RE: Last Call summary for draft-ietf-pkix-cert-utf8

"Jim Schaad" <ietf@augustcellars.com> Thu, 13 April 2006 05:23 UTC

Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1FTuJ2-000811-0n for pkix-archive@lists.ietf.org; Thu, 13 Apr 2006 01:23:48 -0400
Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FTuIz-0006X4-Dd for pkix-archive@lists.ietf.org; Thu, 13 Apr 2006 01:23:48 -0400
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id k3D4IXFI014832; Wed, 12 Apr 2006 21:18:33 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id k3D4IXlC014831; Wed, 12 Apr 2006 21:18:33 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f
Received: from smtp1.pacifier.net (smtp1.pacifier.net [64.255.237.171]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id k3D4IWKb014825 for <ietf-pkix@imc.org>; Wed, 12 Apr 2006 21:18:32 -0700 (MST) (envelope-from ietf@augustcellars.com)
Received: from romans (unknown [207.202.179.27]) by smtp1.pacifier.net (Postfix) with ESMTP id 6BE026F827; Wed, 12 Apr 2006 21:18:30 -0700 (PDT)
From: Jim Schaad <ietf@augustcellars.com>
To: 'Santosh Chokhani' <chokhani@orionsec.com>, ietf-pkix@imc.org, iesg@ietf.org
Subject: RE: Last Call summary for draft-ietf-pkix-cert-utf8
Date: Wed, 12 Apr 2006 21:24:52 -0700
Message-ID: <00c001c65eb2$36527100$0b00a8c0@augustcellars.local>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook 11
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2670
In-Reply-To: <82D5657AE1F54347A734BDD33637C8790241A133@EXVS01.ex.dslextreme.net>
Thread-Index: AcZeWjqPPvO1c3bgR9OP6yYdrh+cuwANBRAgAAjC6qA=
Sender: owner-ietf-pkix@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-pkix/mail-archive/>
List-ID: <ietf-pkix.imc.org>
List-Unsubscribe: <mailto:ietf-pkix-request@imc.org?body=unsubscribe>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: e367d58950869b6582535ddf5a673488

I would second this approach.  I don't think we can impose a task on CAs
that we have no idea how to fix and many of us would consider to be
unsolvable.  Stating that the problem exists and both the CA and relying
party need to be aware of the problem is sufficient.


Suggested text:


When strings are mapped from internal representations to visual
representations, it frequently occurs that two different strings will have
the same visual representations.  This can happen due to similar glyphs,
multiple items being combined into a single glyph among other reasons.  When
this happens people doing visual comparisons between two different names may
think they are the same when in fact they are not.  Issuers of
certifificates and relying parties both need to be aware of this fact.



