Re: [saag] [lamps] subordinate vs intermediate certification authority

Phillip Hallam-Baker <phill@hallambaker.com> Mon, 08 February 2021 18:41 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D68553A14A5 for <saag@ietfa.amsl.com>; Mon, 8 Feb 2021 10:41:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.399
X-Spam-Level:
X-Spam-Status: No, score=-1.399 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.249, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.249, HTML_MESSAGE=0.001, LOTS_OF_MONEY=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z0PLqc9oBYv0 for <saag@ietfa.amsl.com>; Mon, 8 Feb 2021 10:41:27 -0800 (PST)
Received: from mail-yb1-f179.google.com (mail-yb1-f179.google.com [209.85.219.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3655F3A14A9 for <saag@ietf.org>; Mon, 8 Feb 2021 10:41:27 -0800 (PST)
Received: by mail-yb1-f179.google.com with SMTP id v5so6843874ybi.3 for <saag@ietf.org>; Mon, 08 Feb 2021 10:41:27 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=gaVFWaWUDLp08nFZICVj7l0dlB5x366avWyIZwwhAcc=; b=VwIC/oMWpI20mJVsA3VJ1VjMfB7ofWcXNcLS5qWSuMXpZCBP0wtNaCZU/35ZfwCyyg GvL94QPTaLv/QIL6bVdGt4XMMggYfdTTvIo/iQMwQtuOZ4h/rY0wKPz3873f+CVKTYmY +b4DNgf8VeiIc/vvKkHVWx3LbKY63ucrydw+uiOLsqIvIkbAg6uJwQcKoqMjn+TsHskT MZDGvcOQfpQqyFW9ZSSiNBbi12/VLbyfymlpDMl30grmsb5wGP5qNpl2R/Y7hgt066hb SBV1Jz07abkG/wKeA3yIyNNexBa2ohTYVVYkicC318pf89XbtnALtGEF90asarPXk2/N 8p1g==
X-Gm-Message-State: AOAM530ZpNjSw0zXJwHdKiSgiKNu6J7l7o0qZ0oERvRlkmrPUGW0eGku 9oWwvViMfXiyJ7WY1emCExyT2jHRV74qXJhNufdItkyma8s=
X-Google-Smtp-Source: ABdhPJySUvyAK07fhSPoQ9lYav+NX4VfYl8lDh1fgAy9KMN2iCMEJgl+atWAZxp8YHy6iNE+9icaquWne3wT1NYBM1Q=
X-Received: by 2002:a25:d3c9:: with SMTP id e192mr26738860ybf.522.1612809685992; Mon, 08 Feb 2021 10:41:25 -0800 (PST)
MIME-Version: 1.0
References: <CAMm+Lwjks9M+yV0SOsne85eiycyNPm2NtHreDY3=BitAsqt18Q@mail.gmail.com> <CAErg=HHesEG1T+39WCgFGa---wzd884FQNGLndT35dvVAKf+kA@mail.gmail.com> <YCF4hPTq1Myurgqv@straasha.imrryr.org>
In-Reply-To: <YCF4hPTq1Myurgqv@straasha.imrryr.org>
From: Phillip Hallam-Baker <phill@hallambaker.com>
Date: Mon, 08 Feb 2021 13:41:15 -0500
Message-ID: <CAMm+LwhzWxe2vvj-WbQA5z9sfZuD=FhC7cLdzKqJ0k1+RP=cdg@mail.gmail.com>
To: IETF SAAG <saag@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000006c89e905bad7843e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/saag/KL6FQK9QTkP09IiawdlthAGLKYA>
Subject: Re: [saag] [lamps] subordinate vs intermediate certification authority
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Feb 2021 18:41:29 -0000

On Mon, Feb 8, 2021 at 12:44 PM Viktor Dukhovni <ietf-dane@dukhovni.org>
wrote:

> On Mon, Feb 08, 2021 at 11:48:57AM -0500, Ryan Sleevi wrote:
>
> > > Where it gets complex is when organizations have outsourced the CA
> > > function elsewhere.  It's meaningless to pin LetsEncrypt or GoDaddy.
> > > It might be meaningful to pin a Subordinate CA signed by some public
> > > CA though.
> >
> > No one, anywhere, should ever pin to a CA that they don’t directly
> control,
> > and even then, they still shouldn’t :)
> >
> > Pinning is just a poor-man’s attempt at a server controlling the client’s
> > trust anchors, and thus inevitably runs into issues, since client policy
> is
> > inherently _client_ policy. Especially important is never pinning to a
> > so-called “public” CA, precisely because their very existence is
> predicated
> > on client policy that is intentionally not controlled/controllable by
> > servers.
>
> With DANE-TA(2), the server is *asserting* the trust-anchor that's
> relevant for validation of its certificate.  It is not a pin as such.
> The real trust-anchor is the DNSKEY RRset that ultimately signs the
> chain leading to validated TLSA records.
>

Using DNS to anchor WebPKI certs is like trying to nail oak posts to jello.

All you have is a chain of trust up to the ICANN yacht club root of trust.
You don't own a DNS name, you rent it. And companies that charge $250,000
to apply to register a name have shown themselves to be untrustworthy.


Clients that implement DANE-TA(2) support will use whatever appears in
> the TLSA record, so there's no assumption of client policy.  (Indeed
> less assumption of client policy than with WebPKI, where one must
> tacitly assume that the CA one has elected to issue one's certs is
> trusted by the relevant clients).
>

And ten years after DANE started, those widely deployed clients would be?


That said, a few operators have on some occasion been too sloppy to
> ensure that the actual certificate they deploy matches the trust anchor
> listed in their own TLSA records.  This is entirely a server-side issue:
> operational negligence, unrelated to client policy.
>

No, it is a protocol failure. There are no incompetent users, only
incompetent service providers. There are no incompetent administrators,
only incompetent protocol architects.

The sine qua non for all security policy is to automate the management of
the services so that the policy advertisements are always up to date.

On Mon, Feb 08, 2021 at 12:13:36PM -0500, Phillip Hallam-Baker wrote:
>
> > > No one, anywhere, should ever pin to a CA that they don’t directly
> > > control, and even then, they still shouldn’t :)
> >
> > Almost agree. Should not pin to a PKIX CA.
>
> Perhaps this is the short version of what I tried to spell out in more
> detail.
>

DNSSEC is simply the WebPKI with a minimum of two trusted parties per path
(ICANN + TLD registry). Oh and a heck of a lot more registries.

If people want to pin keys to a name, the only way to do that in a
practical way is to make the naming system and PKI co-extensive. That is
not a feature that can be added to DNSSEC or to PKIX.