Re: [certid] section 4.6 rewrite (aka: Bad certificate handling)
Peter Saint-Andre <stpeter@stpeter.im> Thu, 07 October 2010 21:47 UTC
Return-Path: <stpeter@stpeter.im>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id DCA493A6E7D for <certid@core3.amsl.com>;
Thu, 7 Oct 2010 14:47:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.556
X-Spam-Level:
X-Spam-Status: No, score=-102.556 tagged_above=-999 required=5 tests=[AWL=0.043,
BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nm6tWiZubKWf for
<certid@core3.amsl.com>; Thu, 7 Oct 2010 14:47:25 -0700 (PDT)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com
(Postfix) with ESMTP id 984AF3A6D53 for <certid@ietf.org>;
Thu, 7 Oct 2010 14:47:25 -0700 (PDT)
Received: from dhcp-64-101-72-188.cisco.com (dhcp-64-101-72-188.cisco.com
[64.101.72.188]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with
ESMTPSA id D5518403DF; Thu, 7 Oct 2010 15:54:44 -0600 (MDT)
Message-ID: <4CAE402A.30707@stpeter.im>
Date: Thu, 07 Oct 2010 15:48:26 -0600
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US;
rv:1.9.2.9) Gecko/20100915 Thunderbird/3.1.4
MIME-Version: 1.0
To: Jim Schaad <ietf@augustcellars.com>
References: <201010051747.o95Hl8iZ002597@fs4113.wdf.sap.corp>
<4CACACEF.6050205@stpeter.im>
<009c01cb6590$b47e4060$1d7ac120$@augustcellars.com>
In-Reply-To: <009c01cb6590$b47e4060$1d7ac120$@augustcellars.com>
X-Enigmail-Version: 1.1.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Cc: certid@ietf.org
Subject: Re: [certid] section 4.6 rewrite (aka: Bad certificate handling)
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates
<certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Oct 2010 21:47:27 -0000
On 10/6/10 1:57 PM, Jim Schaad wrote: > > >> -----Original Message----- From: Peter Saint-Andre >> [mailto:stpeter@stpeter.im] Sent: Wednesday, October 06, 2010 10:08 >> AM To: mrex@sap.com Cc: Jim Schaad; matt@mattmccutchen.net; >> certid@ietf.org Subject: Re: [certid] section 4.6 rewrite (aka: Bad >> certificate handling) >> >> On 10/5/10 11:47 AM, Martin Rex wrote: >>> Jim Schaad wrote: >>>> >>>> Martin Rex wrote: >>>>> >>>>> (2) support for server certs that do not succeed certificate >>>>> path validation to one of the (pre-)configured trust anchors >>>> >>>> This is from the abstract of the document in question: >>>> >>>> "This document specifies best current practices for >>>> representing and verifying the identity of application services >>>> in such interactions." >>>> >>>> As you see the document is about how to do name comparisons. >>>> If you believe a document on trust , path validation and >>>> pinning are needed I would strongly suggest that you write such >>>> a draft. >>> >>> Thanks! I was asking for removal of the reference to path >>> validation from that one paragraph: >>> >>> PeterSA wrote: >>>> >>>> then the client MUST verify that the presented certificate is >>>> the same as the cached certificate, including verification of >>>> the entire certification path. >>> >>> So the "including verification of the entire certification path" >>> should be completely removed, >> >> I'd be curious to see what Jim's feedback is on that point, since >> he suggested the inclusion of text about the certification path. > > I don't care if you remove the word verification. What I want to say > is that the presented certificate and it's chain back to the trust > anchor is the same as when it was first checked by the advanced user. > If the path has changed then the answer should be re-obtained. > > > 4.6.2. Case #2: No Match Found, Name Association Cached > > If the client does not find a presented identifier matching any of > the reference identifiers, but has previously associated one of the > reference identifiers with the certificate (a) by a human user during > a previous interaction with this application service or (b) via > configuration settings, the server identity check succeeds. The > cached name association needs to include the certificate presented > and the context in which in which it was accepted. The context > includes the chain of certificates from the presented certificate to > the trust anchor. That seems better. Thanks for the proposed text. Tweaked slightly in our working copy, as follows: If the client does not find a presented identifier matching any of the reference identifiers, but has previously associated one of the reference identifiers with the certificate (a) because of positive acceptance by a human user during a previous interaction with this application service or (b) because of configuration settings, then the server identity check succeeds. The cached name association needs to take account of both the certificate presented and the context in which it was accepted or configured (where the context includes the chain of certificates from the presented certificate to the trust anchor). >>> and the "cached certificate" ought to be clarified to mean >>> memorized "CERT-ID" reference identifier to make it clearly >>> distinct from anything related to TLS session caching. > > I don't any any big issues here with the word cached. Although you > might want to use "cached name association" Yes, I like that phrase. Peter -- Peter Saint-Andre https://stpeter.im/
- [certid] section 4.6 rewrite (aka: Bad certificat… =JeffH
- Re: [certid] section 4.6 rewrite (aka: Bad certif… Jim Schaad
- Re: [certid] section 4.6 rewrite (aka: Bad certif… Peter Saint-Andre
- Re: [certid] section 4.6 rewrite (aka: Bad certif… Jim Schaad
- Re: [certid] section 4.6 rewrite (aka: Bad certif… Peter Saint-Andre
- Re: [certid] section 4.6 rewrite (aka: Bad certif… Matt McCutchen
- Re: [certid] section 4.6 rewrite (aka: Bad certif… Matt McCutchen
- Re: [certid] section 4.6 rewrite (aka: Bad certif… Martin Rex
- Re: [certid] section 4.6 rewrite (aka: Bad certif… Jim Schaad
- Re: [certid] section 4.6 rewrite (aka: Bad certif… Jim Schaad
- Re: [certid] section 4.6 rewrite (aka: Bad certif… Martin Rex
- Re: [certid] section 4.6 rewrite (aka: Bad certif… Jim Schaad
- Re: [certid] section 4.6 rewrite (aka: Bad certif… =JeffH
- Re: [certid] section 4.6 rewrite (aka: Bad certif… Martin Rex
- Re: [certid] section 4.6 rewrite (aka: Bad certif… Jim Schaad
- Re: [certid] section 4.6 rewrite (aka: Bad certif… Martin Rex
- Re: [certid] section 4.6 rewrite (aka: Bad certif… Peter Saint-Andre
- Re: [certid] section 4.6 rewrite (aka: Bad certif… Jim Schaad
- Re: [certid] section 4.6 rewrite (aka: Bad certif… Peter Saint-Andre