Re: [TLS] Eleven out of every ten SSL certs aren't valid

Peter Gutmann <pgut001@cs.auckland.ac.nz> Wed, 30 June 2010 07:47 UTC

Return-Path: <pgut001@cs.auckland.ac.nz>
X-Original-To: tls@core3.amsl.com
Delivered-To: tls@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 985F13A6A75 for <tls@core3.amsl.com>; Wed, 30 Jun 2010 00:47:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level:
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[AWL=0.589, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3QPUsu43FiOK for <tls@core3.amsl.com>; Wed, 30 Jun 2010 00:47:36 -0700 (PDT)
Received: from mx2-int.auckland.ac.nz (mx2-int.auckland.ac.nz [130.216.12.41]) by core3.amsl.com (Postfix) with ESMTP id E03D53A6A1E for <tls@ietf.org>; Wed, 30 Jun 2010 00:47:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=auckland.ac.nz; i=pgut001@cs.auckland.ac.nz; q=dns/txt; s=uoa; t=1277884067; x=1309420067; h=from:to:subject:cc:in-reply-to:message-id:date; z=From:=20Peter=20Gutmann=20<pgut001@cs.auckland.ac.nz> |To:=20Nicolas.Williams@oracle.com,=20tim@dierks.org |Subject:=20Re:=20[TLS]=20Eleven=20out=20of=20every=20ten =20SSL=20certs=20aren't=20valid|Cc:=20tls@ietf.org |In-Reply-To:=20<AANLkTinByiAIx1Pg4khiXLPb9KMexp2UUoZB7ik Lzd6f@mail.gmail.com>|Message-Id:=20<E1OTs0r-0000wx-N4@wi ntermute02.cs.auckland.ac.nz>|Date:=20Wed,=2030=20Jun=202 010=2019:47:17=20+1200; bh=DCaRQN1zWxFvmzyiVj2PgnZF0WhXGD81X/8cKS3ugRI=; b=u7LmN6TPqfzRmgV3N0emhZ+iIZ+E6OMNdgGYcG4O8cR9oDdYJb3UG8bb 4fpcuZcOpbkQxWnwttjZ6nrfjmcmcU8SSspFzF7R+froAE1pSvFwcG+mw EMMgfrPL1U0Q6oXiAvavrI26Z6PIVipI/1S/Tc+lsvN8s6WU1+1LDIl4r Y=;
X-IronPort-AV: E=Sophos;i="4.53,510,1272801600"; d="scan'208";a="13298683"
X-Ironport-HAT: UNIVERSITY - $RELAY-THROTTLE
X-Ironport-Source: 130.216.207.92 - Outgoing - Outgoing
Received: from wintermute02.cs.auckland.ac.nz ([130.216.207.92]) by mx2-int.auckland.ac.nz with ESMTP/TLS/AES256-SHA; 30 Jun 2010 19:47:18 +1200
Received: from pgut001 by wintermute02.cs.auckland.ac.nz with local (Exim 4.69) (envelope-from <pgut001@cs.auckland.ac.nz>) id 1OTs0r-0000wx-N4; Wed, 30 Jun 2010 19:47:17 +1200
From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: Nicolas.Williams@oracle.com, tim@dierks.org
In-Reply-To: <AANLkTinByiAIx1Pg4khiXLPb9KMexp2UUoZB7ikLzd6f@mail.gmail.com>
Message-Id: <E1OTs0r-0000wx-N4@wintermute02.cs.auckland.ac.nz>
Date: Wed, 30 Jun 2010 19:47:17 +1200
Cc: tls@ietf.org
Subject: Re: [TLS] Eleven out of every ten SSL certs aren't valid
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Jun 2010 07:47:37 -0000

Tim Dierks <tim@dierks.org> writes:

>What is being said is that 97% of DNS names that point at SSL servers do not
>validate with those DNS names. This is, on its face, is a statement about DNS
>configuration, not about SSL servers.

It really doesn't matter whose fault it is, what matters is how many users 
will see, and need to click away, cert warnings when they connect.  The user 
doesn't care less which obscure bit of geekery caused it, all they care about 
is that they're seeing yet another pointless dialog that they have to get rid 
of.

>To learn anything interesting about SSL servers at all, more work must be
>done.

What needs to be done is to define metrics for what's being analysed.  If you 
want a single figure then I'd use "Will a user connecting with IE6 / IE7 / 
Firefox / (and possibly Chrome) see a warning when they connect?" (to pick 
browsers with > 10% market share).  Why they see a warning is up to the geeks 
to figure out, the important metric in terms of security is what the users 
experience.

Peter.