Re: Review of draft-saintandre-tls-server-id-check

Shumon Huque <shuque@isc.upenn.edu> Mon, 13 September 2010 16:52 UTC

Return-Path: <shuque@isc.upenn.edu>
X-Original-To: ietf@core3.amsl.com
Delivered-To: ietf@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id ECB6D3A6A11; Mon, 13 Sep 2010 09:52:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.639
X-Spam-Level:
X-Spam-Status: No, score=-3.639 tagged_above=-999 required=5 tests=[AWL=-1.040, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OLIgJf56RoN5; Mon, 13 Sep 2010 09:52:39 -0700 (PDT)
Received: from talkeetna.isc-net.upenn.edu (TALKEETNA.isc-net.upenn.edu [128.91.197.188]) by core3.amsl.com (Postfix) with ESMTP id 03E513A6A0C; Mon, 13 Sep 2010 09:52:34 -0700 (PDT)
Received: by talkeetna.isc-net.upenn.edu (Postfix, from userid 4127) id DE8112713; Mon, 13 Sep 2010 12:52:59 -0400 (EDT)
Date: Mon, 13 Sep 2010 12:52:59 -0400
From: Shumon Huque <shuque@isc.upenn.edu>
To: Peter Saint-Andre <stpeter@stpeter.im>
Subject: Re: Review of draft-saintandre-tls-server-id-check
Message-ID: <20100913165259.GA9709@isc.upenn.edu>
References: <20100908195349.GA4292@isc.upenn.edu> <C8ADC7ED.EBA4%stefan@aaa-sec.com> <20100909182253.GB3460@isc.upenn.edu> <4C8E4C6B.3040803@stpeter.im>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <4C8E4C6B.3040803@stpeter.im>
User-Agent: Mutt/1.4.2.1i
Organization: University of Pennsylvania
Cc: Bernard Aboba <bernard_aboba@hotmail.com>, IETF cert-based identity <certid@ietf.org>, ietf@ietf.org
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Sep 2010 16:52:45 -0000

On Mon, Sep 13, 2010 at 10:08:11AM -0600, Peter Saint-Andre wrote:
> On 9/9/10 12:22 PM, Shumon Huque wrote:
> > On Wed, Sep 08, 2010 at 11:08:29PM +0200, Stefan Santesson wrote:
> >> The only thing the client need to do is to verify that the domain name
> >> provided in the input to the lookup matches the host names provided in the
> >> output. It can then safely use the host names in the SRV record as reference
> >> identifiers IF the SRV-ID in the server certificate matches the the
> >> reference identifier.
> > 
> > This only works if the certificate matching rules say something 
> > like "match the SRVName AND also match the DNS resolved target
> > hostname in dNSName". If a client attempts to match _only_ the DNS 
> > resolved hostname without DNSSEC, there is a security problem.
> > 
> > The question is: what should the certificate matching rules say
> > when encountering a certificate with multiple identity types?
> > Right now the draft approximately says "find a match" (ie. find
> > ANY match), rather than match some logically AND'ed combination of 
> > identity types.
> > 
> >   http://tools.ietf.org/html/draft-saintandre-tls-server-id-check-09#section-4
> 
> Hi Shumon,
> 
> As I see it, this I-D is attempting to capture best current practices
> regarding the issuance and checking of certificates containing
> application server identities.

Yes, but whether they are actually "current" best practices is 
debatable. I certainly would like them to become best practices.
For example I don't believe any existing commercial CAs issue 
certificates with the SRVName or URI SAN name forms.

> Do we have evidence that any existing
> certification authorities issue certificates containing both an SRVname
> for the source domain (e.g., example.com) and dNSName for the target
> domain (e.g., apphosting.example.net)? Do we have evidence that any
> existing application clients perform such checks? If not, I would
> consider such complications to be out of scope for this I-D.

I think the question is whether we have examples of applications 
that need to verify "combinations" of subjectaltname name forms in 
certificates. Stefan says there are, but so far no-one has offered
up any public specifications of such apps. So, I think until we 
have them, I agree we can defer considerations of them to future 
documents.

I think it's reasonable for this draft to consider multiple identity
types in certificates (eg. common name, dNSName, SRVName) with the
current matching rules of ANY. This might be needed to gradually
transition an app from validating a host specific identity to an
application specific identity. The current draft allows this.

> That said, we need to be aware that if such usage arises in the future,
> someone might write a document that updates or obsoletes this I-D; in
> fact the present authors very much expect that such documents will
> emerge after the Internet community (specifically certification
> authorities, application service providers, and application client
> developers) have gained more experience with PKIX certificates in the
> context of various application technologies.

Sounds reasonable.

> Peter Saint-Andre
> https://stpeter.im/
> 

-- 
Shumon Huque
University of Pennsylvania.