Re: [therightkey] Basically, it's about keeping the CAs honest

David Conrad <drc@virtualized.org> Mon, 13 February 2012 18:21 UTC

Return-Path: <drc@virtualized.org>
X-Original-To: therightkey@ietfa.amsl.com
Delivered-To: therightkey@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B5DDF21F8758 for <therightkey@ietfa.amsl.com>; Mon, 13 Feb 2012 10:21:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VWfBbgpCRO7z for <therightkey@ietfa.amsl.com>; Mon, 13 Feb 2012 10:21:51 -0800 (PST)
Received: from trantor.virtualized.org (trantor.virtualized.org [199.48.134.42]) by ietfa.amsl.com (Postfix) with ESMTP id 1B10F21F8755 for <therightkey@ietf.org>; Mon, 13 Feb 2012 10:21:38 -0800 (PST)
Received: from [192.168.2.159] (unknown [173.245.57.22]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: drc) by trantor.virtualized.org (Postfix) with ESMTPSA id 98A421705A; Mon, 13 Feb 2012 18:21:36 +0000 (UTC)
Mime-Version: 1.0 (Apple Message framework v1257)
Content-Type: text/plain; charset="us-ascii"
From: David Conrad <drc@virtualized.org>
In-Reply-To: <201202131636.q1DGafVR006049@fs4113.wdf.sap.corp>
Date: Mon, 13 Feb 2012 10:21:35 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <0600CF7A-A8CB-4E35-B729-43D626434645@virtualized.org>
References: <201202131636.q1DGafVR006049@fs4113.wdf.sap.corp>
To: mrex@sap.com
X-Mailer: Apple Mail (2.1257)
Cc: therightkey@ietf.org
Subject: Re: [therightkey] Basically, it's about keeping the CAs honest
X-BeenThere: therightkey@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <therightkey.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/therightkey>, <mailto:therightkey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/therightkey>
List-Post: <mailto:therightkey@ietf.org>
List-Help: <mailto:therightkey-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/therightkey>, <mailto:therightkey-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Feb 2012 18:21:54 -0000

On Feb 13, 2012, at 8:36 AM, Martin Rex wrote:
> The fact that there are products (client-side HTTPS proxies that
> perform MITM and inspect content) actively sold and used,
> which are vitally dependent on being able to exploit weaknesses
> of the existing TLS X.509 PKI security&trust model, is a sure proof
> that something is wrong with the existing security model.

Well, it is proof that the theoretical model in which authorized MITM was disallowed was seen as too limiting. 

> I do not think there is value in maintaining backward compatible
> weaknesses, and personally, I do not mind the slightest about breaking 
> those protocol subverting middle boxes, be it by the use of TLS channel
> bindings, or the checking of DANE TLSA records.

Pragmatically speaking, if you come up with an architecture that disallows people from doing what they want/need to do, they'll either figure out ways around it or not use that architecture. 

Regards,
-drc