Jim


> -----Original Message-----
> From: owner-ietf-pkix@mail.imc.org 
> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani
> Sent: Wednesday, April 12, 2006 5:10 PM
> To: ietf-pkix@imc.org; iesg@ietf.org
> Subject: RE: Last Call summary for draft-ietf-pkix-cert-utf8
> 
> 
> For those of you who care, I simply tried to make Kurt's 
> language parsable.
> 
> Personally, I think the I-D should move to RFC status as is.
> 
> If folks really insist, we can say in security section that 
> human relying party should be aware of names that appear similar.
> 
> -----Original Message-----
> From: owner-ietf-pkix@mail.imc.org 
> [mailto:owner-ietf-pkix@mail.imc.org]
> On Behalf Of Denis Pinkas
> Sent: Wednesday, April 12, 2006 12:59 PM
> To: owner-ietf-pkix@mail.imc.org; 'Sam Hartman'; 
> ietf-pkix@imc.org; Jim Schaad
> Cc: iesg@ietf.org
> Subject: Re: Last Call summary for draft-ietf-pkix-cert-utf8
> 
> 
> Jim,
> 
> >Denis,
> 
> >If you want to have a SHALL NOT or a SHOULD NOT in this statement,
> please
> >provide me an algorithm that I can give to a CA to do this 
> enforcement.
> 
> It was stated at the IETF in Paris that there was no perfect 
> solution to this problem.
> 
> Sam said that there is no consensus to make a specific 
> recommendation for mitigating this risk. I agree. Hence, we 
> are not going to provide any algorithm. The way to solve this 
> issue is the problem of the CA.
> The requirement remains.
> 
> Denis
> 
> >Thanks,
> 
> >Jim Schaad
> 
> >> -----Original Message-----
> >> From: owner-ietf-pkix@mail.imc.org
> >> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Denis Pinkas
> >> Sent: Wednesday, April 12, 2006 7:48 AM
> >> To: ietf-pkix@imc.org; Sam Hartman; owner-ietf-pkix@mail.imc.org
> >> Cc: iesg@ietf.org
> >> Subject: Re: Last Call summary for draft-ietf-pkix-cert-utf8
> >> 
> >> 
> >> Sam,
> >> 
> >> Your position as Security Area Director is the following :
> >> 
> >> "This concern must be mentioned as a residual risk even if 
> there is 
> >> no consensus to make a specific recommendation for mitigating this 
> >> risk.  So I will need wording possibly similar to that 
> suggested by 
> >> Kurt to document this security consideration.  I would propose 
> >> accepting Kurt's wording except that it doesn't seem to parse as 
> >> valid English for me."
> >> 
> >> I would propose to insert:
> >> 
> >>   "Two different subject names might easily appear (using the same 
> >> font
> >>   or different fonts) to have the same or close visual 
> >> representations,
> >>   hence before assigning a subject name to an entity, CAs 
> conforming 
> >> to
> >>   this profile SHOULD NOT assign a subject name that has 
> the same or
> a
> >>   similar visual representation of DN already assigned to another 
> >> entity".
> >> 
> >> I would however have no problem to change "SHOULD NOT" into "SHALL 
> >> NOT".
> >> 
> >> Denis
> >> 
> >> >Sam,
> >> >
> >> >How about the following:
> >> >
> >> >"Different character strings can appear to be the same
> >> string to human
> >> >relying parties.  In order to reduce this risk, CAs should
> >> define and
> >> >follow appropriate policies to reduce this risk by:
> >> >
> >> >1. Selecting their own names that are not easy to spoof to human 
> >> >relying parties; and 2. Asserting subject names that are 
> not easy to
> 
> >> >spoof to human relying parties."
> >> >
> >> >-----Original Message-----
> >> >From: owner-ietf-pkix@mail.imc.org
> >> >[mailto:owner-ietf-pkix@mail.imc.org]
> >> >On Behalf Of Sam Hartman
> >> >Sent: Tuesday, April 11, 2006 8:46 PM
> >> >To: ietf-pkix@imc.org
> >> >Cc: iesg@ietf.org
> >> >Subject: Last Call summary for draft-ietf-pkix-cert-utf8
> >> >
> >> >
> >> >
> >> >
> >> >Denis Pinkas indicated that he had strong concerns about the
> >> document
> >> >because of spoofing attacks.  He believed that we should 
> recommend 
> >> >PrintableString where possible.
> >> >
> >> >Jim Schaad believed that supporting internationalization is
> >> important
> >> >and that we should afford people the same anti-spoofing 
> protection 
> >> >regardless of their character set.  Santosh Chokhani, Stefan
> >> Santesson
> >> >and Kurt Zeilenga also disagreed with Denis.  Kurt believed that 
> >> >spoofing i a problem even in the PrintableString case.
> >> >Kurt believed that security considerations text such as the
> >> following
> >> >should be added to the draft:
> >> >
> >> >     Two different character strings can easily appear (in
> >> >     common and/or a particular font) to be the same string and
> >> >     hence CAs should have and follow appropriate policies to
> >> >     reduce as to who is the subject of any certificate 
> they issue.
> >> >
> >> >
> >> >Denis supported Kurt's text although he argued that it
> >> should go in the
> >> >main body of the document not the security considerations section.
> >> >Denis also proposed that we recommend the use of
> >> PrintableString where
> >> >possible.  There was general disagreement with this 
> recommendation.
> >> >
> >> >A few people disagreed with the idea of adding security
> >> considerations
> >> >text.
> >> >
> >> >There was also a discussion of the appropriateness of CAs
> >> choosing to
> >> >issue certificates to anyone who had a domain name registered or 
> >> >whether they should filter the certificate requests.  This
> >> discussion
> >> >is largely out of scope and reached no consensus.
> >> >
> >> >I conclude there is no rough consensus to change the
> >> document in regard
> >> >to these issues.  I conclude that this discussion does 
> not challenge
> 
> >> >the rough consensus to publish the document.
> >> >
> >> >
> >> >However I find that Kurt has raised a substantive issue 
> that must be
> 
> >> >addressed before publication.  Neither RFC 3280 nor this draft 
> >> >discusses the security consideration of one name being 
> confused for 
> >> >another.  This concern must be mentioned as a residual 
> risk even if 
> >> >there is no consensus to make a specific recommendation for 
> >> mitigating 
> >> >this risk.  So I will need wording possibly similar to that 
> >> suggested 
> >> >by Kurt to document this security consideration.  I would propose 
> >> >accepting Kurt's wording except that it doesn't seem to 
> >> parse as valid 
> >> >English for me.
> >> >--Sam
> >> >
> 
> 
> 
> 
> 
> 
>