IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
RE: Still more feedback on draft-igoe-secsh-x509v3-01
> I know I sometimes mark an intermediate certificate as
> trusted in testing. Is this something that happens in the real world?
>
I haven't seen this & neither have the folks I've asked about it.
> -----Original Message-----
> From: Joseph Galbraith [mailto:galb-list%vandyke.com@localhost]
> Sent: Saturday, April 03, 2010 10:56 AM
> To: Igoe, Kevin M.
> Cc: ietf-ssh%NetBSD.org@localhost; Douglas Stebila
> Subject: Re: Still more feedback on draft-igoe-secsh-x509v3-01
>
> On 4/1/2010 08:18, Igoe, Kevin M. wrote:
> >> o The chain encoded MAY be incomplete; it is usually not
> >> necessary to include the self-signed certificate specifying
> >> the root authority.
> >>
> >> It is NOT REQUIRED to specify any certificates other than
> >> the senders certificate. If the verifier has a trust anchor
> >> that is not the self signed root, these other certificates may
> >> not be needed. However, omitting certificates from the chain
> >> may make it more likely that certificate verification will fail
> >> because the verifier is not able to build a chain to a trusted
> >> anchor.
> >
> > I'd like our X.509v3 draft to be a "gold standard" for
> authentication
> > and would prefer an unbroken certificate chain leading back
> to a root
> > authority. The chain of certs moves the risk that the user's public
> > key is bogus down the chain to the risk that the root's
> public key is
> > bogus. One can then take measures to mitigate the risk
> that the root
> > public key is bogus, these measures being well outside the scope of
> > this document.
> >
> > P.S. Having the root self-sign their cert isn't very
> effective, whence
> > it being optional.
>
> I know I sometimes mark an intermediate certificate as
> trusted in testing. Is this something that happens in the real world?
>
> Thanks,
>
> Joseph
>
> >> -----Original Message-----
> >> From: ietf-ssh-owner%NetBSD.org@localhost
> >> [mailto:ietf-ssh-owner%NetBSD.org@localhost] On Behalf Of Joseph Galbraith
> >> Sent: Wednesday, March 31, 2010 8:55 PM
> >> To: ietf-ssh%NetBSD.org@localhost
> >> Subject: Still more feedback on draft-igoe-secsh-x509v3-01
> >>
> >> In section 2. X.509 Version 3 Certificates, we have:
> >>
> >>> o The self-signed certificate specifying the root
> >> authority MAY be
> >>> omitted.
> >>
> >> which seems to indicate that all certificates except the
> self-signed
> >> certificate at the root MUST be included.
> >>
> >> I'm not sure that's what we want (or if that was actually what was
> >> intended.)
> >>
> >> I think it would be better to say:
> >>
> >> o The chain encoded MAY be incomplete; it is usually not
> >> necessary to include the self-signed certificate specifying
> >> the root authority.
> >>
> >> It is NOT REQUIRED to specify any certificates other than
> >> the senders certificate. If the verifier has a trust anchor
> >> that is not the self signed root, these other certificates may
> >> not be needed. However, omitting certificates from the chain
> >> may make it more likely that certificate verification will fail
> >> because the verifier is not able to build a chain to a trusted
> >> anchor.
> >>
> >> I'm worried in particular that there might be cases where
> the signer
> >> doesn't have all the certificates necessary to chain to the root
> >> easily available. (I'm not sure if this is a real life
> use case or
> >> not.)
> >>
> >> If we do decide we want to REQUIRE all the certificates, I
> think we
> >> should change the paragraph referenced to make that clear:
> >>
> >> o The self-signed certificate specifying the root authority MEY be
> >> omitted. All other certificates in the chain up to the root
> >> authority MUST be included.
> >>
> >> Also, is there any correlation between certificates and OSCP
> >> responses? Currently, there is nothing that constrains the OCSP
> >> responses included to have anything to do with the certificate.
> >>
> >> Is there a need for more than one OCSP response per issuer?
> >> Would it make more sense to do:
> >>
> >> uint32 certificate-count
> >> string certificate
> >> string ocsp-response-from-certificate-issuer
> >> [1..certificate-count]
> >>
> >> Use a 0 length string if no OCSP response is available.
> >>
> >> I'm not sure whether this is a good idea or if I'm just showing my
> >> ignorance.
> >>
> >> Thanks,
> >>
> >> Joseph
> >>
> >>
>
>
Home |
Main Index |
Thread Index |
Old Index