Re: [certid] DNSSEC-based name canonicalization
Martin Rex <mrex@sap.com> Fri, 17 September 2010 05:21 UTC
Return-Path: <mrex@sap.com>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id AE2253A6849 for <certid@core3.amsl.com>;
Thu, 16 Sep 2010 22:21:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.833
X-Spam-Level:
X-Spam-Status: No, score=-9.833 tagged_above=-999 required=5 tests=[AWL=0.416,
BAYES_00=-2.599, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ejt6QbDElp8O for
<certid@core3.amsl.com>; Thu, 16 Sep 2010 22:21:36 -0700 (PDT)
Received: from smtpde02.sap-ag.de (smtpde02.sap-ag.de [155.56.68.140]) by
core3.amsl.com (Postfix) with ESMTP id 5DE6A3A67E6 for <certid@ietf.org>;
Thu, 16 Sep 2010 22:21:36 -0700 (PDT)
Received: from mail.sap.corp by smtpde02.sap-ag.de (26) with ESMTP id
o8H5M0Mm016125 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256
verify=OK); Fri, 17 Sep 2010 07:22:00 +0200 (MEST)
From: Martin Rex <mrex@sap.com>
Message-Id: <201009170521.o8H5LxdZ003712@fs4113.wdf.sap.corp>
To: matt@mattmccutchen.net (Matt McCutchen)
Date: Fri, 17 Sep 2010 07:21:59 +0200 (MEST)
In-Reply-To: <1284693189.5722.209.camel@mattlaptop2.local> from "Matt
McCutchen" at Sep 16, 10 11:13:09 pm
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
X-Scanner: Virus Scanner virwal06
X-SAP: out
Cc: certid@ietf.org
Subject: Re: [certid] DNSSEC-based name canonicalization
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: mrex@sap.com
List-Id: Representation and verification of identity in certificates
<certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Sep 2010 05:21:39 -0000
Matt McCutchen wrote: > > On Fri, 2010-09-17 at 00:34 +0200, Martin Rex wrote: > > Cleanup of my prior message: > > > > > > Matt McCutchen wrote: > > > > > > On Thu, 2010-09-16 at 07:27 +0200, Martin Rex wrote: > > > > Clearly unsafe operations: > > > > > > > > - building a reference identifier from the result of a > > > > DNS CNAME lookup > > > > > > > > (the use of DNSSEC does not make this safe) > > > > > > Why not? I'm not saying it's good practice, but I don't see an actual > > > vulnerability. > > > > You need two characteristics: > > > > (1) _trustworty_ information source for a name transformation > > (2) _protected_access_ to the information source > > > > DNSSEC meets (2) but not (1) > > Why not (1)? It should go without saying that by DNSSEC I meant "DNSSEC > with a set of trustworthy trust anchors that will get us to the desired > signed zone". From there, the DNS admin has full authority to say what > certificates a client trying to connect to a host in her zone should > accept. DNS needs to be available, fast, efficient and low-low-low cost. The cost of creating and maintaining DNS records with any trustworthyness that is measurably distinct from zero, with the necessary expertise to set up and devotion to practise scrutiny for every change to the data is probably going to far exceed the funding of most, if not all DNS admins. Are there already workable procedures and APIs for software to distinguish "normal" DNSSEC lookup results from "trustworthy" DNSSEC lookup results with some level of portability? How and how often would admins/consumers have to update and reconfirm every "trustworthy" DNSSEC key they keep? > > We could have a record, CERTNAME or something, that specifies the > hostname for which the certificate should be valid (via keyassure or > PKIX + server-id-check). I realize now that it would be dangerous to > reinterpret CNAME for this purpose, just as it is dangerous to > reinterpret CERT as making an assurance, but that is a separate issue. > I still wouldn't advise doing it unless we come up with a compelling use > case. DNS domains is a resource that is managed pretty arbitrary on a first-come