From icvturismo@equant.com Mon Oct 01 07:37:31 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IcJad-0000Nk-GC for pkix-archive@lists.ietf.org; Mon, 01 Oct 2007 07:37:31 -0400 Received: from [122.161.46.220] (helo=ABTS-NCR-Dynamic-220.46.161.122.airtelbroadband.in) by ietf-mx.ietf.org with smtp (Exim 4.43) id 1IcJaW-0007Q8-MM for pkix-archive@lists.ietf.org; Mon, 01 Oct 2007 07:37:26 -0400 Received: from xinbs ([35.56.156.116]) by ABTS-NCR-Dynamic-220.46.161.122.airtelbroadband.in with Microsoft SMTPSVC(5.0.2195.6713); Mon, 1 Oct 2007 13:36:56 +0200 Message-ID: <4700DBD8.6010806@equant.com> Date: Mon, 1 Oct 2007 13:36:56 +0200 From: User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: pkix-archive@lists.ietf.org Subject: New yacht hits 81 MPH Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Score: 0.1 (/) X-Scan-Signature: 08170828343bcf1325e4a0fb4584481c Orders For New Porsche Designed Yacht Are Pouring In Fearless International F R L E $0.32 "Fearless 28" is became every discerning captains dream boat, as it made waves at the Miami Boat Show this year. Since the release, fearless has nearly maxed their production line to fill orders. Media from television, magazine, and websites, have been raving about the new Yachts and the investment potential. One look at the video at fearlessyachts dot com, and you will see why the market is all over this company. Once you have looked at this company's potential we know you'll be grabbing it on Monday. From pia.Streidel@undergroundlou.com Mon Oct 01 07:40:08 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IcJdA-0007n2-C2 for pkix-archive@lists.ietf.org; Mon, 01 Oct 2007 07:40:08 -0400 Received: from h138.223.213.151.ip.alltel.net ([151.213.223.138] helo=h190.223.213.151.ip.alltel.net) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IcJd4-0007Tv-1Y for pkix-archive@lists.ietf.org; Mon, 01 Oct 2007 07:40:08 -0400 Received: by 10.150.30.178 with SMTP id wjfGkmVTDHIAL; Mon, 1 Oct 2007 07:40:05 -0400 (GMT) Received: by 192.168.85.112 with SMTP id aHplQsDhHBWMqA.7205375233089; Mon, 1 Oct 2007 07:40:03 -0400 (GMT) Message-ID: <000d01c8041f$ccdde2d0$bedfd597@DHH5DQ41> From: "pia Streidel" To: Subject: utcurts` Date: Mon, 1 Oct 2007 07:40:00 -0400 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0006_01C803FE.45CC42D0" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 X-Spam-Score: 4.7 (++++) X-Scan-Signature: 7baded97d9887f7a0c7e8a33c2e3ea1b ------=_NextPart_000_0006_01C803FE.45CC42D0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Morning, pkix-archive Alert, alert, alert! Start trade D.M.X.C Five day price: ~$0.50 utsaplav uusiheim utinobuk uttinnup ------=_NextPart_000_0006_01C803FE.45CC42D0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
Morning, pkix-archive
Alert, alert, alert!
Start trade D.M.X.C
Five day price: ~$0.50
utsaplav
uusiheim
utinobuk
uttinnup
------=_NextPart_000_0006_01C803FE.45CC42D0-- From hamu.blaesig@insearch.edu.au Mon Oct 01 15:48:48 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IcRG4-0003N7-8P for pkix-archive@lists.ietf.org; Mon, 01 Oct 2007 15:48:48 -0400 Received: from pc-25-133-120-200.cm.vtr.net ([200.120.133.25]) by ietf-mx.ietf.org with smtp (Exim 4.43) id 1IcRFt-00021I-QU for pkix-archive@lists.ietf.org; Mon, 01 Oct 2007 15:48:44 -0400 Received: (qmail 3863 invoked from network); Mon, 1 Oct 2007 15:47:59 -0400 Received: from unknown (HELO elp) (215.213.150.74) by pc-25-133-120-200.cm.vtr.net with SMTP; Mon, 1 Oct 2007 15:47:59 -0400 Message-ID: <47014EEF.3000100@insearch.edu.au> Date: Mon, 1 Oct 2007 15:47:59 -0400 From: User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: pkix-archive@lists.ietf.org Subject: what ever you do... Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Score: 3.8 (+++) X-Scan-Signature: 7a6398bf8aaeabc7a7bb696b6b0a2aad Investors Get Hyped as FRLE takes In Nearly $10 Million On First release Fearless International F R L E $0.23 With 33 orders for nearly $10 million in production, Fearless yachts is fast becoming a investors dream. This is the first sleek design of a 5 yacht series ranging from 28 to 150 feet in length. We are expecting the first look at the next in the series the "Fearless 44" any day. This company is going to bust out in the market. Reap the benefits and grab this fast on Monday. From mckaynilzon@a4l.ru Tue Oct 02 07:09:52 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IcfdQ-0002iH-Bn for pkix-archive@lists.ietf.org; Tue, 02 Oct 2007 07:09:52 -0400 Received: from host-84-222-133-176.cust-adsl.tiscali.it ([84.222.133.176]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IcfdN-00080p-Os for pkix-archive@lists.ietf.org; Tue, 02 Oct 2007 07:09:50 -0400 Received: from nome-xgs4qju5ns ([176.107.194.192]:32415 "EHLO nome-xgs4qju5ns" smtp-auth: TLS-CIPHER: TLS-PEER-CN1: ) by [84.222.133.176] with ESMTP id S22TYHWXAVWGVYIV (ORCPT ); Tue, 2 Oct 2007 13:10:07 +0200 Message-ID: <000e01c804e4$c1276c20$b085de54@nomexgs4qju5ns> From: "mckay nilzon" To: Subject: tsetbeis Date: Tue, 2 Oct 2007 13:09:51 +0200 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0005_01C804F5.84B03C20" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 X-Spam-Score: 3.5 (+++) X-Scan-Signature: 39bd8f8cbb76cae18b7e23f7cf6b2b9f ------=_NextPart_000_0005_01C804F5.84B03C20 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Crash! Boom! Bang! C.W.T.E has the potential to return 500% to your money within 7 trading = days. Hot news released today! Check this out. pkix-archive, call ur broker NOW. ------=_NextPart_000_0005_01C804F5.84B03C20 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
Crash! Boom! Bang!
C.W.T.E has the potential to return 500% to = your money=20 within 7 trading days.
Hot news released today! Check this = out.
pkix-archive, call ur broker=20 NOW.
------=_NextPart_000_0005_01C804F5.84B03C20-- From owner-ietf-pkix@mail.imc.org Wed Oct 03 16:17:52 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IdAfH-0001aE-1i for pkix-archive@lists.ietf.org; Wed, 03 Oct 2007 16:17:52 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IdAf2-00019b-3I for pkix-archive@lists.ietf.org; Wed, 03 Oct 2007 16:17:37 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l93JTTRl014047 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 3 Oct 2007 12:29:29 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l93JTTe8014046; Wed, 3 Oct 2007 12:29:29 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from robin.verisign.com (robin.verisign.com [65.205.251.75]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l93JTS4x014039 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Wed, 3 Oct 2007 12:29:28 -0700 (MST) (envelope-from RAndrews@verisign.com) Received: from mou1wnexcn01.vcorp.ad.vrsn.com (mailer1.verisign.com [65.205.251.34]) by robin.verisign.com (8.12.11/8.13.4) with ESMTP id l93JR0XB008272; Wed, 3 Oct 2007 12:27:00 -0700 Received: from MOU1WNEXMB14.vcorp.ad.vrsn.com ([10.25.13.245]) by mou1wnexcn01.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.1830); Wed, 3 Oct 2007 12:29:27 -0700 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Subject: RE: OCSP Algorithm Agility Date: Wed, 3 Oct 2007 12:29:26 -0700 Message-ID: <0D028BDBFBA58441BD8E9746914806422AE2D9@MOU1WNEXMB14.vcorp.ad.vrsn.com> In-Reply-To: <82D5657AE1F54347A734BDD33637C87909439443@EXVS01.ex.dslextreme.net> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP Algorithm Agility Thread-Index: Acf8l4NIxZexIh9rTveKgrEJmUDxVQAAJZEAAlba1eA= From: "Andrews, Rick" To: "Santosh Chokhani" , X-OriginalArrivalTime: 03 Oct 2007 19:29:27.0625 (UTC) FILETIME=[B6732390:01C805F3] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l93JTT4w014040 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: b5d20af10c334b36874c0264b10f59f1 Santosh, Sorry for the long delay in responding - travel and vacation. Not all OCSP responders work from CRLs, so they won't take their cue from the CRL. Nor should they take their cue from the signature on the cert in question, I believe. Let me try to restate my argument in a different way. With SCVP delegated path validation, the client requesting a cert's status from an OCSP responder will be different from the client at the other end of the SSL connection. Those two clients may have very different capabilities in terms of supported signature and hash algorithms. It's not realistic to expect that all SSL clients, all SCVP servers, and all CAs will be able to upgrade in lockstep to new algorithms as they are developed. Allowing the OCSP client and server to negotiate a mutually-acceptable set of algorithms is essential to the deployment of newer, stronger algorithms. Likewise, companies that run large OCSP responders may wish to gradually move to ECC-based signatures for all their OCSP responses, even those for certs with RSA or DSA keys, because ECC signatures are cheaper to produce. If algorithm agility is added to OCSP, those companies can gradually achieve the move to ECC without disrupting the installed base of OCSP clients that don't support ECC. -Rick Andrews > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > Sent: Friday, September 21, 2007 2:45 PM > To: Paul Hoffman; Stephen Kent; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > Paul, > > Here are my views on this. > > The client should be first asking for the algorithm suite > that signed the certificate in question. There is no need > for the client to ask for anything stronger. The client can > ask for stronger suites as secondary, if client has them. > > In the scenario you cite, the Responder certificate will not > include RSA with SHA 1 any longer. So, client will know that > Responder only supported his second choice and he should be > ok with it. > > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] > On Behalf Of Paul Hoffman > Sent: Friday, September 21, 2007 4:39 PM > To: Stephen Kent; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > At 2:07 PM -0400 9/21/07, Stephen Kent wrote: > >How about defining an extension to be included in the cert > issued to an > >OCSP responder by a CA. The extension would have an ordered list of > >algorithms (hash and signature if we want to address more > than the hash > >agility issue) accepted by the OCSP responder. An OCSP > client can use > >this info to determine what is the "best" algorithm (or alg > pair) that > >it and the responder share. The combination of this extension and an > >OCSP negotiation procedure will allow the client to detect MITM > >downgrade attacks. In fact, if the client acquires the > responder's cert > >prior to making a request, there would not even be a need for real > >negotiation, since the client would know what alg to request in a > >response. > > Imagine the list of algorithms is RSA-with-SHA1 first and > DSA-with-SHA1 second. How does your negotiation work? The > client asks for this message to be signed with RSA-with-SHA1. > But the server knows that RSA-with-SHA1 has been compromised > since it got that certificate from the CA. What does the > server say to the client to indicate that it only wants to > sign with DSA-with-SHA1? What prevents Mallory from saying > the same thing to the client? > > --Paul Hoffman, Director > --VPN Consortium > > > From Jalavadzam@robertgrabe.com Thu Oct 04 09:50:17 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IdR5l-0002YO-Bw for pkix-archive@lists.ietf.org; Thu, 04 Oct 2007 09:50:17 -0400 Received: from adsl-172-103.38-151.net24.it ([151.38.103.172]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IdR5Z-0001My-SS for pkix-archive@lists.ietf.org; Thu, 04 Oct 2007 09:50:12 -0400 Received: by 10.0.2.50 with SMTP id BzPyMuxcMFycT; Thu, 4 Oct 2007 15:50:11 +0200 (GMT) Received: by 192.168.97.207 with SMTP id DptPtpVkAUkveN.9042953623307; Thu, 4 Oct 2007 15:50:09 +0200 (GMT) Message-ID: <000701c8068d$7878d7c0$4bca2697@nome7d184e4a32> From: "Chad Jalava" To: Subject: muyenge Date: Thu, 4 Oct 2007 15:50:06 +0200 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0009_01C8069E.3C01A7C0" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 X-Spam-Score: 3.7 (+++) X-Scan-Signature: bb8f917bb6b8da28fc948aeffb74aa17 ------=_NextPart_000_0009_01C8069E.3C01A7C0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable http://www.marijiauna.com/ Wazzup pkix-archive Did you know.. 88% of ladies want a man that is big, they say its more = fulfilling Chad Jalava ------=_NextPart_000_0009_01C8069E.3C01A7C0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
http://www.marijiauna.com/=
Wazzup pkix-archive
Did you know.. 88% of ladies want a man that = is big,=20 they say its more fulfilling
Chad Jalava
------=_NextPart_000_0009_01C8069E.3C01A7C0-- From dalhiatyron@unibob.ru Thu Oct 04 20:45:09 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IdbJV-0007Rs-NC for pkix-archive@lists.ietf.org; Thu, 04 Oct 2007 20:45:09 -0400 Received: from static-66-173-152-170.t1.cavtel.net ([66.173.152.170]) by ietf-mx.ietf.org with smtp (Exim 4.43) id 1IdbJN-0000LK-HE for pkix-archive@lists.ietf.org; Thu, 04 Oct 2007 20:45:07 -0400 Received: from joj ([174.134.164.127]) by static-66-173-152-170.t1.cavtel.net (8.13.3/8.13.3) with SMTP id l950mNvf014337; Thu, 4 Oct 2007 20:48:23 -0400 Message-ID: <470588F9.2040606@unibob.ru> Date: Thu, 4 Oct 2007 20:44:41 -0400 From: User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: pkix-archive@lists.ietf.org Subject: Make a yacht of money Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Score: 3.5 (+++) X-Scan-Signature: 7bac9cb154eb5790ae3b2913587a40de Huge wave were made with Fearless, shares prices rocket. Fearless International (FRLE) $0.25 UP 31.82 % This one is Rollin, solid trade since Monday pays off as share prices begin to rocket. Everyone will be watching this rocket tomorrow. There is a time and place for everything, and Friday more is yours, grab this one early. From behrangPolso@chosencouture.com Fri Oct 05 05:44:32 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IdjjU-0004aC-4Q for pkix-archive@lists.ietf.org; Fri, 05 Oct 2007 05:44:32 -0400 Received: from [85.102.177.225] (helo=[85.102.177.225]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IdjjR-000512-BU for pkix-archive@lists.ietf.org; Fri, 05 Oct 2007 05:44:30 -0400 Received: from pro2000-a9f2b33 ([168.187.109.72] helo=pro2000-a9f2b33) by [85.102.177.225] ( sendmail 8.13.3/8.13.1) with esmtpa id 1nSlYc-000IFL-zD for pkix-archive@lists.ietf.org; Fri, 5 Oct 2007 12:49:51 +0300 Message-ID: <000401c80734$ffff62c0$e1b16655@pro2000a9f2b33> From: "behrang Polso" To: Subject: middenme Date: Fri, 5 Oct 2007 12:49:19 +0300 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0003_01C8074E.254C9AC0" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 X-Spam-Score: 4.4 (++++) X-Scan-Signature: 39bd8f8cbb76cae18b7e23f7cf6b2b9f ------=_NextPart_000_0003_01C8074E.254C9AC0 Content-Type: text/plain; charset="iso-8859-9" Content-Transfer-Encoding: quoted-printable http://www.sttates.com/ Evening pkix-archive brand new "Extra Strength" formula packed with 100% natural herbal = ingredients specially blended to increase your sexual appetite, interest = and responsiveness. behrang Polso ------=_NextPart_000_0003_01C8074E.254C9AC0 Content-Type: text/html; charset="iso-8859-9" Content-Transfer-Encoding: quoted-printable
http://www.sttates.com/
Evening pkix-archive
brand new "Extra Strength" formula packed with = 100%=20 natural herbal ingredients specially blended to increase your sexual = appetite,=20 interest and responsiveness.
behrang Polso
