> #39: appropriately acknowlege and accommodate DANE
http://trac.tools.ietf.org/wg/websec/trac/ticket/39


fyi & comment, the text I presently have in my working copy of -07 is..

                     .
                     .
                     .
2.2.  HTTP Strict Transport Security Policy Effects

   The effects of the HTTP Strict Transport Security (HSTS) Policy, as
   applied by a UA in interactions with a web resource host wielding
   such policy (known as a HSTS Host), are summarized as follows:
                     .
                     .
   2.  The UA terminates any secure transport connection attempts upon
       any and all secure transport errors or warnings, including those
       caused by a web application presenting a certificate matching a
       trusted certificate association as denoted via the DANE protocol
       [I-D.ietf-dane-protocol], or any other form of self-signed
       certificate that does not chain to a trust anchor in the UA or
       operating system CA root certificate store.
                     .
                     .
                     .
10.2.  Using HSTS in conjunction with self-signed public-key
       certificates

   If a web site/organization/enterprise is generating their own secure
   transport public-key certificates for web sites, and that
   organization's root certification authority (CA) certificate is not
   typically embedded by default in browser and/or operating system CA
   certificate stores, and if HSTS Policy is enabled on a host
   identifying itself using a certificate signed by the organization's
   CA (i.e., a "self-signed certificate"), and this certificate does not
   match a trusted certificate association (as denoted via the DANE
   protocol [I-D.ietf-dane-protocol]), then secure connections to that
   site will fail, per the HSTS design.  This is to protect against
   various active attacks, as discussed above.

   However, if said organization strongly wishes to employ self-signed
   certificates, and their own CA in concert with HSTS, they can do so
   by deploying their root CA certificate to their users' browsers or
   operating system CA root certificate stores.  They can also, in
   addition or instead, distribute to their users' browsers the end-
   entity certificate(s) for specific hosts.  There are various ways in
   which this can be accomplished (details are out of scope for this
   specification).  Once their root CA certificate is installed in the
   browsers, they may employ HSTS Policy on their site(s).

   Alternately, that organization can deploy the DANE protocol; all
   browsers that also use DANE will then be able to trust the
   certificates identified by trusted certificate associations as
   denoted via DANE.

   Note:  Interactively distributing root CA certificates to users,
          e.g., via email, and having the users install them, is
          arguably training the users to be susceptible to a possible
          form of phishing attack, see Section 14.6 "Bogus Root CA
          Certificate Phish plus DNS Cache Poisoning Attack".  Thus care
          should be taken in the manner in which such certificates are
          distributed and installed on users' systems and browsers.
                     .
                     .
                     .

---
end



_______________________________________________
websec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/websec

Reply via email to