Re: [Emu] Idea: New X509 Extension for securing EAP-TLS

Dan Harkins <dharkins@lounge.org> Tue, 19 November 2019 00:39 UTC

Return-Path: <dharkins@lounge.org>
X-Original-To: emu@ietfa.amsl.com
Delivered-To: emu@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E6D17120125 for <emu@ietfa.amsl.com>; Mon, 18 Nov 2019 16:39:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2X_9KYtFBCXY for <emu@ietfa.amsl.com>; Mon, 18 Nov 2019 16:39:12 -0800 (PST)
Received: from www.goatley.com (www.goatley.com [198.137.202.94]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0C92612006F for <emu@ietf.org>; Mon, 18 Nov 2019 16:39:11 -0800 (PST)
Received: from trixy.bergandi.net (cpe-76-93-158-174.san.res.rr.com [76.93.158.174]) by wwwlocal.goatley.com (PMDF V6.8-0 #1001) with ESMTP id <0Q1600DE8XTBKN@wwwlocal.goatley.com> for emu@ietf.org; Mon, 18 Nov 2019 18:39:11 -0600 (CST)
Received: from dhcp-9ca5.meeting.ietf.org ([31.133.156.165]) by trixy.bergandi.net (PMDF V6.7-x01 #1001) with ESMTPSA id <0Q16000GFXOTDK@trixy.bergandi.net> for emu@ietf.org; Mon, 18 Nov 2019 16:36:31 -0800 (PST)
Received: from dhcp-9ca5.meeting.ietf.org ([31.133.156.165] EXTERNAL) (EHLO dhcp-9ca5.meeting.ietf.org) with TLS/SSL by trixy.bergandi.net ([10.0.42.18]) (PreciseMail V3.3); Mon, 18 Nov 2019 16:36:31 -0800
Date: Mon, 18 Nov 2019 16:39:07 -0800
From: Dan Harkins <dharkins@lounge.org>
In-reply-to: <CB7B2197-7984-4EB0-95CB-1BDCD701E3DE@deployingradius.com>
To: Alan DeKok <aland@deployingradius.com>
Cc: emu@ietf.org
Message-id: <339ba466-d24c-6950-3271-68dc71cfcba8@lounge.org>
MIME-version: 1.0
Content-type: text/plain; charset="utf-8"; format="flowed"
Content-language: en-US
Content-transfer-encoding: 8bit
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0) Gecko/20100101 Thunderbird/68.2.2
X-PMAS-SPF: SPF check skipped for authenticated session (recv=trixy.bergandi.net, send-ip=31.133.156.165)
X-PMAS-External-Auth: dhcp-9ca5.meeting.ietf.org [31.133.156.165] (EHLO dhcp-9ca5.meeting.ietf.org)
References: <102dd850-b1ae-3426-8189-45876b7b419d@uni-bremen.de> <04E2AEF5-F1EE-4B74-B5BB-DFE099543C92@vigilsec.com> <D735A4DB-1CFB-4DF4-ACB7-BC6EFDBC6CDE@deployingradius.com> <E0B8DAA7-8C7C-455F-B5BE-128670A093D3@vigilsec.com> <BD30A64D-539C-422D-9413-880AF8D6A16F@deployingradius.com> <8147b718-23d6-07de-a565-08bcc8148095@uni-bremen.de> <MN2PR11MB3901077F38165EE241D30BC5DB740@MN2PR11MB3901.namprd11.prod.outlook.com> <08da27e5-518e-b6a4-a97a-b4ae9c32ed00@uni-bremen.de> <46C8D8C4-7317-47F3-8F9B-6C56F7B7FEE9@vigilsec.com> <F45360DB-D474-4600-BEFD-3C844FA4CB0A@deployingradius.com> <AT5PR8401MB05309002D11E8AEF1018D250DB770@AT5PR8401MB0530.NAMPRD84.PROD.OUTLOOK.COM> <9907D136-C262-48BC-8630-0EABC0EB97F5@deployingradius.com> <c54e1c65-8600-9b36-5b97-7c1425a82fc3@lounge.org> <CB7B2197-7984-4EB0-95CB-1BDCD701E3DE@deployingradius.com>
X-PMAS-Software: PreciseMail V3.3 [191118] (trixy.bergandi.net)
X-PMAS-Allowed: system rule (rule allow header:X-PMAS-External noexists)
Archived-At: <https://mailarchive.ietf.org/arch/msg/emu/ABtv1kwEdvG_bmoxOjwq1HC8EXw>
Subject: Re: [Emu] Idea: New X509 Extension for securing EAP-TLS
X-BeenThere: emu@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "EAP Methods Update \(EMU\)" <emu.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/emu>, <mailto:emu-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/emu/>
List-Post: <mailto:emu@ietf.org>
List-Help: <mailto:emu-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/emu>, <mailto:emu-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Nov 2019 00:39:17 -0000

