Re: [websec] Fwd: New Version Notification for draft-ietf-websec-key-pinning-03.txt

"Ryan Sleevi" <ryan-ietfhasmat@sleevi.com> Wed, 17 October 2012 18:33 UTC

Return-Path: <ryan-ietfhasmat@sleevi.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7CC5521F84DE for <websec@ietfa.amsl.com>; Wed, 17 Oct 2012 11:33:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WVKU3rdfomfd for <websec@ietfa.amsl.com>; Wed, 17 Oct 2012 11:33:46 -0700 (PDT)
Received: from homiemail-a27.g.dreamhost.com (mailbigip.dreamhost.com [208.97.132.5]) by ietfa.amsl.com (Postfix) with ESMTP id 9EFA621F8504 for <websec@ietf.org>; Wed, 17 Oct 2012 11:33:46 -0700 (PDT)
Received: from homiemail-a27.g.dreamhost.com (localhost [127.0.0.1]) by homiemail-a27.g.dreamhost.com (Postfix) with ESMTP id 7088D598060; Wed, 17 Oct 2012 11:33:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sleevi.com; h=message-id :in-reply-to:references:date:subject:from:to:cc:reply-to :mime-version:content-type:content-transfer-encoding; s= sleevi.com; bh=E9Ey9NFiTyKt2D8pp2MzS+c2Vic=; b=vE3GkP5Cdt1/ZwW/E HUCU8crTVHJukhjhd+ZT/7vJmyUCUxZApnMSgrYg5HoBRh42AoDEU0k7fPkizX5A 7WfcgWFTjQPb2gns4LPSSmS3TWaKj7qQ8fCP57mKSbGn2Oqo8CjIWMs7Ao7Pe3Ah bEDyT/y1Pddh6ZFRDQaFR1s8K8=
Received: from webmail.dreamhost.com (caiajhbihbdd.dreamhost.com [208.97.187.133]) (Authenticated sender: ryan@sleevi.com) by homiemail-a27.g.dreamhost.com (Postfix) with ESMTPA id 102A359807B; Wed, 17 Oct 2012 11:33:34 -0700 (PDT)
Received: from 173.8.157.162 (proxying for 173.8.157.162) (SquirrelMail authenticated user ryan@sleevi.com) by webmail.dreamhost.com with HTTP; Wed, 17 Oct 2012 11:33:34 -0700
Message-ID: <e396ba523eed09bc0bee3ee3ffd7f9d0.squirrel@webmail.dreamhost.com>
In-Reply-To: <CCA46922.33DD7%carl@redhoundsoftware.com>
References: <CCA46922.33DD7%carl@redhoundsoftware.com>
Date: Wed, 17 Oct 2012 11:33:34 -0700
From: Ryan Sleevi <ryan-ietfhasmat@sleevi.com>
To: Carl Wallace <carl@redhoundsoftware.com>
User-Agent: SquirrelMail/1.4.21
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Cc: IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] Fwd: New Version Notification for draft-ietf-websec-key-pinning-03.txt
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: ryan-ietfhasmat@sleevi.com
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Oct 2012 18:33:47 -0000

On Wed, October 17, 2012 11:07 am, Carl Wallace wrote:
<snip>
>  I don't doubt any of this, but still think a crawler tool would be
>  sufficient in many (if not most) cases.  It'd probably be instructive to
>  run for the site operators in the worst case.  Note, I did not suggest
>  that a user report feature was not a good or necessary thing, only that a
>  builder tool for the site operator to run without bothering any users
>  would be nice to have in the toolbox too.  Thinking about it, they may
>  well be the same tool if the user reporting tool is aggressive enough.

Ah, I misunderstood your point to be suggesting that a crawler would be
sufficient, and reporting would be unnecessary.

I'm a big fan of the crawler - both for purposes of pinning and for
purposes of generally understanding the nature of the web PKI. Public
datasets such as the EFF SSL Observatory data [1], along with private
datasets such as those that inform tools such as Qualys' SSL Labs [2] or
the Google's Certificate Catalog [3], would go a good deal to establish
what the known-possible certificate hierarchies are. I just thing there
will be a tail of oddities and legacy that are only picked up by
reporting.

[1] https://www.eff.org/observatory
[2] https://www.ssllabs.com/
[3]
http://googleonlinesecurity.blogspot.com/2011/04/improving-ssl-certificate-security.html