Re: [certid] CN-ID and name constraints
Martin Rex <mrex@sap.com> Fri, 24 September 2010 02:39 UTC
Return-Path: <mrex@sap.com>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id 6F8413A68C8 for <certid@core3.amsl.com>;
Thu, 23 Sep 2010 19:39:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.51
X-Spam-Level:
X-Spam-Status: No, score=-9.51 tagged_above=-999 required=5 tests=[AWL=0.139,
BAYES_00=-2.599, HELO_EQ_DE=0.35, J_CHICKENPOX_42=0.6, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GK84hOnsPH4H for
<certid@core3.amsl.com>; Thu, 23 Sep 2010 19:39:02 -0700 (PDT)
Received: from smtpde01.sap-ag.de (smtpde01.sap-ag.de [155.56.68.170]) by
core3.amsl.com (Postfix) with ESMTP id B39BA3A6851 for <certid@ietf.org>;
Thu, 23 Sep 2010 19:39:01 -0700 (PDT)
Received: from mail.sap.corp by smtpde01.sap-ag.de (26) with ESMTP id
o8O2dUKo007863 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256
verify=OK); Fri, 24 Sep 2010 04:39:30 +0200 (MEST)
From: Martin Rex <mrex@sap.com>
Message-Id: <201009240239.o8O2dTQY022491@fs4113.wdf.sap.corp>
To: matt@mattmccutchen.net (Matt McCutchen)
Date: Fri, 24 Sep 2010 04:39:29 +0200 (MEST)
In-Reply-To: <1285290623.1939.15.camel@mattlaptop2.local> from "Matt
McCutchen" at Sep 23, 10 09:10:22 pm
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
X-Scanner: Virus Scanner virwal05
X-SAP: out
Cc: certid@ietf.org
Subject: Re: [certid] CN-ID and name constraints
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: mrex@sap.com
List-Id: Representation and verification of identity in certificates
<certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Sep 2010 02:39:03 -0000
Matt McCutchen wrote: > > > A CA with name constraints for DNSName SANs (required critical according > > to rfc5280, mind you) in its own CA certificate that issues TLS server > > certificates without dNSName SANs yields "fubar" on my scorecard. > > But if by doing that they can issue certificates that clients will > accept for server names the superior CA did not intend, that's a big > security problem. No, there is absolutely no security problem involved. This is a plain and simple liability issue. If the superior CA can not manage the risk appropriately so that the issuing CA will not do this, then either the superior CA MUST NOT certify that issuing CA, or the clients MUST NOT trust the superior CA. It is really as simple as that. Btw. is it completely ridiculous to put Constraints into certificates for a resource that is managed aribraritly on a first-come, first-served basis such as DNS hostnames and think of it as a security feature. What some entirely fail to understand is that this is about a backwards compatibility issue with the installed base, and no amount of praying, cursing and issuing of new Specs with MUST NOTs in them will change the behaviour of the installed base in any way or form. New specs affect only new stuff (implementations and CAs), and to a very limited amount patches into the installed base, under the condition that the change DOES NOT BREAK existing productive usage scenarios. NameConstraints are ill-designed to support what some people intend to do with them. They're specify to constrain only name components that are present, not name components that are absent. Go kick the PKIX folks if you don't like how it is spec'ed, but leave the apps folks alone. I believe that asking the apps folks to regurgitate and re-chew stuff that the PKIX part didn't process to someone's satisfaction is an _extremely_ bad idea. As far as Joe Average User is concerned, which of the CAs shipping in current Browsers does have the alleged security problem anyway? The way they're specified, NameConstraints are not a security feature, but rather a means to enforce a business model, because NameConstraints can no longer securely if there is more than one trust anchor. TLS as used on the internet is approaching 100 seperate trust anchors... > > > Those that need the backwards compatibility will _not_ disable > > the matching fallback if DNSName SANs are present, > > NSS doesn't: > > https://mxr.mozilla.org/mozilla/ident?i=CERT_VerifyCertName > > The idea is that by including a dNSName SAN, the CA opts out of the > backward compatibility. I don't think anyone issues certificates with > both dNSName SAN and CN with the intent that the CN be honored as a > server name. Well no, this is another absolute nonsense, because again it completely ignores the (behaviour of) the installed base. The only way to opt out of CN-ID matching is to issue server certs entirely without CN AVAs in the subject name. Anything else than CN=f.q.d.n or NO CN AVA is non-sensical. The only problem