Re: [websec] #58: Should we pin only SPKI, or also names

Trevor Perrin <trevp@trevp.net> Wed, 07 August 2013 09:45 UTC

Return-Path: <trevp@trevp.net>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8B33711E8122 for <websec@ietfa.amsl.com>; Wed, 7 Aug 2013 02:45:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.977
X-Spam-Level:
X-Spam-Status: No, score=-2.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KHoF04YwHzNo for <websec@ietfa.amsl.com>; Wed, 7 Aug 2013 02:45:50 -0700 (PDT)
Received: from mail-wi0-f171.google.com (mail-wi0-f171.google.com [209.85.212.171]) by ietfa.amsl.com (Postfix) with ESMTP id 00A4611E811E for <websec@ietf.org>; Wed, 7 Aug 2013 02:45:49 -0700 (PDT)
Received: by mail-wi0-f171.google.com with SMTP id hr7so3652446wib.16 for <websec@ietf.org>; Wed, 07 Aug 2013 02:45:49 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=6K9LeV71/bxgrsJq+K8mpsWSgF/jtW60NJ6pVpYbXBQ=; b=Durjmio3neSBlzQbIuaDLGny2pEHURycwWHjpc6E552AEuTmkZ0211ddjDqKZXHMiR r5cl0hxObCXgTNERKaVgNbUmOJZC17TAZPenqn62hkbroXAHta9r5tTlrjmrlr1D/h41 q5KHCgtnrZqrFwTfyoqF6tHlLCoY1Ihnt7xjE+Po0sZB1xKdlK+fID3cH+VWrECPbxMd Xk9V4Qi2wSuGXgmszrEFu5Sokz2z6iDF+EIdKPjYsxYaeLqQs9S0Tt0v8HJonkxI/TiU 7cQZr8JMpzAoMV3RmVDBIQML8cu/nNG8HTTmSm28qObLoQmjpv3ZxDaDgQIKCgfABbn7 SLeg==
X-Gm-Message-State: ALoCoQnPSIqPxaF6N6lypFIZmMcZuacP6FqxazkmkJOV5smGIWE0BgDuVwBCQf/oXggUJNOYdROC
MIME-Version: 1.0
X-Received: by 10.194.174.36 with SMTP id bp4mr1738244wjc.7.1375868749032; Wed, 07 Aug 2013 02:45:49 -0700 (PDT)
Received: by 10.216.212.9 with HTTP; Wed, 7 Aug 2013 02:45:48 -0700 (PDT)
X-Originating-IP: [24.234.64.225]
In-Reply-To: <520214F7.8020308@mozilla.org>
References: <060.be9b0009dc0350ca543f553042673944@trac.tools.ietf.org> <073501ce8c6e$f6c17d90$e44478b0$@digicert.com> <CAMm+LwjdGJC4FHCJ_OAYGRqCGGc0Nz1pLV=yVGK9M9E7drfujQ@mail.gmail.com> <CAOuvq200e9HnPX1w9sZ+e7ipBmdgZdPL5xzKDgcaDpSxz1N=gg@mail.gmail.com> <CAMm+Lwh384YBMXw-BDoxJw+AN4qv8x6GQpF9YK4PW1gQRnadpg@mail.gmail.com> <6125A841-6C85-4858-B37F-C021067F0CFA@checkpoint.com> <2035FF99-A079-4F2F-B4DE-962FE1C1B964@checkpoint.com> <CAGZ8ZG2Ex9Cvft38zSQX5Hcu3hU40HOjpAM+9fCG=JgBJM55Qg@mail.gmail.com> <520214F7.8020308@mozilla.org>
Date: Wed, 07 Aug 2013 02:45:48 -0700
Message-ID: <CAGZ8ZG2N7NBUvjYQVw=CKgnq1KG5JfeN9hZU2-DSKT6OFmBVFg@mail.gmail.com>
From: Trevor Perrin <trevp@trevp.net>
To: Gervase Markham <gerv@mozilla.org>
Content-Type: text/plain; charset="ISO-8859-1"
Cc: websec <websec@ietf.org>
Subject: Re: [websec] #58: Should we pin only SPKI, or also names
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Aug 2013 09:45:56 -0000

On Wed, Aug 7, 2013 at 2:35 AM, Gervase Markham <gerv@mozilla.org> wrote:
> On 07/08/13 10:28, Trevor Perrin wrote:
>> This is relevant to the .well-known URI vs HTTP Header discussion.
>> Pinning CA names would reduce HPKP size, making frequent sending of
>> headers more palatable.
>
> Surely it would also significantly reduce flexibility?

I wouldn't remove key pinning.  Just allow pinning to CA names as well.

So an HPKP header could list keys both "directly" (by hash value) and
"indirectly" (by name).

Presumably the browser would have a table mapping names to key lists,
and would evaluate a site's cert chain by checking for an intersection
with all relevant keys in the pin (direct or indirect).


> At the moment, I can pin to a particular leaf, or a particular
> intermediate, or a particular root, or to a set of any of the above. I
> can decide where in the chain to pin depending on my analysis of the
> cost/benefit.

I'm not suggesting disallowing that.

That sounds a bit complicated for most sites, though.  I'm imagining
that listing several trustworthy CAs, by name, would be a safer and
easier pin for most?


Trevor