|
You seem to contradict yourself. You
say you disagree with my assertion that RFC 5280 as written
doesn't work unless names are globally unambiguous, and then you
try to support your disagreement by saying that "there is at least
one other solution to the problem." So, you acknowledge
that if RFC 5280 didn't require names to be globally unambiguous,
then there would be a problem, and then suggest how RFC 5280 could
be changed to address that problem.
Even Steve Kent acknowledges this: Yes, the Security Considerations section of 5280 notes that problems that can arise if names are not globally unique. However, that is not the same as saying that 5280 requires them to be so. Rather it is a warning of the bad things that may happen if name collisions occur. A warning in the Security Considerations section the way we usually note a residual vulnerability in a standard. It is NOT a backdoor way to add a requirement to a standard. If you and Steve were correct that RFC 5280 didn't require names to be globally unambiguous, then (as I've shown) relying parties could obtain incorrect results even if all of the CAs, OCSP responders, etc., in the PKI were behaving honestly in accordance with the standard. That isn't residual security risk to documented in the Security Considerations section. That is a design flaw in the protocol that should have prevented the document from becoming an RFC. Are you and Steve really saying that the PKIX WG deliberating chose to introduce a design flaw into RFC 5280 (and RFC 5755 and other PKIX documents) by deviating from X.509? Why would the PKIX WG co-chairs allow this? I also disagree that you've pointed out "at least one other solution to the problem." The only things I've seen you suggest is that "the vulnerability is also mitigated by requiring AIA in the EE certificate." I can only guess what that means. Do you mean require an AIA extension with the id-ad-ocsp access method in the EE certificate? Would you simultaneously be forbidding the use of CRLs? What about CA certificates? How would the AIA extension fix the problem with attribute certificates (RFC 5755) that I highlighted? Need further evidence of the RFC 5280 requirement? RFC 5280 says: Section 4.1.2.4: The issuer field identifies the entity that has signed and issued the certificate. The issuer field MUST contain a non-empty distinguished name (DN). The issuer field is defined as the X.501 type Name [X.501].How does X.509 define the Name type: A (directory) name is a construct that identifies a particular object from among the set of all objects. A name shall be unambiguous, that is, denotes just one object. However, a name need not be unique, that is, be the only name that unambiguously denotes the object. So, RFC 5280 says that the issuer and subject fields in certificates as defined as the X.501 type Name, and point to X.501 for the definition of Name, which defines Name to be something that is unambiguous. I'm sure some will argue that RFC 5280 only intended to adopt some aspects of the definition of Name from X.501, and not this part of the definition. However, there is nothing in RFC 5280 to support that. And, you still can't get around the problem that if RFC 5280 didn't require names to be unambiguous, then as it is currently written, it and other PKIX documents would be flawed by design. On 03/31/2016 07:51 AM, Ben Laurie wrote:
|
_______________________________________________ Trans mailing list [email protected] https://www.ietf.org/mailman/listinfo/trans