with CN-less subject names is, that it might create serious usability issues with a number of existing certificate maintenance UIs... > > > and they're > > even more unlikely to adopt such a weird name constraints > > processing of a fallback they shouldn't be doing in the > > first place and keep doing only to not interfere with > > installed base. > > Those that need backwards compatibility, name constraints, and security > need to do something about this issue. I'm not aware of a reasonable justification for the existance of PolicyConstraints and NameConstraints in certificates other than governmental agencies and military would like to use it eventually and still be able to procure on the commodity market. The situation for ECC crypto is similar. Although there may be some usefulness in having alternative algorithm to RSA at some point in the future when all of the annoying patents have expired. -Martin
- [certid] Fwd: Review of draft-saintandre-tls-serv… Paul Hoffman
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Bernard Aboba
- Re: [certid] Review of draft-saintandre-tls-serve… Stefan Santesson
- Re: [certid] Review of draft-saintandre-tls-serve… James Schaad
- Re: [certid] Review of draft-saintandre-tls-serve… Stefan Santesson
- Re: [certid] Review of draft-saintandre-tls-serve… Stefan Santesson
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Shumon Huque
- Re: [certid] Review of draft-saintandre-tls-serve… Shumon Huque
- Re: [certid] Review of draft-saintandre-tls-serve… Stefan Santesson
- Re: [certid] Review of draft-saintandre-tls-serve… Stefan Santesson
- Re: [certid] Review of draft-saintandre-tls-serve… Shumon Huque
- Re: [certid] Review of draft-saintandre-tls-serve… Stefan Santesson
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Paul Hoffman
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Shumon Huque
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Shumon Huque
- Re: [certid] Review of draft-saintandre-tls-serve… Richard L. Barnes
- Re: [certid] Review of draft-saintandre-tls-serve… Dave Cridland
- Re: [certid] Review of draft-saintandre-tls-serve… Martin Rex
- Re: [certid] Review of draft-saintandre-tls-serve… Stefan Santesson
- Re: [certid] Review of draft-saintandre-tls-serve… Stefan Santesson
- Re: [certid] [TLS] Review of draft-saintandre-tls… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Dave Cridland
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Dave Cridland
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Dave Cridland
- Re: [certid] Review of draft-saintandre-tls-serve… Stefan Santesson
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] [TLS] Review of draft-saintandre-tls… James Schaad
- Re: [certid] Review of draft-saintandre-tls-serve… Stefan Santesson
- Re: [certid] Review of draft-saintandre-tls-serve… Stefan Santesson
- Re: [certid] Review of draft-saintandre-tls-serve… Dave Cridland
- Re: [certid] Review of draft-saintandre-tls-serve… Shumon Huque
- Re: [certid] Review of draft-saintandre-tls-serve… Dave Cridland
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- Re: [certid] Review of draft-saintandre-tls-serve… Peter Saint-Andre
- [certid] Why require EKU for certid? Paul Hoffman
- Re: [certid] Why require EKU for certid? Peter Saint-Andre
- Re: [certid] [TLS] Why require EKU for certid? Jim Schaad
- Re: [certid] Why require EKU for certid? Martin Rex
- Re: [certid] Why require EKU for certid? Henry B. Hotz
- [certid] CN-ID and name constraints Matt McCutchen
- Re: [certid] CN-ID and name constraints Martin Rex
- Re: [certid] CN-ID and name constraints Matt McCutchen
- Re: [certid] CN-ID and name constraints Martin Rex
- Re: [certid] CN-ID and name constraints Matt McCutchen
- Re: [certid] CN-ID and name constraints (oops) Matt McCutchen
- Re: [certid] CN-ID and name constraints Matt McCutchen
- Re: [certid] Why require EKU for certid? Peter Saint-Andre
- Re: [certid] CN-ID and name constraints Peter Saint-Andre
- Re: [certid] CN-ID and name constraints Jim Schaad
- Re: [certid] Why require EKU for certid? Peter Saint-Andre
- Re: [certid] Why require EKU for certid? Paul Hoffman
- Re: [certid] Why require EKU for certid? Stefan Santesson
- Re: [certid] Why require EKU for certid? Paul Hoffman
- Re: [certid] Why require EKU for certid? Martin Rex
- Re: [certid] Why require EKU for certid? Stefan Santesson
- Re: [certid] Why require EKU for certid? Peter Saint-Andre
- Re: [certid] Why require EKU for certid? Peter Saint-Andre
- Re: [certid] CN-ID and name constraints Peter Saint-Andre
- Re: [certid] CN-ID and name constraints Jim Schaad
- Re: [certid] CN-ID and name constraints Carl Wallace