Re: Last Call summary for draft-ietf-pkix-cert-utf8

"Denis Pinkas" <denis.pinkas@bull.net> Thu, 13 April 2006 08:13 UTC

Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1FTwx7-0003gB-Kj for pkix-archive@lists.ietf.org; Thu, 13 Apr 2006 04:13:21 -0400
Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FTwx7-00035S-0I for pkix-archive@lists.ietf.org; Thu, 13 Apr 2006 04:13:21 -0400
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id k3D7IVK4022571; Thu, 13 Apr 2006 00:18:31 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id k3D7IVQR022570; Thu, 13 Apr 2006 00:18:31 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f
Received: from odin2.bull.net (odin2.bull.net [129.184.85.11]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id k3D7ITL6022564 for <ietf-pkix@imc.org>; Thu, 13 Apr 2006 00:18:29 -0700 (MST) (envelope-from denis.pinkas@bull.net)
Received: from MSGA-001.frcl.bull.fr (msga-mcl1.frcl.bull.fr [129.182.8.57]) by odin2.bull.net (8.9.3/8.9.3) with ESMTP id JAA04696; Thu, 13 Apr 2006 09:18:05 +0200
Received: from frcls4013 ([129.182.108.120]) by MSGA-001.frcl.bull.fr (Lotus Domino Release 5.0.11) with SMTP id 2006041309182474:4428 ; Thu, 13 Apr 2006 09:18:24 +0200
Date: Thu, 13 Apr 2006 09:19:58 +0100
From: Denis Pinkas <denis.pinkas@bull.net>
To: "iesg@ietf.org" <iesg@ietf.org>, "ietf-pkix@imc.org" <ietf-pkix@imc.org>
Subject: Re: Last Call summary for draft-ietf-pkix-cert-utf8
X-mailer: Foxmail 5.0 [-fr-]
Mime-Version: 1.0
X-MIMETrack: Itemize by SMTP Server on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 13/04/2006 09:18:24, Serialize by Router on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 13/04/2006 09:18:26, Serialize complete at 13/04/2006 09:18:26
Message-ID: <OF94BBBC13.4D5BA470-ONC125714F.0028235B@frcl.bull.fr>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="iso-8859-1"
Sender: owner-ietf-pkix@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-pkix/mail-archive/>
List-ID: <ietf-pkix.imc.org>
List-Unsubscribe: <mailto:ietf-pkix-request@imc.org?body=unsubscribe>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: f2728948111f2edaaf8980b5b9de55af

Jim,

>I would second this approach.  I don't think we can impose a task on CAs
>that we have no idea how to fix and many of us would consider to be
>unsolvable.  Stating that the problem exists and both the CA and relying
>party need to be aware of the problem is sufficient.

>Suggested text:

>When strings are mapped from internal representations to visual
>representations, it frequently occurs that two different strings will have
>the same visual representations.  This can happen due to similar glyphs,
>multiple items being combined into a single glyph among other reasons.  When
>this happens people doing visual comparisons between two different names may
>think they are the same when in fact they are not.  Issuers of
>certifificates and relying parties both need to be aware of this fact.

Thanks for making this new proposal. In fact there would be the need to make 
the difference between two cases:

  a) the visual representations are fully identical,
  b) the visual representations are "similar". 

For case a), it is possible to have solutions, e.g. a given CA uses only ASCII or one Unicode. 
Another example would be only using, either Takatana or one Unicode from a Western country.

For case b), it is a matter of taste and it is clearly impossible to have an algorithm 
that addresses all the cases in a standardized way.

The text you propose is fine for the *same* visual representation, but leaves out 
the case of "similar" representations.

So if a new text proposal could cover the two cases separately, this would be fine.
Would you be able to post a new proposal ?

