Re: [certid] Gen-ART LC Review of draft-saintandre-tls-server-id-check-11

Peter Saint-Andre <stpeter@stpeter.im> Wed, 08 December 2010 22:10 UTC

Return-Path: <stpeter@stpeter.im>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 014DE3A69A2; Wed, 8 Dec 2010 14:10:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.487
X-Spam-Level:
X-Spam-Status: No, score=-102.487 tagged_above=-999 required=5 tests=[AWL=0.113, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pxIJ5YZBF+3s; Wed, 8 Dec 2010 14:10:27 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id CDF7A3A689F; Wed, 8 Dec 2010 14:10:24 -0800 (PST)
Received: from leavealone.cisco.com (72-163-0-129.cisco.com [72.163.0.129]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 9922A4009B; Wed, 8 Dec 2010 15:23:30 -0700 (MST)
Message-ID: <4D000298.20002@stpeter.im>
Date: Wed, 08 Dec 2010 15:11:36 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.12) Gecko/20101027 Thunderbird/3.1.6
MIME-Version: 1.0
To: =JeffH <Jeff.Hodges@KingsMountain.com>
References: <4CFFF2D8.4070408@KingsMountain.com>
In-Reply-To: <4CFFF2D8.4070408@KingsMountain.com>
X-Enigmail-Version: 1.1.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha1"; boundary="------------ms070109040702000104090304"
Cc: Ben Campbell <ben@nostrum.com>, General Area Review Team <gen-art@ietf.org>, IETF cert-based identity <certid@ietf.org>, Paul Hoffman <paul.hoffman@vpnc.org>, draft-saintandre-tls-server-id-check.all@tools.ietf.org
Subject: Re: [certid] Gen-ART LC Review of draft-saintandre-tls-server-id-check-11
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates <certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Dec 2010 22:10:39 -0000

On 12/8/10 2:04 PM, =JeffH wrote:
> stpete replied..
>>
>> On 12/7/10 8:01 AM, Paul Hoffman wrote:
>>> [[ Much abbreviated ]]
>>>
>>> At 9:10 PM -0700 12/6/10, Peter Saint-Andre wrote:
>>>>>>> -- 3.1, rule 6:
>>>>>>>
>>>>>>> Can you motivate why this is not a MUST NOT?
>>>>> The reason for allowing this wiggle-room is that (for better or
> worse)..
>>>>>
>>>>>   1. the CA/Browser Forum Extended Validation (EV) Certificate
> Guidelines
>>>>>      explicitly allow for multiple CN-IDs
>>>>>
>>>>>   2. It's a not-totally-uncommon current practice to have certs
> that do
>>>>> have
>>>>>      mutiple CN-IDs, eg from Comodo (whether EV or DV (domain
> valivdated)).
>>>>>
>>>>>   3. Virtual hosting multiple distinct-domain TLS servers on one
> entity is
>>>>>      difficult today if one desires wide desktop client support
> because
>>>>>      a certain vendor's older-but-still-widely-deployed-OS does not
> (yet?)
>>>>>      support the TLS Server Name Indication extension. Thus having one
>>>>>      cert with all the domains jammed in it (as either/both CN-IDs
> or/and
>>>>>      DNS-IDs) is a workaround (eg Content Delivery Networks use this).
>>>>>
>>>>>
>>>>> So some argue that if we MUST NOT multiple CN-IDs at this point, it is
>>>>> flying in the face of present reality and might contribute to
> acquiring
>>>>> an attained reputation for this BCP that is lower than we desire.
>>>>>
>>>>> There is also concern on the part of CA folk about client-side TLS
> libs
>>>>> and their support for name matching (ie some (old?) one(s) will only
>>>>> match on CN-ID).
>>>>>
>>>>> For a CA perspective on all the above, see...
>>>>>
>>>>> Re: [certid] weird CN-IDs (subjectCommonName) in SSL Labs Survey Data
>>>>> http://www.ietf.org/mail-archive/web/certid/current/msg00502.html
>>>>
>>>> +1 to all that.
>>>
>>> Putting an explanation such as the above in the document will help
> future
>>> IETFs to decide when to make this a MUST NOT. It might also help the
> CA/Browser
>>> Forum and specific CAs see that they should stop doing this ASAP, and
> maybe
>>> even convince a particular legacy OS vendor to support TLS SNI.
>>
>> Sigh. I don't particularly want to add a long informational note that
>> qualifies eight words in the spec, but you're right. :)
> 
> agreed.

Possible text for the Security Considerations:

###

5.4.  Multiple Identifiers

   This specification allows multiple DNS-IDs, SRV-IDs, or URI-IDs in a
   certificate, but discourages multiple CN-IDs.  The inclusion in the
   Common Name of multiple strings whose form matches that of a fully-
   qualified DNS domain name (e.g., "www.example.com") makes it more
   difficult to parse the Common Name and increases the likelihood of
   false positives in the identity verification process.  Although it
   would be preferable to forbid multiple CN-IDs entirely, there are
   several reasons why this specification states that they SHOULD NOT
   (instead of MUST NOT) be included:

   o  At least one significant technology community of interest
      explicitly allows multiple CN-IDs [EV-CERTS].

   o  At least one significant certification authority is known to issue
      certificates containing multiple CN-IDs.

   o  Many service providers often deem inclusion of multiple CN-IDs
      necessary in "virtual hosting" environments because at least one
      widely-deployed operating system does not yet support the Server
      Name Indication extension [TLS-EXT]

   It is hoped that the recommendation in this specification can be
   further tightened in the future.

###

To be referenced from bullet #6 in Section 3.1:

   6.  The certificate MAY contain more than one DNS-ID, SRV-ID, or
       URI-ID (but SHOULD NOT contain more than one CN-ID, as further
       explained under Section 5.4).

/psa