Re: criticality conformance

Mark S Feldman <feldman@tis.com> Fri, 17 May 1996 17:07 UTC

Received: from ietf.cnri.reston.va.us by IETF.CNRI.Reston.VA.US id aa18985; 17 May 96 13:07 EDT
Received: from CNRI.Reston.VA.US by IETF.CNRI.Reston.VA.US id aa18980; 17 May 96 13:07 EDT
Received: from neptune.tis.com by CNRI.Reston.VA.US id aa11746; 17 May 96 13:07 EDT
Received: from neptune.tis.com by neptune.TIS.COM id aa03286; 17 May 96 12:46 EDT
Received: from relay.tis.com by neptune.TIS.COM id aa03240; 17 May 96 12:35 EDT
Received: by relay.tis.com; id MAA14245; Fri, 17 May 1996 12:37:14 -0400
Received: from sol.tis.com(192.33.112.100) by relay.tis.com via smap (V3.1) id xma014232; Fri, 17 May 96 12:36:52 -0400
Received: from pulsar.tis.com by tis.com (4.1/SUN-5.64) id AA08176; Fri, 17 May 96 12:37:04 EDT
Message-Id: <9605171637.AA08176@tis.com>
To: peter@verisign.com
Cc: pem-dev@tis.com, feldman@tis.com, solo@bbn.com, hoa@rsa.com
MMDF-Warning: Unable to confirm address in preceding line at neptune.TIS.COM
MMDF-Warning: Unable to confirm address in preceding line at neptune.TIS.COM
Subject: Re: criticality conformance
In-Reply-To: Your message of "Thu, 16 May 1996 15:16:11 PDT." <319BA92B.49C5@verisign.com>
Mime-Version: 1.0
Content-Type: multipart/signed; protocol="application/moss-signature"; micalg="md5"; boundary="----- =_aaaaaaaaaa0"
Date: Fri, 17 May 1996 12:39:28 -0400
Sender: ietf-archive-request@IETF.CNRI.Reston.VA.US
From: Mark S Feldman <feldman@tis.com>
X-Orig-Sender: pem-dev-approval@neptune.tis.com
Precedence: bulk

...
> Perhaps you live in a different, safe and secure R&D/defense world to me.  

No, I think we all pretty much live in the same world:-)

...
> Extension contents has become the battleground in the
> certificate-based application market. Whose definitions will win
> is...a platform war prediction. However there may be a technology
> solution available. At this stage in the game, however, too much is
> being earned by having the proprietary extensions war; so its unlikely
> to see light of day! Such is the nature of open standards; they
> intefere with profit!

I see no problem with application-specific extensions, even
proprietary ones, as long as they do not make the certificates
unusable for other purposes.  In the end, and it may take some time,
if vendors make incompatible changes to what they advertised as X.509
certificates to "hook" users, the users will revolt.  Making a profit
with open standards is a different game, but it is still winnable.

I see two uses of certificates evolving:

1) Application-specific certificates.  They may be perfectly valid
X.509v3, but they are linked back to a special, limited purpose root
or they have special extensions, perhaps carrying information not
available elsewhere.  These certificates are proprietary black boxes.
They could just as well be something other than X.509 certificates,
but the application authors chose X.509 as an expedient, marketing
ploy, what have you.

2) Identity certificates that are of general use.  More or less the
original PEM model.  The problem here is the lack of infrastructure.
This has largely been bypassed in the rush for (1) above.  Separate
mechanisms will map identity to authority, privilege, etc.

> A solution is to have a cert contain [a] content schema rule[s], in
> which for each supported object class (where the class notion is
> applied to cert extn types), the various extensions pertaining to that
> class are flagged - madatory/optional/required as appropriate to the
> application which will use these extensions, for some purpose. The
> application will choose which object classes it wishes to process from
> those present in the cert (ignoring others classes, with their
> critical or otherwise extension values).

In the end, isn't the application granting a privilege the sole
arbiter of the validity of a certificate?  Maybe, as I said
previously, "validity" is the wrong word.  A certificate may be
perfectly valid in the X.509 sense, but it may not be "valid for a
particular purpose."  

I may use VeriSign as my root and I may be able to validate your
certificate back to VeriSign, but that does not mean that you may log
into my computer.  The certificate-based challenge-response login in
my computer is basing its decision on the validity of the certificate
in the X.509 sense and the distinguished name, issuername/serial
number, or some such.  Such a decision could also be made based on
non-critical extensions.  Should there be a "valid for login to TIS
systems" extension and should I believe it if I find it in your
otherwise valid certificate?  My responses is "No and no."

> This notion replaces the criticality notion; which turns out to be
> effectively useless, as we have now seen 3 experts say in ietf-pkix.
> (It also makes the cert an effective application enabling capability
> versus a mere digital id.)

A specific extensions can easily be critical or non-critical in all
cases.  Being able to say otherwise in the certificate with the
criticality flag creates confusion (I think this is similar to your
original question).  It is a shame that the OID space for extensions
can't be divided into critical and non-critical (say, even and odd),
creating an atomic bond between the extension and its criticality -- no
need for external, possibly ambiguous, rules identifying extensions as
critical or not.

  Mark

====
Trusted Information Systems, Inc.                Phone: +1 301 854 6889
3060 Washington Road                            Direct: +1 301 854 5704
Glenwood, Maryland 21738                           FAX: +1 301 854 5363