Re: [certid] Domain Components
Bruno Harbulot <Bruno.Harbulot@manchester.ac.uk> Mon, 21 June 2010 22:19 UTC
Return-Path: <Bruno.Harbulot@manchester.ac.uk>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id BA70E3A68B1 for <certid@core3.amsl.com>;
Mon, 21 Jun 2010 15:19:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.42
X-Spam-Level:
X-Spam-Status: No, score=-2.42 tagged_above=-999 required=5 tests=[AWL=2.021,
BAYES_20=-0.74, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ELYbkRFkQrc0 for
<certid@core3.amsl.com>; Mon, 21 Jun 2010 15:19:38 -0700 (PDT)
Received: from clarity.mcc.ac.uk (clarity.mcc.ac.uk [130.88.200.144]) by
core3.amsl.com (Postfix) with ESMTP id B1D613A67C2 for <certid@ietf.org>;
Mon, 21 Jun 2010 15:19:38 -0700 (PDT)
Received: from kelvin.its.manchester.ac.uk ([130.88.25.195]) by
clarity.mcc.ac.uk with esmtps (TLSv1:AES256-SHA:256) (Exim 4.69 (FreeBSD))
(envelope-from <Bruno.Harbulot@manchester.ac.uk>) id 1OQpLC-0003lF-Uh;
Mon, 21 Jun 2010 23:19:43 +0100
Received: from 94-192-243-24.zone6.bethere.co.uk ([94.192.243.24]:52501
helo=mymachine) by kelvin.its.manchester.ac.uk with esmtpsa
(TLSv1:AES256-SHA:256) (Exim 4.69) (envelope-from
<Bruno.Harbulot@manchester.ac.uk>) id 1OQpLC-0001dA-1b;
Mon, 21 Jun 2010 23:19:42 +0100
Message-ID: <4C1FE579.5030403@manchester.ac.uk>
Date: Mon, 21 Jun 2010 23:19:37 +0100
From: Bruno Harbulot <Bruno.Harbulot@manchester.ac.uk>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US;
rv:1.9.1.9) Gecko/20100317 Lightning/1.0b1 Thunderbird/3.0.4
MIME-Version: 1.0
To: =?ISO-8859-1?Q?Michael_Str=F6der?= <michael@stroeder.com>
References: <4C12A27D.3070308@stpeter.im> <p0624086ac8386db66483@[10.20.30.158]>
<4C1CA2B8.9080103@isode.com> <p0624082ac8427d3d733f@[10.20.30.158]> <4C1CD30B.4090200@isode.com>
<4C1CD73B.6000602@stroeder.com> <p0624082ec8428aeca84e@[10.20.30.158]> <4C1FA6F0.1040001@stroeder.com> <p06240828c8455b71fba1@[10.20.30.158]> <4C1FD34F.90004@stroeder.com>
<4C1FD3CD.8090009@stroeder.com>
In-Reply-To: <4C1FD3CD.8090009@stroeder.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
X-Authenticated-Sender: Bruno Harbulot from 94-192-243-24.zone6.bethere.co.uk
(mymachine) [94.192.243.24]:52501
X-Authenticated-From: Bruno.Harbulot@manchester.ac.uk
Cc: Paul Hoffman <phoffman@imc.org>, IETF cert-based identity <certid@ietf.org>
Subject: Re: [certid] Domain Components
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates
<certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Jun 2010 22:19:39 -0000
On 21/06/2010 22:04, Michael Ströder wrote: > Michael Ströder wrote: >> Paul Hoffman wrote: >>> It tells us that, when there are multiple ways to do things, and some of >>> those ways are known to be insecure due to repeated poor implementations, >>> we can say "don't do that" for the bad ways. >> >> That's fine for me too. > > But to make that more clear in this context: The draft should not discourage > completely using DCs in the subject-DN. It should only recommend not to encode > the server's hostname in the DCs. I think the problem with that approach is the same as the use of the word "represent" in a couple of paragraphs (as mentioned earlier on this list): if you get some DCs (or CN for that matter), how do you know whether or not they were meant to "represent" the hostname or something else? If DCs are to be used in some but not all cases to convey the hostname to check against, then there either needs a way to disambiguate which case is which. In my opinion, I would split this in two cases: - If there is a subject alt. name.: the Subject DN can be more or less ignored (it would just be a convenience). - If there isn't: the expectations on the DCs (or CN) in the Subject DN have to be strict (i.e. a MUST). If we get something like "SHOULD NOT encode the server hostname in the DCs", then the door is open to ambiguity, and I think that's where the problems will come for determining whether or not the certificate matches the server. (I think that would also be compatible with the existing implementations of RFC 2818.) Best wishes, Bruno.
- [certid] Domain Components Peter Saint-Andre
- Re: [certid] Domain Components Paul Hoffman
- Re: [certid] Domain Components Paul Hoffman
- Re: [certid] Domain Components Alexey Melnikov
- Re: [certid] Domain Components Paul Hoffman
- Re: [certid] Domain Components Peter Sylvester
- Re: [certid] Domain Components Alexey Melnikov
- Re: [certid] Domain Components Michael Ströder
- Re: [certid] Domain Components Paul Hoffman
- Re: [certid] Domain Components Paul Hoffman
- Re: [certid] Domain Components Peter Sylvester
- Re: [certid] Domain Components Michael Ströder
- Re: [certid] Domain Components Peter Sylvester
- [certid] CN-ID in version 6 Peter Sylvester
- Re: [certid] Domain Components Paul Hoffman
- Re: [certid] Domain Components Peter Sylvester
- Re: [certid] Domain Components Paul Hoffman
- Re: [certid] Domain Components Michael Ströder
- Re: [certid] Domain Components Paul Hoffman
- Re: [certid] Domain Components Peter Sylvester
- Re: [certid] Domain Components Michael Ströder
- Re: [certid] Domain Components Michael Ströder
- Re: [certid] Domain Components Bruno Harbulot
- Re: [certid] Domain Components Martin Rex
- Re: [certid] Domain Components Martin Rex
- Re: [certid] Domain Components Peter Sylvester
- Re: [certid] Domain Components Martin Rex