Re: [websec] HPKP & different encodings of the same public key

Alice Wonder <alice@domblogger.net> Sun, 15 May 2016 23:23 UTC

Return-Path: <alice@domblogger.net>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EF3FD12D54F for <websec@ietfa.amsl.com>; Sun, 15 May 2016 16:23:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.427
X-Spam-Level:
X-Spam-Status: No, score=-3.427 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RP_MATCHES_RCVD=-1.426, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=domblogger.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Vpw9VzB2mAVz for <websec@ietfa.amsl.com>; Sun, 15 May 2016 16:23:20 -0700 (PDT)
Received: from mail.domblogger.net (mail.domblogger.net [IPv6:2600:3c00::f03c:91ff:fe56:d6a2]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BE46012D54D for <websec@ietf.org>; Sun, 15 May 2016 16:23:19 -0700 (PDT)
Received: from [192.168.0.103] (71-9-134-226.dhcp.mdfd.or.charter.com [71.9.134.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.domblogger.net (Postfix) with ESMTPSA id 75E3547D for <websec@ietf.org>; Sun, 15 May 2016 23:23:18 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=domblogger.net; s=default; t=1463354598; bh=jKOM1YdqSeB6mAWeA3PIMwGsUHRl5hwwVEmrVIfuKuw=; h=Subject:To:References:From:Date:In-Reply-To; b=mv4a3bobBt66r4Jvd+X4s0RaLKD7ADSUJsbuyZk6irQdVjWsJCGDEd/lPgkF1DMNh ybBadFxYEVmXpY3QGM/Z8UxmBcJ5J/AcO/Z5Iee0e5R6kPWgbl6y8E0/tb0L8L07fF oJLz9anIkXMQ9k4dqBzTe6hipIlc4R+QV7HAmSDs=
To: websec@ietf.org
References: <CAME=j1=QZTFdxaMQ=_Egy296zhAiL--2hcW0_nc-3BLgz7z9XA@mail.gmail.com> <CAFewVt7u2e6184T_XP7VFJRbz4XJyrxUf2VK8XtZg3FQCquZ3g@mail.gmail.com> <CAME=j1=PimfS=rA3MBAY_8YwsvYzg1x8+FvkgzMEw-qBR9PTyw@mail.gmail.com> <CAH8yC8kuaBsmjJy673k+qYfo-_BbEQZFmLKGSYGQ11MMT+6LfQ@mail.gmail.com> <CAFewVt6=sTdUKSXznjyy7WHH=MVsyWkBANF2_PJqvwkQyerwsg@mail.gmail.com> <CAH8yC8n27O7wNkktPYddkyepwn=+UhgQndXv8o_w5DVFOhwTQA@mail.gmail.com>
From: Alice Wonder <alice@domblogger.net>
Message-ID: <573904E5.1000500@domblogger.net>
Date: Sun, 15 May 2016 16:23:17 -0700
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.8.0
MIME-Version: 1.0
In-Reply-To: <CAH8yC8n27O7wNkktPYddkyepwn=+UhgQndXv8o_w5DVFOhwTQA@mail.gmail.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/websec/kGrTcmGJiYkOGW-1K-aQuYbq9cc>
Subject: Re: [websec] HPKP & different encodings of the same public key
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/websec/>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 15 May 2016 23:23:21 -0000

On 05/15/2016 04:04 PM, Jeffrey Walton wrote:
>>>> can petition to get fixed), rather than spec bug (that we all have to
>>>> workaround).
>>>
>>> It depends on the issuing policies.
>>>
>>> The IETF has no way to specify that a certificate was created or
>>> issued under PKIX, so its a moot point. (It creates a vaccum like the
>>> EV mess, except for standard certificates rather than EV
>>> certificates).
>>
>>
>> HPKP is specified in terms of RFC 5280, so we can assume only PKIX
>> certificates are used for HPKP....
>
> In that case, the IETF provides a document on path building and
> validation (RFC 4158), but not certificate validation (modulo RFC
> 6125). As far as I can tell, its still the wild, wild west with no
> guidance on end-entity certificate validation.
>
> Jeff

DANE is better anyway.

HPKP is trust on first use, and even worse, trust on first use without
   user interaction.
DANE is validate on every use

HPKP only works with https
DANE works with anything tcp or udp

HPKP can be used for a DOS attack. Simple DNS cache poison and send the
   header with a bogus set of keypins and long TTL
DANE validates via DNSSEC avoiding that issue.

I do not understand browser resistance to DANE validation.