Re: [websec] Comments on draft-ietf-websec-key-pinning-06
Phillip Hallam-Baker <hallam@gmail.com> Fri, 28 June 2013 15:00 UTC
Return-Path: <hallam@gmail.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF45121F9B99 for <websec@ietfa.amsl.com>; Fri, 28 Jun 2013 08:00:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZF-JzbDmy9Z5 for <websec@ietfa.amsl.com>; Fri, 28 Jun 2013 08:00:58 -0700 (PDT)
Received: from mail-wg0-x22b.google.com (mail-wg0-x22b.google.com [IPv6:2a00:1450:400c:c00::22b]) by ietfa.amsl.com (Postfix) with ESMTP id 84D8921F9BF8 for <websec@ietf.org>; Fri, 28 Jun 2013 08:00:57 -0700 (PDT)
Received: by mail-wg0-f43.google.com with SMTP id z11so1737713wgg.22 for <websec@ietf.org>; Fri, 28 Jun 2013 08:00:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=Q7438EHSEzAnLIl6Je8jlxL/ejWsGFauBoYQZP/t9C4=; b=pi5zu0k5Z8pxinljMLMLOh9CBBYd4Eqzh8+wXxOftwcicp7Q2YtJvS6dYP1pvtAPWm mg3k0siXfP8fPpmmB58Q4JdQm3RY3vcy6YhXDHuqAhHee1K7CUhaM8fOl+XpI5Aznsmg SzeOeCodFuVx0nGd0Yaq6z3BstbPsdp/iygpJ+5xEe81A5ckfX+qRUDjJwcxM0BP1dvf L9zXIjfr1VFisVIZGtMzWou7fSnwFbGfQPb5ufNKgDxnov8lhKSPL9WQhW7bfr8vBLSR fdCL+MipU/PP/0oavAAlwbvInxqGoNLrpQU66iVSXrMmE9K+z2YCTHGpJB95lISb5lHa WjbQ==
MIME-Version: 1.0
X-Received: by 10.180.187.136 with SMTP id fs8mr2717900wic.18.1372431656755; Fri, 28 Jun 2013 08:00:56 -0700 (PDT)
Received: by 10.194.54.10 with HTTP; Fri, 28 Jun 2013 08:00:56 -0700 (PDT)
In-Reply-To: <51CD39D9.1040801@gondrom.org>
References: <8c03997da80b4e8da7100491011b8c12@BN1PR03MB039.namprd03.prod.outlook.com> <6F2FE5F2-D02C-4B09-A6CA-7C3B63722E34@checkpoint.com> <CAOuvq203V8LNjkimfd2m+aTX7-gKr=J62jmUqz-PDQEN6O9Lvg@mail.gmail.com> <CAOuvq20_KZPcBWyPgpGj=K5gy=1BGGRv11Zuxmcw_wBmzBhgUA@mail.gmail.com> <CAGZ8ZG1uHYxxh9q+z7767zW4=HWTa19EJGiu4oyERhTyM0KQBw@mail.gmail.com> <51CD39D9.1040801@gondrom.org>
Date: Fri, 28 Jun 2013 11:00:56 -0400
Message-ID: <CAMm+LwhRm7dCk=Q=mQAWtOQ5hosjyngSWjVbQ454Tj+ocVDqrQ@mail.gmail.com>
From: Phillip Hallam-Baker <hallam@gmail.com>
To: Tobias Gondrom <tobias.gondrom@gondrom.org>
Content-Type: multipart/alternative; boundary="001a11c381ec612d4b04e03825a3"
Cc: dmatson@microsoft.com, websec <websec@ietf.org>
Subject: Re: [websec] Comments on draft-ietf-websec-key-pinning-06
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Jun 2013 15:00:58 -0000
CAA faced the problem of identifying a CA. During the evolution of the draft we went through pretty much every scheme mentioned in this thread. In the end we decided to go with a domain name that is asserted for that purpose by the CA. So symantec.com / comodo.com / etc. At this point the main reason Cert Pinning should follow the same route is that it is already in use and absent a good reason, TLS CA pinning should follow the existing approach. This makes it more likely that we will get the support embedded into platforms accurately. The main reason for going with domain names in CAA was that it means there is no need to create a new registry. That is important as it feels wrong to have an IETF spec differentiate between commercial and private CAs. It feels even wronger to have IANA managing registries of commercial providers. There are good business reasons for the CAs to not want their business under the control of IANA and vice versa. There are several other advantages though. One is that it makes it much easier to work out how to put in mechanisms to 'unpin' since these can now key off Domain names. So hypothetically let us imagine that there was a Diginotar situation and several hundred thousand browsers are now pinned to the busted root. Ooops. One way that we could approach unpinning in this situation would be to use something involving DNSSEC Now that is not an argument for writing more code now. But putting DNS names there are at least as good as any other option but the fact that they are a discovery index provides a LOT of power that may be useful down the line. This might happen in CAA. An obvious next step for CAA is to have a cert request mechanism where the end entity looks at the CAA record to find out where it can get certs from.
- [websec] Comments on draft-ietf-websec-key-pinnin… David Matson
- Re: [websec] Comments on draft-ietf-websec-key-pi… Yoav Nir
- Re: [websec] Comments on draft-ietf-websec-key-pi… Trevor Perrin
- Re: [websec] Comments on draft-ietf-websec-key-pi… Tobias Gondrom
- Re: [websec] Comments on draft-ietf-websec-key-pi… Trevor Perrin
- Re: [websec] Comments on draft-ietf-websec-key-pi… Chris Palmer
- Re: [websec] Comments on draft-ietf-websec-key-pi… Chris Palmer
- Re: [websec] Comments on draft-ietf-websec-key-pi… Tobias Gondrom
- Re: [websec] Comments on draft-ietf-websec-key-pi… Trevor Perrin
- Re: [websec] Comments on draft-ietf-websec-key-pi… Trevor Perrin
- Re: [websec] Comments on draft-ietf-websec-key-pi… Tobias Gondrom
- Re: [websec] Comments on draft-ietf-websec-key-pi… Phillip Hallam-Baker
- Re: [websec] Comments on draft-ietf-websec-key-pi… Trevor Perrin
- Re: [websec] Comments on draft-ietf-websec-key-pi… Phillip Hallam-Baker