan says there are, but so far no-one has offered > up any public specifications of such apps. So, I think until we > have them, I agree we can defer considerations of them to future > documents. Agreed. I've never seen this I-D as the final word, but instead as the beginning of a longer-term conversation, both about the limited topic that's covered in the I-D as well as all the topics we deemed out of scope. > I think it's reasonable for this draft to consider multiple identity > types in certificates (eg. common name, dNSName, SRVName) with the > current matching rules of ANY. This might be needed to gradually > transition an app from validating a host specific identity to an > application specific identity. The current draft allows this. Correct. >> That said, we need to be aware that if such usage arises in the future, >> someone might write a document that updates or obsoletes this I-D; in >> fact the present authors very much expect that such documents will >> emerge after the Internet community (specifically certification >> authorities, application service providers, and application client >> developers) have gained more experience with PKIX certificates in the >> context of various application technologies. > > Sounds reasonable. I'm looking forward to further work in this area. Peter -- Peter Saint-Andre https://stpeter.im/
- [certid] Fwd: Review of draft-saintandre-tls-serv… Paul Hoffman
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Bernard Aboba
- Re: [certid] Review of draft-saintandre-tls-serve… Stefan Santesson
- Re: [certid] Review of draft-saintandre-tls-serve… James Schaad
- Re: [certid] Review of draft-saintandre-tls-serve… Stefan Santesson
- Re: [certid] Review of draft-saintandre-tls-serve… Stefan Santesson
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Shumon Huque
- Re: [certid] Review of draft-saintandre-tls-serve… Shumon Huque
- Re: [certid] Review of draft-saintandre-tls-serve… Stefan Santesson
- Re: [certid] Review of draft-saintandre-tls-serve… Stefan Santesson
- Re: [certid] Review of draft-saintandre-tls-serve… Shumon Huque
- Re: [certid] Review of draft-saintandre-tls-serve… Stefan Santesson
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Paul Hoffman
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Shumon Huque
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Shumon Huque
- Re: [certid] Review of draft-saintandre-tls-serve… Richard L. Barnes
- Re: [certid] Review of draft-saintandre-tls-serve… Dave Cridland
- Re: [certid] Review of draft-saintandre-tls-serve… Martin Rex
- Re: [certid] Review of draft-saintandre-tls-serve… Stefan Santesson
- Re: [certid] Review of draft-saintandre-tls-serve… Stefan Santesson
- Re: [certid] [TLS] Review of draft-saintandre-tls… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Dave Cridland
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Dave Cridland
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Dave Cridland
- Re: [certid] Review of draft-saintandre-tls-serve… Stefan Santesson
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] [TLS] Review of draft-saintandre-tls… James Schaad
- Re: [certid] Review of draft-saintandre-tls-serve… Stefan Santesson
- Re: [certid] Review of draft-saintandre-tls-serve… Stefan Santesson
- Re: [certid] Review of draft-saintandre-tls-serve… Dave Cridland
- Re: [certid] Review of draft-saintandre-tls-serve… Shumon Huque
- Re: [certid] Review of draft-saintandre-tls-serve… Dave Cridland
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- [certid] Why require EKU for certid? Paul Hoffman
- Re: [certid] Why require EKU for certid? Peter Saint-Andre
- Re: [certid] [TLS] Why require EKU for certid? Jim Schaad
- Re: [certid] Why require EKU for certid? Martin Rex
- Re: [certid] Why require EKU for certid? Henry B. Hotz
- [certid] CN-ID and name constraints Matt McCutchen
- Re: [certid] CN-ID and name constraints Martin Rex
- Re: [certid] CN-ID and name constraints Matt McCutchen
- Re: [certid] CN-ID and name constraints Martin Rex
- Re: [certid] CN-ID and name constraints Matt McCutchen
- Re: [certid] CN-ID and name constraints (oops) Matt McCutchen
- Re: [certid] CN-ID and name constraints Matt McCutchen
- Re: [certid] Why require EKU for certid? Peter Saint-Andre
- Re: [certid] CN-ID and name constraints Peter Saint-Andre
- Re: [certid] CN-ID and name constraints Jim Schaad
- Re: [certid] Why require EKU for certid? Peter Saint-Andre
- Re: [certid] Why require EKU for certid? Paul Hoffman
- Re: [certid] Why require EKU for certid? Stefan Santesson
- Re: [certid] Why require EKU for certid? Paul Hoffman
- Re: [certid] Why require EKU for certid? Martin Rex
- Re: [certid] Why require EKU for certid? Stefan Santesson
- Re: [certid] Why require EKU for certid? Peter Saint-Andre
- Re: [certid] Why require EKU for certid? Peter Saint-Andre
- Re: [certid] CN-ID and name constraints Peter Saint-Andre
- Re: [certid] CN-ID and name constraints Jim Schaad
- Re: [certid] CN-ID and name constraints Carl Wallace