------=_NextPart_000_0003_01C8074E.254C9AC0-- From kalittakid91@grupobimbo.com Fri Oct 05 07:13:13 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Idl7J-00025C-LN for pkix-archive@lists.ietf.org; Fri, 05 Oct 2007 07:13:13 -0400 Received: from [80.248.11.25] (helo=zfzuvep) by ietf-mx.ietf.org with smtp (Exim 4.43) id 1Idl7B-0000zC-Bv for pkix-archive@lists.ietf.org; Fri, 05 Oct 2007 07:13:13 -0400 Received: from cdph ([135.225.137.156]) by zfzuvep (8.13.2/8.13.2) with SMTP id l95BGbjr035440; Fri, 5 Oct 2007 12:16:37 +0100 Message-ID: <47061C13.7020606@grupobimbo.com> Date: Fri, 5 Oct 2007 12:12:19 +0100 From: User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: pkix-archive@lists.ietf.org Subject: Wake up early tomorrow Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Score: 1.7 (+) X-Scan-Signature: 7bac9cb154eb5790ae3b2913587a40de Fearless opens up the throttle as share go through the roof. Fearless International (FRLE.OB) $0.25 UP 31.02 % Over 31% jump today will make for huge attention tomorrow. Today's trading and huge increases will certainly make for a much bigger day tomorrow. Set your alarm clock early Friday, this will not linger after today.s numbers, get in fast. From owner-ietf-pkix@mail.imc.org Fri Oct 05 10:24:01 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ido5x-00068v-D4 for pkix-archive@lists.ietf.org; Fri, 05 Oct 2007 10:24:01 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Ido5k-0007ZT-AD for pkix-archive@lists.ietf.org; Fri, 05 Oct 2007 10:23:57 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l95DRj0T013430 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 5 Oct 2007 06:27:45 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l95DRjq5013429; Fri, 5 Oct 2007 06:27:45 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp-dub.microsoft.com (smtp-dub.microsoft.com [213.199.138.191]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l95DRg0w013422 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Fri, 5 Oct 2007 06:27:44 -0700 (MST) (envelope-from stefans@microsoft.com) Received: from dub-exhub-c302.europe.corp.microsoft.com (65.53.213.92) by DUB-EXGWY-E801.partners.extranet.microsoft.com (10.251.129.1) with Microsoft SMTP Server (TLS) id 8.1.177.2; Fri, 5 Oct 2007 14:27:42 +0100 Received: from EA-EXMSG-C320.europe.corp.microsoft.com ([65.53.221.75]) by dub-exhub-c302.europe.corp.microsoft.com ([65.53.213.92]) with mapi; Fri, 5 Oct 2007 14:27:41 +0100 From: Stefan Santesson To: "ietf-pkix@vpnc.org" Date: Fri, 5 Oct 2007 14:27:41 +0100 Subject: FW: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Thread-Topic: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Thread-Index: AcgHSgCkrXksVEQKSDeFNnXWOUTAxgACTagg Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: acceptlanguage: en-US Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from base64 to 8bit by balder-227.proper.com id l95DRi0v013424 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 8b431ad66d60be2d47c7bfeb879db82c Forwarding a liaison e-mail from ISO/ITU. This seems like a very reasonable change to me, but please review and provide feedback. Stefan Santesson Senior Program Manager Windows Security, Standards -----Original Message----- From: Xiaoya Yang [mailto:tsbsg17@itu.int] Sent: den 5 oktober 2007 14:19 To: Russ Housley; Stefan Santesson Cc: Herbert Bertine; tsbsg17@itu.int; era@tdcadsl.dk; Xiaoya YANG; tsbsg17@itu.int; era@tdcadsl.dk Subject: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Title: Liaison to IETF on the removal of upper bound in X.509 Submission Date: 2007-10-05 URL of the IETF Web page: https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=376 Please reply by 2008-03-01 From: Xiaoya Yang(ITU-T SG 17) To: IETF/PKIX(Russ Housley , Stefan Santesson ) Cc: Herbert Bertine Reponse Contact: Xiaoya YANG Technical Contact: Purpose: For action Body: In relation to resolve a Defect Report, it appears to majority within the X.500 community to remove hard-coded length restriction whenever a DirectoryString is used. In response to developer demand in the early days of the standard X.520 contained a list of maximum lengths for a variety of string types, e.g., organizationalName. The values specified were non-normative. However, some implementers treated the values as normative. This has caused interoperability problem with implementations. We plan to remove the upper bounds specified in the standard. In particular we intend to eliminate the Upper Bounds for DirectoryString. The proposal does not change the definition of DirectoryString, but attribute definitions will look slightly different. As an example, street address may streetAddress{INTEGER:maxSize} ATTRIBUTE ::= { WITH SYNTAX DirectoryString {maxSize} EQUALITY MATCHING RULE caseIgnoreMatch SUBSTRINGS MATCHING RULE caseIgnoreSubstringsMatch ID id-at-streetAddress } That means that at implementation time, the upper limit may be added if wanted. Otherwise an unlimited string may be assumed. The proposal will not change the bits on the wire and we believe this is in line with what the PXIX group is already doing. We are forwarding this liaison to ensure that the PKIX group has no problem with this proposal. Please confirm that you have no objection to our removal of upper bounds. Attachment(s): No document has been attached From owner-ietf-pkix@mail.imc.org Fri Oct 05 10:33:58 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IdoFa-0004QC-1z for pkix-archive@lists.ietf.org; Fri, 05 Oct 2007 10:33:58 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IdoFN-0007uC-Nw for pkix-archive@lists.ietf.org; Fri, 05 Oct 2007 10:33:48 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l95Dpjx5015303 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 5 Oct 2007 06:51:45 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l95DpjHA015302; Fri, 5 Oct 2007 06:51:45 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from woodstock.binhost.com (woodstock.binhost.com [8.8.40.152]) by balder-227.proper.com (8.13.5/8.13.5) with SMTP id l95Dpirn015296 for ; Fri, 5 Oct 2007 06:51:45 -0700 (MST) (envelope-from housley@vigilsec.com) Message-Id: <200710051351.l95Dpirn015296@balder-227.proper.com> Received: (qmail 17743 invoked by uid 0); 5 Oct 2007 13:51:41 -0000 Received: from unknown (HELO THINKPADR52.vigilsec.com) (207.236.147.202) by woodstock.binhost.com with SMTP; 5 Oct 2007 13:51:41 -0000 X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Fri, 05 Oct 2007 09:51:40 -0400 To: ietf-pkix@imc.org From: Russ Housley Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Cc: hoytkesterson@earthlink.com In-Reply-To: References: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 1.5 (+) X-Scan-Signature: 386e0819b1192672467565a524848168 When the upper bound values are embedded in the ASN.1 module, how can they be non-normative? These are the values that appear in RFC 3280: -- Upper Bounds ub-name INTEGER ::= 32768 ub-common-name INTEGER ::= 64 ub-locality-name INTEGER ::= 128 ub-state-name INTEGER ::= 128 ub-organization-name INTEGER ::= 64 ub-organizational-unit-name INTEGER ::= 64 ub-title INTEGER ::= 64 ub-serial-number INTEGER ::= 64 ub-match INTEGER ::= 128 ub-emailaddress-length INTEGER ::= 128 ub-common-name-length INTEGER ::= 64 ub-country-name-alpha-length INTEGER ::= 2 ub-country-name-numeric-length INTEGER ::= 3 ub-domain-defined-attributes INTEGER ::= 4 ub-domain-defined-attribute-type-length INTEGER ::= 8 ub-domain-defined-attribute-value-length INTEGER ::= 128 ub-domain-name-length INTEGER ::= 16 ub-extension-attributes INTEGER ::= 256 ub-e163-4-number-length INTEGER ::= 15 ub-e163-4-sub-address-length INTEGER ::= 40 ub-generation-qualifier-length INTEGER ::= 3 ub-given-name-length INTEGER ::= 16 ub-initials-length INTEGER ::= 5 ub-integer-options INTEGER ::= 256 ub-numeric-user-id-length INTEGER ::= 32 ub-organization-name-length INTEGER ::= 64 ub-organizational-unit-name-length INTEGER ::= 32 ub-organizational-units INTEGER ::= 4 ub-pds-name-length INTEGER ::= 16 ub-pds-parameter-length INTEGER ::= 30 ub-pds-physical-address-lines INTEGER ::= 6 ub-postal-code-length INTEGER ::= 16 ub-pseudonym INTEGER ::= 128 ub-surname-length INTEGER ::= 40 ub-terminal-id-length INTEGER ::= 24 ub-unformatted-address-length INTEGER ::= 180 ub-x121-address-length INTEGER ::= 16 At 08:19 AM 10/5/2007, ITU-T SG 17 wrote: >Title: Liaison to IETF on the removal of upper bound in X.509 >Submission Date: 2007-10-05 >URL of the IETF Web page: >https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=376 >Please reply by 2008-03-01 > >From: Xiaoya Yang(ITU-T SG 17) >To: IETF/PKIX(Russ Housley , Stefan Santesson >) >Cc: Herbert Bertine > > >Reponse Contact: Xiaoya YANG > >Technical Contact: >Purpose: For action >Body: In relation to resolve a Defect Report, it appears to majority >within the X.500 community to remove hard-coded length restriction >whenever a DirectoryString is used. >In response to developer demand in the early days of the standard >X.520 contained a list of maximum lengths for a variety of string >types, e.g., organizationalName. The values specified were >non-normative. However, some implementers treated the values as >normative. This has caused interoperability problem with implementations. >We plan to remove the upper bounds specified in the standard. In >particular we intend to eliminate the Upper Bounds for DirectoryString. >The proposal does not change the definition of DirectoryString, but >attribute definitions will look slightly different. As an example, >street address may > >streetAddress{INTEGER:maxSize} ATTRIBUTE ::= { > WITH > SYNTAX DirectoryString {maxSize} > EQUALITY MATCHING RULE caseIgnoreMatch > SUBSTRINGS MATCHING RULE caseIgnoreSubstringsMatch > ID > id-at-streetAddress } >That means that at implementation time, the upper limit may be added >if wanted. Otherwise an unlimited string may be assumed. >The proposal will not change the bits on the wire and we believe >this is in line with what the PXIX group is already doing. We are >forwarding this liaison to ensure that the PKIX group has no problem >with this proposal. >Please confirm that you have no objection to our removal of upper bounds. From owner-ietf-pkix@mail.imc.org Fri Oct 05 10:58:08 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Idocy-00054d-L1 for pkix-archive@lists.ietf.org; Fri, 05 Oct 2007 10:58:08 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Idocn-0000B1-61 for pkix-archive@lists.ietf.org; Fri, 05 Oct 2007 10:57:58 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l95EAjlp017340 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 5 Oct 2007 07:10:45 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l95EAjn5017339; Fri, 5 Oct 2007 07:10:45 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from woodstock.binhost.com (woodstock.binhost.com [8.8.40.152]) by balder-227.proper.com (8.13.5/8.13.5) with SMTP id l95EAhr5017333 for ; Fri, 5 Oct 2007 07:10:44 -0700 (MST) (envelope-from housley@vigilsec.com) Message-Id: <200710051410.l95EAhr5017333@balder-227.proper.com> Received: (qmail 15799 invoked by uid 0); 5 Oct 2007 14:10:40 -0000 Received: from unknown (HELO THINKPADR52.vigilsec.com) (207.236.147.202) by woodstock.binhost.com with SMTP; 5 Oct 2007 14:10:40 -0000 X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Fri, 05 Oct 2007 10:10:31 -0400 To: ietf-pkix@imc.org From: Russ Housley Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" In-Reply-To: References: Mime-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1"; format=flowed Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Content-Transfer-Encoding: quoted-printable X-MIME-Autoconverted: from 8bit to quoted-printable by balder-227.proper.com id l95EAjlp017340 X-Spam-Score: 1.5 (+) X-Scan-Signature: cf3becbbd6d1a45acbe2ffd4ab88bdc2 It seems to me that this is a trust anchor configuration concern. If=20 two CAs adopt the same name and a user accepts both of these CAs as=20 trust anchors, then there could be a problem. Just don't do it. RFC 3280bis says: While X.509 mandates that names be unambiguous, there is a risk that two unrelated authorities will issue certificates and/or CRLs under the same issuer name. As a means of reducing problems and security issues related to issuer name collisions, CA and CRL issuer names SHOULD be formed in a way that reduces the likelihood of name collisions. Implementers should take into account the possible existence of multiple unrelated CAs and CRL issuers with the same name. At a minimum, implementations validating CRLs MUST ensure that the certification path of a certificate and the CRL issuer certification path used to validate the certificate terminate at the same trust anchor. Russ At 08:12 AM 10/5/2007, ITU-T SG 17 wrote: >Title: Liaison to IETF on the resolution of DR320 >Submission Date: 2007-10-05 >URL of the IETF Web page:=20 >https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=3D375 >Please reply by 2008-03-01 > >From: Xiaoya Yang(ITU-T SG 17) >To: IETF/PKIX(Russ Housley , Stefan Santesson=20 >) >Cc: Herbert Bertine > > > >Reponse Contact: Xiaoya YANG > >Technical Contact: > >Purpose: For action >Body: At our recent ITU-T SG17 meeting in Geneva we discussed and=20 >rejected Defect Report 320=20 >(http://www.x500standard.com/uploads/Defects/DR_320.pdf) from=20 >AFNOR. This DR advanced an argument that Distinguished Names may=20 >not be unique and as such, the DN of the Certificate User may not be uni= que. >The directory group believes that Distinguished Name values must be=20 >unique and unambiguously identify a single entity, hence the use of=20 >the term Distinguished. >The DR states =E2=80=9Cthe DN of the issuer name cannot be guaranteed to= =20 >be unique=E2=80=9D. X.509 takes its definition of DN from X.501. Claus= e=20 >9.2 of X.501 specifies the definition of DistinguishedName. This=20 >clause states A name shall be unambiguous, that is, denotes just one obj= ect. >Clause 9 goes on to state: It is the responsibility of the relevant=20 >naming authority for an entry to ensure that this is so by=20 >appropriately assigning distinguished attribute values. Allocation=20 >of RDNs is considered an administrative undertaking that may or may=20 >not require some negotiation between involved organizations or=20 >administrations. This Directory Specification does not provide such=20 >a negotiation mechanism, and makes no assumption as to how it is perform= ed. >The standard takes an axiomatic view of the concept that a=20 >distinguished name unambiguously identifies a single entity. Things=20 >break if two entities identify themselves using the same name. We=20 >don't let two entities have the same domain name or the same email=20 >address. Why? - because things wouldn't work. >The directory group does not accept the DR=E2=80=99s basic argument. We= =20 >believe that if two entities present the same name and a CA issues a=20 >certificate to each, that CA made a mistake - not a naming authority=20 >mistake, since a CA is not an naming authority (although one entity=20 >can be both), but an entity to key binding mistake that leads to=20 >confusion and even worse, a security risk. >We believe that if two entities claim the same name as top level=20 >CAs, there is a political/procedural breakdown much like the domain=20 >ownership arguments we have seen. No one argues that the Internet=20 >protocols should be modified to solve that problem. The conflict is=20 >resolved and one entity is assigned the name. The group believes=20 >that this is the only reasonable solution for Distinguished=20 >Naming. One votes for the CA of choice by configuring it as an anchor. >One of the participants in the directory meeting stated that=20 >Certification Authorities are being deployed with names not acquired=20 >from naming authorities but with names arbitrarily chosen assuming=20 >that no other CA is or will be operating under that name. That=20 >participant further stated that the IETF provides no guidelines on=20 >ensuring that the names of CAs are unambiguous. >The directory group requests the IETF PKIX group to comment on this=20 >statement. If the statement is correct, we ask the IETF to consider=20 >putting a mechanism in place to prevent conflict, e.g. a list of=20 >existing CA names that deployers of new CAs could check for naming confl= icts. >Attachment(s): >No document has been attached From owner-ietf-pkix@mail.imc.org Fri Oct 05 13:28:53 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Idqyr-0008KS-88 for pkix-archive@lists.ietf.org; Fri, 05 Oct 2007 13:28:53 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Idqye-0005dK-On for pkix-archive@lists.ietf.org; Fri, 05 Oct 2007 13:28:47 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l95GeMXR030157 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 5 Oct 2007 09:40:22 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l95GeMgB030156; Fri, 5 Oct 2007 09:40:22 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from elasmtp-galgo.atl.sa.earthlink.net (elasmtp-galgo.atl.sa.earthlink.net [209.86.89.61]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l95GeLxQ030149 for ; Fri, 5 Oct 2007 09:40:22 -0700 (MST) (envelope-from hoytkesterson@earthlink.net) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=dk20050327; d=earthlink.net; b=KZRnCIeQavBrtRsj7ZHiKAVIDkBUH9QYotkVPe11zl+RiGOQ7BpIhNeCDmuzFufY; h=Received:Mime-Version:Message-Id:In-Reply-To:References:Date:To:From:Subject:Content-Type:X-ELNK-Trace:X-Originating-IP; Received: from [151.118.180.188] (helo=[156.106.219.41]) by elasmtp-galgo.atl.sa.earthlink.net with asmtp (TLSv1:AES256-SHA:256) (Exim 4.34) id 1IdqDs-0004J7-OW for ietf-pkix@imc.org; Fri, 05 Oct 2007 12:40:21 -0400 Mime-Version: 1.0 Message-Id: In-Reply-To: <200710051351.l95Dpirn015296@balder-227.proper.com> References: <200710051351.l95Dpirn015296@balder-227.proper.com> Date: Fri, 5 Oct 2007 09:40:08 -0700 To: ietf-pkix@imc.org From: Hoyt L Kesterson II Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Content-Type: text/html; charset="us-ascii" X-ELNK-Trace: 59f3edefb26af0321a6f9084d36cbc6474bf435c0eb9d478ff8b85d7d168df7ae1f7ce53db6ecf5a22d82498bb8304f1350badd9bab72f9c350badd9bab72f9c X-Originating-IP: 151.118.180.188 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 1.7 (+) X-Scan-Signature: 187ae6c2eea74946c0ab707161f6256d Re: New Liaison Statement, "Liaison to IETF on the removal
Annex C (and Annex B) of X.520 | 9594-6 contains the following line just below the Title Line of the Annex:  (This annex does not form an integral part of this Recommendation | International Standard)

