Re: [certid] Bad certificate handling
=JeffH <Jeff.Hodges@KingsMountain.com> Fri, 24 September 2010 19:32 UTC
Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id A5DD43A6B66 for <certid@core3.amsl.com>;
Fri, 24 Sep 2010 12:32:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.116
X-Spam-Level:
X-Spam-Status: No, score=-102.116 tagged_above=-999 required=5 tests=[AWL=0.149,
BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HTBmw8nYC0Fn for
<certid@core3.amsl.com>; Fri, 24 Sep 2010 12:32:21 -0700 (PDT)
Received: from cpoproxy3-pub.bluehost.com (cpoproxy3-pub.bluehost.com
[67.222.54.6]) by core3.amsl.com (Postfix) with SMTP id 6B3943A6978 for
<certid@ietf.org>; Fri, 24 Sep 2010 12:32:21 -0700 (PDT)
Received: (qmail 17670 invoked by uid 0); 24 Sep 2010 19:32:53 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by
cpoproxy3.bluehost.com with SMTP; 24 Sep 2010 19:32:53 -0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=kingsmountain.com;
h=Received:Message-ID:Date:From:User-Agent:MIME-Version:To:Subject:Content-Type:Content-Transfer-Encoding:X-Identified-User;
b=DGGwk/ylIU3sQahFQQLjqqunnurrQDrBZETPBvzBIbfqTKKwx0dr1N7y6vspLam0c9mpt+6YFj7lZTi68giYYtpOHMhUcNZW0KnZoKOG9Ej3W1eYl8JXDeDxPL32cXED;
Received: from outbound4.ebay.com ([216.113.168.128] helo=[10.244.48.179]) by
box514.bluehost.com with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.69)
(envelope-from <Jeff.Hodges@KingsMountain.com>) id 1OzE0r-0001Pj-2k for
certid@ietf.org; Fri, 24 Sep 2010 13:32:53 -0600
Message-ID: <4C9CFCE4.1050801@KingsMountain.com>
Date: Fri, 24 Sep 2010 12:32:52 -0700
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Thunderbird 2.0.0.24 (X11/20100411)
MIME-Version: 1.0
To: IETF cert-based identity <certid@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com}
{sentby:smtp auth 216.113.168.128 authed with jeff.hodges+kingsmountain.com}
Subject: Re: [certid] Bad certificate handling
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates
<certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>,
<mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Sep 2010 19:32:22 -0000
matt@mattmccutchen.net said: > On Wed, 2010-09-22 at 09:59 -0600, Peter Saint-Andre wrote: > > The part of the text that you have not quoted does say that this > > practice is typically offered only to advanced users (and I don't think > > that Barry's mother counts as an advanced user). However, we've > > provisionally made the text even more scary, as follows: > > > > Security Note: Some existing interactive user agents give advanced > > users the option of proceeding despite an identity mismatch. > > Although this behavior can be appropriate in certain specialized > > circumstances, in general it needs to be exposed only to advanced > > users and even then needs to be handled with extreme caution, for > > example by first encouraging even an advanced user to terminate > > the connection and, if the advanced user chooses to proceed > > anyway, by forcing the user to view the entire certification path > > and only then allowing the user to accept the certificate on a > > temporary basis (i.e., for this connection attempt and all > > subsequent connection attempts for the life of the application > > session, but not for connection attempts during future application > > sessions). > > > > Jeff still needs to review that text before we finalize it. > > There is a trade-off in making the acceptance temporary. ... > > The current remark about temporary acceptance might suggest to readers > that it is better than permanent acceptance, which is at best an > oversimplification and possibly untrue. Thus, I propose that the remark > be removed. agreed. Jhutz also suggested such. > Separately, I wonder if it makes sense for server-id-check to > specifically discuss the handling of certificates that don't match a > reference identifier when the considerations are essentially the same > for certificates with other problems (most commonly, expired or > untrusted issuer) and, indeed, modern browsers tend to provide a single > UI for these three most common problems. I'm not sure where would be > the right place to standardize handling of bad certificates in general. > There is a W3C document, but it only applies to interactive user agents: > > http://www.w3.org/TR/wsc-ui/ [WSC-UI] Which is entitled: "Web Security Context: User Interface Guidelines" Note that we already cite this doc (tho we need to update our cite because it is now a Recommendation). In any case, this is a good catch, thanks. In reading WSC-UI, it appears to overall address our needs for more full explanation of interactive user agent behavior in error condition cases (although it doesn't differentiate between "pinning" a cert temporarily vs permanently). Given all this, I suggest we change the last part of the last sentence of the "Security Note" quoted above to something like.. ..., by forcing the user to view the entire certification path and only then allowing the user to choose whether to accept the certificate on a temporary or permanent basis. See [WSC-UI] for further guidance. ..and leave it at that in -tls-server-id-check. We should also consider making [WSC-UI] a normative reference now that it is at Recommendation maturity level. =JeffH
- Re: [certid] Bad certificate handling =JeffH
- Re: [certid] Bad certificate handling Matt McCutchen
- Re: [certid] Bad certificate handling =JeffH
- Re: [certid] Bad certificate handling Martin Rex
- Re: [certid] Bad certificate handling Matt McCutchen
- Re: [certid] Bad certificate handling Matt McCutchen
- Re: [certid] Bad certificate handling Jeffrey A. Williams
- Re: [certid] Bad certificate handling Martin Rex
- Re: [certid] Bad certificate handling ArkanoiD
- Re: [certid] Bad certificate handling =JeffH
- Re: [certid] Bad certificate handling Peter Saint-Andre