Re: [certid] Name constraints and legacy clients

Matt McCutchen <matt@mattmccutchen.net> Mon, 04 October 2010 02:49 UTC

Return-Path: <matt@mattmccutchen.net>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 428B33A6F15 for <certid@core3.amsl.com>; Sun, 3 Oct 2010 19:49:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.565
X-Spam-Level:
X-Spam-Status: No, score=-2.565 tagged_above=-999 required=5 tests=[AWL=0.034, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Gs6SIMC8ICr0 for <certid@core3.amsl.com>; Sun, 3 Oct 2010 19:49:19 -0700 (PDT)
Received: from homiemail-a14.g.dreamhost.com (mailbigip.dreamhost.com [208.97.132.5]) by core3.amsl.com (Postfix) with ESMTP id 0BA7B3A6F12 for <certid@ietf.org>; Sun, 3 Oct 2010 19:49:19 -0700 (PDT)
Received: from homiemail-a14.g.dreamhost.com (localhost [127.0.0.1]) by homiemail-a14.g.dreamhost.com (Postfix) with ESMTP id 710108C06C; Sun, 3 Oct 2010 19:50:13 -0700 (PDT)
DomainKey-Signature: a=rsa-sha1; c=nofws; d=mattmccutchen.net; h=subject:from :to:cc:in-reply-to:references:content-type:date:message-id :mime-version:content-transfer-encoding; q=dns; s= mattmccutchen.net; b=OxjyVMmvUWSbmPmzaTwuQUzSVAyhdwF0K3yTlc8EkTH hqKxCJ5spJU2NvGEcttkekwKZqn99+go6D0PcdogZxUstf5aRpnZxeJmd0jEBlXQ 970puNXWrts2mLeDbk7DUz7FlXgbMsStcRQKBe4LrHJ8CbOsKgxLB+gCOPe39Bqs =
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=mattmccutchen.net; h= subject:from:to:cc:in-reply-to:references:content-type:date :message-id:mime-version:content-transfer-encoding; s= mattmccutchen.net; bh=UkhUtnThSHIk1H+eKWBka03iat4=; b=nwzcZ6WZmw kdKXpjE/S+ByffKnh+uzZCazCNmmq2CWeJd2vYMhC/hWOYp5Ls5OODbkBskHVdT6 moM9Ec8+8VBTEoWK36HQQ28Dv7PoIikWJClWkROuuv8ASS1ggijp9s2XCtS8goSI uE6IdRFwBldG01VhSKiUIWd4W4AqW6FfI=
Received: from [129.2.249.209] (ml2.student.umd.edu [129.2.249.209]) (Authenticated sender: matt@mattmccutchen.net) by homiemail-a14.g.dreamhost.com (Postfix) with ESMTPA id 2982D8C06A; Sun, 3 Oct 2010 19:50:13 -0700 (PDT)
From: Matt McCutchen <matt@mattmccutchen.net>
To: Paul Tiemann <paul.tiemann.usenet@gmail.com>
In-Reply-To: <AANLkTil-6PZ4iAE9SfysI3AuIjam40xbN8DywgLOMwI0@mail.gmail.com>
References: <201006301746.o5UHkIsE019133@fs4113.wdf.sap.corp> <4C2B843A.5010206@stpeter.im> <4C305B93.9090001@velox.ch> <201007061435.29786.ludwig.nussel@suse.de> <4C335CE5.1090608@edelweb.fr> <4C3421B3.3070404@velox.ch> <4C3B4F6E.80903@stpeter.im> <4C3DDC18.4020808@bolyard.me> <4C3E979B.4050401@velox.ch> <AANLkTil-6PZ4iAE9SfysI3AuIjam40xbN8DywgLOMwI0@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"
Date: Sun, 03 Oct 2010 22:50:11 -0400
Message-ID: <1286160611.14732.125.camel@mattlaptop2.local>
Mime-Version: 1.0
X-Mailer: Evolution 2.30.4
Content-Transfer-Encoding: 7bit
Cc: certid@ietf.org
Subject: Re: [certid] Name constraints and legacy clients
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates <certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Oct 2010 02:49:20 -0000

On Fri, 2010-07-16 at 12:02 -0600, Paul Tiemann wrote:
> On the topic of name constraints: What if there are ways to push Name
> Constraints forward without necessarily having to wait for all legacy
> clients to die and all the niche clients to become compatible?  Here's
> one idea (admittedly not past v0.1 in my head)
> 
> 1) Have the major browser vendors add a small mechanism to detect
> certificates with Name Constraint violations, and give them a central,
> automated way to "report" a certificate found with violated name
> constraints which might pose a risk for all the non-compliant browsers
> and clients.  With something like that in place, the major browsers
> will be able to handle name constraints correctly, and the constraints
> policing feature would help to erase the incentive that the operator
> of a constrained CA certificate would have for violating the
> constraints to trick legacy devices.  
> 2) NetCraft could possibly help with Name Constraints monitoring, at
> least for the public internet.

And at this point it becomes safe to give someone we don't fully trust a
name-constrained intermediate certificate?  I'm skeptical.  An attacker
may be able to target some subset of legacy clients with a false
certificate (by source IP address or ClientHello content) without ever
sending the certificate to a violation-reporting client and thereby
evade detection.

Another approach is to have name-constrained intermediate certificates
include a critical extension that means "name constraints must be
applied to the CN-ID".  EE certificates under such an intermediate
certificate will only be accepted by clients that properly enforce the
name constraints.  An organization could use a name-constrained
intermediate certificate for servers that don't need to support legacy
clients and get a certificate directly from a public CA for servers that
do.  I previously proposed this here:


-- 
Matt