Re: [Spasm] Spasm Digest, Vol 13, Issue 21

Viktor Dukhovni <ietf-dane@dukhovni.org> Fri, 28 April 2017 17:02 UTC

Return-Path: <ietf-dane@dukhovni.org>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 426E5127342 for <spasm@ietfa.amsl.com>; Fri, 28 Apr 2017 10:02:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LDteJ9_Xytrr for <spasm@ietfa.amsl.com>; Fri, 28 Apr 2017 10:02:53 -0700 (PDT)
Received: from mournblade.imrryr.org (mournblade.imrryr.org [108.5.242.66]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7367B1293DB for <spasm@ietf.org>; Fri, 28 Apr 2017 09:59:15 -0700 (PDT)
Received: by mournblade.imrryr.org (Postfix, from userid 1034) id B25D87A330D; Fri, 28 Apr 2017 16:59:14 +0000 (UTC)
Date: Fri, 28 Apr 2017 16:59:14 +0000
From: Viktor Dukhovni <ietf-dane@dukhovni.org>
To: SPASM <spasm@ietf.org>
Message-ID: <20170428165914.GC25754@mournblade.imrryr.org>
Reply-To: spasm@ietf.org
References: <mailman.12.1493233203.16587.spasm@ietf.org> <A0D2106A-AF9F-4803-90FB-05565B7148B8@dukhovni.org> <BC920F8A-5624-4616-9DBD-CB11E4F29FC1@vigilsec.com> <20170427190314.GJ2856@localhost> <E3616585-D562-4D43-9AC2-CBCD86338DC9@vigilsec.com> <20170427214016.GK2856@localhost> <67321AE0-A036-4E86-BDA3-157C4340A84A@vigilsec.com> <20170427222534.GL2856@localhost> <4B0879AB-0913-4232-AF06-C7E17538E74C@vigilsec.com> <CAAFsWK2+-tyUacwjAcrsBzb+9VxwquSYqTbLa8zo0ZJZYA_bhg@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <CAAFsWK2+-tyUacwjAcrsBzb+9VxwquSYqTbLa8zo0ZJZYA_bhg@mail.gmail.com>
User-Agent: Mutt/1.7.2 (2016-11-26)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/RgnRfzV_yhEcHXvKhfU7jyseMcg>
Subject: Re: [Spasm] Spasm Digest, Vol 13, Issue 21
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Apr 2017 17:02:55 -0000

On Fri, Apr 28, 2017 at 06:57:17AM -0700, Wei Chuang wrote:

> > I have a problem with you saying that the common practice for an email
> > address that includes an IDN is to put both the A-Lable for and the U-Label
> > for in the certificate.  This leads to more checks than are needed to make
> > sure that both conform to the name constraints, and  it might lead to other
> > surprises because some relying parties use on form while other relying
> > parties use the other.  I’m just arguing for the normal practice to be the
> > use of one of the encodings, not both.
> 
> +1
> 
> Option 3, while agreed it has some nice properties, causes a lot more
> complexity and creates a lot more room for implementation and operational
> errors.  You can see that complexity in the earlier draft -08 in the
> example section where we tried to enumerate most of the cases:
> https://tools.ietf.org/html/draft-ietf-lamps-eai-addresses-08
> It called for special casing name constraints for backwards compatibility
> by the SmtpUTF8Name aware issuer.  That draft also called for SmtpUTF8Name
> aware path verifiers to help "police" those name constraint.

Actually, no!  The complexity in draft 8 is entirely due to using
two types of *name constraints*.  There is no such complexity when
using both types of SANs.

Both types of SANs need to be supported anyway, so what "option 3"
does is make it possible to compare the reference identifier against
the SAN *without* conversions.  That is, the certificate is populated
with all the email identities that the sender intends to use, and the
relying party performs no conversions!  

When the reference identifier has no U-labels, and the localpart
is all ASCII, only rfc822Name SANs are checked (with domain parts
compared in a case-insensitive manner).

When the reference identifier has U-labels, or the localpart is
not all ASCII, only SMTPUtf8Name SANs checked (with U-labels in
the domain parts compared byte for byte and NR-LDH or A-labels in
a case-insensitive manner).

A sender who wants working certificate authentication should not
use addresses that don't appear verbatim (modulo case of NR-LDH or
A-labels of domains) in your certificate.  Or equivalently, a sender
should obtain a certificate with all the desired address forms.

Instead of placing the burden on all the verifiers, place it on
the party obtaining the certificate from the CA.

-- 
	Viktor.