On 22/02/16 11:01, Ben Laurie wrote:
<snip>
    Note that in this scenario, it's unlikely that space-constrained
    blacklist-style client updates (e.g. CRLset) will include every leaf
    certificate that chains to A after A is known-compromised.  So TLS
    clients won't necessarily be warned off of C directly.

It seems to me there are multiple solutions here. The easiest is to not
blacklist A_X, but instead to blacklists A_X's subject, which will also
blacklist B_X.

I think that blacklisting the shared issuer public key would be better than blacklisting the shared issuer name.

AIUI, MS CryptoAPI prefers to build certificate chains using the Authority/Subject Key Identifiers, and it only cares about whether or not the Issuer/Subject Names match if AKI/SKI are absent.

<snip>
    How to fix this?  A few ideas come to mind, but i'm not convinced of
    either of them yet:

      * recommend that clients who care about transparency should expect
    that
        all intermediate certs themselves are logged -- 6962bis already
        permits this, though it seems to be mainly in contemplation of
        name-constrained intermediate authorities.  This expands the number
        of SCTs or inclusion proofs that need to accompany a chain, and
    makes
        verification logic slightly more complicated.

Regardless of the argument above and mitigation thereof, I think this
would be a good idea.

If we expect to (eventually) have an effective revocation mechanism (e.g. blacklisting the issuer public key), then why would we need to increase the TLS handshake size (by sending additional SCTs/proofs) just so that we can solve the same problem twice?

If we do want CT to handle this though, then I suggest that we:
- require intermediate certs to be logged in the same logs as the end-entity certs they issue. - don't require SCTs or inclusion proofs for intermediates to be sent by TLS servers (except for the name-constrained case). - say that TLS clients SHOULD fetch and verify inclusion proofs for all intermediate certs that they rely on.

<snip>

--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to