PHB,

There are a bunch of changes to PKIX that were blocked for quite some time. The opposition coming from a cabal of DoD etc. contractors. This opposition has proven ultimately futile since the industry has decided to ignore the specification and set its own standards in two cases.
A cabal? Gee do member have secret handshakes and a secret clubhouse? That sounds like fun. Can I join? Oh, you're
saying that I _am_ a member!
I don't want to get into a discussion of Snowden etc. I will however note that I suspected something of the sort was going on several years ago and that is why I was looking to take the standards process to a forum where such interference could be prevented. The only practical effect of Snowden is that I can now explain the reasons for that decision without sounding like a black helicopter paranoid nut.
The fact that the PKIX WG did not elect to adopt every proposal you made is hardly a justification for name calling. Moving your crusade to the CABF was a good strategy; fewer folks to convince and a focus on outcomes independent of architectural considerations. This is the same group that wanted to give CAs 3 years to fix a serious security bug, before the ICANN SSAC insisted otherwise, if I recall Warren's briefing in SAAG.
1) Name Constraints MUST be marked critical

And utterly stupid restriction since the semantics of the criticality bit are 'break backwards compatibility'. Use of name constraints provide a significant reduction in the attack surface and would have prevented the Flame attack. However marking a name constraint critical breaks Safari and provides no security benefit in the Web PKI.

Outcome: Industry has decided that the standard is that name constraints MAY be marked non-critical.
It might be worth emhpasizing that the principal reason cited for not marking the extension critical, as per X,.509 and RFC 5280, was a single vendor's unwillingness to fix a bug in their browser. The CABF members, being browser vendors as well as third-party CAs, was the prefect venue in which elect to given precedence to a vendor's intransigence.
2) OCSP reports success for unknown/unissued certificates.

One of the reasons that the DigiNotar incident was so severe is that the OCSP responder reported 'Valid' status for certificates that the CA had not issued. This limit is allegedly a consequence of the DoD's billion dollar PKI being unable to issue OCSP responses except by using CRLs as a source.

One important consequence of this constraint is that it provides a weak form of CA transparency. It is possible to determine whether a CA is consistently defaulting on this requirement or not.


Outcome: Industry has mandated OCSP responses report INVALID status if the certificate was not issued.
A number of folks have long wanted OCSP to be a cert status protocol, instead of a cert _revocation_ status protocol. DoD is probably not the only CA that uses CRLs to generate OCSP replies. The relevant RFCs have always allowed this practice, and it's a reasonable one, especially if the OCSP service providers is not the CA.

There are a number of ways that the major problems associated with DigiNotar breech could have been mitigated, many
of them not requiring any changes to protocols.

The fundamental issue here, for both of the examples cited, is that the browser PKI model is a terrible one. DANE is a much better solution, except for the CAs that might lose business as a result.

Steve
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to