Re: [certid] Name constraints and legacy clients

Paul Tiemann <paul.tiemann.usenet@gmail.com> Mon, 04 October 2010 13:47 UTC

Return-Path: <paul.tiemann.usenet@gmail.com>
X-Original-To: certid@core3.amsl.com
Delivered-To: certid@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3B9CF3A6F92 for <certid@core3.amsl.com>; Mon, 4 Oct 2010 06:47:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X1y6JSEu4PP0 for <certid@core3.amsl.com>; Mon, 4 Oct 2010 06:47:37 -0700 (PDT)
Received: from mail-pw0-f44.google.com (mail-pw0-f44.google.com [209.85.160.44]) by core3.amsl.com (Postfix) with ESMTP id 52D953A6C91 for <certid@ietf.org>; Mon, 4 Oct 2010 06:47:37 -0700 (PDT)
Received: by pwi3 with SMTP id 3so1758256pwi.31 for <certid@ietf.org>; Mon, 04 Oct 2010 06:48:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:subject:mime-version :content-type:from:in-reply-to:date:cc:content-transfer-encoding :message-id:references:to:x-mailer; bh=c8QTG5N2YTGJWK82wcD3NM3ds6rGgOik86lDQYOM12Q=; b=hZsf90w15hebnPLBtssm2NG9Ni3RMv1y0wpcxrfeUfHM0Nn8LgyDNFgLpgrOFp5BmR B/r+Flqt5Z2yeSsUTmPzhURJQ6XK3icNWo5ShJWyM/XGdCNVSrpvJLnEJV3xkXAe1Z8q D/bbryg6nkubXwjUig/HDlqCkBcUopZ5PLk1w=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=subject:mime-version:content-type:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to:x-mailer; b=D+Ml2f3KRVl66KhA+xbjiuNW3xCaJDiyLlpzsIvjWFAXrrE/0t2M/ReIzdwjlqh8wc VvyiiDbhw/0MBp3bBhqlezQoEMJjPeqNadb8OT2XvN9N6I6rCsS7h+0KsrO2/eGZwcxf kSV46C/RDHd33KlCFP3L342hGZnmfEPnWJjGk=
Received: by 10.142.135.17 with SMTP id i17mr8595266wfd.278.1286199950646; Mon, 04 Oct 2010 06:45:50 -0700 (PDT)
Received: from [10.0.10.100] (c-174-52-143-18.hsd1.ut.comcast.net [174.52.143.18]) by mx.google.com with ESMTPS id x8sm4819880wff.11.2010.10.04.06.45.49 (version=TLSv1/SSLv3 cipher=RC4-MD5); Mon, 04 Oct 2010 06:45:50 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1081)
Content-Type: text/plain; charset=us-ascii
From: Paul Tiemann <paul.tiemann.usenet@gmail.com>
In-Reply-To: <1286160611.14732.125.camel@mattlaptop2.local>
Date: Mon, 4 Oct 2010 07:45:48 -0600
Content-Transfer-Encoding: quoted-printable
Message-Id: <E1699FD9-14C4-4BF0-9798-893C414F85E3@gmail.com>
References: <201006301746.o5UHkIsE019133@fs4113.wdf.sap.corp> <4C2B843A.5010206@stpeter.im> <4C305B93.9090001@velox.ch> <201007061435.29786.ludwig.nussel@suse.de> <4C335CE5.1090608@edelweb.fr> <4C3421B3.3070404@velox.ch> <4C3B4F6E.80903@stpeter.im> <4C3DDC18.4020808@bolyard.me> <4C3E979B.4050401@velox.ch> <AANLkTil-6PZ4iAE9SfysI3AuIjam40xbN8DywgLOMwI0@mail.gmail.com> <1286160611.14732.125.camel@mattlaptop2.local>
To: Matt McCutchen <matt@mattmccutchen.net>
X-Mailer: Apple Mail (2.1081)
Cc: certid@ietf.org
Subject: Re: [certid] Name constraints and legacy clients
X-BeenThere: certid@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Representation and verification of identity in certificates <certid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/certid>
List-Post: <mailto:certid@ietf.org>
List-Help: <mailto:certid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/certid>, <mailto:certid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Oct 2010 13:47:39 -0000

On Oct 3, 2010, at 8:50 PM, Matt McCutchen wrote:

> On Fri, 2010-07-16 at 12:02 -0600, Paul Tiemann wrote:
>> On the topic of name constraints: What if there are ways to push Name
>> Constraints forward without necessarily having to wait for all legacy
>> clients to die and all the niche clients to become compatible?  Here's
>> one idea (admittedly not past v0.1 in my head)
>> 
>> 1) Have the major browser vendors add a small mechanism to detect
>> certificates with Name Constraint violations, and give them a central,
>> automated way to "report" a certificate found with violated name
>> constraints which might pose a risk for all the non-compliant browsers
>> and clients.  With something like that in place, the major browsers
>> will be able to handle name constraints correctly, and the constraints
>> policing feature would help to erase the incentive that the operator
>> of a constrained CA certificate would have for violating the
>> constraints to trick legacy devices.  
>> 2) NetCraft could possibly help with Name Constraints monitoring, at
>> least for the public internet.
> 
> And at this point it becomes safe to give someone we don't fully trust a
> name-constrained intermediate certificate?  I'm skeptical.  An attacker
> may be able to target some subset of legacy clients with a false
> certificate (by source IP address or ClientHello content) without ever
> sending the certificate to a violation-reporting client and thereby
> evade detection.

Here's my cue to admit that I didn't think too long about that kind of risk before sending it out.  

Just to be clear about my intent: DigiCert hasn't ever issued an intermediate cert to an external entity, and we've never yet had any interest in issuing name-constrained intermediate certs either.  "Trust is good, but control is better."  This was just part of a thread where Name Constraints were being discussed, and I thought I'd go ahead and toss out some ideas about Name Constraints while I was at it. 

> Another approach is to have name-constrained intermediate certificates
> include a critical extension that means "name constraints must be
> applied to the CN-ID".  EE certificates under such an intermediate
> certificate will only be accepted by clients that properly enforce the
> name constraints.  An organization could use a name-constrained
> intermediate certificate for servers that don't need to support legacy
> clients and get a certificate directly from a public CA for servers that
> do.  I previously proposed this here:
> 
> https://bugzilla.mozilla.org/show_bug.cgi?id=554442

Hmm, my guess is that there won't be enough demand for an intermediate cert that causes all legacy browsers to choke.  (Not enough demand for a CA to want to build it is what I'm guessing...)

Paul Tiemann
CTO, DigiCert