Re: [pkix] Self-issued certificates

王文正 <wcwang@cht.com.tw> Mon, 13 July 2015 13:50 UTC

Return-Path: <wcwang@cht.com.tw>
X-Original-To: pkix@ietfa.amsl.com
Delivered-To: pkix@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DB1541B2AF6 for <pkix@ietfa.amsl.com>; Mon, 13 Jul 2015 06:50:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.625
X-Spam-Level: *
X-Spam-Status: No, score=1.625 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HELO_EQ_TW=1.335, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k6HCmQD2YM8Z for <pkix@ietfa.amsl.com>; Mon, 13 Jul 2015 06:50:43 -0700 (PDT)
Received: from scan14.cht.com.tw (scan14.cht.com.tw [202.39.160.144]) by ietfa.amsl.com (Postfix) with ESMTP id 4CCD21B2AFA for <pkix@ietf.org>; Mon, 13 Jul 2015 06:50:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; d=cht.com.tw; s=bill; c=relaxed/simple; q=dns/txt; i=@cht.com.tw; t=1436795436; x=1439387436; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=3J14pXEonjtJgKMsv3kw4RMUAsLZMdbFc85C7D5nKls=; b=omO9uEhatNYWE0mD8pyCe52Mx9KbI5pdPQwI/rBeOFul7gq6BGEUrWCIqCLgSHvD iUGD6NeDB8aKNAr0HBAY16b3Gnz0vvsZ590rzKrdeiH4fPx6xbVCpAkwbVVPZgcf q16GhJiu4EfxCKuMUX/wYoAUrNfIEiFgg8HwgRPRzEw=;
X-AuditID: 0aa00768-f79166d000000bd1-c1-55a3c22cc485
Received: from scanrelay4.cht.com.tw ( [10.160.7.109]) by scan14.cht.com.tw (CHT Outgoing ESMTP Mail Server) with SMTP id D7.5F.03025.C22C3A55; Mon, 13 Jul 2015 21:50:36 +0800 (CST)
Received: from HUB4.app.corp.cht.com.tw (unknown [10.172.18.168]) by scanrelay4.cht.com.tw (Symantec Mail Security) with ESMTP id 6C1AFC000088 for <pkix@ietf.org>; Mon, 13 Jul 2015 21:50:36 +0800 (CST)
Received: from MBS6.app.corp.cht.com.tw ([fe80::3178:69dd:b794:fa86]) by HUB4.app.corp.cht.com.tw ([fe80::f8db:4064:82dd:2fdb%12]) with mapi id 14.02.0342.003; Mon, 13 Jul 2015 21:50:36 +0800
From: 王文正 <wcwang@cht.com.tw>
To: PKIX <pkix@ietf.org>
Thread-Topic: [pkix] Self-issued certificates
Thread-Index: AQHQvO6GAYPrVwbgc064vRlSWTnR1Z3YHn2AgAEqVNA=
Date: Mon, 13 Jul 2015 13:50:35 +0000
Message-ID: <20825998BCB8D84C983674C159E25E753D620DDF@mbs6.app.corp.cht.com.tw>
References: <CAK6vND-muOnNMo62LKMYJcvLUsQjbau-fuWuhnAj4aLQ2ENH-g@mail.gmail.com> <CAFewVt5mxdMbnZPOe=OQoLaeX_FdBZUSp-BmqHSpHHBPDyNKNQ@mail.gmail.com>
In-Reply-To: <CAFewVt5mxdMbnZPOe=OQoLaeX_FdBZUSp-BmqHSpHHBPDyNKNQ@mail.gmail.com>
Accept-Language: zh-TW, en-US
Content-Language: zh-TW
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.77.4.111]
Content-Type: multipart/alternative; boundary="_000_20825998BCB8D84C983674C159E25E753D620DDFmbs6appcorpchtc_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrMKsWRmVeSWpSXmKPExsXCtYA9V1fn0OJQg+UPFC0uHixyYPRYsuQn UwBjVAOjTWJeXn5JYkmqQkpqcbKtUnJGiW5KZnFyTmJmbmqRbmpeupJCZoqtkomSQkFOYnJq bmpeia1SYkFBal6Kkh2XAgawASrLzFNIzUvOT8nMS7dV8gz217WwMLXUNVSyC8hJTSxOVUhK VUhMKcssTk1RSNggk7H/Vht7wYGkisdf37I1ML6I72Lk5JAQMJG4d7OXHcIWk7hwbz1bFyMX h5DAdkaJPVdPM0I4Zxkl9n25ygzhHGaU6Oz/ywbSwiZgJLHx7C4mEFtEQEJiw+vnYLawgI7E rTv7oeK6EpeefQeq5wCyrSQOHZYCCbMIqEq8f/YObAyvgL/Epb8foOZPZ5SYdPICM0iCUyBQ 4tS3RWA2o4CsxJMFz8BmMguIS5y72Ap1toDEkj3nmSFsUYmXj/+xguySEJCXmPZGBqI8X+LP 1n0sELsEJU7OfMIygVF0FpJJs5CUzUJSNgtoErOApsT6XfoQJYoSU7ofQpVrSLTOmcuOLL6A kX0Vo2BxcmKeoYkeMJL1kvNz9UrKNzFCEkjGDsb98x0PMQpwMCrx8DL0LwoVYk0sK67MPcQo wcGsJMKbU7w4VIg3JbGyKrUoP76oNCe1+BCjKTCwJjJLiSbnA5NbXkm8obGlsYWhkYGZsbmF hZI475TWzBAhgXRg6spOTS1ILYLpY+LglGpg5GVc+0A5yNXqwJ2bk5ZMP3j/mDXD9pjEtqWV TNUctVwNWfZpr3VkJl1s1ph0vqFd8O6GTSxujIuVFDaYPctatf/Oarc4lcjGGPt6ZeUK1dgF X6KXtLn0CwRnP59uUDlRpuT14d6AF6v2p+7hz7z1xmTmtga+EOtmpZesKSs/3lrF+Dme74ma EktxRqKhFnNRcSIAO0qOwzYDAAA=
Archived-At: <http://mailarchive.ietf.org/arch/msg/pkix/Ac1gKsEfZBTqxuJ0PsSpCGzkEXY>
Subject: Re: [pkix] Self-issued certificates
X-BeenThere: pkix@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: PKIX Working Group <pkix.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pkix>, <mailto:pkix-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pkix/>
List-Post: <mailto:pkix@ietf.org>
List-Help: <mailto:pkix-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pkix>, <mailto:pkix-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Jul 2015 13:50:47 -0000

