---------
Background:

    http://wiki.cacert.org/WildcardCertificates

Plus 3280/5280:

   Finally, the semantics of subject alternative names that include
   wildcard characters (e.g., as a placeholder for a set of names) are
   not addressed by this specification.  Applications with specific
   requirements MAY use such names, but they must define the semantics.
---------

Should DANE or draft-ietf-dane-{srv,smtp} say anything about the
semantics of the "*" in "*.example.com" CNs or DNS subjectAltNames?

There was never an explicit specification of certificate matching for
SMTP, and Postfix allows wildcards to match exactly one label in a nod
to RFC 2818 for lack of any other normative text:

        mail.example.com =~ *.example.com
    foo.mail.example.com !~ *.example.com

This has not been an issue since X509v3 certificates are almost
universally unverified in SMTP, and the exceptional cases where
site A does verify mail to site B use hand-tuned verification rules
that match site B's certs.

Since DANE enabled MTAs will require TLS verification between peers
without prior *mutual* arrangement, the semantics of "*.example.com"
for SMTP (and likely other protocols) need to be understood by all
parties.  I am concerned that receiving sites like Postini may be
tempted to publish TLSA RRs for their current wildcard certificate,
causing a major outage for senders, since Postini handles the MX
hosts for many client domains with MX hostnames of the form
"example.com.<id>.psmtp.com" which does not match "*.psmtp.com" in
the current Postfix implementation.

  Connected to postini.com.s8a1.psmtp.com[64.18.7.10]:25
  > STARTTLS
  < 220 Go ahead
  postini.com.s8a1.psmtp.com[64.18.7.10]:25: depth=1 matched=1 trust anchor 
certificate sha256 digest 
25:0D:A2:69:1B:E9:7C:9A:33:CE:EF:7E:31:1C:14:FB:01:84:6E:05:8A:99:CE:A9:BD:11:25:BD:25:A0:CA:D5
  postini.com.s8a1.psmtp.com[64.18.7.10]:25: subjectAltName: *.psmtp.com
  postini.com.s8a1.psmtp.com[64.18.7.10]:25 CommonName *.psmtp.com
  postini.com.s8a1.psmtp.com[64.18.7.10]:25: subject_CN=*.psmtp.com, 
issuer_CN=Google Internet Authority, 
fingerprint=B7:3B:6F:25:EB:A7:FD:AA:77:80:EB:30:DD:82:AC:D7:52:CA:64:FE, 
pkey_fingerprint=25:F3:B4:77:4F:9E:0B:FA:FD:96:4E:70:87:77:B3:CA:F9:F5:1E:44
  Trusted TLS connection established to 
postini.com.s8a1.psmtp.com[64.18.7.10]:25: TLSv1 with cipher AES256-SHA 
(256/256 bits)
  > QUIT
  < 221 Catch you later

Above "Trusted" means the certificate trust chain is valid, but
only "Verified" would indicate that it matches the expected peer,
so a TLS verified delivery to Postini would fail to match the
expected "postini.com.s8a1.psmtp.com" certificate peername.

Should Postfix be more liberal in its treatment of "*", or are
Postini clueless about wildcard certificates?

-- 
        Viktor.
_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to