On Sunday, 10 July 2016 14:29:34 UTC+1, Peter Gutmann  wrote:
> Uhh, do you even know how SCEP is used?  When you're provisioning a VPN
> gateway, SCADA device, an iPhone, or one of the other systems that SCEP is
> used with, the cert issue is auth'd with a PSK unique to that system, so you
> know that if you see a cert with DNP3 ID ABC or AppleID XYZ, you really are
> talking to the exact device/service you think you're talking to.

You've described the optimism, I was talking about the reality. I already 
provided the CERT reference for where the chasm between them opens up.

Apple provide a nice diagram for would-be deployers in which the actual 
verification step is labelled "optional", and they provide source code for a 
reference implementation of their profile service needed to issue iPhones with 
a certificate, which is more or less a complete working system... and does no 
verification whatsoever. Funny thing about "reference implementations", they 
tend to become the actual implementation by a process of copy-paste.

> In contrast with the web PKI (and presumably ACME), you think you're talking
> to Paypal but you could just as easily be talking to a Paypal phishing site.

You'd have been talking to PayPal, specifically their "Partner Support" 
department, which will be a group managing affinity relationships within PayPal.

> Here's one example, a phishing email identified by Paypal security as being a
> phish, redirecting people to an equally phishy site www.paypal-special.com,
> which however had an EV cert with a serial number that duplicated that of a
> genuine Paypal cert:
> http://security.stackexchange.com/questions/49200/apparently-paypal-affiliated-site-with-very-suspect-security/58470).

A genuine EV certificate for a genuine (but crappy) PayPal marketing site.

2.5.4.5 aka id-at-serialNumber is an X500 OID used in the subject DN. As such 
it identifies the subject of the certificate, not the certificate itself. In 
particular for the web PKI id-at-serialNumber will be the identifier for this 
company in a register or index, such as in this case PayPal's company number 
3014267 in the Delaware Division of Corporations.

The certificates themselves do, as expected and required, each have their own 
completely different serial numbers, and they're both genuine. The fact that 
human agents behave inconsistently (in transcribing or not the punctuation at 
the end of PayPal Inc.) is permitted by the current BRs since this information 
is intended to be human readable.

> Is it genuine or a phish?  Paypal security says it's a phish, the EV cert says
> it isn't.

So far as I can see a Customer Services agent pushed the button to generate an 
form reply "thanks for telling us about phishing" email out to a concerned 
customer. Maybe they should not have done that. Calling this person "Paypal 
security" without the pay jump that would imply seems a bit unfair, they're 
probably expected to process dozens or even hundreds of such emails per hour.

PayPal had been operating this site since at least 2013, but they eventually 
shut it down some time after that post, perhaps because it gave a negative 
impression, as you've demonstrated.

> So SCEP provides pretty strong assurance of who you're talking to

SCEP itself provides no assurance whatever, as you were originally proud to 
point out that "no-one cared". It is possible to achieve some assurance out of 
band but I still haven't seen examples of this in the wild.

> ACME (if it follows the web PKI) provides the illusion of assurance
> (you think you're talking to Paypal but it's actually a phisher).

ACME itself today provides reasonable assurance only as to the (DNS) name of 
the entity you're talking to. Semi-automation of EV has come a long way, but I 
doubt that fully automated issuance of EV certificates is on the horizon. It is 
anticipated that an outfit like Symantec (Versign), if they used ACME for EV, 
would add one or more ACME challenges that could only be completed manually and 
require those for their EV certificates.

> The fact that SCEP, in its
> original design, doesn't do DV or whatever isn't a shortcoming of the spec,
> it's because there's no need for such a low-assurance mechanism when you've
> already got a high-assurance mechanism available.

Previously you said nobody cared, now you claim they have an unspecified 
"high-assurance mechanism". The reality is closer to the former, unfortunately.
 
> So adding a minor extension to a proven, established protocol is naivety but
> inventing a totally new, unproven one from scratch isn't?

Insistence that it would constitute a "minor extension" is all yours and I 
think reflects further on your naivety. The challenge mechanisms make up a 
considerable fraction of the entire ACME standard on paper, and practical 
experience shows that this is the hardest part to get right.

> Look, I can see that this is obviously an issue of religious dogma for you
> that ACME is perfect and everything else isn't

ACME is much too complicated to ever be perfect, but while you were bothering 
people in this unrelated thread, development of ACME continued, 
draft-ietf-acme-acme-03 was published and discussion of the open items 
continued in the appropriate IETF working group.

> it doesn't seem productive to continue this discussion, it'll just annoy
> everyone else who's having to listen.  Also, while it was fun initially,
> I'm now getting bored.  I'll bow out now.

Thank you, in the event you have anything actually useful to contribute to 
ACME, please do it on the ACME Working Group mailing list or bring it to IETF 
96, if you have contributions (other than general disdain) to the state of the 
Web PKI as it pertains to Mozilla you should put them in a new thread here in 
mozilla.dev.security.policy with an appropriate subject line.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to