Re: [Uta] Certificate pinning?

Trevor Perrin <trevp@trevp.net> Sun, 09 March 2014 09:21 UTC

Return-Path: <trevp@trevp.net>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CFE4E1A02AE for <uta@ietfa.amsl.com>; Sun, 9 Mar 2014 01:21:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.977
X-Spam-Level:
X-Spam-Status: No, score=-1.977 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bN7KgK1h0bhe for <uta@ietfa.amsl.com>; Sun, 9 Mar 2014 01:21:53 -0800 (PST)
Received: from mail-we0-f171.google.com (mail-we0-f171.google.com [74.125.82.171]) by ietfa.amsl.com (Postfix) with ESMTP id 20DC81A0240 for <uta@ietf.org>; Sun, 9 Mar 2014 01:21:52 -0800 (PST)
Received: by mail-we0-f171.google.com with SMTP id t61so7221451wes.30 for <uta@ietf.org>; Sun, 09 Mar 2014 01:21:47 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=3pyvhKhu7Jdjn/VZwOK6HV8I0ym1z8TP83PfiLDNP9k=; b=TVBlC25qsmcJavRHV/WC/Srd3GSj21UIeTNuni1Ylr6VCq2NNsDY9TTIeAMyLpDe8Z CQYwGdQwe10jfYAcciPs1y/RIydpX2AEWbfjHE9opMnpBwLXbWK33CM841D8NaieaxrR 8Gx0M1AVYQH/1EaS2Vb4dbQVAgmgvJvwe1WwWVBIC03wKl5sZdWn72d31lqadArzce8L 68e+oJ3nF0jGHFPlmyJ7L3e6ev++N+NVbqAxAauLTrwkT/ZxpeiNe4crXm+/jKQJ1O1z YkbHZ18OIXFtP2TQZBDyAKfOQTsD5iPtvoOtgQQOBSzcy+bYcJdVWyZ4UYiXny2om+9U G+lg==
X-Gm-Message-State: ALoCoQkMwQjgs/3uic6lFg8QRxAA6gqj1d2dI16Lc4wyXV5UlJFtiU4YpeBHS9odX34zpj8UZ2tN
MIME-Version: 1.0
X-Received: by 10.180.19.35 with SMTP id b3mr4927236wie.20.1394356907405; Sun, 09 Mar 2014 01:21:47 -0800 (PST)
Received: by 10.216.45.146 with HTTP; Sun, 9 Mar 2014 01:21:47 -0800 (PST)
X-Originating-IP: [184.23.29.222]
In-Reply-To: <CA+cU71mTPKjb7NqkPgtyqx=+nfmWFSvw5512Owy_Tg__=8XDHg@mail.gmail.com>
References: <5472A050F724AB161474A2E7@caldav.corp.apple.com> <CA+cU71mTPKjb7NqkPgtyqx=+nfmWFSvw5512Owy_Tg__=8XDHg@mail.gmail.com>
Date: Sun, 09 Mar 2014 01:21:47 -0800
Message-ID: <CAGZ8ZG2WC_+sLYvgjgjwL1SSOrZN1ddMMvsA2Gpnka55b2fexA@mail.gmail.com>
From: Trevor Perrin <trevp@trevp.net>
To: Tom Ritter <tom@ritter.vg>
Content-Type: multipart/alternative; boundary="bcaec53d5eb528066804f4290489"
Archived-At: http://mailarchive.ietf.org/arch/msg/uta/Hb06maWmAwzKgfrXREbJ6PJzP24
Cc: Cyrus Daboo <cyrus@daboo.name>, uta@ietf.org
Subject: Re: [Uta] Certificate pinning?
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 09 Mar 2014 09:21:56 -0000

On Fri, Mar 7, 2014 at 2:02 PM, Tom Ritter <tom@ritter.vg> wrote:

> Quite so.  http://tack.io/ is a mechanism for pinning that operates at
> the TLS layer, making it usable for a wide variety of protocols,
> without needing to redefine it for every application later protocol.
>
> -tom
>
> On 7 March 2014 10:12, Cyrus Daboo <cyrus@daboo.name> wrote:
> > Hi,
> > Has any thought been given to generalizing the certificate pinning work
> > being done by the websec WG
> > (<http://tools.ietf.org/html/draft-ietf-websec-key-pinning-11>) to make
> it
> > applicable to other protocols?
> >
> > And, vice versa, what about taking the concept of security latches from
> > draft-newman-email-deep-01 and making those available in HTTP?
>


To echo Tom, TACK's approach to pinning is applicable to any TLS-using
protocol (e.g. MUA protocols like POP, IMAP, or SMTP):

http://tools.ietf.org/html/draft-perrin-tls-tack-02


Cross-domain SMTP poses challenges for pinning due to MX indirection, one
approach is here:

https://lists.riseup.net/www/arc/tack/2013-08/msg00000.html


DEEP's "latches" allow a server to pin itself so that:
 (a) the server must forever present a valid certificate from any CA in the
Web PKI, or
 (b) the server must forever maintain a valid DANE record and DNSSEC chain.

There's no option for the server to pin itself to a 3rd-party of its own
choosing, or to manage its keys itself.  The assumption is apparently that
everyone wants to delegate the power to authenticate (and thus impersonate)
their domain to one of these two systems.  That's a bad assumption.

I also question the wisdom of pinning permanently to *anything*.  Mistakes
happen.  Domains change ownership.  TACK has a more conservative approach
to pin lifetimes.


Trevor