In my experiences, Mozilla Firefox still worked fine for handling self-issued certificates for key rollover purposes. Actually, most browsers will simply treat self-issued certificates as regular intermediate CA certificates. Therefore, if there are no complex path length constrains or name constrains to be handled, the certification path processing will be fine even though browsers might not implement those exceptional handling rules for self-issued certificates.



What really caused our headaches was some web server such as Microsoft IIS does not recognize self-issued certificates. For a CA performing its key rollover with self-issued certificates, the certification path chaining up to the old root certificate will be as follows:



old root certificate (a self-signed certificate) --> new-with-old certificate (a self-issued certificate) --> subordinate CA certificate (an intermediate CA certificate) --> SSL certificate



During the SSL/TLS handshake, it is expected that the web server to send "new-with-old certificate --> subordinate CA certificate --> SSL certificate" to browsers (the client side).

However, it is unfortunately that Microsoft IIS wrongly treats the self-issued certificate as a self-signed certificate and therefore it will only send "subordinate CA certificate --> SSL certificate" to browsers. The result is that browsers such as Firefox might failed to chain the certification path up to the old root certificate. In the cases where browsers do not yet trust the new root certificate, the SSL/TLS handshake will be failed.



Our company had already send a bug report to Microsoft through their so-called premium tech support channel several months ago, however they seemed not yet decide whether they want to fix that IIS bug or not. Therefore, be warned if you want to perform a CA key rollover with self-issued certificates because there are still a lot servers and clients whose certification path processing implementations do not conform to RFC 5280 or X.509 standard.



Wen-Cheng Wang



-----Original Message-----
From: pkix [mailto:pkix-bounces@ietf.org] On Behalf Of Brian Smith
Sent: Monday, July 13, 2015 9:57 AM
To: Peter Bowen
Cc: PKIX
Subject: Re: [pkix] Self-issued certificates



<snip>



In fact, mozilla::pkix doesn't recognize self-issued certificates at all, and so doesn't implement those exceptions. So far, this has not caused any problems, so as far as the Web PKI is concerned, it is likely we can forget about the concept of self-issued certificate completely. And, that's what I recommend that people do.



Cheers,

Brian



Please be advised that this email message (including any attachments) contains confidential information and may be legally privileged. If you are not the intended recipient, please destroy this message and all attachments from your system and do not further collect, process, or use them. Chunghwa Telecom and all its subsidiaries and associated companies shall not be liable for the improper or incomplete transmission of the information contained in this email nor for any delay in its receipt or damage to your system. If you are the intended recipient, please protect the confidential and/or personal information contained in this email with due care. Any unauthorized use, disclosure or distribution of this message in whole or in part is strictly prohibited.  Also, please self-inspect attachments and hyperlinks contained in this email to ensure the information security and to protect personal information.