Re: [TLS] Why require EKU for certid?
Peter Saint-Andre <stpeter@stpeter.im> Wed, 22 September 2010 17:58 UTC
Return-Path: <stpeter@stpeter.im>
X-Original-To: tls@core3.amsl.com
Delivered-To: tls@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2877A3A69B4; Wed, 22 Sep 2010 10:58:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.551
X-Spam-Level:
X-Spam-Status: No, score=-102.551 tagged_above=-999 required=5 tests=[AWL=0.048, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RxfRqoZC9JzO; Wed, 22 Sep 2010 10:58:24 -0700 (PDT)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id F41613A685B; Wed, 22 Sep 2010 10:58:23 -0700 (PDT)
Received: from moveme.cisco.com (72-163-0-129.cisco.com [72.163.0.129]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 361F640074; Wed, 22 Sep 2010 12:03:45 -0600 (MDT)
Message-ID: <4C9A43D9.6060809@stpeter.im>
Date: Wed, 22 Sep 2010 11:58:49 -0600
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.12) Gecko/20100914 Thunderbird/3.0.8
MIME-Version: 1.0
To: Paul Hoffman <paul.hoffman@vpnc.org>
References: <C8B4E80F.EE82%stefan@aaa-sec.com> <4C9A2D12.3020409@stpeter.im> <p0624084ac8bfe10f5b72@[10.20.30.158]>
In-Reply-To: <p0624084ac8bfe10f5b72@[10.20.30.158]>
X-Enigmail-Version: 1.0.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Cc: IETF cert-based identity <certid@ietf.org>, ietf@ietf.org, tls@ietf.org
Subject: Re: [TLS] Why require EKU for certid?
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Sep 2010 17:58:25 -0000
On 9/22/10 10:44 AM, Paul Hoffman wrote: > At 10:21 AM -0600 9/22/10, Peter Saint-Andre wrote: >> On 9/14/10 12:51 AM, Stefan Santesson wrote: >>> General: I would consider stating that server certificates >>> according to this profile either MUST or SHOULD have the >>> serverAuth EKU set since it is allways related to the use of TSL >>> and server authentication. At least it MUST be set when allowing >>> checks of the CN-ID (see 2.3 below). >> >> Jeff and I are still discussing this topic and do not yet have >> editorial agreement about how to proceed. > > This is not editorial, this is definitely technical. Sorry, by "editorial agreement" I meant consensus between the document editors about how we think it's best to address the issue that Stefan raised. Jeff and I have discussed many of the issues that have been raised, but haven't yet had a chance to discuss this one. > What possible > advantage is there to making certificates that do not have this flag > set be excluded from the practices you are defining? That is, if a > TLS client gets a certificate from a TLS server that the TLS server > says is its authentication certificate, why should the client care > whether or not that flag is set? That flag is an assertion from the > CA, not from the server who is authenticating. > >>> 2.3 It would be good if we could restrict the use of CN-ID for >>> storing a domain name to the case when the serverAuth EKU is set. >>> Requiring the EKU reduce the probability that the CN-ID appears >>> to be a domain name by accident or is a domain name in the wrong >>> context. > > That makes no sense from an operational standpoint. The inclusion of > an EKU has nothing to do with the decision-making for the domain name > location. > >>> In many deployments, this also affects the name constraints >>> processing to perform domain name constraints also on the CN >>> attribute. > > True, and irrelevant. > >>> There should at least be a rule stating that any client that >>> accepts the CN attribute to carry the domain name MUST also >>> perform name constraints on this attribute using the domain name >>> logic if name constraints is applied to the path. Failing this >>> requirement poses a security threat if the claimed domain name in >>> CN-ID violated the name constraints set for domain names. > > Fully disagree. Thanks for your input. Our little editors team will take your comments under advisement during our discussion of this open issue. :) Peter -- Peter Saint-Andre https://stpeter.im/
- Re: [TLS] Review of draft-saintandre-tls-server-i… Peter Saint-Andre
- Re: [TLS] Review of draft-saintandre-tls-server-i… Peter Saint-Andre
- Re: [TLS] Review of draft-saintandre-tls-server-i… Bernard Aboba
- Re: [TLS] Review of draft-saintandre-tls-server-i… =JeffH
- Re: [TLS] [xmpp] Review of draft-saintandre-tls-s… Bernard Aboba
- Re: [TLS] Review of draft-saintandre-tls-server-i… James Schaad
- Re: [TLS] [xmpp] Review of draft-saintandre-tls-s… Bernard Aboba
- Re: [TLS] Review of draft-saintandre-tls-server-i… Peter Saint-Andre
- Re: [TLS] Review of draft-saintandre-tls-server-i… James Schaad
- Re: [TLS] Review of draft-saintandre-tls-server-i… Peter Saint-Andre
- Re: [TLS] Review of draft-saintandre-tls-server-i… Peter Saint-Andre
- [TLS] Why require EKU for certid? Paul Hoffman
- Re: [TLS] Why require EKU for certid? Peter Saint-Andre
- Re: [TLS] Why require EKU for certid? Jim Schaad
- Re: [TLS] [certid] Why require EKU for certid? Martin Rex
- Re: [TLS] [certid] Why require EKU for certid? Henry B. Hotz