[pkix] Re: Name constraints in certificates
Phillip Hallam-Baker <phill@hallambaker.com> Fri, 15 November 2024 19:20 UTC
Return-Path: <hallam@gmail.com>
X-Original-To: pkix@ietfa.amsl.com
Delivered-To: pkix@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 536D8C090370 for <pkix@ietfa.amsl.com>; Fri, 15 Nov 2024 11:20:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.652
X-Spam-Level:
X-Spam-Status: No, score=-1.652 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.001, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.25, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3K0SU8OWvy11 for <pkix@ietfa.amsl.com>; Fri, 15 Nov 2024 11:20:49 -0800 (PST)
Received: from mail-qv1-f51.google.com (mail-qv1-f51.google.com [209.85.219.51]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D8290C20C8FD for <pkix@ietf.org>; Fri, 15 Nov 2024 11:20:49 -0800 (PST)
Received: by mail-qv1-f51.google.com with SMTP id 6a1803df08f44-6cbd550b648so39476d6.0 for <pkix@ietf.org>; Fri, 15 Nov 2024 11:20:49 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1731698449; x=1732303249; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=BhwJJpJbUmKTtO7XIs18C7SORv+ysOFPU60gbQ1LUbU=; b=jftTHCv+nbdi81J24+uCFcBXKEVBFuqKiZQXaLWWuthjqpsgUGAM3Ug4KiM8+dGhh/ a5YP1KL9m0Jf9mlqQiOMmPQL5ucEp/0+cemhbdLKHBvfhCHVKIuQjJvUIcx/q+0jM9p/ ii3CX2UKBWB16HvStaCgMGHPM3a8HgByZsEJO7uC8GcwpyECQQJwq3xXRI3NhcorTb2R GerxP6v7sqwqTXQD0dKc+mjwSNYjjV5Fxzc94CDjRizDIa5vZggy65IGccYjlzRprfWq jIlxOb05oFcTJKn1xjvB5bEpK8Ha9VP4zrEym+SrNF/PAHs/8xvoYL/DAql7TxuoomWG S2CA==
X-Gm-Message-State: AOJu0YwlkHnlCcqIWpC2LbsQJe7GqGJFgxTlbGfTSGbTVaxFUzC28LLe vNoYoWblZSJZB36LL4xDs1mmlGry62EPix2h9oLoAmkB42rPWIIgf6EWAHYgwRTKlGjZjtzW3eg Mq95cAmTL52M7yVC7R4DBPYj0B2buqvzg
X-Google-Smtp-Source: AGHT+IETZwhnV0rJpVJBF77NTJjFMdIC8aKZQOQYfJl2xbCOxuILYGxpfN2jeD+k4ebqKRTDKeK86bZx10lv0rZrdzI=
X-Received: by 2002:a05:6214:3991:b0:6cc:2cd6:24 with SMTP id 6a1803df08f44-6d3fb88bdf9mr49450106d6.36.1731698448488; Fri, 15 Nov 2024 11:20:48 -0800 (PST)
MIME-Version: 1.0
References: <CAMm+LwjythcrwCdFkUchAZZC+dWXFes7k0m4rrQtJUoXGdGFzg@mail.gmail.com>
In-Reply-To: <CAMm+LwjythcrwCdFkUchAZZC+dWXFes7k0m4rrQtJUoXGdGFzg@mail.gmail.com>
From: Phillip Hallam-Baker <phill@hallambaker.com>
Date: Fri, 15 Nov 2024 14:20:36 -0500
Message-ID: <CAMm+Lwi8cgfkhzQhMiQ=xxstnUVOUPxGeT+fzq9D9yDjfx-63Q@mail.gmail.com>
To: pkix@ietf.org
Content-Type: multipart/alternative; boundary="000000000000e162da0626f8762b"
Message-ID-Hash: V3FFVY2ABGVFABEHARCG6PB757WMYZDX
X-Message-ID-Hash: V3FFVY2ABGVFABEHARCG6PB757WMYZDX
X-MailFrom: hallam@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-pkix.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [pkix] Re: Name constraints in certificates
List-Id: PKIX Working Group <pkix.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/pkix/0tkEE1dyJeomsNsXLet497UiV2w>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pkix>
List-Help: <mailto:pkix-request@ietf.org?subject=help>
List-Owner: <mailto:pkix-owner@ietf.org>
List-Post: <mailto:pkix@ietf.org>
List-Subscribe: <mailto:pkix-join@ietf.org>
List-Unsubscribe: <mailto:pkix-leave@ietf.org>
