Re: [certid] Why require EKU for certid?

Peter Saint-Andre <stpeter@stpeter.im> Thu, 30 September 2010 18:59 UTC

Return-Path: <stpeter@stpeter.im>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 787D93A6E3B for <certid@core3.amsl.com>; Thu, 30 Sep 2010 11:59:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.551
X-Spam-Level:
X-Spam-Status: No, score=-102.551 tagged_above=-999 required=5 tests=[AWL=0.048, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HVSpDK0H3pez for <certid@core3.amsl.com>; Thu, 30 Sep 2010 11:59:06 -0700 (PDT)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 32E9C3A6E75 for <certid@ietf.org>; Thu, 30 Sep 2010 11:58:22 -0700 (PDT)
Received: from dhcp-64-101-72-188.cisco.com (dhcp-64-101-72-188.cisco.com [64.101.72.188]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 5ACD340BB9; Thu, 30 Sep 2010 13:04:46 -0600 (MDT)
Message-ID: <4CA4DDFB.2040306@stpeter.im>
Date: Thu, 30 Sep 2010 12:59:07 -0600
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.9) Gecko/20100915 Thunderbird/3.1.4
MIME-Version: 1.0
To: mrex@sap.com
References: <201009300324.o8U3OYBJ013277@fs4113.wdf.sap.corp>
In-Reply-To: <201009300324.o8U3OYBJ013277@fs4113.wdf.sap.corp>
X-Enigmail-Version: 1.1.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Cc: stefan@aaa-sec.com, certid@ietf.org, Paul Hoffman <paul.hoffman@vpnc.org>
Subject: Re: [certid] Why require EKU for certid?
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates <certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Sep 2010 18:59:07 -0000

On 9/29/10 9:24 PM, Martin Rex wrote:
> Paul Hoffman wrote:
>>
>> At 1:20 AM +0200 9/30/10, Stefan Santesson wrote:
>>
>>> Absent this check, the domain name may violate name constraints and you
>>> would never know. This is the most important point.
>>
>> If the TLS client is doing full certificate path validation, the
>> certificate cannot violate name constraints. That is quite different
>> than what you just said.
> 
> As defined by PKIX, name constraints defined for dNSName SANs do not
> apply to directoryNames such as a certificate subject.
> 
> Some people are trying to artificially redefine the semantics of
> name constraints to ensure business models of CAs coming preconfigured
> as trusted with the software.  They're asking TLS clients for a gruesome
> breach of the PKIX name constraints architecture to "protect" against
> CAs from evading "dNSName SAN name constraints" imposed by their
> superiorCAs by issuing server certs without dNSName SANs
> (and CN-IDs instead, to which dNSName SAN name constraints do no apply).
> 
> I think it is an extremely bad idea to increase the complexity of
> CN-ID server-id-check semantics, which have been deprecated 10 years ago,
> by the order of a magnitude -- in particular in a BCP document,
> because most of the installed base does not work that way and
> a huge part of them is quite unlikely to ever adopt such weird
> CN-ID semantics.

Agreed.

As I see it, the Common Name is just a series of characters. Sometimes
that series happens to contain one or more instances of the "."
character, arrayed in a way that leads people to interpret the series of
characters as a DNS domain name. That doesn't mean that it's sensible to
take the PKIX name constraints that have been defined for the dNSName
SAN and apply those constraints to a series of characters that happens
to look like and be interpreted as a DNS domain name.

Peter

-- 
Peter Saint-Andre
https://stpeter.im/