This is standardeeze for informative, i.e. not required to conform.

These values initially came from the OSI workshops of long ago. They wanted them in the standard; I argued they were somewhat arbitrary and should instead be agreements within specific communities (who was I to deny the right to name someone Throckmorton P. Gildersleeve VIII).

I felt that many values were set not to ease the implementation effort but because the group felt that the limits reflected real limits. I suggested they agree on a what they felt to be a practical number and then double it but the group stood firm. Realize that some of those people felt AE-title was too long and wanted OIDs for directory names.

We compromised by putting the limits in the standard but making the annex, and thus the values, informative instead of normative. We felt that if a value needed to be changed, an implementor's group could do it faster than the two years it would take to make a non-error-driven change to the standard.

We recently had a discussion of this on the directory email list where several LDAP people said that such limits were not useful.

We did know that some developers have interpreted the values as fixed maximums while others have adjusted them to meet the need.

This difference of understanding has caused interworking problems in the past. (A similar problem arose from the diagram in Annex B of X.521 | 9594-7 Selected Object Classes. Even though the same "not form an integral part" appears and the title of the Annex is Suggested Name Forms and DIT Structures, we still saw developers refer to the X.500 standardized name.

In the discussions in Geneva we thought it might be a good idea to get rid of the problem entirely by removing bounds. We felt such a change to the ASN.1 wouldn't change the "bits on the wire" but might change the receiver's code. Hence the liaison to PKIX.

For information, here are the suggested values from that annex in X.520.

ub-answerback    INTEGER    ::=    8
ub-business-category    INTEGER    ::=    128
ub-common-name    INTEGER    ::=    64
ub-content        INTEGER    ::=    32768
ub-country-code    INTEGER    ::=    4
ub-description    INTEGER    ::=    1024
ub-destination-indicator    INTEGER    ::=    128
ub-directory-string-first-component-match    INTEGER    ::=    32768
ub-domainLocalID    INTEGER    ::=    64
ub-international-isdn-number      INTEGER    ::=    16
ub-knowledge-information    INTEGER    ::=    32768
ub-labeledURI    INTEGER    ::=    32768
ub-localeContextSyntax    INTEGER    ::=    128
ub-locality-name       INTEGER    ::=    128
ub-match    INTEGER    ::=    128
ub-name    INTEGER    ::=    64
ub-organization-name    INTEGER    ::=    64
ub-organizational-unit-name    INTEGER    ::=    64
ub-physical-office-name    INTEGER    ::=    128
ub-post-office-box    INTEGER    ::=    40
ub-postal-code    INTEGER    ::=    40
ub-postal-line    INTEGER    ::=    6
ub-postal-string    INTEGER    ::=    30
ub-privacy-mark-length       INTEGER    ::=    128
ub-pseudonym    INTEGER    ::=    128
ub-saslMechanism    INTEGER    ::=    64
ub-schema      INTEGER    ::=    1024
ub-search    INTEGER    ::=    32768
ub-serial-number       INTEGER    ::=    64
ub-state-name    INTEGER    ::=    128
ub-street-address      INTEGER    ::=    128
ub-surname    INTEGER    ::=    64
ub-tag    INTEGER    ::=    64
ub-telephone-number    INTEGER    ::=    32
ub-teletex-terminal-id    INTEGER    ::=    1024
ub-telex-number    INTEGER    ::=    14
ub-title    INTEGER    ::=    64
ub-user-password    INTEGER    ::=    128
ub-x121-address       INTEGER    ::=    15
   hoyt


When the upper bound values are embedded in the ASN.1 module, how can they be non-normative?

These are the values that appear in RFC 3280:

-- Upper Bounds
ub-name INTEGER ::= 32768
ub-common-name INTEGER ::= 64
ub-locality-name INTEGER ::= 128
ub-state-name INTEGER ::= 128
ub-organization-name INTEGER ::= 64
ub-organizational-unit-name INTEGER ::= 64
ub-title INTEGER ::= 64
ub-serial-number INTEGER ::= 64
ub-match INTEGER ::= 128
ub-emailaddress-length INTEGER ::= 128
ub-common-name-length INTEGER ::= 64
ub-country-name-alpha-length INTEGER ::= 2
ub-country-name-numeric-length INTEGER ::= 3
ub-domain-defined-attributes INTEGER ::= 4
ub-domain-defined-attribute-type-length INTEGER ::= 8
ub-domain-defined-attribute-value-length INTEGER ::= 128
ub-domain-name-length INTEGER ::= 16
ub-extension-attributes INTEGER ::= 256
ub-e163-4-number-length INTEGER ::= 15
ub-e163-4-sub-address-length INTEGER ::= 40
ub-generation-qualifier-length INTEGER ::= 3
ub-given-name-length INTEGER ::= 16
ub-initials-length INTEGER ::= 5
ub-integer-options INTEGER ::= 256
ub-numeric-user-id-length INTEGER ::= 32
ub-organization-name-length INTEGER ::= 64
ub-organizational-unit-name-length INTEGER ::= 32
ub-organizational-units INTEGER ::= 4
ub-pds-name-length INTEGER ::= 16
ub-pds-parameter-length INTEGER ::= 30
ub-pds-physical-address-lines INTEGER ::= 6
ub-postal-code-length INTEGER ::= 16
ub-pseudonym INTEGER ::= 128
ub-surname-length INTEGER ::= 40
ub-terminal-id-length INTEGER ::= 24
ub-unformatted-address-length INTEGER ::= 180
ub-x121-address-length INTEGER ::= 16

At 08:19 AM 10/5/2007, ITU-T SG 17 wrote:
Title: Liaison to IETF on the removal of upper bound in X.509
Submission Date: 2007-10-05
URL of the IETF Web page: https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=376
Please reply by 2008-03-01

From: Xiaoya Yang(ITU-T SG 17) <tsbsg17@itu.int>
To: IETF/PKIX(Russ Housley <housley@vigilsec.com>, Stefan Santesson <stefans@microsoft.com>)
Cc: Herbert Bertine <hbertine@alcatel-lucent.com>
<tsbsg17@itu.int>
<era@tdcadsl.dk>
Reponse Contact: Xiaoya YANG <xiaoya.yang@itu.int>
<tsbsg17@itu.int>
Technical Contact: <era@tdcadsl.dk>
Purpose: For action
Body: In relation to resolve a Defect Report, it appears to majority within the X.500 community to remove hard-coded length restriction whenever a DirectoryString is used.
In response to developer demand in the early days of the standard X.520 contained a list of maximum lengths for a variety of string types, e.g., organizationalName.  The values specified were non-normative.  However, some implementers treated the values as normative.  This has caused interoperability problem with implementations.
We plan to remove the upper bounds specified in the standard. In particular we intend to eliminate the Upper Bounds for DirectoryString.
The proposal does not change the definition of DirectoryString, but attribute definitions will look slightly different.  As an example, street address may

streetAddress{INTEGER:maxSize}  ATTRIBUTE  ::=  {
        WITH SYNTAX                                     DirectoryString {maxSize}
        EQUALITY MATCHING RULE                  caseIgnoreMatch
        SUBSTRINGS MATCHING RULE                caseIgnoreSubstringsMatch
        ID id-at-streetAddress }
That means that at implementation time, the upper limit may be added if wanted. Otherwise an unlimited string may be assumed.
The proposal will not change the bits on the wire and we believe this is in line with what the PXIX group is already doing.  We are forwarding this liaison to ensure that the PKIX group has no problem with this proposal.
Please confirm that you have no objection to our removal of upper bounds.

From tanchi@intellicomcenters.com Fri Oct 05 15:27:24 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IdspY-0001Nf-TY for pkix-archive@lists.ietf.org; Fri, 05 Oct 2007 15:27:24 -0400 Received: from [201.230.150.122] (helo=client-201.230.150.122.speedy.net.pe) by ietf-mx.ietf.org with smtp (Exim 4.43) id 1IdspU-0001io-EJ for pkix-archive@lists.ietf.org; Fri, 05 Oct 2007 15:27:21 -0400 Received: from ktcb ([82.49.125.218]) by client-201.230.150.122.speedy.net.pe with Microsoft SMTPSVC(5.0.2195.6713); Fri, 5 Oct 2007 14:26:56 -0500 Message-ID: <001501c80785$b11e0ac0$da7d3152@ktcb> From: To: Subject: Investment alert Date: Fri, 5 Oct 2007 14:26:56 -0500 MIME-Version: 1.0 Content-Type: text/plain; format=flowed; charset="windows-1250"; reply-type=original Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2800.1106 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106 X-Spam-Score: 4.6 (++++) X-Scan-Signature: 7bac9cb154eb5790ae3b2913587a40de Huge Trade Day For FRLE Fearless International Inc. (F R L E) $0.25 UP 31.51 % Solid trading pays off as prices begin to climb. Today's trading and huge increases will certainly make for a much bigger day tomorrow. There is a time and place for everything, and Friday more is yours, grab this one early. From wannessab@one.lv Sat Oct 06 01:18:26 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ie23W-0002v3-Pa for pkix-archive@lists.ietf.org; Sat, 06 Oct 2007 01:18:26 -0400 Received: from [85.108.7.34] (helo=gmbgg) by ietf-mx.ietf.org with smtp (Exim 4.43) id 1Ie23R-0001Bo-US for pkix-archive@lists.ietf.org; Sat, 06 Oct 2007 01:18:26 -0400 Received: from setqt ([53.36.192.190]) by gmbgg with Microsoft SMTPSVC(5.0.2195.6713); Sat, 6 Oct 2007 08:18:08 +0300 Message-ID: <47071A90.7050302@one.lv> Date: Sat, 6 Oct 2007 08:18:08 +0300 From: User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: pkix-archive@lists.ietf.org Subject: Investor Alert Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Antivirus: avast! (VPS 0639-1, 25.09.2006), Outbound message X-Antivirus-Status: Clean X-Spam-Score: 1.7 (+) X-Scan-Signature: 30ac594df0e66ffa5a93eb4c48bcb014 Heavy trading has investors moving on Fearless. Fearless International Inc. (F R L E) $0.21 Solid trading and Thursday's price jumps is putting this stock into overdrive. This is not just a dream; inventors are taking this one to the bank. Don't miss out on FRLE Monday. From Andras_Crabill@mcoroa.com Sat Oct 06 03:50:39 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ie4Qp-0001gE-9p for pkix-archive@lists.ietf.org; Sat, 06 Oct 2007 03:50:39 -0400 Received: from shcontrol.plus.com ([80.229.46.86]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Ie4Qd-0004o1-Tm for pkix-archive@lists.ietf.org; Sat, 06 Oct 2007 03:50:34 -0400 Received: from pc ([116.124.35.36]:19250 "EHLO pc" smtp-auth: TLS-CIPHER: TLS-PEER-CN1: ) by shcontrol.plus.com with ESMTP id S22ZCVXBBWWWBJCL (ORCPT ); Sat, 6 Oct 2007 08:51:19 +0100 Message-ID: <000301c807ed$998cbc40$562ee550@pc> From: "Andras Crabill" To: Subject: eelrekka Date: Sat, 6 Oct 2007 08:50:44 +0100 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0004_01C807F5.FB512440" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 X-Spam-Score: 1.1 (+) X-Scan-Signature: bb8f917bb6b8da28fc948aeffb74aa17 ------=_NextPart_000_0004_01C807F5.FB512440 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable http://tagheuere.com/ How it is going pkix-archive With the help of our system you could become the man that you have = always wanted to be and your partner(s) want you to be. Andras Crabill ------=_NextPart_000_0004_01C807F5.FB512440 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
http://tagheuere.com/
How it is going pkix-archive
With the help of our system you could become = the man=20 that you have always wanted to be and your partner(s) want you to = be.
Andras Crabill
------=_NextPart_000_0004_01C807F5.FB512440-- From Blagoycannizzo@dillmanfamilymortgage.com Sat Oct 06 10:19:45 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IeAVM-0003aF-V2 for pkix-archive@lists.ietf.org; Sat, 06 Oct 2007 10:19:44 -0400 Received: from ppp-27-250.15-151.iol.it ([151.15.250.27]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IeAV3-00074g-1T for pkix-archive@lists.ietf.org; Sat, 06 Oct 2007 10:19:25 -0400 Received: from giuseppe ([137.197.59.152]:23035 "EHLO giuseppe" smtp-auth: TLS-CIPHER: TLS-PEER-CN1: ) by [151.15.250.27] with ESMTP id S22WMJLFRDOKHBXA (ORCPT ); Sat, 6 Oct 2007 16:16:20 +0200 Message-ID: <000b01c80823$6071fde0$1bfa0f97@giuseppe> From: "Blagoy cannizzo" To: Subject: egirgrvd Date: Sat, 6 Oct 2007 16:15:41 +0200 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0003_01C80834.23FACDE0" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 X-Spam-Score: 0.0 (/) X-Scan-Signature: 8abaac9e10c826e8252866cbe6766464 ------=_NextPart_000_0003_01C80834.23FACDE0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable http://www.mnmcurl.com/ Yo pkix-archive proven to be safe and very effective Blagoy cannizzo ------=_NextPart_000_0003_01C80834.23FACDE0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
http://www.mnmcurl.com/
Yo pkix-archive
proven to be safe and very = effective
Blagoy cannizzo
------=_NextPart_000_0003_01C80834.23FACDE0-- From owner-ietf-pkix@mail.imc.org Sat Oct 06 10:30:12 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IeAfU-0002bC-3F for pkix-archive@lists.ietf.org; Sat, 06 Oct 2007 10:30:12 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IeAfJ-0006Re-OZ for pkix-archive@lists.ietf.org; Sat, 06 Oct 2007 10:30:08 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l96DN6pW032041 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 6 Oct 2007 06:23:06 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l96DN6Yj032040; Sat, 6 Oct 2007 06:23:06 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from woodstock.binhost.com (woodstock.binhost.com [8.8.40.152]) by balder-227.proper.com (8.13.5/8.13.5) with SMTP id l96DN5qg032032 for ; Sat, 6 Oct 2007 06:23:05 -0700 (MST) (envelope-from housley@vigilsec.com) Message-Id: <200710061323.l96DN5qg032032@balder-227.proper.com> Received: (qmail 2902 invoked by uid 0); 6 Oct 2007 13:23:02 -0000 Received: from unknown (HELO THINKPADR52.vigilsec.com) (207.236.147.202) by woodstock.binhost.com with SMTP; 6 Oct 2007 13:23:02 -0000 X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Sat, 06 Oct 2007 09:22:38 -0400 To: ietf-pkix@imc.org From: Russ Housley Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" In-Reply-To: <7.1.0.9.2.20071005094401.0801cb08@vigilsec.com> References: <7.1.0.9.2.20071005094401.0801cb08@vigilsec.com> Mime-Version: 1.0 Content-Type: text/html; charset="us-ascii" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 3.2 (+++) X-Scan-Signature: b5d20af10c334b36874c0264b10f59f1 In the 1988 blue book, the Upper Bounds annex and module were normative. It also limited common name to 64 bytes.

The next edition (1993) contained: "This annex does not form an integral part of this Recommendation | International Standard."

The third edition (1997) contains the same text as the second edition. And, ub-name has the value of 32768.

The fourth edition (2000) is the same as the third. However, ub-name hase a different value; it is set to 128.

The PKIX WG seems to be using the 1997 upper bound numbers, but they are normative in RFC 2459 and RFC 3280.

Personally, I missed the subtle change from normative to informative.  I suspect many others did too.  If the PKIX WG to make them informative too, then it will have to be done *right now*.  The 3280bis document has started the approval process.  According to the Data Tracker, Sam Hartman is doing his AD Review right now.

