Re: [websec] Fwd: New Version Notification for draft-ietf-websec-key-pinning-03.txt
"Ryan Sleevi" <ryan-ietfhasmat@sleevi.com> Wed, 17 October 2012 18:33 UTC
Return-Path: <ryan-ietfhasmat@sleevi.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7CC5521F84DE for <websec@ietfa.amsl.com>; Wed, 17 Oct 2012 11:33:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WVKU3rdfomfd for <websec@ietfa.amsl.com>; Wed, 17 Oct 2012 11:33:46 -0700 (PDT)
Received: from homiemail-a27.g.dreamhost.com (mailbigip.dreamhost.com [208.97.132.5]) by ietfa.amsl.com (Postfix) with ESMTP id 9EFA621F8504 for <websec@ietf.org>; Wed, 17 Oct 2012 11:33:46 -0700 (PDT)
Received: from homiemail-a27.g.dreamhost.com (localhost [127.0.0.1]) by homiemail-a27.g.dreamhost.com (Postfix) with ESMTP id 7088D598060; Wed, 17 Oct 2012 11:33:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sleevi.com; h=message-id :in-reply-to:references:date:subject:from:to:cc:reply-to :mime-version:content-type:content-transfer-encoding; s= sleevi.com; bh=E9Ey9NFiTyKt2D8pp2MzS+c2Vic=; b=vE3GkP5Cdt1/ZwW/E HUCU8crTVHJukhjhd+ZT/7vJmyUCUxZApnMSgrYg5HoBRh42AoDEU0k7fPkizX5A 7WfcgWFTjQPb2gns4LPSSmS3TWaKj7qQ8fCP57mKSbGn2Oqo8CjIWMs7Ao7Pe3Ah bEDyT/y1Pddh6ZFRDQaFR1s8K8=
Received: from webmail.dreamhost.com (caiajhbihbdd.dreamhost.com [208.97.187.133]) (Authenticated sender: ryan@sleevi.com) by homiemail-a27.g.dreamhost.com (Postfix) with ESMTPA id 102A359807B; Wed, 17 Oct 2012 11:33:34 -0700 (PDT)
Received: from 173.8.157.162 (proxying for 173.8.157.162) (SquirrelMail authenticated user ryan@sleevi.com) by webmail.dreamhost.com with HTTP; Wed, 17 Oct 2012 11:33:34 -0700
Message-ID: <e396ba523eed09bc0bee3ee3ffd7f9d0.squirrel@webmail.dreamhost.com>
In-Reply-To: <CCA46922.33DD7%carl@redhoundsoftware.com>
References: <CCA46922.33DD7%carl@redhoundsoftware.com>
Date: Wed, 17 Oct 2012 11:33:34 -0700
From: Ryan Sleevi <ryan-ietfhasmat@sleevi.com>
To: Carl Wallace <carl@redhoundsoftware.com>
User-Agent: SquirrelMail/1.4.21
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Cc: IETF WebSec WG <websec@ietf.org>
Subject: Re: [websec] Fwd: New Version Notification for draft-ietf-websec-key-pinning-03.txt
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: ryan-ietfhasmat@sleevi.com
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Oct 2012 18:33:47 -0000
On Wed, October 17, 2012 11:07 am, Carl Wallace wrote: <snip> > I don't doubt any of this, but still think a crawler tool would be > sufficient in many (if not most) cases. It'd probably be instructive to > run for the site operators in the worst case. Note, I did not suggest > that a user report feature was not a good or necessary thing, only that a > builder tool for the site operator to run without bothering any users > would be nice to have in the toolbox too. Thinking about it, they may > well be the same tool if the user reporting tool is aggressive enough. Ah, I misunderstood your point to be suggesting that a crawler would be sufficient, and reporting would be unnecessary. I'm a big fan of the crawler - both for purposes of pinning and for purposes of generally understanding the nature of the web PKI. Public datasets such as the EFF SSL Observatory data [1], along with private datasets such as those that inform tools such as Qualys' SSL Labs [2] or the Google's Certificate Catalog [3], would go a good deal to establish what the known-possible certificate hierarchies are. I just thing there will be a tail of oddities and legacy that are only picked up by reporting. [1] https://www.eff.org/observatory [2] https://www.ssllabs.com/ [3] http://googleonlinesecurity.blogspot.com/2011/04/improving-ssl-certificate-security.html
- [websec] Fwd: New Version Notification for draft-… Chris Palmer
- Re: [websec] Fwd: New Version Notification for dr… Yoav Nir
- Re: [websec] Fwd: New Version Notification for dr… Tom Ritter
- Re: [websec] Fwd: New Version Notification for dr… Ryan Sleevi
- Re: [websec] Fwd: New Version Notification for dr… Carl Wallace
- Re: [websec] Fwd: New Version Notification for dr… Ryan Sleevi
- Re: [websec] Fwd: New Version Notification for dr… Carl Wallace
- Re: [websec] Fwd: New Version Notification for dr… Ryan Sleevi
- Re: [websec] Fwd: New Version Notification for dr… Chris Palmer
- Re: [websec] Fwd: New Version Notification for dr… Chris Palmer
- Re: [websec] Fwd: New Version Notification for dr… Tobias Gondrom
- Re: [websec] Fwd: New Version Notification for dr… Tom Ritter
- Re: [websec] Fwd: New Version Notification for dr… Chris Palmer