Ooops, * Trust the LetsAuthenticate root Oh and, yes, I applied for the names before LetsEncrypt though to apply for a trademark. My thought being that at some point, we might decide we needed to avoid the provision of WebPKI certs becoming a monopoly. On the ugliness of direct names, it is quite possible this can be hidden behind hypertext links. I was just experimenting with the user 'device browser' and the user doesn't need to know the camera in their garage is garage-camera.mb5s-r4aj-3fbt-7nho-t26z-2e6y-wfh4.mesh Where this goes pear shaped is if Alice stays at Bob's house and Bob wants to delegate control over stuff while she is there. On Fri, Nov 15, 2024 at 12:50 PM Phillip Hallam-Baker <phill@hallambaker.com> wrote: > I am looking at the problem of issuing certificates to IoT devices that > was raised in ALL-DISPATCH with a view to creating a proof of concept for > the problem described as 'impossible' :-) > > As it happens, I own the domains letsauthenticate.com and > letsauthenticate.org and these could be used to create a sister service > to letsencrypt but focused on devices and issuing certificates that are > bound to non-IANA DNS names. > > One of the nice properties of this scheme is that I can construct a CA > whose operation is entirely constrained by the operation of the naming > infrastructure and employs separation of duties between a set of > entities holding the signature keys. So it takes more than one party to > defect for a bogus certificate to issue. > > > The basic plan is that Alice registers the UDF fingerprint of her Mesh > root of trust mb5s-r4aj-3fbt-7nho-t26z-2e6y-wfh4 with the LetsAuthenticate > threshold CA issues an Intermediate cert to her with a name constraint > allowing her to issue certs in the *.mb5s-r4aj-3fbt-7nho-t26z-2e6y-wfh4.mesh > domain. > > Alice can now issue certificates through her local CA which could again > make use of threshold to provide separation of duties between her local > device and an offsite service. > > > The resulting certificates would be recognized by any Web browser that had > the specific configuration to recognize them: > > * Refer requests for .mesh to a resolver that handles them > * Trust the LetsEncrypt root > * Perform the appropriate pathmath to check the end entity cert. > > Now as it happens, I have my own browser, Phill's Hypothetical Browser and > that allows me to meet what I consider to be the core requirement that > someone should be able to buy an IoT device from wherever, plonk it onto > their network and configure it through a Mesh enabled browser without any > personalization to their personal account. (PHB has the LetsAuthenticate > Root installed, it does not need an Alice root). > > Of course, I am aware the use of Direct names is ugly but I have a > solution for that as well, as most of you know. And building a friendly > name registration service like callsign might be the way to fund this > infrastructure if it becomes widely used. > > > In the short term, I am somewhat concerned about the risk of unexpected > effects in the legacy WebPKI. I will mark the name constraints critical of > course. But would there be consequences if the user installs the > LetsAuthenticate root? > > I would ideally want to put name constraints in the root cert but that > isn't a thing of course because root certs aren't really certs. >
- [pkix] Name constraints in certificates Phillip Hallam-Baker
- [pkix] Re: Name constraints in certificates Phillip Hallam-Baker
- [pkix] Re: Name constraints in certificates Corey Bonnell
- [pkix] Re: Name constraints in certificates Phillip Hallam-Baker
- [pkix] Re: Name constraints in certificates Corey Bonnell
- [pkix] Re: Name constraints in certificates Phillip Hallam-Baker