Re: [websec] Richard Barnes' Yes on draft-ietf-websec-key-pinning-19: (with COMMENT)
Yoav Nir <ynir.ietf@gmail.com> Wed, 06 August 2014 22:12 UTC
Return-Path: <ynir.ietf@gmail.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C33D81B28F5; Wed, 6 Aug 2014 15:12:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a5gXleoSfqtc; Wed, 6 Aug 2014 15:12:05 -0700 (PDT)
Received: from mail-wg0-x229.google.com (mail-wg0-x229.google.com [IPv6:2a00:1450:400c:c00::229]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A75D61B28F3; Wed, 6 Aug 2014 15:12:04 -0700 (PDT)
Received: by mail-wg0-f41.google.com with SMTP id z12so3295533wgg.0 for <multiple recipients>; Wed, 06 Aug 2014 15:12:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=peOkvCEZfsdUuKGSRy0e7eX6hJ41JnhO2aysc8toSR8=; b=BDSb9zeURDLZjXADWGd1GOJb0BkRto4BMvKQDUZYuOLIxJzVZWHgaEKZJd70MrnAY/ VFVmvxUBcCrgOtjG2/FSwjKszC6kO9nF+PfHjSxuodTAvrjvG/dnPWry9ZJ7kfmdZyqi ArsD3QxuZMcONW9KotU48E++XBr4MtYaMnruFEEhvWnb4snnIzFNZaHNdpdkQKh00n+0 zmhkTHzD7/QnERYi6UN2hBjPTp069mnwLJE64o6OJUk9U4ITrwOosg4dsKUhsYWdbK3H yNErpAGxRjSTMVdu5hJ3ngkI1rPlJoUXutXL+eTbQfFPdgjRnAJwm06sWqzfOrr/mtDG Bt+g==
X-Received: by 10.180.184.133 with SMTP id eu5mr48046627wic.26.1407363123239; Wed, 06 Aug 2014 15:12:03 -0700 (PDT)
Received: from [192.168.1.104] (bzq-84-109-50-18.red.bezeqint.net. [84.109.50.18]) by mx.google.com with ESMTPSA id eh7sm5315671wjd.32.2014.08.06.15.12.02 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 06 Aug 2014 15:12:02 -0700 (PDT)
Content-Type: text/plain; charset="windows-1252"
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Yoav Nir <ynir.ietf@gmail.com>
In-Reply-To: <20140806192308.15466.52635.idtracker@ietfa.amsl.com>
Date: Thu, 07 Aug 2014 01:12:00 +0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <4069DECD-ADB7-43BF-9323-1920A99BE141@gmail.com>
References: <20140806192308.15466.52635.idtracker@ietfa.amsl.com>
To: Richard Barnes <rlb@ipv.sx>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: http://mailarchive.ietf.org/arch/msg/websec/1m13BaGR7BxfH38FDrSmkdMRIMc
Cc: draft-ietf-websec-key-pinning@tools.ietf.org, websec@ietf.org, The IESG <iesg@ietf.org>, websec-chairs@tools.ietf.org
Subject: Re: [websec] Richard Barnes' Yes on draft-ietf-websec-key-pinning-19: (with COMMENT)
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec/>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Aug 2014 22:12:07 -0000
On Aug 6, 2014, at 10:23 PM, Richard Barnes <rlb@ipv.sx> wrote: > Section 2.5. "at least one Pin that does NOT refer to an SPKI in the > certificate chain" > > I understand the motivation for this, but this doesn't actually force the > site to have a backup pin -- they can just make up a pin value. It seems > like it would be more effective to make the recommendation in Section 4.3 > stronger. I don’t think we can force a site to do thing securely with any protocol. TLS and the like require "32 bytes generated by a secure RNG” here and “nonce” there, yet the peer has no way of checking whether an implementation uses a 64-bit LFSR for the former and a hard-coded value for the latter. We’re hoping this requirement will steer them in the right direction, but there are no guarantees. > But if the WG thinks the requirement for a backup pin is worth the effort, it is specified interoperably, so I'm not going to stand in the way. It does. Besides, generating a real key is as easy as generating a fake one: openssl genrsa -out private 2048 openssl rsa -in private -putout -outform DER -out public openssl dgst -sha256 -binary public | base64 > Section 4. "Security Considerations" > > Most of these seem more like "Operational Considerations" or > "How-To-Not-Brick-Your-Site Considerations". :) We felt that not bricking your site was very important. And it is security-relevant. If you don’t do these things, then a key compromise is augmented by a long-lasting DoS. If you don’t follow the advice, then this security mechanism actually makes the attacks worse. Yoav
- [websec] Richard Barnes' Yes on draft-ietf-websec… Richard Barnes
- Re: [websec] Richard Barnes' Yes on draft-ietf-we… Ryan Sleevi
- Re: [websec] Richard Barnes' Yes on draft-ietf-we… Richard Barnes
- Re: [websec] Richard Barnes' Yes on draft-ietf-we… Yoav Nir