David,

I appreciate your persistence, but we will just have to agree to disagree on the
topic of whether 5280 requires global name uniqueness.

First, I cited text from Secyion 4.1.2.6, which is the one place in 5280 where global name uniqueness should be mandated if it were a requirement. That section establishes a requirement for local (per-CA) name uniqueness, not for global name uniqueness. IMHO
that is the definitive statement on this topic.

RFC 5280, like its predecessors, has deviated from X.509 where we felt necessary. Your argument that PKIX docs will maintain compatibility with X.509 is just an indication of overall intent, not a promise to never deviate. You acknowledge this later when you discuss CRL issuer paths and say ".. a requirement imposed by RFC 5280, but not X.509."

Yes, the Security Considerations section of 5280 notes that problems that can arise if names are not globally unique. However, that is not the same as saying that 5280 requires them to be so. Rather it is a warning of the bad things that may happen if name collisions occur. A warning in the Security Considerations section the way we usually note a residual vulnerability in a standard. It is NOT a backdoor way to add a requirement to a standard.

Your other comments cite text that, in your opinion, suggests the need for global name uniqueness, rather than citing text that establishes this requirement. Hence I'm not going
to spend time addressing those comments.

Aside from the gratuitous parenthetical in your text falsely stating that RFC 5280 "doe not preclude the creation of two CAs with the same name, so long as the parent CAs are distinct," you still write about two CAs issuing two EE certificates that are identical. If it walks like a duck and it quacks like a duck, then chances are its a duck. In the scenario you are trying to describe, there is one CA that issues one EE certificate.
One might argue that two entities acting as CAs that have the same name and same public key are the same CA. But if the entities happen to be different organizations, perhaps in different geopolitical regions, others might argue that they are different CAs.
Can you name even one RP that maintains a cache of revocation status info organized by cert path?
BBN has implemented RP code for at least 4 products over the past 20 years. Some were part of PKI systems developed for clients in the financial services area. The most recent is
the RPSTIR code for the RPKI. All of them operate as I described.

I'll discuss whether my attack scenarios are accurate and match the spirit of DKGs original
message with him, not you.

Steve
_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to