first-served basis. It has some loose "a domain is leased to at most one entity at any single time" provision, that's it. DNS is vital for the internet, so it needs to remain fast, efficient and free, and all of that combined makes it hardly usable to bootstrap an infrastructure of trust, with any meaningful level of trust. The fraction of resources that web browsers accesses through HTTPS, where the first HTTPS link is served through a page received via HTTP in a completely untrusted fashion is mindboggling. Example "ebay". What do you think: how many users that login through the ebay sign-in page via HTTPS every day, have supplied the URL of the signin page in a trusted&secure fashion, and how many open http://www.ebay.<country> and click a link on that page? How about online banking? An internet commerce that cares strongly about security should serve only one single "301 Moved Permanently" page with an HTTPS url on port 80, making it difficult to bookmark anything else than a HTTPS urls to this site. "Secure" electronic commerce on the internet is often like a handful of iron rings that are quickly attached to each other with tiny rubber bands from the kitchen drawer in order to give the impression of a chain. Occasionally, some of these "chains" rip apart by their own weight alone. -Martin
- [certid] Fwd: secdir review of draft-saintandre-t… Peter Saint-Andre
- Re: [certid] Fwd: secdir review of draft-saintand… Henry B. Hotz
- Re: [certid] Fwd: secdir review of Martin Rex
- Re: [certid] Fwd: secdir review of draft-saintand… Matt McCutchen
- Re: [certid] Fwd: secdir review of draft-saintand… Matt McCutchen
- Re: [certid] Fwd: secdir review of Martin Rex
- Re: [certid] Fwd: secdir review of draft-saintand… Matt McCutchen
- Re: [certid] Fwd: secdir review of draft-saintand… Phillip Hallam-Baker
- Re: [certid] Fwd: secdir review of Martin Rex
- Re: [certid] Fwd: secdir review of Henry B. Hotz
- Re: [certid] Fwd: secdir review of Martin Rex
- Re: [certid] Fwd: secdir review of Martin Rex
- [certid] DNSSEC-based name canonicalization Matt McCutchen
- [certid] Wildcards for serving untrusted web cont… Matt McCutchen
- Re: [certid] DNSSEC-based name canonicalization Martin Rex
- Re: [certid] DNSSEC-based name canonicalization Peter Gutmann
- Re: [certid] secdir review of draft-saintandre-tl… Peter Saint-Andre
- Re: [certid] Fwd: secdir review of draft-saintand… Peter Saint-Andre
- Re: [certid] [secdir] secdir review of draft-sain… Peter Saint-Andre
- Re: [certid] secdir review of draft-saintandre-tl… Barry Leiba
- Re: [certid] Fwd: secdir review of draft-saintand… Barry Leiba
- Re: [certid] secdir review of draft-saintandre-tl… Peter Saint-Andre
- Re: [certid] [secdir] secdir review of draft-sain… Peter Saint-Andre
- Re: [certid] [secdir] secdir review of draft-sain… Jeffrey Hutzelman
- Re: [certid] [secdir] secdir review of draft-sain… Jeffrey Hutzelman
- Re: [certid] [secdir] secdir review of draft-sain… Peter Saint-Andre
- Re: [certid] [secdir] secdir review of draft-sain… ArkanoiD
- Re: [certid] [TLS] [secdir] secdir review of draf… Marsh Ray
- Re: [certid] [TLS] [secdir] secdir review of draf… Jeffrey A. Williams
- Re: [certid] [TLS] [secdir] secdir review of draf… Marsh Ray
- Re: [certid] [TLS] [secdir] secdir Martin Rex
- Re: [certid] [TLS] [secdir] secdir review of draf… Richard L. Barnes
- Re: [certid] [TLS] [secdir] secdir review of draf… Marsh Ray
- [certid] Bad certificate handling Matt McCutchen
- Re: [certid] [TLS] [secdir] secdir review of Martin Rex
- Re: [certid] [TLS] [secdir] secdir review of Robert Relyea
- Re: [certid] [TLS] [secdir] secdir review of draf… =JeffH
- Re: [certid] [TLS] [secdir] secdir review of Nicolas Williams
- Re: [certid] DNSSEC-based name canonicalization Peter Saint-Andre