Re: [certid] Domain Components

Bruno Harbulot <Bruno.Harbulot@manchester.ac.uk> Mon, 21 June 2010 22:19 UTC

Return-Path: <Bruno.Harbulot@manchester.ac.uk>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BA70E3A68B1 for <certid@core3.amsl.com>; Mon, 21 Jun 2010 15:19:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.42
X-Spam-Level:
X-Spam-Status: No, score=-2.42 tagged_above=-999 required=5 tests=[AWL=2.021, BAYES_20=-0.74, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ELYbkRFkQrc0 for <certid@core3.amsl.com>; Mon, 21 Jun 2010 15:19:38 -0700 (PDT)
Received: from clarity.mcc.ac.uk (clarity.mcc.ac.uk [130.88.200.144]) by core3.amsl.com (Postfix) with ESMTP id B1D613A67C2 for <certid@ietf.org>; Mon, 21 Jun 2010 15:19:38 -0700 (PDT)
Received: from kelvin.its.manchester.ac.uk ([130.88.25.195]) by clarity.mcc.ac.uk with esmtps (TLSv1:AES256-SHA:256) (Exim 4.69 (FreeBSD)) (envelope-from <Bruno.Harbulot@manchester.ac.uk>) id 1OQpLC-0003lF-Uh; Mon, 21 Jun 2010 23:19:43 +0100
Received: from 94-192-243-24.zone6.bethere.co.uk ([94.192.243.24]:52501 helo=mymachine) by kelvin.its.manchester.ac.uk with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.69) (envelope-from <Bruno.Harbulot@manchester.ac.uk>) id 1OQpLC-0001dA-1b; Mon, 21 Jun 2010 23:19:42 +0100
Message-ID: <4C1FE579.5030403@manchester.ac.uk>
Date: Mon, 21 Jun 2010 23:19:37 +0100
From: Bruno Harbulot <Bruno.Harbulot@manchester.ac.uk>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.1.9) Gecko/20100317 Lightning/1.0b1 Thunderbird/3.0.4
MIME-Version: 1.0
To: =?ISO-8859-1?Q?Michael_Str=F6der?= <michael@stroeder.com>
References: <4C12A27D.3070308@stpeter.im> <p0624086ac8386db66483@[10.20.30.158]> <4C1CA2B8.9080103@isode.com> <p0624082ac8427d3d733f@[10.20.30.158]> <4C1CD30B.4090200@isode.com> <4C1CD73B.6000602@stroeder.com> <p0624082ec8428aeca84e@[10.20.30.158]> <4C1FA6F0.1040001@stroeder.com> <p06240828c8455b71fba1@[10.20.30.158]> <4C1FD34F.90004@stroeder.com> <4C1FD3CD.8090009@stroeder.com>
In-Reply-To: <4C1FD3CD.8090009@stroeder.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
X-Authenticated-Sender: Bruno Harbulot from 94-192-243-24.zone6.bethere.co.uk (mymachine) [94.192.243.24]:52501
X-Authenticated-From: Bruno.Harbulot@manchester.ac.uk
Cc: Paul Hoffman <phoffman@imc.org>, IETF cert-based identity <certid@ietf.org>
Subject: Re: [certid] Domain Components
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates <certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Jun 2010 22:19:39 -0000

On 21/06/2010 22:04, Michael Ströder wrote:
> Michael Ströder wrote:
>> Paul Hoffman wrote:
>>> It tells us that, when there are multiple ways to do things, and some of
>>> those ways are known to be insecure due to repeated poor implementations,
>>> we can say "don't do that" for the bad ways.
>>
>> That's fine for me too.
>
> But to make that more clear in this context: The draft should not discourage
> completely using DCs in the subject-DN. It should only recommend not to encode
> the server's hostname in the DCs.

I think the problem with that approach is the same as the use of the 
word "represent" in a couple of paragraphs (as mentioned earlier on this 
list): if you get some DCs (or CN for that matter), how do you know 
whether or not they were meant to "represent" the hostname or something 
else?
If DCs are to be used in some but not all cases to convey the hostname 
to check against, then there either needs a way to disambiguate which 
case is which.


In my opinion, I would split this in two cases:
- If there is a subject alt. name.: the Subject DN can be more or less 
ignored (it would just be a convenience).
- If there isn't: the expectations on the DCs (or CN) in the Subject DN 
have to be strict (i.e. a MUST). If we get something like "SHOULD NOT 
encode the server hostname in the DCs", then the door is open to 
ambiguity, and I think that's where the problems will come for 
determining whether or not the certificate matches the server.

(I think that would also be compatible with the existing implementations 
of RFC 2818.)


Best wishes,

Bruno.