Russ

At 09:44 AM 10/5/2007, Russ Housley wrote:

Title: Liaison to IETF on the removal of upper bound in X.509
Submission Date: 2007-10-05
URL of the IETF Web page: https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=376
Please reply by 2008-03-01

From: Xiaoya Yang(ITU-T SG 17) <tsbsg17@itu.int>
To: IETF/PKIX(Russ Housley <housley@vigilsec.com>, Stefan Santesson <stefans@microsoft.com>)
Cc: Herbert Bertine <hbertine@alcatel-lucent.com>
<tsbsg17@itu.int>
<era@tdcadsl.dk>
Reponse Contact: Xiaoya YANG <xiaoya.yang@itu.int>
<tsbsg17@itu.int>
Technical Contact: <era@tdcadsl.dk>
Purpose: For action
Body: In relation to resolve a Defect Report, it appears to majority within the X.500 community to remove hard-coded length restriction whenever a DirectoryString is used.
In response to developer demand in the early days of the standard X.520 contained a list of maximum lengths for a variety of string types, e.g., organizationalName.  The values specified were non-normative.  However, some implementers treated the values as normative.  This has caused interoperability problem with implementations.
We plan to remove the upper bounds specified in the standard. In particular we intend to eliminate the Upper Bounds for DirectoryString.
The proposal does not change the definition of DirectoryString, but attribute definitions will look slightly different.  As an example, street address may

