Re: [TLS] AIA cert fetching seen as harmful

Mike <mike-list@pobox.com> Fri, 11 April 2008 03:20 UTC

Return-Path: <tls-bounces@ietf.org>
X-Original-To: tls-archive@ietf.org
Delivered-To: ietfarch-tls-archive@core3.amsl.com
Received: from core3.amsl.com (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 015AF3A69EE; Thu, 10 Apr 2008 20:20:48 -0700 (PDT)
X-Original-To: tls@core3.amsl.com
Delivered-To: tls@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 565C43A6BF5 for <tls@core3.amsl.com>; Thu, 10 Apr 2008 20:20:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.489
X-Spam-Level:
X-Spam-Status: No, score=-1.489 tagged_above=-999 required=5 tests=[AWL=1.110, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jAvbRdc-x4z8 for <tls@core3.amsl.com>; Thu, 10 Apr 2008 20:20:43 -0700 (PDT)
Received: from sasl.smtp.pobox.com (a-sasl-fastnet.sasl.smtp.pobox.com [207.106.133.19]) by core3.amsl.com (Postfix) with ESMTP id 5F8EC3A6A11 for <tls@ietf.org>; Thu, 10 Apr 2008 20:20:42 -0700 (PDT)
Received: from localhost.localdomain (localhost [127.0.0.1]) by a-sasl-fastnet.sasl.smtp.pobox.com (Postfix) with ESMTP id A0EA91CBE for <tls@ietf.org>; Thu, 10 Apr 2008 23:21:03 -0400 (EDT)
Received: from [192.168.1.8] (wsip-24-234-114-35.lv.lv.cox.net [24.234.114.35]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by a-sasl-fastnet.sasl.smtp.pobox.com (Postfix) with ESMTP id 3A0FA1CBD for <tls@ietf.org>; Thu, 10 Apr 2008 23:21:01 -0400 (EDT)
Message-ID: <47FED914.7050609@pobox.com>
Date: Thu, 10 Apr 2008 20:20:52 -0700
From: Mike <mike-list@pobox.com>
User-Agent: Thunderbird 2.0.0.12 (Windows/20080213)
MIME-Version: 1.0
To: tls@ietf.org
References: <200804101549.m3AFnH5T008818@fs4113.wdf.sap.corp> <47FE39E7.2020209@pobox.com> <47FEB492.6020209@bolyard.com>
In-Reply-To: <47FEB492.6020209@bolyard.com>
Subject: Re: [TLS] AIA cert fetching seen as harmful
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: tls-bounces@ietf.org
Errors-To: tls-bounces@ietf.org

>> This could be made safe with some help from PKIX (if X.509 doesn't
>> already support it -- I haven't read RFC 3280 or -bis in a while).
>> If root certificates listed constraints on what constitutes a valid
>> URL for retrieving issued certificates, then a server could scan
>> the combined list from each trusted root to determine if it is safe
>> to fetch a client certificate.
> 
> Are you all aware of this paper, now making a stir?
> 
>     https://www.cynops.de/techzone/http_over_x509.html
> 
> It claims that fetching CA certs from URLs found in AIA extensions in certs
> that have not yet been validated is a vulnerability.  At least one browser
> organization known to me agrees.

What I suggested is that the information about which URL's are safe
for the client certificate URL extension could be embedded in the
-root- certificate, which you trust.  When a client sends you a URL
in place of a certificate, you would compare it to the information
in each of your root certificates.  If the URL matches one of them,
you know it's safe to retrieve it; otherwise you best not.  Also,
theoretically it would be wasted effort since you would not be able
to build a complete certificate chain.  So this could also improve
performance in cases where client authentication will fail.

Mike
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls