ietf
[Top] [All Lists]

Re: Review of draft-saintandre-tls-server-id-check

2010-09-13 11:08:35
On 9/9/10 12:22 PM, Shumon Huque wrote:
On Wed, Sep 08, 2010 at 11:08:29PM +0200, Stefan Santesson wrote:

On 10-09-08 9:53 PM, "Shumon Huque" <shuque(_at_)isc(_dot_)upenn(_dot_)edu> 
wrote:
The output of the SRV record lookup contains a target hostname,
not a service name, so it's not applicable to the SRVName name
form. The target could be used in another name form (dNSName)
as the reference identifier, but then the client needs to convince
itself that the lookup was done securely (DNSSEC or some other
means) otherwise there's a security problem.

I disagree,

A client can use the output from the DNS lookup also from a normal insecure
DNS server.

The only thing the client need to do is to verify that the domain name
provided in the input to the lookup matches the host names provided in the
output. It can then safely use the host names in the SRV record as reference
identifiers IF the SRV-ID in the server certificate matches the the
reference identifier.

This only works if the certificate matching rules say something 
like "match the SRVName AND also match the DNS resolved target
hostname in dNSName". If a client attempts to match _only_ the DNS 
resolved hostname without DNSSEC, there is a security problem.

The question is: what should the certificate matching rules say
when encountering a certificate with multiple identity types?
Right now the draft approximately says "find a match" (ie. find
ANY match), rather than match some logically AND'ed combination of 
identity types.

  http://tools.ietf.org/html/draft-saintandre-tls-server-id-check-09#section-4

Hi Shumon,

As I see it, this I-D is attempting to capture best current practices
regarding the issuance and checking of certificates containing
application server identities. Do we have evidence that any existing
certification authorities issue certificates containing both an SRVname
for the source domain (e.g., example.com) and dNSName for the target
domain (e.g., apphosting.example.net)? Do we have evidence that any
existing application clients perform such checks? If not, I would
consider such complications to be out of scope for this I-D.

That said, we need to be aware that if such usage arises in the future,
someone might write a document that updates or obsoletes this I-D; in
fact the present authors very much expect that such documents will
emerge after the Internet community (specifically certification
authorities, application service providers, and application client
developers) have gained more experience with PKIX certificates in the
context of various application technologies.

Peter

-- 
Peter Saint-Andre
https://stpeter.im/


_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
https://www.ietf.org/mailman/listinfo/ietf

<Prev in Thread] Current Thread [Next in Thread>