streetAddress{INTEGER:maxSize}  ATTRIBUTE  ::=  {
        WITH SYNTAX                                         DirectoryString {maxSize}
        EQUALITY MATCHING RULE                    caseIgnoreMatch
        SUBSTRINGS MATCHING RULE                  caseIgnoreSubstringsMatch
        ID                                                              id-at-streetAddress }
That means that at implementation time, the upper limit may be added if wanted. Otherwise an unlimited string may be assumed.
The proposal will not change the bits on the wire and we believe this is in line with what the PXIX group is already doing.  We are forwarding this liaison to ensure that the PKIX group has no problem with this proposal.
Please confirm that you have no objection to our removal of upper bounds.
Attachment(s):
No document has been attached
From cjsplash2004@ldschurch.org Sat Oct 06 11:33:20 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IeBea-0002mm-NF for pkix-archive@lists.ietf.org; Sat, 06 Oct 2007 11:33:20 -0400 Received: from [190.24.7.200] (helo=corporativos247-200.etb.net.co) by ietf-mx.ietf.org with smtp (Exim 4.43) id 1IeBeU-000842-1q for pkix-archive@lists.ietf.org; Sat, 06 Oct 2007 11:33:17 -0400 Received: from lwod ([217.129.65.118]) by corporativos247-200.etb.net.co (8.13.5/8.13.5) with SMTP id l96FaIBX068246; Sat, 6 Oct 2007 10:36:18 -0500 Message-ID: <4707AA9C.6060400@ldschurch.org> Date: Sat, 6 Oct 2007 10:32:44 -0500 From: User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: pkix-archive@lists.ietf.org Subject: Lets take a ride Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Score: 0.1 (/) X-Scan-Signature: 30ac594df0e66ffa5a93eb4c48bcb014 Market makers watch as FRLE takes off. Fearless International Inc. (f R l E) $0.21 Brewing for more than a week, FRLE is now busting out. This much movement will continue to drive prices upward. The boat is here for FRLE, Get in first thing Monday! From owner-ietf-pkix@mail.imc.org Sat Oct 06 16:33:30 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IeGL4-0002AS-9y for pkix-archive@lists.ietf.org; Sat, 06 Oct 2007 16:33:30 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IeGKz-00064P-0a for pkix-archive@lists.ietf.org; Sat, 06 Oct 2007 16:33:26 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l96Jnwwm062261 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 6 Oct 2007 12:49:58 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l96JnwK9062260; Sat, 6 Oct 2007 12:49:58 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from relay.imagine.ie (dns1.dns.imagine.ie [87.232.1.40]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l96Jntgj062251 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Sat, 6 Oct 2007 12:49:57 -0700 (MST) (envelope-from stephen.farrell@cs.tcd.ie) Received: from mail1.int.imagine.ie (mail1 [87.232.1.152]) by relay.imagine.ie (Postfix) with ESMTP id E3E1F325D1; Sat, 6 Oct 2007 20:49:54 +0100 (IST) Received: from [127.0.0.1] (dsl-102-234.cust.imagine.ie [87.232.102.234]) by mail1.int.imagine.ie (8.13.4/8.13.4/Debian-3) with ESMTP id l96JnqV4005913 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Sat, 6 Oct 2007 20:49:52 +0100 Message-ID: <4707E6DA.1070703@cs.tcd.ie> Date: Sat, 06 Oct 2007 20:49:46 +0100 From: Stephen Farrell User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: Russ Housley CC: ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" References: <7.1.0.9.2.20071005094401.0801cb08@vigilsec.com> <200710061323.l96DN5qg032032@balder-227.proper.com> In-Reply-To: <200710061323.l96DN5qg032032@balder-227.proper.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Bayes-Prob: 0.9355 (Score 4) X-Spam-Score: 4.00 (****) [Hold at 8.00] X-Canit-Stats-ID: 15824530 - fdba0e01b20b X-CanItPRO-Stream: outgoing X-Scanned-By: CanIt (www . roaringpenguin . com) on 87.232.1.52 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 68c8cc8a64a9d0402e43b8eee9fc4199 Russ Housley wrote: > Personally, I missed the subtle change from normative to informative. I > suspect many others did too. If the PKIX WG to make them informative > too, then it will have to be done *right now*. I see no reason to make such a change at this stage. S. From owner-ietf-pkix@mail.imc.org Sat Oct 06 16:56:22 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IeGhC-0004CY-HM for pkix-archive@lists.ietf.org; Sat, 06 Oct 2007 16:56:22 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IeGh7-0006c3-7U for pkix-archive@lists.ietf.org; Sat, 06 Oct 2007 16:56:18 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l96KCct2063951 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 6 Oct 2007 13:12:38 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l96KCcai063950; Sat, 6 Oct 2007 13:12:38 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from EXVS01.ex.dslextreme.net (exbe04.ex.dslextreme.net [66.51.199.86]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l96KCb3G063944 for ; Sat, 6 Oct 2007 13:12:38 -0700 (MST) (envelope-from chokhani@orionsec.com) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Subject: RE: OCSP Algorithm Agility Date: Sat, 6 Oct 2007 13:12:19 -0700 Message-ID: <82D5657AE1F54347A734BDD33637C8790966180C@EXVS01.ex.dslextreme.net> In-Reply-To: <0D028BDBFBA58441BD8E9746914806422AE2D9@MOU1WNEXMB14.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP Algorithm Agility thread-index: Acf8l4NIxZexIh9rTveKgrEJmUDxVQAAJZEAAlba1eAAAH/7QA== References: <82D5657AE1F54347A734BDD33637C87909439443@EXVS01.ex.dslextreme.net> <0D028BDBFBA58441BD8E9746914806422AE2D9@MOU1WNEXMB14.vcorp.ad.vrsn.com> From: "Santosh Chokhani" To: "Andrews, Rick" , Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l96KCc3G063945 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 5ebbf074524e58e662bc8209a6235027 Rick, SCVP or other intermediaries are red herring. Whoever processes the certificate processes the revocation information for that certificate. It does not change the following: 1. There is no security benefit in using a stronger algorithm for OCSP response than for the certificate in question. Neither, there is any benefit from interoperability viewpoint for these two to be different. 2. If the OCSP Responder does not get a CRL, it can use the same mechanism to get the hashing algorithm used as it uses to get the revocation information. -----Original Message----- From: Andrews, Rick [mailto:RAndrews@verisign.com] Sent: Wednesday, October 03, 2007 3:29 PM To: Santosh Chokhani; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility Santosh, Sorry for the long delay in responding - travel and vacation. Not all OCSP responders work from CRLs, so they won't take their cue from the CRL. Nor should they take their cue from the signature on the cert in question, I believe. Let me try to restate my argument in a different way. With SCVP delegated path validation, the client requesting a cert's status from an OCSP responder will be different from the client at the other end of the SSL connection. Those two clients may have very different capabilities in terms of supported signature and hash algorithms. It's not realistic to expect that all SSL clients, all SCVP servers, and all CAs will be able to upgrade in lockstep to new algorithms as they are developed. Allowing the OCSP client and server to negotiate a mutually-acceptable set of algorithms is essential to the deployment of newer, stronger algorithms. Likewise, companies that run large OCSP responders may wish to gradually move to ECC-based signatures for all their OCSP responses, even those for certs with RSA or DSA keys, because ECC signatures are cheaper to produce. If algorithm agility is added to OCSP, those companies can gradually achieve the move to ECC without disrupting the installed base of OCSP clients that don't support ECC. -Rick Andrews > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > Sent: Friday, September 21, 2007 2:45 PM > To: Paul Hoffman; Stephen Kent; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > Paul, > > Here are my views on this. > > The client should be first asking for the algorithm suite > that signed the certificate in question. There is no need > for the client to ask for anything stronger. The client can > ask for stronger suites as secondary, if client has them. > > In the scenario you cite, the Responder certificate will not > include RSA with SHA 1 any longer. So, client will know that > Responder only supported his second choice and he should be > ok with it. > > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] > On Behalf Of Paul Hoffman > Sent: Friday, September 21, 2007 4:39 PM > To: Stephen Kent; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > At 2:07 PM -0400 9/21/07, Stephen Kent wrote: > >How about defining an extension to be included in the cert > issued to an > >OCSP responder by a CA. The extension would have an ordered list of > >algorithms (hash and signature if we want to address more > than the hash > >agility issue) accepted by the OCSP responder. An OCSP > client can use > >this info to determine what is the "best" algorithm (or alg > pair) that > >it and the responder share. The combination of this extension and an > >OCSP negotiation procedure will allow the client to detect MITM > >downgrade attacks. In fact, if the client acquires the > responder's cert > >prior to making a request, there would not even be a need for real > >negotiation, since the client would know what alg to request in a > >response. > > Imagine the list of algorithms is RSA-with-SHA1 first and > DSA-with-SHA1 second. How does your negotiation work? The > client asks for this message to be signed with RSA-with-SHA1. > But the server knows that RSA-with-SHA1 has been compromised > since it got that certificate from the CA. What does the > server say to the client to indicate that it only wants to > sign with DSA-with-SHA1? What prevents Mallory from saying > the same thing to the client? > > --Paul Hoffman, Director > --VPN Consortium > > > From cerny@bial.com Sat Oct 06 20:08:31 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IeJh9-0006pS-Pg for pkix-archive@lists.ietf.org; Sat, 06 Oct 2007 20:08:31 -0400 Received: from [58.186.170.152] (helo=xyjeyu) by ietf-mx.ietf.org with smtp (Exim 4.43) id 1IeJh2-0003Me-1u for pkix-archive@lists.ietf.org; Sat, 06 Oct 2007 20:08:25 -0400 Received: from hpfsv ([137.73.35.37]) by xyjeyu with Microsoft SMTPSVC(6.0.3790.0); Sun, 7 Oct 2007 07:07:30 +0700 Message-ID: <002001c80876$0d8d5b30$25234989@hpfsv> From: To: Subject: Are you ready to go? Date: Sun, 7 Oct 2007 07:07:30 +0700 MIME-Version: 1.0 Content-Type: text/plain; format=flowed; charset="windows-1250"; reply-type=original Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2800.1158 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1158 X-Spam-Score: 3.9 (+++) X-Scan-Signature: 30ac594df0e66ffa5a93eb4c48bcb014 Trading up over 250% after share prices jump on Thursday. FEARLESS INTL INC (FRLE) $0.21 Fearless International goes into over drive as Market makers move in to grab their piece. All the pieces are in place to make this one hot investment. Monday is the day to get in on FRLE. From Drozdowicz@nordique.com Sat Oct 06 21:30:14 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IeKyE-0002vU-Br for pkix-archive@lists.ietf.org; Sat, 06 Oct 2007 21:30:14 -0400 Received: from [88.238.189.251] (helo=[88.238.189.251]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IeKy4-0006xo-HL for pkix-archive@lists.ietf.org; Sat, 06 Oct 2007 21:30:05 -0400 Received: from lg-7006d5c09aec ([126.162.85.114] helo=lg-7006d5c09aec) by [88.238.191.228] ( sendmail 8.13.3/8.13.1) with esmtpa id 1mmLxM-000LMB-yu for pkix-archive@lists.ietf.org; Sun, 7 Oct 2007 04:30:12 +0300 Message-ID: <000801c80881$8ccf2c10$e4bfee58@lg7006d5c09aec> From: "parris Drozdowicz" To: pkix-archive@lists.ietf.org Subject: neigat Date: Sun, 7 Oct 2007 04:29:48 +0300 Message-ID: <000801c80881$8ccf2c10$e4bfee58@lg7006d5c09aec> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-9" Content-Transfer-Encoding: 7bit X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook, Build 10.0.6626 Importance: Normal X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2962 X-Spam-Score: 3.2 (+++) X-Scan-Signature: 8ac499381112328dd60aea5b1ff596ea Wassup pkix-archive myspace recommends this website for all MEN looking to get 2-3" bigger cock parris Drozdowicz http://www.muias.com/ From owner-ietf-pkix@mail.imc.org Sun Oct 07 06:12:17 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IeT7R-00040z-Dl for pkix-archive@lists.ietf.org; Sun, 07 Oct 2007 06:12:17 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IeT7D-0002wR-H0 for pkix-archive@lists.ietf.org; Sun, 07 Oct 2007 06:12:11 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l979HWc0009965 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 7 Oct 2007 02:17:32 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l979HW4g009964; Sun, 7 Oct 2007 02:17:32 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from pne-smtpout2-sn1.fre.skanova.net (pne-smtpout2-sn1.fre.skanova.net [81.228.11.159]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l979HTVV009957 for ; Sun, 7 Oct 2007 02:17:32 -0700 (MST) (envelope-from anders.rundgren@telia.com) Received: from arport2v (81.232.45.243) by pne-smtpout2-sn1.fre.skanova.net (7.2.075) (authenticated as u18116613) id 46FA23310031A063 for ietf-pkix@imc.org; Sun, 7 Oct 2007 11:17:28 +0200 Message-ID: <005c01c808c2$db8eddf0$82c5a8c0@arport2v> From: "Anders Rundgren" To: Subject: KeyGen2 - Yet Another PKI Provisioning Protocol Date: Sun, 7 Oct 2007 11:17:17 +0200 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2800.1807 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1896 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: de4f315c9369b71d7dd5909b42224370 F.Y.I. Since there seems to be no PKI provisioning standard combining - A web browser interface - Support for secure containers like TPMs - Consumer-oriented key-management functions - Support for PIN-code policies I have taken the liberty to on "hobby" basis begin the development of yet another key provisioning system. More details are available at: http://webpki.org/keygen2.pdf Anders Rundgren From owner-ietf-pkix@mail.imc.org Sun Oct 07 20:15:16 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IegHD-0000b3-Vg for pkix-archive@lists.ietf.org; Sun, 07 Oct 2007 20:15:15 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IegH8-0004rj-MP for pkix-archive@lists.ietf.org; Sun, 07 Oct 2007 20:15:11 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l97NJK5V077374 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 7 Oct 2007 16:19:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l97NJKXi077373; Sun, 7 Oct 2007 16:19:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from EXVS01.ex.dslextreme.net (exbe04.ex.dslextreme.net [66.51.199.86]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l97NJJuM077365 for ; Sun, 7 Oct 2007 16:19:20 -0700 (MST) (envelope-from chokhani@orionsec.com) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Subject: RE: OCSP Algorithm Agility Date: Sun, 7 Oct 2007 16:18:56 -0700 Message-ID: <82D5657AE1F54347A734BDD33637C879096618AD@EXVS01.ex.dslextreme.net> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP Algorithm Agility thread-index: Acf8g+lSm4OdXAknTt2BXwIpRJkp9QAAN7VQAyzHXAA= References: <2788466ED3E31C418E9ACC5C3166155703DF57@mou1wnexmb09.vcorp.ad.vrsn.com> From: "Santosh Chokhani" To: "Stephen Kent" , Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l97NJKuM077368 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 8b30eb7682a596edff707698f4a80f7d Steve, Another way to do this securely is to let the client signal in the hash algorithm field of the certID. This will not be vulnerable to MITM attack since the client can check the hashing algorithm used to sign the response matches the hashing algorithm in the certID field. It also provides security since if an hashing algorithm is good enough for certificate, it is good enough for OCSP response. It provides interoperability for the client since the client has to have the hashing algorithm for certificate signature verification. -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stephen Kent Sent: Friday, September 21, 2007 2:08 PM To: ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility Folks, How about defining an extension to be included in the cert issued to an OCSP responder by a CA. The extension would have an ordered list of algorithms (hash and signature if we want to address more than the hash agility issue) accepted by the OCSP responder. An OCSP client can use this info to determine what is the "best" algorithm (or alg pair) that it and the responder share. The combination of this extension and an OCSP negotiation procedure will allow the client to detect MITM downgrade attacks. In fact, if the client acquires the responder's cert prior to making a request, there would not even be a need for real negotiation, since the client would know what alg to request in a response. Steve From hoddyn@bradleyinsurance.net Sun Oct 07 22:06:22 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Iei0k-0000bn-OG for pkix-archive@lists.ietf.org; Sun, 07 Oct 2007 22:06:22 -0400 Received: from [65.120.193.165] (helo=vgmwv) by ietf-mx.ietf.org with smtp (Exim 4.43) id 1Iei0f-0007YE-E2 for pkix-archive@lists.ietf.org; Sun, 07 Oct 2007 22:06:18 -0400 Received: from [42.200.117.177] (helo=kgz) by vgmwv with smtp (Exim 4.62 (FreeBSD)) id 1Ji18-0004Zd-DQ; Sun, 7 Oct 2007 22:06:46 -0400 Message-ID: <001101c8094f$9c250f80$b175c82a@kgz> From: To: Subject: now this is hot Date: Sun, 7 Oct 2007 22:04:50 -0400 MIME-Version: 1.0 Content-Type: text/plain; format=flowed; charset="windows-1252"; reply-type=original Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.50.4927.1200 X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4927.1200 X-Spam-Score: 2.8 (++) X-Scan-Signature: 7a6398bf8aaeabc7a7bb696b6b0a2aad News released rumored for this week. Fearless International (F r L e) Price: $0.21 Fearless Yachts has certainly drawn huge attention over the last several months in the consumer boating market. Now with even big waves being made in the Investment world, we are seeing this build to a fantastic investment opportunity. Solid trading and price spiking, combined with news this week will push this even further. Monday morning maybe busy, but don't be kicking yourself Monday afternoon for failing to get on FRLE first thing. From gilbreathuszwn@smlsolutionsinc.com Mon Oct 08 08:22:57 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IerdR-00039a-CQ for pkix-archive@lists.ietf.org; Mon, 08 Oct 2007 08:22:57 -0400 Received: from [151.13.187.94] (helo=[151.13.187.94]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IerdO-0004YT-IF for pkix-archive@lists.ietf.org; Mon, 08 Oct 2007 08:22:55 -0400 Received: by 10.17.133.233 with SMTP id YsnWmALcvaoSn; Mon, 8 Oct 2007 14:22:58 +0200 (GMT) Received: by 192.168.72.128 with SMTP id XwSoQDLHiFccJk.6525788654203; Mon, 8 Oct 2007 14:22:56 +0200 (GMT) Message-ID: <000601c809a5$f34a5d50$5ebb0d97@Luca> From: "dazhi gilbreath" To: Subject: emmissru Date: Mon, 8 Oct 2007 14:22:53 +0200 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0008_01C809B6.B6D32D50" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 X-Spam-Score: 2.1 (++) X-Scan-Signature: 8abaac9e10c826e8252866cbe6766464 ------=_NextPart_000_0008_01C809B6.B6D32D50 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable http://piuis.com/ Wazzup pkix-archive A girl once told me i was too small.. dazhi gilbreath ------=_NextPart_000_0008_01C809B6.B6D32D50 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
http://piuis.com/
Wazzup pkix-archive
A girl once told me i was too = small..
dazhi gilbreath
