Re: Review of draft-saintandre-tls-server-id-check

Peter Saint-Andre <stpeter@stpeter.im> Mon, 13 September 2010 18:48 UTC

Return-Path: <stpeter@stpeter.im>
X-Original-To: ietf@core3.amsl.com
Delivered-To: ietf@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A786B3A6A8D; Mon, 13 Sep 2010 11:48:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.53
X-Spam-Level:
X-Spam-Status: No, score=-102.53 tagged_above=-999 required=5 tests=[AWL=0.069, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yXzgs1-D48cm; Mon, 13 Sep 2010 11:48:32 -0700 (PDT)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 62F963A6A21; Mon, 13 Sep 2010 11:48:32 -0700 (PDT)
Received: from dhcp-64-101-72-245.cisco.com (dhcp-64-101-72-245.cisco.com [64.101.72.245]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id C3FE9400EE; Mon, 13 Sep 2010 12:53:03 -0600 (MDT)
Message-ID: <4C8E7218.6010204@stpeter.im>
Date: Mon, 13 Sep 2010 12:48:56 -0600
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.12) Gecko/20100824 Thunderbird/3.0.7
MIME-Version: 1.0
To: Dave Cridland <dave@cridland.net>
Subject: Re: Review of draft-saintandre-tls-server-id-check
References: <20100908195349.GA4292@isc.upenn.edu> <C8ADC7ED.EBA4%stefan@aaa-sec.com> <20100909182253.GB3460@isc.upenn.edu> <4C8E4C6B.3040803@stpeter.im> <20100913165259.GA9709@isc.upenn.edu> <8252.1284397511.595153@puncture>
In-Reply-To: <8252.1284397511.595153@puncture>
X-Enigmail-Version: 1.0.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Cc: Bernard Aboba <bernard_aboba@hotmail.com>, IETF cert-based identity <certid@ietf.org>, IETF-Discussion <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Sep 2010 18:48:33 -0000

On 9/13/10 11:05 AM, Dave Cridland wrote:
> On Mon Sep 13 17:52:59 2010, Shumon Huque wrote:
>> Yes, but whether they are actually "current" best practices is
>> debatable. I certainly would like them to become best practices.
>> For example I don't believe any existing commercial CAs issue
>> certificates with the SRVName or URI SAN name forms.
>>
>>
> They do, I've seen sRVName SANs in some XMPP server certificates.
> 
> 
>> > Do we have evidence that any existing
>> > certification authorities issue certificates containing both an SRVname
>> > for the source domain (e.g., example.com) and dNSName for the target
>> > domain (e.g., apphosting.example.net)? Do we have evidence that any
>> > existing application clients perform such checks? If not, I would
>> > consider such complications to be out of scope for this I-D.
>>
>> I think the question is whether we have examples of applications
>> that need to verify "combinations" of subjectaltname name forms in
>> certificates. Stefan says there are, but so far no-one has offered
>> up any public specifications of such apps. So, I think until we
>> have them, I agree we can defer considerations of them to future
>> documents.
>>
>> I think it's reasonable for this draft to consider multiple identity
>> types in certificates (eg. common name, dNSName, SRVName) with the
>> current matching rules of ANY. This might be needed to gradually
>> transition an app from validating a host specific identity to an
>> application specific identity. The current draft allows this.
>>
>>
> Isode M-Link will check xmppAddr and dNSName (and I'll add in sRVName
> soonish, and possibly URI). If no SANs of a supported type exist, then
> it will fall back to a CN match.
> 
> It will not check the dNSName against the result of a SRV DNS lookup,
> ever, nor will it check a dNSName if it has already found a matching
> xmppAddr (nor vice-versa). As such it's not checking combinations of SANs.
> 
> Looking at the draft, it seems to read that I should check dNSName
> first, and then, only if this matches, check xmppAddr or sRVName. This
> seems odd - sRVName and xmppAddr (and URI) all contain a superset of the
> data contained, so why look at dNSName if a more specific match exists?

Earlier versions of this draft had somewhat elaborate rules about
ordering of reference identifiers. Those rules were removed in -09
because folks on the certid@ietf.org list argued persuasively that they
were not necessary because "first match wins" is good enough. Naturally,
an implementation might have a preference order of reference
identifiers, but such an order is not mandated by this I-D.

Peter

-- 
Peter Saint-Andre
https://stpeter.im/