Re: [TLS] [saag] [pkix] Cert Enumeration and Key Assurance With DNSSEC

Yaron Sheffer <yaronf.ietf@gmail.com> Wed, 06 October 2010 21:17 UTC

Return-Path: <yaronf.ietf@gmail.com>
X-Original-To: tls@core3.amsl.com
Delivered-To: tls@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 13B023A7147; Wed, 6 Oct 2010 14:17:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.449
X-Spam-Level:
X-Spam-Status: No, score=-102.449 tagged_above=-999 required=5 tests=[AWL=0.150, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QnxdQCLQqM6P; Wed, 6 Oct 2010 14:16:59 -0700 (PDT)
Received: from mail-fx0-f44.google.com (mail-fx0-f44.google.com [209.85.161.44]) by core3.amsl.com (Postfix) with ESMTP id 053223A71E5; Wed, 6 Oct 2010 14:16:57 -0700 (PDT)
Received: by fxm6 with SMTP id 6so9814fxm.31 for <multiple recipients>; Wed, 06 Oct 2010 14:17:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from :user-agent:mime-version:to:cc:subject:references:in-reply-to :content-type:content-transfer-encoding; bh=lnSVHYR12MIJciOaVQlrO+vYpkQLQPf2U6qFCEiOJTk=; b=XwE6DBl33CHleM9lZrdO/+9g8Xzn0WGh8HdbmLN8QorQogLysEQffyg+DbD6mPLC50 CYFU4T1+nWmZyJr+PWjoEKCi+WHWkvQtUTRa8/7V6hAAbWFwfzxf/y10oPrICYt6QdVJ Ynq4/uZYPLA+n/q1yW6fvpIDalV2ZE+K0S/I4=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; b=MQoYHjh4DcF5HgD8Aaof+J4O3py1qPT2dGDcpte6qSksVz6vLM1xCW91p/walRjDL4 U3cpm24VjjhJjfSZfrq37K55eZsQE6rrBwk34AjKtsR6tYc1pIJSdceO1sVJi9HtXOdx +Eve86cB8oL+q3ks7og5SYd/VArhoucMhejeQ=
Received: by 10.223.109.141 with SMTP id j13mr13126150fap.39.1286399872972; Wed, 06 Oct 2010 14:17:52 -0700 (PDT)
Received: from [10.0.0.2] (bzq-79-181-39-14.red.bezeqint.net [79.181.39.14]) by mx.google.com with ESMTPS id u8sm686757fah.36.2010.10.06.14.17.49 (version=SSLv3 cipher=RC4-MD5); Wed, 06 Oct 2010 14:17:51 -0700 (PDT)
Message-ID: <4CACE77B.80804@gmail.com>
Date: Wed, 06 Oct 2010 23:17:47 +0200
From: Yaron Sheffer <yaronf.ietf@gmail.com>
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.1.12) Gecko/20100915 Lightning/1.0b1 Thunderbird/3.0.8
MIME-Version: 1.0
To: mrex@sap.com
References: <201010050046.o950kBPe005266@fs4113.wdf.sap.corp>
In-Reply-To: <201010050046.o950kBPe005266@fs4113.wdf.sap.corp>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: pkix@ietf.org, dnsop@ietf.org, Michael StJohns <mstjohns@comcast.net>, saag@ietf.org, tls@ietf.org
Subject: Re: [TLS] [saag] [pkix] Cert Enumeration and Key Assurance With DNSSEC
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Oct 2010 21:17:00 -0000

People keep referring to the 100+ vendor CA jungle. It is somewhat 
impolite to point it out, but there are very few major vendors in this 
space, and these vendors have been implicated in some of the most 
publicized attacks. In some cases, hiding behind a "low-cost" brand name.

In other words, the problem with the TLS PKI is not (only) the small fish.

Thanks,
	Yaron

On 10/05/2010 02:46 AM, Martin Rex wrote:
[...]
>
> Conceptually, limiting the certificates that can be used to provide
> servers on specific DNS hostnames to certificates explicitly listed
> by the DNS admin would significantly reduce the huge attack surface
> of the existing "TLS PKI" with>100 independent pre-configured
> trust-anchors in most TLS client software.
>