Re: [websec] Certificate Pinning via HSTS

Yoav Nir <ynir@checkpoint.com> Tue, 13 September 2011 05:51 UTC

Return-Path: <ynir@checkpoint.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4F81921F8C04 for <websec@ietfa.amsl.com>; Mon, 12 Sep 2011 22:51:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.378
X-Spam-Level:
X-Spam-Status: No, score=-10.378 tagged_above=-999 required=5 tests=[AWL=0.221, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UV9itYsjwDpE for <websec@ietfa.amsl.com>; Mon, 12 Sep 2011 22:51:56 -0700 (PDT)
Received: from michael.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by ietfa.amsl.com (Postfix) with ESMTP id 0018921F8BF9 for <websec@ietf.org>; Mon, 12 Sep 2011 22:51:54 -0700 (PDT)
X-CheckPoint: {4E6EFD1E-2-1B221DC2-FFFF}
Received: from il-ex01.ad.checkpoint.com (il-ex01.ad.checkpoint.com [194.29.34.26]) by michael.checkpoint.com (8.13.8/8.13.8) with ESMTP id p8D5rokQ017628; Tue, 13 Sep 2011 08:53:50 +0300
Received: from il-ex03.ad.checkpoint.com (194.29.34.71) by il-ex01.ad.checkpoint.com (194.29.34.26) with Microsoft SMTP Server (TLS) id 8.2.255.0; Tue, 13 Sep 2011 08:53:50 +0300
Received: from il-ex01.ad.checkpoint.com ([126.0.0.2]) by il-ex03.ad.checkpoint.com ([194.29.34.71]) with mapi; Tue, 13 Sep 2011 08:53:49 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: "Richard L. Barnes" <rbarnes@bbn.com>
Date: Tue, 13 Sep 2011 08:53:29 +0300
Thread-Topic: [websec] Certificate Pinning via HSTS
Thread-Index: Acxx2YIH8hl1RblfTBee59APMwFRFw==
Message-ID: <86A71F95-AAFF-4A09-853E-3888962C4930@checkpoint.com>
References: <CAOuvq22p2qNnXRsK=PS=mxknnq4MrCWt0Np-N8su-iHXaWHqpg@mail.gmail.com> <498A0E83-7C80-4226-9D69-7A7E93D8C929@bbn.com>
In-Reply-To: <498A0E83-7C80-4226-9D69-7A7E93D8C929@bbn.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
x-kse-antivirus-interceptor-info: scan successful
x-kse-antivirus-info: Clean
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-KSE-AntiSpam-Interceptor-Info: protection disabled
Cc: Chris Evans <cevans@google.com>, "websec@ietf.org" <websec@ietf.org>
Subject: Re: [websec] Certificate Pinning via HSTS
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Sep 2011 05:51:57 -0000

On Sep 13, 2011, at 3:54 AM, Richard L. Barnes wrote:

> Hey Chris & Chris,
> 
> This seems like a useful near-term approach, but also probably something that might want to migrate to DANE over time.
> 
> Is there any particular reason you're using key fingerprints instead of cert fingerprints?  It seems like the latter might be slightly easier to implement, since you don't have to parse the cert.

I can think of two reasons. 

1. Sometimes certificates are renewed periodically with the same public key. This is very common for sub-CAs and less so for EE certificates, but unless it has been compromised, or NIST recommends that you double your bit-length again, there's no reason not to use the same old public key and the new certificate

2. The spec talks about having a backup key pair kept offline. Although the spec says that you should have that key pair signed by a different CA, you can save money by not having it signed unless your "live" certificate has been lost or otherwise compromised. With the full automation you get with today's CAs, you can get a DV certificate in a matter of minutes. EV certificates take longer, but if you're the kind of organization that buys EV certificates, you might want a backup plan that includes a signed certificate.