Denis

>Jim
>
>
>> -----Original Message-----
>> From: owner-ietf-pkix@mail.imc.org 
>> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani
>> Sent: Wednesday, April 12, 2006 5:10 PM
>> To: ietf-pkix@imc.org; iesg@ietf.org
>> Subject: RE: Last Call summary for draft-ietf-pkix-cert-utf8
>> 
>> 
>> For those of you who care, I simply tried to make Kurt's 
>> language parsable.
>> 
>> Personally, I think the I-D should move to RFC status as is.
>> 
>> If folks really insist, we can say in security section that 
>> human relying party should be aware of names that appear similar.
>> 
>> -----Original Message-----
>> From: owner-ietf-pkix@mail.imc.org 
>> [mailto:owner-ietf-pkix@mail.imc.org]
>> On Behalf Of Denis Pinkas
>> Sent: Wednesday, April 12, 2006 12:59 PM
>> To: owner-ietf-pkix@mail.imc.org; 'Sam Hartman'; 
>> ietf-pkix@imc.org; Jim Schaad
>> Cc: iesg@ietf.org
>> Subject: Re: Last Call summary for draft-ietf-pkix-cert-utf8
>> 
>> 
>> Jim,
>> 
>> >Denis,
>> 
>> >If you want to have a SHALL NOT or a SHOULD NOT in this statement,
>> please
>> >provide me an algorithm that I can give to a CA to do this 
>> enforcement.
>> 
>> It was stated at the IETF in Paris that there was no perfect 
>> solution to this problem.
>> 
>> Sam said that there is no consensus to make a specific 
>> recommendation for mitigating this risk. I agree. Hence, we 
>> are not going to provide any algorithm. The way to solve this 
>> issue is the problem of the CA.
>> The requirement remains.
>> 
>> Denis
>> 
>> >Thanks,
>> 
>> >Jim Schaad
>> 
>> >> -----Original Message-----
>> >> From: owner-ietf-pkix@mail.imc.org
>> >> [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Denis Pinkas
>> >> Sent: Wednesday, April 12, 2006 7:48 AM
>> >> To: ietf-pkix@imc.org; Sam Hartman; owner-ietf-pkix@mail.imc.org
>> >> Cc: iesg@ietf.org
>> >> Subject: Re: Last Call summary for draft-ietf-pkix-cert-utf8
>> >> 
>> >> 
>> >> Sam,
>> >> 
>> >> Your position as Security Area Director is the following :
>> >> 
>> >> "This concern must be mentioned as a residual risk even if 
>> there is 
>> >> no consensus to make a specific recommendation for mitigating this 
>> >> risk.  So I will need wording possibly similar to that 
>> suggested by 
>> >> Kurt to document this security consideration.  I would propose 
>> >> accepting Kurt's wording except that it doesn't seem to parse as 
>> >> valid English for me."
>> >> 
>> >> I would propose to insert:
>> >> 
>> >>   "Two different subject names might easily appear (using the same 
>> >> font
>> >>   or different fonts) to have the same or close visual 
>> >> representations,
>> >>   hence before assigning a subject name to an entity, CAs 
>> conforming 
>> >> to
>> >>   this profile SHOULD NOT assign a subject name that has 
>> the same or
>> a
>> >>   similar visual representation of DN already assigned to another 
>> >> entity".
>> >> 
>> >> I would however have no problem to change "SHOULD NOT" into "SHALL 
>> >> NOT".
>> >> 
>> >> Denis
>> >> 
>> >> >Sam,
>> >> >
>> >> >How about the following:
>> >> >
>> >> >"Different character strings can appear to be the same
>> >> string to human
>> >> >relying parties.  In order to reduce this risk, CAs should
>> >> define and
>> >> >follow appropriate policies to reduce this risk by:
>> >> >
>> >> >1. Selecting their own names that are not easy to spoof to human 
>> >> >relying parties; and 2. Asserting subject names that are 
>> not easy to
>> 
>> >> >spoof to human relying parties."
>> >> >
>> >> >-----Original Message-----
>> >> >From: owner-ietf-pkix@mail.imc.org
>> >> >[mailto:owner-ietf-pkix@mail.imc.org]
>> >> >On Behalf Of Sam Hartman
>> >> >Sent: Tuesday, April 11, 2006 8:46 PM
>> >> >To: ietf-pkix@imc.org
>> >> >Cc: iesg@ietf.org
>> >> >Subject: Last Call summary for draft-ietf-pkix-cert-utf8
>> >> >
>> >> >
>> >> >
>> >> >
>> >> >Denis Pinkas indicated that he had strong concerns about the
>> >> document
>> >> >because of spoofing attacks.  He believed that we should 
>> recommend 
>> >> >PrintableString where possible.
>> >> >
>> >> >Jim Schaad believed that supporting internationalization is
>> >> important
>> >> >and that we should afford people the same anti-spoofing 
>> protection 
>> >> >regardless of their character set.  Santosh Chokhani, Stefan
>> >> Santesson
>> >> >and Kurt Zeilenga also disagreed with Denis.  Kurt believed that 
>> >> >spoofing i a problem even in the PrintableString case.
>> >> >Kurt believed that security considerations text such as the
>> >> following
>> >> >should be added to the draft:
>> >> >
>> >> >     Two different character strings can easily appear (in
>> >> >     common and/or a particular font) to be the same string and
>> >> >     hence CAs should have and follow appropriate policies to
>> >> >     reduce as to who is the subject of any certificate 
>> they issue.
>> >> >
>> >> >
>> >> >Denis supported Kurt's text although he argued that it
>> >> should go in the
>> >> >main body of the document not the security considerations section.
>> >> >Denis also proposed that we recommend the use of
>> >> PrintableString where
>> >> >possible.  There was general disagreement with this 
>> recommendation.
>> >> >
>> >> >A few people disagreed with the idea of adding security
>> >> considerations
>> >> >text.
>> >> >
>> >> >There was also a discussion of the appropriateness of CAs
>> >> choosing to
>> >> >issue certificates to anyone who had a domain name registered or 
>> >> >whether they should filter the certificate requests.  This
>> >> discussion
>> >> >is largely out of scope and reached no consensus.
>> >> >
>> >> >I conclude there is no rough consensus to change the
>> >> document in regard
>> >> >to these issues.  I conclude that this discussion does 
>> not challenge
>> 
>> >> >the rough consensus to publish the document.
>> >> >
>> >> >
>> >> >However I find that Kurt has raised a substantive issue 
>> that must be
>> 
>> >> >addressed before publication.  Neither RFC 3280 nor this draft 
>> >> >discusses the security consideration of one name being 
>> confused for 
>> >> >another.  This concern must be mentioned as a residual 
>> risk even if 
>> >> >there is no consensus to make a specific recommendation for 
>> >> mitigating 
>> >> >this risk.  So I will need wording possibly similar to that 
>> >> suggested 
>> >> >by Kurt to document this security consideration.  I would propose 
>> >> >accepting Kurt's wording except that it doesn't seem to 
>> >> parse as valid 
>> >> >English for me.
>> >> >--Sam