Re: [Trans] WGLC started for draft-ietf-trans-threat-analysis

"David A. Cooper" <david.cooper@nist.gov> Thu, 10 May 2018 18:37 UTC

Return-Path: <david.cooper@nist.gov>
X-Original-To: trans@ietfa.amsl.com
Delivered-To: trans@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 155BF127599 for <trans@ietfa.amsl.com>; Thu, 10 May 2018 11:37:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.476
X-Spam-Level:
X-Spam-Status: No, score=-3.476 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_HTML_ONLY=0.723, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id friKy4L31KPr for <trans@ietfa.amsl.com>; Thu, 10 May 2018 11:37:37 -0700 (PDT)
Received: from wsget1.nist.gov (wsget1.nist.gov [IPv6:2610:20:6005:13::150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BCCF012D94B for <trans@ietf.org>; Thu, 10 May 2018 11:37:36 -0700 (PDT)
Received: from WSGHUB2.xchange.nist.gov (129.6.42.35) by wsget1.nist.gov (129.6.13.150) with Microsoft SMTP Server (TLS) id 14.3.389.1; Thu, 10 May 2018 14:38:47 -0400
Received: from postmark.nist.gov (129.6.16.94) by mail-g.nist.gov (129.6.42.33) with Microsoft SMTP Server id 14.3.389.1; Thu, 10 May 2018 14:37:33 -0400
Received: from [129.6.105.183] (cooper-optiplex-9010.campus.nist.gov [129.6.105.183]) by postmark.nist.gov (8.13.8/8.13.1) with ESMTP id w4AIb5QC005728; Thu, 10 May 2018 14:37:05 -0400
To: Stephen Kent <s@zerho.info>
CC: Paul Wouters <paul@nohats.ca>, Melinda Shore <melinda.shore@gmail.com>, Trans <trans@ietf.org>
References: <alpine.LRH.2.21.1804161658150.17034@bofh.nohats.ca> <cf3fd01c-a1f2-0cd0-d1a2-cda7b9558986@nist.gov> <IUUXIbDImicbov7jLKxe4l9QVrF_cCO0F1_mY4LpATYvr-Eag7fAJwnwqnviKXU3drx1vKgpuE6hkehmUMBq2QzPSKNKaMdM3D6LIMv2Gig=@zerho.info>
From: "David A. Cooper" <david.cooper@nist.gov>
Message-ID: <78496468-a279-7e1b-f29b-be679d71dc6e@nist.gov>
Date: Thu, 10 May 2018 14:37:07 -0400
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0
MIME-Version: 1.0
In-Reply-To: <IUUXIbDImicbov7jLKxe4l9QVrF_cCO0F1_mY4LpATYvr-Eag7fAJwnwqnviKXU3drx1vKgpuE6hkehmUMBq2QzPSKNKaMdM3D6LIMv2Gig=@zerho.info>
Content-Type: text/html; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-NIST-MailScanner-Information:
Archived-At: <https://mailarchive.ietf.org/arch/msg/trans/D9IUMOPi982IXyR7fQagID05BKY>
Subject: Re: [Trans] WGLC started for draft-ietf-trans-threat-analysis
X-BeenThere: trans@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Public Notary Transparency working group discussion list <trans.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/trans>, <mailto:trans-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/trans/>
List-Post: <mailto:trans@ietf.org>
List-Help: <mailto:trans-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/trans>, <mailto:trans-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 May 2018 18:37:41 -0000

On 05/09/2018 08:49 AM, Stephen Kent wrote:
  1. Section 4.1.1.4 says "Unfortunately, experience suggests that many browsers do not perform thorough syntactic checks on certificates, and so it seems unlikely that browsers will be a reliable way to detect erroneous certificates." and Section 4.2.1.4 says "As noted above (4.1.1.4), most browsers fail to perform thorough syntax checks on certificates." These sentences should be removed or modified. There is no reason that a browser should perform thorough syntactic checks on certificates, and there are good reasons for browsers not to. So, this document should not be labeling this as unfortunate or a failure. We do not want to encourage browsers to perform thorough syntax checks on certificates, as this could lead to the same types of problems that TLS has experienced, where making a change in something causes deployed products to break. 

It seems likely that the primary reason that browsers fail to perform thorough syntactic checks on certificates is because, at least historically, some CAs fail to issue syntactically valid certificates. This failure by browsers flies in the face of PKIX standards; you, as one who usually insists that failures to follow standards ought to be a capital crime, have no basis for criticizing this text. No changes will be made in response to this comment.


If only I had a nickel for every time you made some false accusation about me, I'd be retired by now.

Please see the message below, which I sent to mail list before you sent your response above.

Even in your response yesterday you said that "a certificate that violated the syntax imposed by a criteria such as the CABF would qualify as mis-issued," so the document does not intend to suggest that syntactic checks are just about PKIX standards, they are also about certificate profiles, which are subject to change.

This isn't about accommodating CAs that issue certificates incorrectly, but about acknowledging that (1) certificate profiles can change over time and (2) some clients will continue to use browsers that are very old.

-------- Forwarded Message --------
Subject: Re: [Trans] WGLC started for draft-ietf-trans-threat-analysis
Date: Mon, 7 May 2018 16:48:44 -0400
From: David A. Cooper <david.cooper@nist.gov>
To: Andrew Ayer <agwa@andrewayer.name>
CC: Paul Wouters <paul@nohats.ca>, Trans <trans@ietf.org>, Melinda Shore <melinda.shore@gmail.com>


I think it's fine for browsers to check for syntactic errors in certificates. However, I interpreted "thorough syntactic checks on certificates" to mean that browsers should be performing checks such as the ones described in https://tools.ietf.org/html/draft-kent-trans-domain-validation-cert-checks" rel="nofollow">https://tools.ietf.org/html/draft-kent-trans-domain-validation-cert-checks and https://tools.ietf.org/html/draft-kent-trans-extended-validation-cert-checks" rel="nofollow">https://tools.ietf.org/html/draft-kent-trans-extended-validation-cert-checks.

Most of the checks in these drafts are fine, as they are checks for requirements that are unlikely to change. However, some of the checks are more problematic. For example, the first of these drafts say that for DV certificates

             if the [subject] name does not contain an organizationName attribute,
             then the streetAddress attribute MUST NOT be present. If
             the organizationName attribute is present, the streetAddress
             attribute MAY be present.  This requirement is derived from
             section 9.2.4b of [CABF-DV].

What if a browser implemented a check for this and then the CA/Browser Forum later updated their Baseline Requirements to allow a streetAddress attribute in the subject fields of certificates that do not contain an organizationName attribute? This wouldn't cause a problem for users who keep their browsers up to date, but some clients continue to use browsers that are very old.