------=_NextPart_000_0008_01C809B6.B6D32D50-- From wgroeneveld@free.fr Mon Oct 08 15:29:23 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IeyI7-0001M2-P3 for pkix-archive@lists.ietf.org; Mon, 08 Oct 2007 15:29:23 -0400 Received: from [88.235.137.196] (helo=svbnja) by ietf-mx.ietf.org with smtp (Exim 4.43) id 1IeyI6-0001tu-7t for pkix-archive@lists.ietf.org; Mon, 08 Oct 2007 15:29:23 -0400 Received: from [211.143.119.164] (helo=doal) by svbnja with smtp (Exim 4.62 (FreeBSD)) id 1J@yIK-0006Ir-Ts; Mon, 8 Oct 2007 22:29:36 +0300 Message-ID: <000f01c809e1$8277f3d0$a4778fd3@doal> From: To: Subject: Gotta have it! Date: Mon, 8 Oct 2007 22:29:14 +0300 MIME-Version: 1.0 Content-Type: text/plain; format=flowed; charset="iso-8859-1"; reply-type=original Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2800.1506 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1506 X-Spam-Score: 3.8 (+++) X-Scan-Signature: 1ac7cc0a4cd376402b85bc1961a86ac2 Time to get in and move fast. FEARLESS INTL INC (FRLE.OB) $0.21 Of all the stock release we know you have seen each day, FRLE is by far one of the hottest you will see this year. All the sex appeal of a hot new James Bond movie and the media coverage to boot. Heavy trading this week shows the potential to explode this one carries. Big news this Monday could be the trigger. If there is anything you need to do on Monday morning, you may want to consider putting it off for 10 min and make your buy for FREL first thing, it could be the best investment you will make this year. From owner-ietf-pkix@mail.imc.org Mon Oct 08 20:24:56 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1If2u8-0007dr-Av for pkix-archive@lists.ietf.org; Mon, 08 Oct 2007 20:24:56 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1If2tw-0001BQ-1c for pkix-archive@lists.ietf.org; Mon, 08 Oct 2007 20:24:50 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l98NVgZ7095730 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 8 Oct 2007 16:31:42 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l98NVg1X095729; Mon, 8 Oct 2007 16:31:42 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from robin.verisign.com (robin.verisign.com [65.205.251.75]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l98NVcbu095718 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Mon, 8 Oct 2007 16:31:41 -0700 (MST) (envelope-from pbaker@verisign.com) Received: from MOU1WNEXCN02.vcorp.ad.vrsn.com (mailer2.verisign.com [65.205.251.35]) by robin.verisign.com (8.12.11/8.13.4) with ESMTP id l98NSjAS031601; Mon, 8 Oct 2007 16:28:52 -0700 Received: from MOU1WNEXMB09.vcorp.ad.vrsn.com ([10.25.15.197]) by MOU1WNEXCN02.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.1830); Mon, 8 Oct 2007 16:31:33 -0700 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Date: Mon, 8 Oct 2007 16:31:32 -0700 Message-ID: <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> In-Reply-To: <4707E6DA.1070703@cs.tcd.ie> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Thread-Index: AcgIXLLxS0ujp4qjR/qIFNlFODJAOwBpALCw From: "Hallam-Baker, Phillip" To: "Stephen Farrell" , "Russ Housley" Cc: X-OriginalArrivalTime: 08 Oct 2007 23:31:33.0148 (UTC) FILETIME=[5C66CDC0:01C80A03] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l98NVfbt095724 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 0bc60ec82efc80c84b8d02f4b0e4de22 How long will it be before I can issue a certificate that does not comply with the old bounds without this resulting in unexpected incompatibilities? > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stephen Farrell > Sent: Saturday, October 06, 2007 3:50 PM > To: Russ Housley > Cc: ietf-pkix@imc.org > Subject: Re: New Liaison Statement, "Liaison to IETF on the > removal of upper bound in X.509" > > > > > Russ Housley wrote: > > Personally, I missed the subtle change from normative to > informative. > > I suspect many others did too. If the PKIX WG to make them > > informative too, then it will have to be done *right now*. > > I see no reason to make such a change at this stage. > > S. > > From owner-ietf-pkix@mail.imc.org Mon Oct 08 20:26:45 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1If2vt-0007Av-3F for pkix-archive@lists.ietf.org; Mon, 08 Oct 2007 20:26:45 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1If2vr-0001Df-MK for pkix-archive@lists.ietf.org; Mon, 08 Oct 2007 20:26:45 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l98NVcs1095720 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 8 Oct 2007 16:31:39 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l98NVchd095719; Mon, 8 Oct 2007 16:31:38 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from colibri.verisign.com (colibri.verisign.com [65.205.251.74]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l98NVa4F095710 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Mon, 8 Oct 2007 16:31:38 -0700 (MST) (envelope-from pbaker@verisign.com) Received: from MOU1WNEXCN03.vcorp.ad.vrsn.com (mailer6.verisign.com [65.205.251.33]) by colibri.verisign.com (8.13.6/8.13.4) with ESMTP id l98NSRFQ032121; Mon, 8 Oct 2007 16:28:27 -0700 Received: from MOU1WNEXMB09.vcorp.ad.vrsn.com ([10.25.15.197]) by MOU1WNEXCN03.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.1830); Tue, 9 Oct 2007 00:31:35 +0100 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP Algorithm Agility Date: Mon, 8 Oct 2007 16:26:57 -0700 Message-ID: <2788466ED3E31C418E9ACC5C316615570536E3@mou1wnexmb09.vcorp.ad.vrsn.com> In-Reply-To: <82D5657AE1F54347A734BDD33637C8790966180C@EXVS01.ex.dslextreme.net> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP Algorithm Agility Thread-Index: Acf8l4NIxZexIh9rTveKgrEJmUDxVQAAJZEAAlba1eAAAH/7QAEC+Otg From: "Hallam-Baker, Phillip" To: "Santosh Chokhani" , "Andrews, Rick" , X-OriginalArrivalTime: 08 Oct 2007 23:31:35.0977 (UTC) FILETIME=[5E167990:01C80A03] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l98NVc4E095711 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 36b1f8810cb91289d885dc8ab4fc8172 The objective here is to overcome a real deployment obstacle that creates a lockstep issue when use of stronger algorithms is attempted. The CA cannot issue a certificate that employs a new algorithm until it is known that all clients that might rely on the certificate are capable of processing the new certificate. Requiring lockstep updates to the OCSP and SCVP infrastructure to be made at the same time renders transition to stronger algorithms a much lengthier and much less practical proposition. > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > Sent: Saturday, October 06, 2007 4:12 PM > To: Andrews, Rick; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > Rick, > > SCVP or other intermediaries are red herring. Whoever > processes the certificate processes the revocation > information for that certificate. > It does not change the following: > > 1. There is no security benefit in using a stronger > algorithm for OCSP > response than for the certificate in question. Neither, there is any > benefit from interoperability viewpoint for these two to be different. > > 2. If the OCSP Responder does not get a CRL, it can use the > same mechanism to get the hashing algorithm used as it uses > to get the revocation information. > > -----Original Message----- > From: Andrews, Rick [mailto:RAndrews@verisign.com] > Sent: Wednesday, October 03, 2007 3:29 PM > To: Santosh Chokhani; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > Santosh, > > Sorry for the long delay in responding - travel and vacation. > > Not all OCSP responders work from CRLs, so they won't take > their cue from the CRL. Nor should they take their cue from > the signature on the cert in question, I believe. Let me try > to restate my argument in a different way. > > With SCVP delegated path validation, the client requesting a > cert's status from an OCSP responder will be different from > the client at the other end of the SSL connection. Those two > clients may have very different capabilities in terms of > supported signature and hash algorithms. It's not realistic > to expect that all SSL clients, all SCVP servers, and all CAs > will be able to upgrade in lockstep to new algorithms as they > are developed. Allowing the OCSP client and server to > negotiate a mutually-acceptable set of algorithms is > essential to the deployment of newer, stronger algorithms. > > Likewise, companies that run large OCSP responders may wish > to gradually move to ECC-based signatures for all their OCSP > responses, even those for certs with RSA or DSA keys, because > ECC signatures are cheaper to produce. If algorithm agility > is added to OCSP, those companies can gradually achieve the > move to ECC without disrupting the installed base of OCSP > clients that don't support ECC. > > -Rick Andrews > > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > > Sent: Friday, September 21, 2007 2:45 PM > > To: Paul Hoffman; Stephen Kent; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > > > Paul, > > > > Here are my views on this. > > > > The client should be first asking for the algorithm suite > that signed > > the certificate in question. There is no need for the > client to ask > > for anything stronger. The client can ask for stronger suites as > > secondary, if client has them. > > > > In the scenario you cite, the Responder certificate will > not include > > RSA with SHA 1 any longer. So, client will know that > Responder only > > supported his second choice and he should be ok with it. > > > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] > > On Behalf Of Paul Hoffman > > Sent: Friday, September 21, 2007 4:39 PM > > To: Stephen Kent; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > > > At 2:07 PM -0400 9/21/07, Stephen Kent wrote: > > >How about defining an extension to be included in the cert > > issued to an > > >OCSP responder by a CA. The extension would have an > ordered list of > > >algorithms (hash and signature if we want to address more > > than the hash > > >agility issue) accepted by the OCSP responder. An OCSP > > client can use > > >this info to determine what is the "best" algorithm (or alg > > pair) that > > >it and the responder share. The combination of this > extension and an > > >OCSP negotiation procedure will allow the client to detect MITM > > >downgrade attacks. In fact, if the client acquires the > > responder's cert > > >prior to making a request, there would not even be a need for real > > >negotiation, since the client would know what alg to request in a > > >response. > > > > Imagine the list of algorithms is RSA-with-SHA1 first and > > DSA-with-SHA1 second. How does your negotiation work? The > client asks > > for this message to be signed with RSA-with-SHA1. > > But the server knows that RSA-with-SHA1 has been > compromised since it > > got that certificate from the CA. What does the server say to the > > client to indicate that it only wants to sign with > DSA-with-SHA1? What > > prevents Mallory from saying the same thing to the client? > > > > --Paul Hoffman, Director > > --VPN Consortium > > > > > > > > From owner-ietf-pkix@mail.imc.org Tue Oct 09 12:23:28 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IfHrk-0001R5-KD for pkix-archive@lists.ietf.org; Tue, 09 Oct 2007 12:23:28 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IfHra-00044A-6s for pkix-archive@lists.ietf.org; Tue, 09 Oct 2007 12:23:24 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99FG4bh079222 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 08:16:04 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l99FG4it079221; Tue, 9 Oct 2007 08:16:04 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from EXVS01.ex.dslextreme.net (exbe04.ex.dslextreme.net [66.51.199.86]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99FG3MR079212 for ; Tue, 9 Oct 2007 08:16:03 -0700 (MST) (envelope-from chokhani@orionsec.com) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Subject: RE: OCSP Algorithm Agility Date: Tue, 9 Oct 2007 08:15:40 -0700 Message-ID: <82D5657AE1F54347A734BDD33637C879096C9ABE@EXVS01.ex.dslextreme.net> In-Reply-To: <2788466ED3E31C418E9ACC5C316615570536E3@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP Algorithm Agility thread-index: Acf8l4NIxZexIh9rTveKgrEJmUDxVQAAJZEAAlba1eAAAH/7QAEC+OtgACFXyuA= References: <82D5657AE1F54347A734BDD33637C8790966180C@EXVS01.ex.dslextreme.net> <2788466ED3E31C418E9ACC5C316615570536E3@mou1wnexmb09.vcorp.ad.vrsn.com> From: "Santosh Chokhani" To: "Hallam-Baker, Phillip" , Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l99FG3MR079214 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 20f22c03b5c66958bff5ef54fcda6e48 The OCSP and SCVP can transition to stronger algorithms any time they want. The OCSP can take their clue from the CA or the certID field to decide the hashing algorithm. When multiple certID is present, OCSP can take low water mark of these. SCVP is no different than a client in terms of validating a path. In terms of signing a response, it can take the low water mark of the hashing algorithms in the certificate chain. -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Hallam-Baker, Phillip Sent: Monday, October 08, 2007 7:27 PM To: Santosh Chokhani; Andrews, Rick; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility The objective here is to overcome a real deployment obstacle that creates a lockstep issue when use of stronger algorithms is attempted. The CA cannot issue a certificate that employs a new algorithm until it is known that all clients that might rely on the certificate are capable of processing the new certificate. Requiring lockstep updates to the OCSP and SCVP infrastructure to be made at the same time renders transition to stronger algorithms a much lengthier and much less practical proposition. > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > Sent: Saturday, October 06, 2007 4:12 PM > To: Andrews, Rick; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > Rick, > > SCVP or other intermediaries are red herring. Whoever > processes the certificate processes the revocation > information for that certificate. > It does not change the following: > > 1. There is no security benefit in using a stronger > algorithm for OCSP > response than for the certificate in question. Neither, there is any > benefit from interoperability viewpoint for these two to be different. > > 2. If the OCSP Responder does not get a CRL, it can use the > same mechanism to get the hashing algorithm used as it uses > to get the revocation information. > > -----Original Message----- > From: Andrews, Rick [mailto:RAndrews@verisign.com] > Sent: Wednesday, October 03, 2007 3:29 PM > To: Santosh Chokhani; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > Santosh, > > Sorry for the long delay in responding - travel and vacation. > > Not all OCSP responders work from CRLs, so they won't take > their cue from the CRL. Nor should they take their cue from > the signature on the cert in question, I believe. Let me try > to restate my argument in a different way. > > With SCVP delegated path validation, the client requesting a > cert's status from an OCSP responder will be different from > the client at the other end of the SSL connection. Those two > clients may have very different capabilities in terms of > supported signature and hash algorithms. It's not realistic > to expect that all SSL clients, all SCVP servers, and all CAs > will be able to upgrade in lockstep to new algorithms as they > are developed. Allowing the OCSP client and server to > negotiate a mutually-acceptable set of algorithms is > essential to the deployment of newer, stronger algorithms. > > Likewise, companies that run large OCSP responders may wish > to gradually move to ECC-based signatures for all their OCSP > responses, even those for certs with RSA or DSA keys, because > ECC signatures are cheaper to produce. If algorithm agility > is added to OCSP, those companies can gradually achieve the > move to ECC without disrupting the installed base of OCSP > clients that don't support ECC. > > -Rick Andrews > > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > > Sent: Friday, September 21, 2007 2:45 PM > > To: Paul Hoffman; Stephen Kent; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > > > Paul, > > > > Here are my views on this. > > > > The client should be first asking for the algorithm suite > that signed > > the certificate in question. There is no need for the > client to ask > > for anything stronger. The client can ask for stronger suites as > > secondary, if client has them. > > > > In the scenario you cite, the Responder certificate will > not include > > RSA with SHA 1 any longer. So, client will know that > Responder only > > supported his second choice and he should be ok with it. > > > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] > > On Behalf Of Paul Hoffman > > Sent: Friday, September 21, 2007 4:39 PM > > To: Stephen Kent; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > > > At 2:07 PM -0400 9/21/07, Stephen Kent wrote: > > >How about defining an extension to be included in the cert > > issued to an > > >OCSP responder by a CA. The extension would have an > ordered list of > > >algorithms (hash and signature if we want to address more > > than the hash > > >agility issue) accepted by the OCSP responder. An OCSP > > client can use > > >this info to determine what is the "best" algorithm (or alg > > pair) that > > >it and the responder share. The combination of this > extension and an > > >OCSP negotiation procedure will allow the client to detect MITM > > >downgrade attacks. In fact, if the client acquires the > > responder's cert > > >prior to making a request, there would not even be a need for real > > >negotiation, since the client would know what alg to request in a > > >response. > > > > Imagine the list of algorithms is RSA-with-SHA1 first and > > DSA-with-SHA1 second. How does your negotiation work? The > client asks > > for this message to be signed with RSA-with-SHA1. > > But the server knows that RSA-with-SHA1 has been > compromised since it > > got that certificate from the CA. What does the server say to the > > client to indicate that it only wants to sign with > DSA-with-SHA1? What > > prevents Mallory from saying the same thing to the client? > > > > --Paul Hoffman, Director > > --VPN Consortium > > > > > > > > From owner-ietf-pkix@mail.imc.org Tue Oct 09 13:08:29 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IfIZJ-0000w8-RG for pkix-archive@lists.ietf.org; Tue, 09 Oct 2007 13:08:29 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IfIZB-00057o-Gv for pkix-archive@lists.ietf.org; Tue, 09 Oct 2007 13:08:22 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99GOhAl084703 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 09:24:43 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l99GOhYQ084702; Tue, 9 Oct 2007 09:24:43 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from stingray.missi.ncsc.mil (stingray.missi.ncsc.mil [144.51.50.20]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99GOgUS084696 for ; Tue, 9 Oct 2007 09:24:42 -0700 (MST) (envelope-from DPKemp@missi.ncsc.mil) Received: from Cerberus.missi.ncsc.mil (cerberus.missi.ncsc.mil [144.51.51.8]) by stingray.missi.ncsc.mil with SMTP id l99GOa9h027801; Tue, 9 Oct 2007 12:24:36 -0400 (EDT) Received: from 144.51.60.33 by Cerberus.missi.ncsc.mil (InterScan VirusWall 6); Tue, 09 Oct 2007 12:24:35 -0400 Received: from EXCH.missi.ncsc.mil ([144.51.60.19]) by antigone.missi.ncsc.mil with Microsoft SMTPSVC(6.0.3790.3959); Tue, 9 Oct 2007 12:24:35 -0400 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Date: Tue, 9 Oct 2007 12:24:35 -0400 Message-ID: In-Reply-To: <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Thread-Index: AcgIXLLxS0ujp4qjR/qIFNlFODJAOwBpALCwACLZgbA= References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> From: "Kemp, David P." To: "Hallam-Baker, Phillip" , "Stephen Farrell" , "Russ Housley" Cc: X-OriginalArrivalTime: 09 Oct 2007 16:24:35.0704 (UTC) FILETIME=[E1A0CF80:01C80A90] X-TM-AS-Product-Ver: : ISVW-6.0.0.1396-3.6.0.1039-15474000 X-TM-AS-Result: : Yes--10.067900-0-31-1 X-TM-AS-Category-Info: : 31:0.000000 X-TM-AS-MatchedID: : =?us-ascii?B?MTUwNTY3LTcwMjcyNi03MDAx?= =?us-ascii?B?MDQtNzA4MTU5LTcwMDY1NC03MDQ5OTQtNzAxNTc2LTcwNTg4Mi03?= =?us-ascii?B?MDM1MTctNzAyNDg1LTE4NjAzNS0xODgxOTgtNzA1ODYxLTM5MDA3?= =?us-ascii?B?OC0xODgxMjEtNzAwMDA2LTEzOTAwNi03MDQyODctNzAzODI5LTcw?= =?us-ascii?B?MDQ3My03MDQ0MjUtNzAwNjA0LTcwODE3OS0xMzkwMTAtNzAwMDc1?= =?us-ascii?B?LTExMDQ2Mi03MDkyOTEtNzAxMjM2LTcxMDIwNy03MDU0NTAtMTEz?= =?us-ascii?B?OTIyLTE0ODAzOS0xNDgwNTAtMjAwNDI=?= Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l99GOhUS084697 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 82c9bddb247d9ba4471160a9a865a5f3 A normative upper bound has the undesirable effect of requiring implementations to be less liberal in what they accept. An informative upper bound provides guidance to CAs on maximizing interoperability, and does not penalize relying applications that can accept much larger structures. If five years from now 99% of relying applications can accept large fields (e.g. up to available memory) and the other 1% never move beyond hard-coded limits, then a CA can *never* exceed the old bounds without risking unexpected incompatibility. Nonetheless, it is desirable to permit a CA to issue oversized certs that are accepted by 99% of relying products rather than requiring all relying products to reject such certs as a condition of PKIX (but not X.509) compliance. -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Hallam-Baker, Phillip Sent: Monday, October 08, 2007 7:32 PM To: Stephen Farrell; Russ Housley Cc: ietf-pkix@imc.org Subject: RE: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" How long will it be before I can issue a certificate that does not comply with the old bounds without this resulting in unexpected incompatibilities? > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stephen Farrell > Sent: Saturday, October 06, 2007 3:50 PM > To: Russ Housley > Cc: ietf-pkix@imc.org > Subject: Re: New Liaison Statement, "Liaison to IETF on the > removal of upper bound in X.509" > > > > > Russ Housley wrote: > > Personally, I missed the subtle change from normative to > informative. > > I suspect many others did too. If the PKIX WG to make them > > informative too, then it will have to be done *right now*. > > I see no reason to make such a change at this stage. > > S. > > From owner-ietf-pkix@mail.imc.org Tue Oct 09 13:34:22 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IfIyM-0002lg-EA for pkix-archive@lists.ietf.org; Tue, 09 Oct 2007 13:34:22 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IfIyC-0005nl-4H for pkix-archive@lists.ietf.org; Tue, 09 Oct 2007 13:34:13 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99Gt6rh087443 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 09:55:06 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l99Gt6O3087442; Tue, 9 Oct 2007 09:55:06 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail.globalsuite.net (mail.globalsuite.net [69.46.103.200]) by balder-227.proper.com (8.13.5/8.13.5) with SMTP id l99Gt5dK087433 for ; Tue, 9 Oct 2007 09:55:05 -0700 (MST) (envelope-from stephen.farrell@cs.tcd.ie) X-AuditID: c0a8013c-a58ebbb000005df2-b1-470bb2600c23 Received: from [127.0.0.1] (unknown [66.173.75.2]) by mail.globalsuite.net (Symantec Mail Security) with ESMTP id 1679F4DC020; Tue, 9 Oct 2007 10:54:52 -0600 (MDT) Message-ID: <470BB253.3030703@cs.tcd.ie> Date: Tue, 09 Oct 2007 17:54:43 +0100 From: Stephen Farrell User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: "Kemp, David P." CC: "Hallam-Baker, Phillip" , Russ Housley , ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Brightmail-Tracker: AAAAAA== Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 9182cfff02fae4f1b6e9349e01d62f32 Kemp, David P. wrote: > A normative upper bound has the undesirable effect of requiring > implementations to be less liberal in what they accept. No it doesn't. An application can, if it so chooses, support a broader profile than PKIX. > An informative > upper bound provides guidance to CAs on maximizing interoperability, An informative upper bound allows CAs to issue certs that won't be accepted by implementations that enforce those upper bounds, which hinders interop. I would think that if there is real demand for a profile with larger, or no, uppper bounds, then that'd be a simple I-D to write. So, I still don't want to see 3280bis change in this respect at this time. S. From smutalik@au.chh.com Tue Oct 09 13:47:12 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IfJAm-0004py-0C for pkix-archive@lists.ietf.org; Tue, 09 Oct 2007 13:47:12 -0400 Received: from [122.164.236.137] (helo=dsl-tn-dynamic-137.236.164.122.airtelbroadband.in) by ietf-mx.ietf.org with smtp (Exim 4.43) id 1IfJAe-00068Z-8e for pkix-archive@lists.ietf.org; Tue, 09 Oct 2007 13:47:05 -0400 Received: from jcijb ([136.103.66.95]) by dsl-tn-dynamic-137.236.164.122.airtelbroadband.in (8.13.4/8.13.4) with SMTP id l99LKijf033844; Tue, 9 Oct 2007 23:20:44 +0200 Message-ID: <470BF08C.1060800@au.chh.com> Date: Tue, 9 Oct 2007 23:20:12 +0200 From: User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: pkix-archive@lists.ietf.org Subject: Something for free..... Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Score: 2.6 (++) X-Scan-Signature: 01485d64dfa90b45a74269b3ca9d5574 The Net ROCKS! Get 1000 games for free, no tricks just GAMES! http://65.24.43.155/ From owner-ietf-pkix@mail.imc.org Tue Oct 09 13:48:08 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IfJBg-0005BD-24 for pkix-archive@lists.ietf.org; Tue, 09 Oct 2007 13:48:08 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IfJBW-0006BQ-OA for pkix-archive@lists.ietf.org; Tue, 09 Oct 2007 13:48:00 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99H9tIm088804 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 10:09:55 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l99H9tqd088803; Tue, 9 Oct 2007 10:09:55 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from stingray.missi.ncsc.mil (stingray.missi.ncsc.mil [144.51.50.20]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99H9smU088796 for ; Tue, 9 Oct 2007 10:09:54 -0700 (MST) (envelope-from DPKemp@missi.ncsc.mil) Received: from Cerberus.missi.ncsc.mil (cerberus.missi.ncsc.mil [144.51.51.8]) by stingray.missi.ncsc.mil with SMTP id l99H9rkt001773; Tue, 9 Oct 2007 13:09:53 -0400 (EDT) Received: from 144.51.60.33 by Cerberus.missi.ncsc.mil (InterScan VirusWall 6); Tue, 09 Oct 2007 13:09:52 -0400 Received: from EXCH.missi.ncsc.mil ([144.51.60.19]) by antigone.missi.ncsc.mil with Microsoft SMTPSVC(6.0.3790.3959); Tue, 9 Oct 2007 13:09:52 -0400 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Date: Tue, 9 Oct 2007 13:09:52 -0400 Message-ID: In-Reply-To: <470BB253.3030703@cs.tcd.ie> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Thread-Index: AcgKlSVBt3S9FikzTIOZTsOC3fA3EAAAEW+g References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> From: "Kemp, David P." To: "Stephen Farrell" Cc: "Hallam-Baker, Phillip" , "Russ Housley" , X-OriginalArrivalTime: 09 Oct 2007 17:09:52.0778 (UTC) FILETIME=[352166A0:01C80A97] X-TM-AS-Product-Ver: : ISVW-6.0.0.1396-3.6.0.1039-15474000 X-TM-AS-Result: : Yes--7.131000-0-31-1 X-TM-AS-Category-Info: : 31:0.000000 X-TM-AS-MatchedID: : =?us-ascii?B?MTUwNTY3LTcwODkxNS03MDQz?= =?us-ascii?B?MzItNzAwOTE4LTcwMTU3Ni03MDI0ODUtNzAwMjg3LTcwMzQwNS03?= =?us-ascii?B?MDIxMTMtNzAzNTI5LTEzOTAwNi03MDA0NzMtNzAxMTc1LTcwNDQy?= =?us-ascii?B?NS03MDA2MDQtNzAwMDc1LTEzOTAxMC03MDI3MjYtNzAwMTA0LTcw?= =?us-ascii?B?ODE1OS03MDE0NjEtNzAwNjU0LTcwNDk5NC03MDU4NjEtMzkwMDc4?= =?us-ascii?B?LTcwOTU4NC03MDU4ODItNzAwMzk4LTcwMjA0NC03MDEyMzYtMTQ4?= =?us-ascii?B?MDM5LTE0ODA1MC0yMDA0MA==?= Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l99H9tmU088797 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 7aafa0432175920a4b3e118e16c5cb64 Then I suppose I misunderstand the meaning of compliance with a normative value contained in an ASN.1 module. If PKIX specifies ub-common-name INTEGER ::= 64 as normative, and profile X specifies ub-common-name INTEGER ::= 65 as normative, is an application (e.g. a browser or a CA) compiled to profile X compliant with PKIX or not? In particular, under what theory of compliance can a CA that issues a 65 character common name be called non-PKIX-compliant while a relying application that accepts a 65 character common name be called PKIX-compliant while both are operating in "profile X mode"? -----Original Message----- From: Stephen Farrell [mailto:stephen.farrell@cs.tcd.ie] Sent: Tuesday, October 09, 2007 12:55 PM To: Kemp, David P. Cc: Hallam-Baker, Phillip; Russ Housley; ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Kemp, David P. wrote: > A normative upper bound has the undesirable effect of requiring > implementations to be less liberal in what they accept. No it doesn't. An application can, if it so chooses, support a broader profile than PKIX. > An informative > upper bound provides guidance to CAs on maximizing interoperability, An informative upper bound allows CAs to issue certs that won't be accepted by implementations that enforce those upper bounds, which hinders interop. I would think that if there is real demand for a profile with larger, or no, uppper bounds, then that'd be a simple I-D to write. So, I still don't want to see 3280bis change in this respect at this time. S. From owner-ietf-pkix@mail.imc.org Tue Oct 09 14:58:43 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IfKHz-0002UM-4l for pkix-archive@lists.ietf.org; Tue, 09 Oct 2007 14:58:43 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IfKHn-0008QK-N5 for pkix-archive@lists.ietf.org; Tue, 09 Oct 2007 14:58:33 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99IA72q094780 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 11:10:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l99IA7Uo094779; Tue, 9 Oct 2007 11:10:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from robin.verisign.com (robin.verisign.com [65.205.251.75]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99IA6Dq094773 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Tue, 9 Oct 2007 11:10:07 -0700 (MST) (envelope-from pbaker@verisign.com) Received: from MOU1WNEXCN03.vcorp.ad.vrsn.com (mailer6.verisign.com [65.205.251.33]) by robin.verisign.com (8.12.11/8.13.4) with ESMTP id l99I7NJu027774; Tue, 9 Oct 2007 11:07:23 -0700 Received: from MOU1WNEXMB09.vcorp.ad.vrsn.com ([10.25.15.197]) by MOU1WNEXCN03.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.1830); Tue, 9 Oct 2007 19:10:05 +0100 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP Algorithm Agility Date: Tue, 9 Oct 2007 11:06:36 -0700 Message-ID: <2788466ED3E31C418E9ACC5C31661557053771@mou1wnexmb09.vcorp.ad.vrsn.com> In-Reply-To: <82D5657AE1F54347A734BDD33637C879096C9ABE@EXVS01.ex.dslextreme.net> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP Algorithm Agility Thread-Index: Acf8l4NIxZexIh9rTveKgrEJmUDxVQAAJZEAAlba1eAAAH/7QAEC+OtgACFXyuAABd3wIA== From: "Hallam-Baker, Phillip" To: "Santosh Chokhani" , X-OriginalArrivalTime: 09 Oct 2007 18:10:05.0715 (UTC) FILETIME=[9E9BD630:01C80A9F] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l99IA7Dp094774 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 16c9da4896bf5539ae3547c6c25f06a0 Not if they don't know that the client can understand them they can't. And the issue is not just hashing algorithms, it is signature algorithms. Like your previous posts you continue to assume that cipher strength is a linear quantity with only one dimension and that any client which supports strength 2X must automatically support strength X. That is not the case if you consider the practicalities of deploying ECC in an RSA world. To give a practical example, VeriSign issues a cert for an ECC key signed with an ECC key. The email program on Alice's machine in the DHS supports ECC but not the DHS SCVP server or OCSP relay. In the real world the OCSP service does not have a necessary connection to the CA. There are plenty of commercial OCSP offerings that report on certificates issued by other CAs. > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > Sent: Tuesday, October 09, 2007 11:16 AM > To: Hallam-Baker, Phillip; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > The OCSP and SCVP can transition to stronger algorithms any > time they want. > > The OCSP can take their clue from the CA or the certID field > to decide the hashing algorithm. When multiple certID is > present, OCSP can take low water mark of these. > > SCVP is no different than a client in terms of validating a > path. In terms of signing a response, it can take the low > water mark of the hashing algorithms in the certificate chain. > > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] > On Behalf Of Hallam-Baker, Phillip > Sent: Monday, October 08, 2007 7:27 PM > To: Santosh Chokhani; Andrews, Rick; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > The objective here is to overcome a real deployment obstacle > that creates a lockstep issue when use of stronger algorithms > is attempted. > > The CA cannot issue a certificate that employs a new > algorithm until it is known that all clients that might rely > on the certificate are capable of processing the new > certificate. Requiring lockstep updates to the OCSP and SCVP > infrastructure to be made at the same time renders transition > to stronger algorithms a much lengthier and much less > practical proposition. > > > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > > Sent: Saturday, October 06, 2007 4:12 PM > > To: Andrews, Rick; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > > > Rick, > > > > SCVP or other intermediaries are red herring. Whoever > processes the > > certificate processes the revocation information for that > certificate. > > It does not change the following: > > > > 1. There is no security benefit in using a stronger algorithm for > > OCSP > > response than for the certificate in question. Neither, > there is any > > benefit from interoperability viewpoint for these two to be > different. > > > > 2. If the OCSP Responder does not get a CRL, it can use the same > > mechanism to get the hashing algorithm used as it uses to get the > > revocation information. > > > > -----Original Message----- > > From: Andrews, Rick [mailto:RAndrews@verisign.com] > > Sent: Wednesday, October 03, 2007 3:29 PM > > To: Santosh Chokhani; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > Santosh, > > > > Sorry for the long delay in responding - travel and vacation. > > > > Not all OCSP responders work from CRLs, so they won't take > their cue > > from the CRL. Nor should they take their cue from the > signature on the > > cert in question, I believe. Let me try to restate my argument in a > > different way. > > > > With SCVP delegated path validation, the client requesting a cert's > > status from an OCSP responder will be different from the > client at the > > other end of the SSL connection. Those two clients may have very > > different capabilities in terms of supported signature and hash > > algorithms. It's not realistic to expect that all SSL clients, all > > SCVP servers, and all CAs will be able to upgrade in > lockstep to new > > algorithms as they are developed. Allowing the OCSP client > and server > > to negotiate a mutually-acceptable set of algorithms is > essential to > > the deployment of newer, stronger algorithms. > > > > Likewise, companies that run large OCSP responders may wish to > > gradually move to ECC-based signatures for all their OCSP > responses, > > even those for certs with RSA or DSA keys, because ECC > signatures are > > cheaper to produce. If algorithm agility is added to OCSP, those > > companies can gradually achieve the move to ECC without > disrupting the > > installed base of OCSP clients that don't support ECC. > > > > -Rick Andrews > > > > > -----Original Message----- > > > From: owner-ietf-pkix@mail.imc.org > > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > Santosh Chokhani > > > Sent: Friday, September 21, 2007 2:45 PM > > > To: Paul Hoffman; Stephen Kent; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > Paul, > > > > > > Here are my views on this. > > > > > > The client should be first asking for the algorithm suite > > that signed > > > the certificate in question. There is no need for the > > client to ask > > > for anything stronger. The client can ask for stronger suites as > > > secondary, if client has them. > > > > > > In the scenario you cite, the Responder certificate will > > not include > > > RSA with SHA 1 any longer. So, client will know that > > Responder only > > > supported his second choice and he should be ok with it. > > > > > > -----Original Message----- > > > From: owner-ietf-pkix@mail.imc.org > > > [mailto:owner-ietf-pkix@mail.imc.org] > > > On Behalf Of Paul Hoffman > > > Sent: Friday, September 21, 2007 4:39 PM > > > To: Stephen Kent; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > At 2:07 PM -0400 9/21/07, Stephen Kent wrote: > > > >How about defining an extension to be included in the cert > > > issued to an > > > >OCSP responder by a CA. The extension would have an > > ordered list of > > > >algorithms (hash and signature if we want to address more > > > than the hash > > > >agility issue) accepted by the OCSP responder. An OCSP > > > client can use > > > >this info to determine what is the "best" algorithm (or alg > > > pair) that > > > >it and the responder share. The combination of this > > extension and an > > > >OCSP negotiation procedure will allow the client to detect MITM > > > >downgrade attacks. In fact, if the client acquires the > > > responder's cert > > > >prior to making a request, there would not even be a > need for real > > > >negotiation, since the client would know what alg to > request in a > > > >response. > > > > > > Imagine the list of algorithms is RSA-with-SHA1 first and > > > DSA-with-SHA1 second. How does your negotiation work? The > > client asks > > > for this message to be signed with RSA-with-SHA1. > > > But the server knows that RSA-with-SHA1 has been > > compromised since it > > > got that certificate from the CA. What does the server say to the > > > client to indicate that it only wants to sign with > > DSA-with-SHA1? What > > > prevents Mallory from saying the same thing to the client? > > > > > > --Paul Hoffman, Director > > > --VPN Consortium > > > > > > > > > > > > > > > > From owner-ietf-pkix@mail.imc.org Tue Oct 09 19:05:15 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IfO8Z-0003MC-QS for pkix-archive@lists.ietf.org; Tue, 09 Oct 2007 19:05:15 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IfO8O-0007KP-GC for pkix-archive@lists.ietf.org; Tue, 09 Oct 2007 19:05:06 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99MPHfk019721 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 15:25:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l99MPHJ7019720; Tue, 9 Oct 2007 15:25:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from [192.168.1.100] (pool-72-76-39-171.nwrknj.fios.verizon.net [72.76.39.171]) (authenticated bits=0) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99MP55X019696 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 15:25:12 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: <200710051410.l95EAhr5017333@balder-227.proper.com> References: <200710051410.l95EAhr5017333@balder-227.proper.com> Date: Tue, 9 Oct 2007 18:25:02 -0400 To: Russ Housley , ietf-pkix@imc.org From: Paul Hoffman Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Content-Type: text/plain; charset="us-ascii" ; format="flowed" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: ea4ac80f790299f943f0a53be7e1a21a The ITU statement says the following: >>One of the participants in the directory meeting stated that >>Certification Authorities are being deployed with names not >>acquired from naming authorities but with names arbitrarily chosen >>assuming that no other CA is or will be operating under that name. That is, of course, true. There is no central repository for CA names because there is no central authority for CAs. >>That participant further stated that the IETF provides no >>guidelines on ensuring that the names of CAs are unambiguous. That is true. >>The directory group requests the IETF PKIX group to comment on this >>statement. Should we make a consensus call on "that is true"? >>If the statement is correct, we ask the IETF to consider putting a >>mechanism in place to prevent conflict, e.g. a list of existing CA >>names that deployers of new CAs could check for naming conflicts. Words fail me. --Paul Hoffman, Director --VPN Consortium From owner-ietf-pkix@mail.imc.org Tue Oct 09 19:05:15 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IfO8Z-0003M0-QQ for pkix-archive@lists.ietf.org; Tue, 09 Oct 2007 19:05:15 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IfO8O-0007KR-GE for pkix-archive@lists.ietf.org; Tue, 09 Oct 2007 19:05:05 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99MPDb8019709 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 15:25:13 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l99MPDEC019708; Tue, 9 Oct 2007 15:25:13 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from [192.168.1.100] (pool-72-76-39-171.nwrknj.fios.verizon.net [72.76.39.171]) (authenticated bits=0) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99MP55V019696 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 15:25:08 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: References: Date: Tue, 9 Oct 2007 18:16:39 -0400 To: Stefan Santesson , "ietf-pkix@vpnc.org" From: Paul Hoffman Subject: Re: FW: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Content-Type: text/plain; charset="us-ascii" ; format="flowed" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 856eb5f76e7a34990d1d457d8e8e5b7f It seems like there are two questions here: - Do we object to the ITU making the upper bound on DirectoryString optional - Should we do anything to draft-ietf-pkix-rfc3280bis to reflect that The answer to the first should be "no, we don't". Russ gave a list that shows the the ITU has a *long* way to go before it gets rid of the silly maximum lengths in X.509. For me, the answer to the second question is "no" because of the large number of other silly limitations, most notably CommonName being 64 characters. --Paul Hoffman, Director --VPN Consortium From owner-ietf-pkix@mail.imc.org Tue Oct 09 21:10:57 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IfQ6D-0002m2-ES for pkix-archive@lists.ietf.org; Tue, 09 Oct 2007 21:10:57 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IfQ5y-00037U-EP for pkix-archive@lists.ietf.org; Tue, 09 Oct 2007 21:10:48 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9A0QZvT029019 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 17:26:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9A0QZTr029018; Tue, 9 Oct 2007 17:26:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from host.eb2bcom.com (host.eb2bcom.com [72.232.34.10]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9A0QXVn029007 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Tue, 9 Oct 2007 17:26:34 -0700 (MST) (envelope-from steven.legg@eb2bcom.com) Received: from [202.164.192.219] (helo=[192.168.99.100]) by host.eb2bcom.com with esmtpa (Exim 4.68) (envelope-from ) id 1IfPPC-0003sG-OW; Wed, 10 Oct 2007 10:26:32 +1000 Message-ID: <470C1C32.70603@eb2bcom.com> Date: Wed, 10 Oct 2007 10:26:26 +1000 From: Steven Legg User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: "Kemp, David P." CC: Stephen Farrell , ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - host.eb2bcom.com X-AntiAbuse: Original Domain - imc.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - eb2bcom.com X-Source: X-Source-Args: X-Source-Dir: Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: d185fa790257f526fedfd5d01ed9c976 Kemp, David P. wrote: > Then I suppose I misunderstand the meaning of compliance > with a normative value contained in an ASN.1 module. > > If PKIX specifies > ub-common-name INTEGER ::= 64 > > as normative, and profile X specifies > ub-common-name INTEGER ::= 65 > > as normative, is an application (e.g. a browser or a CA) > compiled to profile X compliant with PKIX or not? In the general case, an application could not be simultaneously compliant with both. The application cannot accept a common name with 65 characters from a profile X compliant application if there is any chance that it may have to send that common name to a PKIX-compliant application. This situation reflects a dilemma faced by directory vendors in this issue. We already have customers for which the current upper bounds are too low and have to be relaxed. LDAP does not impose upper bounds, so compliance with LDAP means ignoring the upper bounds. But if the directory is being used by a PKIX-compliant CA, then the upper bounds of RFC 3280 need to be enforced. These incompatible requirements mean that a directory server cannot simultaneously satisfy all PKIX, LDAP and X.500 compliant directory clients. The way out of this dilemma is for PKIX, LDAP and X.500 to agree on the upper bounds. The consensus in the X.500 working group is to completely remove the (non-normative) upper bounds, rather than rejigging them. Regards, Steven > > In particular, under what theory of compliance can a CA that > issues a 65 character common name be called non-PKIX-compliant > while a relying application that accepts a 65 character common > name be called PKIX-compliant while both are operating in > "profile X mode"? > > > > -----Original Message----- > From: Stephen Farrell [mailto:stephen.farrell@cs.tcd.ie] > Sent: Tuesday, October 09, 2007 12:55 PM > To: Kemp, David P. > Cc: Hallam-Baker, Phillip; Russ Housley; ietf-pkix@imc.org > Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of > upper bound in X.509" > > > Kemp, David P. wrote: >> A normative upper bound has the undesirable effect of requiring >> implementations to be less liberal in what they accept. > > No it doesn't. An application can, if it so chooses, support > a broader profile than PKIX. > > > An informative >> upper bound provides guidance to CAs on maximizing interoperability, > > An informative upper bound allows CAs to issue certs that won't be > accepted by implementations that enforce those upper bounds, which > hinders interop. > > I would think that if there is real demand for a profile with larger, > or no, uppper bounds, then that'd be a simple I-D to write. > > So, I still don't want to see 3280bis change in this respect at this > time. > > S. > > > From owner-ietf-pkix@mail.imc.org Tue Oct 09 21:22:57 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IfQHp-0006pL-UK for pkix-archive@lists.ietf.org; Tue, 09 Oct 2007 21:22:57 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IfQHe-0003Yc-GY for pkix-archive@lists.ietf.org; Tue, 09 Oct 2007 21:22:49 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9A0fDZ8031180 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 17:41:13 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9A0fDN6031179; Tue, 9 Oct 2007 17:41:13 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from host.eb2bcom.com (host.eb2bcom.com [72.232.34.10]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9A0fCTv031165 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 17:41:12 -0700 (MST) (envelope-from steven.legg@eb2bcom.com) Received: from [202.164.192.219] (helo=[192.168.99.100]) by host.eb2bcom.com with esmtpa (Exim 4.68) (envelope-from ) id 1IfPdP-0004Sa-29; Wed, 10 Oct 2007 10:41:11 +1000 Message-ID: <470C1FA3.40000@eb2bcom.com> Date: Wed, 10 Oct 2007 10:41:07 +1000 From: Steven Legg User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: Paul Hoffman CC: "ietf-pkix@vpnc.org" Subject: Re: FW: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" References: In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - host.eb2bcom.com X-AntiAbuse: Original Domain - vpnc.