Re: [websec] Certificate Pinning via HSTS (.txt version)
=JeffH <Jeff.Hodges@KingsMountain.com> Tue, 13 September 2011 18:31 UTC
Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1490921F8A6C for <websec@ietfa.amsl.com>; Tue, 13 Sep 2011 11:31:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.526
X-Spam-Level:
X-Spam-Status: No, score=-100.526 tagged_above=-999 required=5 tests=[AWL=-0.031, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, RDNS_NONE=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j2V329pUTJYz for <websec@ietfa.amsl.com>; Tue, 13 Sep 2011 11:31:37 -0700 (PDT)
Received: from oproxy9.bluehost.com (oproxy9.bluehost.com [IPv6:2605:dc00:100:2::a2]) by ietfa.amsl.com (Postfix) with SMTP id C9E5721F8A55 for <websec@ietf.org>; Tue, 13 Sep 2011 11:31:36 -0700 (PDT)
Received: (qmail 27705 invoked by uid 0); 13 Sep 2011 18:33:43 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by oproxy9.bluehost.com with SMTP; 13 Sep 2011 18:33:43 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kingsmountain.com; s=default; h=Content-Transfer-Encoding:Content-Type:Subject:To:MIME-Version:From:Date:Message-ID; bh=mT/FitIq2i8xMlr4/VWmv2yAxsKL9akJ1LgLNfNfx90=; b=RUIluefIdtx0WF2/y0PuE+OQ7XIEFkEsiFRZFZ2xi6ZhJx72YreB0p2WJxC0en/ml552OD3kuJoOlJ1AeQjO3CH4MR6nJJx+PMObOyJcy0M4AuFhmOa/l6qS80sOGXI7;
Received: from outbound4.ebay.com ([216.113.168.128] helo=[10.244.137.226]) by box514.bluehost.com with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.76) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1R3Xnj-0006nL-8e for websec@ietf.org; Tue, 13 Sep 2011 12:33:43 -0600
Message-ID: <4E6FA207.2050907@KingsMountain.com>
Date: Tue, 13 Sep 2011 11:33:43 -0700
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.21) Gecko/20110831 Thunderbird/3.1.13
MIME-Version: 1.0
To: IETF WebSec WG <websec@ietf.org>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 216.113.168.128 authed with jeff.hodges+kingsmountain.com}
Subject: Re: [websec] Certificate Pinning via HSTS (.txt version)
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Sep 2011 18:31:38 -0000
StPeter said.. > > On 9/12/11 5:53 PM, =JeffH wrote: >>> Chris Evans and I work at Google on the Chrome security team. We have >>> devised this specification for a new extension to Strict Transport >>> Security to allow site operators to "pin" certificates: UAs will >>> require that TLS connections be validated with at least one of the >>> public keys identified in the new "pins" directive in the HSTS header. >>> (Sites can pin to one or more public keys in end entity, subordinate >>> CA, and/or root CA certificates, for flexibility and disaster >>> recovery.) >>> >>> We hope that this mechanism opens up the benefits of certificate >>> pinning to more sites. Currently, Chrome can "pre-load" HSTS behavior >>> and certificate pins for sites, but the mechanism for doing this >>> (email us!) does not scale. >>> >>> We eagerly anticipate your comments, questions, concerns, et c. As you >>> can see from the Ideas section, there are some unanswered questions >>> about the behavior of UAs and hosts, and possible extensions to the >>> policy. >> >> This is great, thanks for posting this here. >> >> I have various comments on it I'll try to get to in the next day or so. >> >> During HSTS's gestation, various parties have discussed potential >> "LockCA" and "LockEV" directives ostensibly having similar semantics to >> what you've proposed here (see talk slides from last few websec sessions >> at IETF meetings). (though I think recent events pretty much obviate >> those nominal ideas because they'd relied on the resilience of one's CA >> and the CA infrastructure (oops)) > > <hat type='individual'/> > > Jeff, why do you say that? It seems to me that if you think various CAs > are dodgy or vulnerable, but you know and like the policies of the CA > you're using, you might well want to lock into that CA. yes, such a decision is more nuanced than I quickly painted it above. There's a number of trade-offs between "locking" / "pinning" to a CA, intermediates, end entity cert/key. =JeffH
- Re: [websec] Certificate Pinning via HSTS (.txt v… =JeffH
- Re: [websec] Certificate Pinning via HSTS (.txt v… Chris Palmer
- Re: [websec] Certificate Pinning via HSTS (.txt v… Peter Saint-Andre
- Re: [websec] Certificate Pinning via HSTS (.txt v… =JeffH
- Re: [websec] Certificate Pinning via HSTS (.txt v… Yoav Nir
- Re: [websec] Certificate Pinning via HSTS (.txt v… Daniel Kahn Gillmor
- Re: [websec] Certificate Pinning via HSTS (.txt v… Marsh Ray
- Re: [websec] Certificate Pinning via HSTS (.txt v… Chris Palmer
- Re: [websec] Certificate Pinning via HSTS (.txt v… Chris Palmer
- Re: [websec] Certificate Pinning via HSTS (.txt v… Gervase Markham
- Re: [websec] Certificate Pinning via HSTS (.txt v… Steingruebl, Andy
- Re: [websec] Certificate Pinning via HSTS (.txt v… Marsh Ray
- Re: [websec] Certificate Pinning via HSTS (.txt v… Chris Palmer
- Re: [websec] Certificate Pinning via HSTS (.txt v… Phillip Hallam-Baker
- Re: [websec] Certificate Pinning via HSTS (.txt v… davidillsley
- Re: [websec] Certificate Pinning via HSTS (.txt v… Marsh Ray
- Re: [websec] Certificate Pinning via HSTS (.txt v… Phillip Hallam-Baker
- Re: [websec] Certificate Pinning via HSTS (.txt v… davidillsley
- Re: [websec] Certificate Pinning via HSTS (.txt v… SM
- Re: [websec] Certificate Pinning via HSTS (.txt v… Chris Palmer
- Re: [websec] Certificate Pinning via HSTS (.txt v… Yoav Nir
- Re: [websec] Certificate Pinning via HSTS (.txt v… Phillip Hallam-Baker