Re: Review of draft-saintandre-tls-server-id-check

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 9/9/10 12:22 PM, Shumon Huque wrote:
> On Wed, Sep 08, 2010 at 11:08:29PM +0200, Stefan Santesson wrote:
>>
>> On 10-09-08 9:53 PM, "Shumon Huque" <shuque@xxxxxxxxxxxxx> wrote:
>>> The output of the SRV record lookup contains a target hostname,
>>> not a service name, so it's not applicable to the SRVName name
>>> form. The target could be used in another name form (dNSName)
>>> as the reference identifier, but then the client needs to convince
>>> itself that the lookup was done securely (DNSSEC or some other
>>> means) otherwise there's a security problem.
>>
>> I disagree,
>>
>> A client can use the output from the DNS lookup also from a normal insecure
>> DNS server.
>>
>> The only thing the client need to do is to verify that the domain name
>> provided in the input to the lookup matches the host names provided in the
>> output. It can then safely use the host names in the SRV record as reference
>> identifiers IF the SRV-ID in the server certificate matches the the
>> reference identifier.
> 
> This only works if the certificate matching rules say something 
> like "match the SRVName AND also match the DNS resolved target
> hostname in dNSName". If a client attempts to match _only_ the DNS 
> resolved hostname without DNSSEC, there is a security problem.
> 
> The question is: what should the certificate matching rules say
> when encountering a certificate with multiple identity types?
> Right now the draft approximately says "find a match" (ie. find
> ANY match), rather than match some logically AND'ed combination of 
> identity types.
> 
>   http://tools.ietf.org/html/draft-saintandre-tls-server-id-check-09#section-4

Hi Shumon,

As I see it, this I-D is attempting to capture best current practices
regarding the issuance and checking of certificates containing
application server identities. Do we have evidence that any existing
certification authorities issue certificates containing both an SRVname
for the source domain (e.g., example.com) and dNSName for the target
domain (e.g., apphosting.example.net)? Do we have evidence that any
existing application clients perform such checks? If not, I would
consider such complications to be out of scope for this I-D.

That said, we need to be aware that if such usage arises in the future,
someone might write a document that updates or obsoletes this I-D; in
fact the present authors very much expect that such documents will
emerge after the Internet community (specifically certification
authorities, application service providers, and application client
developers) have gained more experience with PKIX certificates in the
context of various application technologies.

Peter

-- 
Peter Saint-Andre
https://stpeter.im/


_______________________________________________
Ietf mailing list
Ietf@xxxxxxxx
https://www.ietf.org/mailman/listinfo/ietf


[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]