Re: [CHANNEL-BINDING] TLS endpoint channel bindings in SCRAM

Nicolas Williams <Nicolas.Williams@sun.com> Fri, 03 April 2009 15:03 UTC

Return-Path: <Nicolas.Williams@sun.com>
X-Original-To: channel-binding@core3.amsl.com
Delivered-To: channel-binding@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3EF313A683F for <channel-binding@core3.amsl.com>; Fri, 3 Apr 2009 08:03:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.798
X-Spam-Level:
X-Spam-Status: No, score=-5.798 tagged_above=-999 required=5 tests=[AWL=0.248, BAYES_00=-2.599, HELO_MISMATCH_COM=0.553, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CiGrb5fSeAWO for <channel-binding@core3.amsl.com>; Fri, 3 Apr 2009 08:03:49 -0700 (PDT)
Received: from sca-ea-mail-2.sun.com (sca-ea-mail-2.Sun.COM [192.18.43.25]) by core3.amsl.com (Postfix) with ESMTP id 953183A68DF for <channel-binding@ietf.org>; Fri, 3 Apr 2009 08:03:45 -0700 (PDT)
Received: from dm-central-01.central.sun.com ([129.147.62.4]) by sca-ea-mail-2.sun.com (8.13.7+Sun/8.12.9) with ESMTP id n33F4mjg025783 for <channel-binding@ietf.org>; Fri, 3 Apr 2009 15:04:48 GMT
Received: from binky.Central.Sun.COM (binky.Central.Sun.COM [129.153.128.104]) by dm-central-01.central.sun.com (8.13.8+Sun/8.13.8/ENSMAIL, v2.2) with ESMTP id n33F4lZX060615 for <channel-binding@ietf.org>; Fri, 3 Apr 2009 09:04:47 -0600 (MDT)
Received: from binky.Central.Sun.COM (localhost [127.0.0.1]) by binky.Central.Sun.COM (8.14.3+Sun/8.14.3) with ESMTP id n33Elwmt002627; Fri, 3 Apr 2009 09:47:58 -0500 (CDT)
Received: (from nw141292@localhost) by binky.Central.Sun.COM (8.14.3+Sun/8.14.3/Submit) id n33Elqwb002626; Fri, 3 Apr 2009 09:47:52 -0500 (CDT)
X-Authentication-Warning: binky.Central.Sun.COM: nw141292 set sender to Nicolas.Williams@sun.com using -f
Date: Fri, 03 Apr 2009 09:47:52 -0500
From: Nicolas Williams <Nicolas.Williams@sun.com>
To: Pasi.Eronen@nokia.com
Message-ID: <20090403144752.GT1500@Sun.COM>
References: <5690.1237934257.266964@peirce.dave.cridland.net> <20090401225220.GA1500@Sun.COM> <808FD6E27AD4884E94820BC333B2DB7727F21CDF28@NOK-EUMSG-01.mgdnok.nokia.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <808FD6E27AD4884E94820BC333B2DB7727F21CDF28@NOK-EUMSG-01.mgdnok.nokia.com>
User-Agent: Mutt/1.5.7i
Cc: lzhu@windows.microsoft.com, channel-binding@ietf.org, stefans@microsoft.com, Mark.Novak@microsoft.com, ietf-sasl@imc.org, dave@cridland.net, paulle@windows.microsoft.com, kdamour@microsoft.com, jaltman@secure-endpoints.com, hartmans-ietf@mit.edu
Subject: Re: [CHANNEL-BINDING] TLS endpoint channel bindings in SCRAM
X-BeenThere: channel-binding@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of channel binding IANA registry requests and specifications <channel-binding.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/channel-binding>, <mailto:channel-binding-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/channel-binding>
List-Post: <mailto:channel-binding@ietf.org>
List-Help: <mailto:channel-binding-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/channel-binding>, <mailto:channel-binding-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Apr 2009 15:03:50 -0000

On Fri, Apr 03, 2009 at 02:33:47PM +0200, Pasi.Eronen@nokia.com wrote:
> Nicolas Williams wrote:
> 
> > Questions:
> > 
> > 1) Do many/most/all TLS implementations output the DER-encoded form of
> >    the server cert?  Which ones do/don't?
> > 
> > 2) Is the cert used on the wire generally NOT DER-encoded?  If so, how
> >    hard would it be to change this?  (e.g., re-encode the cert and
> >    restart apps?)
> 
> Although the TLS spec doesn't explicitly say this, the on-the-wire
> certificate is DER encoded. There's no field specifying what the
> encoding is, so if you attempt sending PER or XER, it simply won't
> work.

Right, I doubt anyone re-encodes certs in PER or XER :)

It's BER that one should worry about.

> Some implementations might accept some limited subset of BER (to
> work around CA bugs), but even in those cases, nobody's going to
> re-encode it to DER (most likely the CA calculated the signature over
> BER encoded version -- violating all possible standards -- and the
> API would return the octets sent on the wire).

OK, thanks.

> So I don't see any problem in using the tls-server-end-point channel
> binding...

Excellent.  Thanks!

>            (and it seems it would work for OpenPGP, too)

It could be made to, but tls-server-end-point refers to the first cert
in the 'certificate_list' field of the server's Certificate message --
there's no such field in the OpenPGP case.  It'd be a trivial updat to
tls-server-end-point to allow the use of a server's OpenPGP cert though.

Nico
--