Re: [sipcore] Enabling the wildcard certificates for SIP TLS implementation

"Olle E. Johansson" <oej@edvina.net> Tue, 11 August 2020 12:38 UTC

Return-Path: <oej@edvina.net>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 872793A102A for <sipcore@ietfa.amsl.com>; Tue, 11 Aug 2020 05:38:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dabXYy0otKN6 for <sipcore@ietfa.amsl.com>; Tue, 11 Aug 2020 05:38:05 -0700 (PDT)
Received: from smtp7.webway.se (smtp7.webway.se [212.3.14.205]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3C0DD3A1029 for <sipcore@ietf.org>; Tue, 11 Aug 2020 05:38:03 -0700 (PDT)
Received: from macbook-pro.webway.org (h-205-16.A165.corp.bahnhof.se [176.10.205.16]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp7.webway.se (Postfix) with ESMTPSA id CA70929B6; Tue, 11 Aug 2020 14:37:57 +0200 (CEST)
From: "Olle E. Johansson" <oej@edvina.net>
Message-Id: <1001AACE-ECE2-45EE-AEEF-7812FC240B61@edvina.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_7E5CB4EC-8CA2-4B59-9164-377EC5039532"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.1\))
Date: Tue, 11 Aug 2020 14:37:57 +0200
In-Reply-To: <7164b84b-ade1-7085-7e64-541be8c25085@gmail.com>
Cc: Simon MORLAT <simon.morlat@gmail.com>, Roman Shpount <roman@telurix.com>, SIPCORE <sipcore@ietf.org>, Leonid Fainshtein <leonid.fainshtein@xorcom.com>
To: Daniel-Constantin Mierla <miconda@gmail.com>
References: <CAJr_9Tau8iW7idbJLNhhKX5MA5PDhZxR0vmdcfva6_fMMBfKCA@mail.gmail.com> <5BFABAC0-BCF4-4282-A457-F41BD3D142F2@edvina.net> <CAH_g9Rx5DcgOG1--GsUv86OJRu0Kf2MwA-p25gasVa=ex-R95A@mail.gmail.com> <AFF09E0F-3063-4C10-B6D8-221237A46FA8@edvina.net> <CAD5OKxsBGM6+Dmx_YEYcJk2ZbTGi6EC1S+z+9DiyHGb6sQjsFQ@mail.gmail.com> <CAH_g9RxWXKp8nMtPVzb0bNG5GXgshB-iB9NFE3fUddvFjEmkoQ@mail.gmail.com> <7164b84b-ade1-7085-7e64-541be8c25085@gmail.com>
X-Mailer: Apple Mail (2.3608.120.23.2.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/ZlY9u2520r2yEX-SSKecuXoY5YY>
Subject: Re: [sipcore] Enabling the wildcard certificates for SIP TLS implementation
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Aug 2020 12:38:09 -0000


> On 11 Aug 2020, at 11:36, Daniel-Constantin Mierla <miconda@gmail.com> wrote:
> 
> Hello,
> 
> maybe it should be split in:
> 
> 1) trusting the certificate to be used for encryption, but asserting the identity of the peer is done separately. This is the common use case these days and the goal is to ensure the certificate belongs to the entity owning the service by association with the main domain name. E.g., hosted pbx providers with subdomain allocation per customer, like custid.cloudpbx.lab. Identity of peers is ensured by other meanings like shared secret. Here wild card certificates are very useful (with the full left most label being the wildcard), is such case management of certificates with full domains is getting close to impossible on large deployments, not only painful.
> 
Opportunistic crypto always works. What we’re discussing - at least I - is some way to set up a call between trusted peers, so you are right
in dividing the use case. In order to get some undefined level of confidentiality you can just take the public key from any cert presented without
validating, much like most SMTP servers can do today.
> 2) trusting the certificate also for asserting the identity of the peer, when it needs to match in a 1-to-1 relation. In this case wildcard certificates are not useful, of course, but I rarely have seen it used for this purpose.
> 
> 
And it is today a bit undefined what the expected behaviour is. The SIP RFCs only define validation of SIP server certs with a given SIP URI. There are
a few documents from the UTA group describing expected behaviour when using DNS SRV but they are not really following the SIP one. And there’s no documentation whatsoever on client certs, so mutual auth is very hard to set up if you expect interoperability.

I will go through my old documents and presentations. I think I have tried to sort this mess up into some form of agenda a few years ago.

/O :-)
> Cheers,
> Daniel
> 
> On 11.08.20 10:43, Simon MORLAT wrote:
>> Hi,
>> 
>> Thank you for all your answers, this is very helpful.
>> I did not know RFC 6125. Based on these considerations, I would say that wildcard certificates will probably disappear for all applications in the next few years.
>> 
>> Best regards,
>> 
>> Simon
>> 
>> 
>> Le lun. 10 août 2020 à 20:12, Roman Shpount <roman@telurix.com <mailto:roman@telurix.com>> a écrit :
>> 
>> On Mon, Aug 10, 2020 at 11:04 AM Olle E. Johansson <oej@edvina.net <mailto:oej@edvina.net>> wrote:
>> I found documentation in RFC 6125 from the “Using TLS in applications” working group.
>> https://tools.ietf.org/html/rfc6125#section-7.2 <https://tools.ietf.org/html/rfc6125#section-7.2>
>>  
>> This section essentially says why wildcard certificates must not be used and can only be supported for legacy applications. Not supporting wildcard certificates does create a certain degree of pain but given security risks should continue to be avoided.
>> 
>> Changes are done by publishing a new RFC, not with Errata. That will open up a whole can of worms, but we need to open it
>> and specify how SIP over TLS should work. Like the "transport=TLS” stuff and deprecating “SIPS:”.
>> 
>> 
>> One thing I've wanted for a long time is an extension which allows to multiplex several DTLS connections over the same protocol/address/port pair. This will allow to replicate all the current SIP over UDP deployment scenarios using a secure protocol. Once this is available, I would participate or author an RFC.
>> 
>> Best Regards,
>> _____________
>> Roman Shpount 
>> 
>> 
>> _______________________________________________
>> sipcore mailing list
>> sipcore@ietf.org <mailto:sipcore@ietf.org>
>> https://www.ietf.org/mailman/listinfo/sipcore <https://www.ietf.org/mailman/listinfo/sipcore>
> -- 
> Daniel-Constantin Mierla -- www.asipto.com <http://www.asipto.com/>
> www.twitter.com/miconda <http://www.twitter.com/miconda> -- www.linkedin.com/in/miconda <http://www.linkedin.com/in/miconda>