On 11/18/19 3:42 PM, Alan DeKok wrote:
> On Nov 18, 2019, at 6:22 PM, Dan Harkins <dharkins@lounge.org> wrote:
>> On 11/12/19 3:40 PM, Alan DeKok wrote:
>>> On Nov 12, 2019, at 3:13 PM, Cappalli, Tim (Aruba) <timc@hpe.com> wrote:
>>>> How does a public CA prove ownership of an SSID?
>>>    Do public CAs *always* verify addresses and/or telephone numbers, which are normally included in certificates?
>>>
>>>    Do public CAs verify that email addresses in the certificate work?
>>>
>>>    Do public CAs verify that the OIDs in the certificate match the intended use-cases?
>>>
>>>    Is there a global registry of SSIDs which the public CA could use to verify the SSID?
>>    I'm taking these as rhetorical questions with an implied "no". If that is
>> not the correct way of taking them then please let me know.
>    The implication is that many of them are "no".  Some are "yes".  Some *should* be "yes", and are in practice often "no".
>
>>    So the issue is, if the CA does not check any of these things then you cannot
>> trust them in the certificate.
>    What happens if the CA checks some things, and not others?

   Then it means the CA is certifying things it shouldn't.

>> The reason you trust the contents of a certificate
>> is because you trust the CA has done the appropriate due diligence to validate
>> the stuff it is certifying. If a CA doesn't do the due diligence on any of the
>> above stuff and still issues a certificate containing that stuff then I would
>> question the integrity of the CA and probably not trust other things it is
>> certifying. In other words, I'd probably remove that CA's cert from my TADB.
>    That's up to you.

   Let me put it another way. There is no reason to trust a CA that does 
not perform
due diligence on the things it certifies. Convince me otherwise.

>>>    To put it another way, I'm not sure why this question is being posed.
>>    Here's one: Why would you trust an attribute that was not validated?
>    Define "validation" :)

   I'll pass on playing that game.

>    If the certificate contains an NAIRealm OID, then I know how the CA should validate it: check that the realm matches the domain.
>
>    For SSIDs, since there's no registry, it's not possible to "validate" it against a registry.  So "validation" here means... what, exactly?
>
>    My point for SSIDs is that validation means whatever we define it to mean.  So long as everyone agrees that the SSID field is a hint and is not validated by the CA, it's OK to use it.

   Use it how? What value do you put in an attribute that hasn't been 
validated (and
don't ask me what that word means since you used it)?


>    In addition, CAs currently validate *control* of a domain.  But they don't (and can't) really validate *ownership* as such.  i.e. if I own a company, I can tell an employee to ask a CA for certificates for that domain.  He may be making that request, even if he doesn't "own" the domain.  He can convince the CA that he controls the domain.  I'm not sure how the CA would check that the owner of the domain has properly delegated the certificate request to the employee.

   Then what you can infer from a domain name in a certificate issued by 
such a CA
is that the holder of the corresponding private key controls that 
domain. Nothing
more, nothing less. But you can't infer anything from other attributes 
that have not
been validated (again, using a word you used yourself)

>    The same applies for telephone numbers.  Do CAs call the numbers?  Do they check that the person answering is the same person who made the request?  Maybe.

   You tell me if a CA "calls the numbers". If it doesn't then what can 
you infer
from a telephone number in a certificate it signs?


>    These issues can't be answered with simple black & white statements.  If the data in a certificate is imperfect, it might still be useful.

   OK, convince me of its utility.

   Dan.