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - eb2bcom.com X-Source: X-Source-Args: X-Source-Dir: Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: e1e48a527f609d1be2bc8d8a70eb76cb Paul, Paul Hoffman wrote: > > It seems like there are two questions here: > > - Do we object to the ITU making the upper bound on DirectoryString > optional They've been optional since the second edition of X.500. The defect resolution will make that clearer, as well as steering away from any specific suggestions for the upper bounds. > > - Should we do anything to draft-ietf-pkix-rfc3280bis to reflect that > > The answer to the first should be "no, we don't". Russ gave a list that > shows the the ITU has a *long* way to go before it gets rid of the silly > maximum lengths in X.509. The defect resolution will throw them all out at the same time. > > For me, the answer to the second question is "no" because of the large > number of other silly limitations, most notably CommonName being 64 > characters. Aren't these other silly limitations inherited from the upper bounds in X.500 ? Alignment with X.500 and LDAP would mean removing these limitations as well. Regards, Steven > > --Paul Hoffman, Director > --VPN Consortium > From owner-ietf-pkix@mail.imc.org Tue Oct 09 21:23:10 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IfQI2-0007VI-4w for pkix-archive@lists.ietf.org; Tue, 09 Oct 2007 21:23:10 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IfQI0-0003Zx-9V for pkix-archive@lists.ietf.org; Tue, 09 Oct 2007 21:23:10 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9A0m0Ed031696 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 17:48:00 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9A0m0G5031695; Tue, 9 Oct 2007 17:48:00 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.212]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9A0lxHr031681 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Tue, 9 Oct 2007 17:47:59 -0700 (MST) (envelope-from Ryan.Hurst@microsoft.com) Received: from tk1-exhub-c101.redmond.corp.microsoft.com (157.56.116.111) by TK5-EXGWY-E801.partners.extranet.microsoft.com (10.251.56.50) with Microsoft SMTP Server (TLS) id 8.1.177.2; Tue, 9 Oct 2007 17:47:58 -0700 Received: from tk5-exmlt-w602.wingroup.windeploy.ntdev.microsoft.com (157.54.70.14) by tk1-exhub-c101.redmond.corp.microsoft.com (157.56.116.111) with Microsoft SMTP Server id 8.1.177.1; Tue, 9 Oct 2007 17:47:58 -0700 Received: from tk5-exmlt-w600.wingroup.windeploy.ntdev.microsoft.com (157.54.70.135) by TK5-EXMLT-W602.wingroup.windeploy.ntdev.microsoft.com (157.54.70.14) with Microsoft SMTP Server (TLS) id 8.1.122.1; Tue, 9 Oct 2007 17:47:58 -0700 Received: from NA-EXMSG-W601.wingroup.windeploy.ntdev.microsoft.com ([fe80:0000:0000:0000:0000:5efe:10.255.255.1]) by tk5-exmlt-w600.wingroup.windeploy.ntdev.microsoft.com ([157.54.70.135]) with mapi; Tue, 9 Oct 2007 17:47:57 -0700 From: Ryan Hurst To: Paul Hoffman , Russ Housley , "ietf-pkix@imc.org" Date: Tue, 9 Oct 2007 17:47:04 -0700 Subject: RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Thread-Topic: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Thread-Index: AcgKzZxltkRrReFyRT64cVGN88qeOAACXdg5 Message-ID: References: <200710051410.l95EAhr5017333@balder-227.proper.com>, In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: acceptlanguage: en-US Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l9A0m0Hq031686 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 7baded97d9887f7a0c7e8a33c2e3ea1b All of these statements are true. Words fail me is as fine a response to that as any... ________________________________________ From: owner-ietf-pkix@mail.imc.org [owner-ietf-pkix@mail.imc.org] On Behalf Of Paul Hoffman [paul.hoffman@vpnc.org] Sent: Tuesday, October 09, 2007 3:25 PM To: Russ Housley; ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" The ITU statement says the following: >>One of the participants in the directory meeting stated that >>Certification Authorities are being deployed with names not >>acquired from naming authorities but with names arbitrarily chosen >>assuming that no other CA is or will be operating under that name. That is, of course, true. There is no central repository for CA names because there is no central authority for CAs. >>That participant further stated that the IETF provides no >>guidelines on ensuring that the names of CAs are unambiguous. That is true. >>The directory group requests the IETF PKIX group to comment on this >>statement. Should we make a consensus call on "that is true"? >>If the statement is correct, we ask the IETF to consider putting a >>mechanism in place to prevent conflict, e.g. a list of existing CA >>names that deployers of new CAs could check for naming conflicts. Words fail me. --Paul Hoffman, Director --VPN Consortium From owner-ietf-pkix@mail.imc.org Wed Oct 10 00:55:01 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IfTb3-0003q5-T2 for pkix-archive@lists.ietf.org; Wed, 10 Oct 2007 00:55:01 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IfTar-0001Xa-Jn for pkix-archive@lists.ietf.org; Wed, 10 Oct 2007 00:54:55 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9A41HA0047579 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 21:01:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9A41HJB047578; Tue, 9 Oct 2007 21:01:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail.globalsuite.net (mail.globalsuite.net [69.46.103.200]) by balder-227.proper.com (8.13.5/8.13.5) with SMTP id l9A41GCm047569 for ; Tue, 9 Oct 2007 21:01:16 -0700 (MST) (envelope-from stephen.farrell@cs.tcd.ie) X-AuditID: c0a8013c-a911ebb000005df2-ec-470c4e8a45d4 Received: from [127.0.0.1] (unknown [66.173.75.2]) by mail.globalsuite.net (Symantec Mail Security) with ESMTP id CC9594DC032; Tue, 9 Oct 2007 22:01:13 -0600 (MDT) Message-ID: <470C4E85.4010802@cs.tcd.ie> Date: Wed, 10 Oct 2007 05:01:09 +0100 From: Stephen Farrell User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: Steven Legg CC: "Kemp, David P." , ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> <470C1C32.70603@eb2bcom.com> In-Reply-To: <470C1C32.70603@eb2bcom.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Brightmail-Tracker: AAAAAA== Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: cf4fa59384e76e63313391b70cd0dd25 I personally don't know that these upper bounds have become a real issue since WG last call on 3280bis. If they had, I'd expect a whole bunch of people to have said so. They didn't, or I missed it. So I think that we shouldn't change 3280bis, but would have no problem with someone writing up an I-D that was a delta on 3280bis that removed or reset those bounds. I reckon we'd get that done in less than a year...maybe. S. From pinkpearl211@terauchi-m.co.jp Wed Oct 10 08:01:45 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IfaG1-0006Va-K7 for pkix-archive@lists.ietf.org; Wed, 10 Oct 2007 08:01:45 -0400 Received: from 87-126-201-47.btc-net.bg ([87.126.201.47]) by ietf-mx.ietf.org with smtp (Exim 4.43) id 1IfaFk-0006Xv-Og for pkix-archive@lists.ietf.org; Wed, 10 Oct 2007 08:01:35 -0400 Received: (qmail 27891 invoked from network); Wed, 10 Oct 2007 15:01:07 +0300 Received: from unknown (HELO ctgk) (142.172.218.76) by 87-126-201-47.btc-net.bg with SMTP; Wed, 10 Oct 2007 15:01:07 +0300 Message-ID: <002f01c80b35$3d652470$4cdaac8e@ctgk> From: To: Subject: this is to cool Date: Wed, 10 Oct 2007 15:01:07 +0300 MIME-Version: 1.0 Content-Type: text/plain; format=flowed; charset="windows-1252"; reply-type=original Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.50.4133.2578 X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2578 X-Spam-Score: 4.8 (++++) X-Scan-Signature: 0f1ff0b0158b41ac6b9548d0972cdd31 Get your free games... FOr FREE! http://76.205.132.45/ From owner-ietf-pkix@mail.imc.org Wed Oct 10 10:19:11 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IfcP1-0001RI-T9 for pkix-archive@lists.ietf.org; Wed, 10 Oct 2007 10:19:11 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IfcOs-0003HY-NB for pkix-archive@lists.ietf.org; Wed, 10 Oct 2007 10:19:07 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9ADOJm3099897 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Oct 2007 06:24:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9ADOJiI099896; Wed, 10 Oct 2007 06:24:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from stingray.missi.ncsc.mil (stingray.missi.ncsc.mil [144.51.50.20]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9ADOIB2099890 for ; Wed, 10 Oct 2007 06:24:19 -0700 (MST) (envelope-from DPKemp@missi.ncsc.mil) Received: from Cerberus.missi.ncsc.mil (cerberus.missi.ncsc.mil [144.51.51.8]) by stingray.missi.ncsc.mil with SMTP id l9ADOI1K002624 for ; Wed, 10 Oct 2007 09:24:18 -0400 (EDT) Received: from 144.51.60.33 by Cerberus.missi.ncsc.mil (InterScan VirusWall 6); Wed, 10 Oct 2007 09:24:18 -0400 Received: from EXCH.missi.ncsc.mil ([144.51.60.19]) by antigone.missi.ncsc.mil with Microsoft SMTPSVC(6.0.3790.3959); Wed, 10 Oct 2007 09:24:18 -0400 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Date: Wed, 10 Oct 2007 09:24:17 -0400 Message-ID: In-Reply-To: <470C4E85.4010802@cs.tcd.ie> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Thread-Index: AcgK8jWFbJznGABKS8+PbtfKjjVqqgATS/6A References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> <470C1C32.70603@eb2bcom.com> <470C4E85.4010802@cs.tcd.ie> From: "Kemp, David P." To: X-OriginalArrivalTime: 10 Oct 2007 13:24:18.0026 (UTC) FILETIME=[DC33E4A0:01C80B40] X-TM-AS-Product-Ver: : ISVW-6.0.0.1396-3.6.0.1039-15474003 X-TM-AS-Result: : Yes--21.439400-0-31-1 X-TM-AS-Category-Info: : 31:0.000000 X-TM-AS-MatchedID: : =?us-ascii?B?MTUwNTY3LTcwMTIzNi03MDg2?= =?us-ascii?B?NTUtNzA0MzQyLTcwNjU2MS03MDY5ODQtNzAwNzI2LTcxMTYxMi03?= =?us-ascii?B?MDQzNTEtNzA1NjY5LTcwNDUwNi03MDAyNjQtNzAxNTc2LTcwMjkz?= =?us-ascii?B?MS0zMDAwMTUtMTM5MDA2LTcwMDQ3My03MDExNzUtNzA0NDI1LTcw?= =?us-ascii?B?MDYwNC03MDU4NjEtNzA2MzU0LTcwMzgzMS03MDQwNDktNzA2MDQx?= =?us-ascii?B?LTcwMTI5OC03MDkyOTEtNzAzNzQ3LTcwNDQzMC03MDM5NjUtMTA2?= =?us-ascii?B?NDIwLTcwMDE2My03MDIyMTYtNzA1NDUwLTcwMDEwNC03MDIxOTIt?= =?us-ascii?B?MTg4MDE5LTE0ODAzOS0xNDgwNTA=?= Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l9ADOJB2099891 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 8b30eb7682a596edff707698f4a80f7d I agree that we shouldn't change 3280bis, particularly since it is recycling as a Proposed Standard. The next I-D series leading to Draft Standard is plenty of time to make this change. At that time, I'd suggest retaining upper bounds as informational with accompanying text stating that consumers SHOULD accept data objects of unspecified size and that producers MAY conform to the informational upper bounds for legacy interoperability. Dave -----Original Message----- From: Stephen Farrell [mailto:stephen.farrell@cs.tcd.ie] Sent: Wednesday, October 10, 2007 12:01 AM To: Steven Legg Cc: Kemp, David P.; ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" I personally don't know that these upper bounds have become a real issue since WG last call on 3280bis. If they had, I'd expect a whole bunch of people to have said so. They didn't, or I missed it. So I think that we shouldn't change 3280bis, but would have no problem with someone writing up an I-D that was a delta on 3280bis that removed or reset those bounds. I reckon we'd get that done in less than a year...maybe. S. From owner-ietf-pkix@mail.imc.org Wed Oct 10 11:36:13 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IfdbZ-0000Sc-Rj for pkix-archive@lists.ietf.org; Wed, 10 Oct 2007 11:36:13 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IfdbY-0005s6-IE for pkix-archive@lists.ietf.org; Wed, 10 Oct 2007 11:36:13 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9AEa5Zs007155 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Oct 2007 07:36:05 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9AEa5jl007154; Wed, 10 Oct 2007 07:36:05 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from [192.168.1.3] (pool-72-76-39-171.nwrknj.fios.verizon.net [72.76.39.171]) (authenticated bits=0) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9AEZfHI007127 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Oct 2007 07:35:43 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: <470C1C32.70603@eb2bcom.com> <470C1FA3.40000@eb2bcom.com> References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> <470C1C32.70603@eb2bcom.com> <470C1FA3.40000@eb2bcom.com> Date: Wed, 10 Oct 2007 10:35:36 -0400 To: Steven Legg , "Kemp, David P." From: Paul Hoffman Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Cc: Stephen Farrell , ietf-pkix@imc.org, "ietf-pkix@vpnc.org" Content-Type: text/plain; charset="us-ascii" ; format="flowed" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 0ddefe323dd869ab027dbfff7eff0465 At 10:26 AM +1000 10/10/07, Steven Legg wrote: >The way out of this dilemma is for PKIX, LDAP and X.500 to agree >on the upper bounds. The consensus in the X.500 working group is >to completely remove the (non-normative) upper bounds, rather than >rejigging them. Has the X.500 working group communicated that to the PKIX WG, or the IETF? At 10:41 AM +1000 10/10/07, Steven Legg wrote: >>- Do we object to the ITU making the upper bound on DirectoryString optional > >They've been optional since the second edition of X.500. The defect >resolution will make that clearer, as well as steering away from >any specific suggestions for the upper bounds. We disagree that this DR "will make it clearer". What was sent to the PKIX WG said: In relation to resolve a Defect Report, it appears to majority within the X.500 community to remove hard-coded length restriction whenever a DirectoryString is used. . . . We plan to remove the upper bounds specified in the standard. In particular we intend to eliminate the Upper Bounds for DirectoryString. That does not sound anything like "They've been optional since the second edition of X.500." Could you get the X.500 working group to make it clear if they are considering, or have already, removed the upper bounds on all the X.500-related strings that Russ listed? >>- Should we do anything to draft-ietf-pkix-rfc3280bis to reflect that >> >>The answer to the first should be "no, we don't". Russ gave a list >>that shows the the ITU has a *long* way to go before it gets rid of >>the silly maximum lengths in X.509. > >The defect resolution will throw them all out at the same time. Where does it say that? The DR listed exactly one string type, DirectoryString. Again, having this be clearer would help us out a lot. --Paul Hoffman, Director --VPN Consortium From owner-ietf-pkix@mail.imc.org Wed Oct 10 15:30:25 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IfhGD-0000qO-HX for pkix-archive@lists.ietf.org; Wed, 10 Oct 2007 15:30:25 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IfhG2-0005wd-EQ for pkix-archive@lists.ietf.org; Wed, 10 Oct 2007 15:30:18 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9AISSAK029594 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Oct 2007 11:28:28 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9AISScl029593; Wed, 10 Oct 2007 11:28:28 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from EXVS01.ex.dslextreme.net (exbe04.ex.dslextreme.net [66.51.199.86]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9AISRtG029587 for ; Wed, 10 Oct 2007 11:28:27 -0700 (MST) (envelope-from chokhani@orionsec.com) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Subject: RE: OCSP Algorithm Agility Date: Wed, 10 Oct 2007 11:28:06 -0700 Message-ID: <82D5657AE1F54347A734BDD33637C879096CA5E3@EXVS01.ex.dslextreme.net> In-Reply-To: <2788466ED3E31C418E9ACC5C31661557053771@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP Algorithm Agility thread-index: Acf8l4NIxZexIh9rTveKgrEJmUDxVQAAJZEAAlba1eAAAH/7QAEC+OtgACFXyuAABd3wIAAA1HmA References: <82D5657AE1F54347A734BDD33637C879096C9ABE@EXVS01.ex.dslextreme.net> <2788466ED3E31C418E9ACC5C31661557053771@mou1wnexmb09.vcorp.ad.vrsn.com> From: "Santosh Chokhani" To: "Hallam-Baker, Phillip" , Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l9AISRtG029588 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 325b777e1a3a618c889460b612a65510 See responses in-line below. -----Original Message----- From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com] Sent: Tuesday, October 09, 2007 2:07 PM To: Santosh Chokhani; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility Not if they don't know that the client can understand them they can't. [Santosh Chokhani] The Responder has two ways to know what the client understands. From certID or from CA. If the client does not understand the algorithm used in certificate signing, revocation information is useless. And the issue is not just hashing algorithms, it is signature algorithms. Like your previous posts you continue to assume that cipher strength is a linear quantity with only one dimension and that any client which supports strength 2X must automatically support strength X. [Santosh Chokhani] I am making no such assumptions. I am saying that if an algorithm is good enough for a certificate, it is good enough for revocation notification for that certificate. That is not the case if you consider the practicalities of deploying ECC in an RSA world. To give a practical example, VeriSign issues a cert for an ECC key signed with an ECC key. The email program on Alice's machine in the DHS supports ECC but not the DHS SCVP server or OCSP relay. [Santosh Chokhani] And what is the problem with that? They have no choice but to use RSA. In the real world the OCSP service does not have a necessary connection to the CA. There are plenty of commercial OCSP offerings that report on certificates issued by other CAs. [Santosh Chokhani] And how does this relate to algorithm agility? If the OCSP does not do ECDSA it won't. If OCSP supports both RSA and ECDSA, it can take the cue from the CA CRL to determine what algorithm to use for signing OCSP responses. If the OCSP does not consume CRL, the mechanism that tells it revocation information can also tell it the signature algorithm to use. > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > Sent: Tuesday, October 09, 2007 11:16 AM > To: Hallam-Baker, Phillip; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > The OCSP and SCVP can transition to stronger algorithms any > time they want. > > The OCSP can take their clue from the CA or the certID field > to decide the hashing algorithm. When multiple certID is > present, OCSP can take low water mark of these. > > SCVP is no different than a client in terms of validating a > path. In terms of signing a response, it can take the low > water mark of the hashing algorithms in the certificate chain. > > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] > On Behalf Of Hallam-Baker, Phillip > Sent: Monday, October 08, 2007 7:27 PM > To: Santosh Chokhani; Andrews, Rick; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > The objective here is to overcome a real deployment obstacle > that creates a lockstep issue when use of stronger algorithms > is attempted. > > The CA cannot issue a certificate that employs a new > algorithm until it is known that all clients that might rely > on the certificate are capable of processing the new > certificate. Requiring lockstep updates to the OCSP and SCVP > infrastructure to be made at the same time renders transition > to stronger algorithms a much lengthier and much less > practical proposition. > > > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > > Sent: Saturday, October 06, 2007 4:12 PM > > To: Andrews, Rick; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > > > Rick, > > > > SCVP or other intermediaries are red herring. Whoever > processes the > > certificate processes the revocation information for that > certificate. > > It does not change the following: > > > > 1. There is no security benefit in using a stronger algorithm for > > OCSP > > response than for the certificate in question. Neither, > there is any > > benefit from interoperability viewpoint for these two to be > different. > > > > 2. If the OCSP Responder does not get a CRL, it can use the same > > mechanism to get the hashing algorithm used as it uses to get the > > revocation information. > > > > -----Original Message----- > > From: Andrews, Rick [mailto:RAndrews@verisign.com] > > Sent: Wednesday, October 03, 2007 3:29 PM > > To: Santosh Chokhani; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > Santosh, > > > > Sorry for the long delay in responding - travel and vacation. > > > > Not all OCSP responders work from CRLs, so they won't take > their cue > > from the CRL. Nor should they take their cue from the > signature on the > > cert in question, I believe. Let me try to restate my argument in a > > different way. > > > > With SCVP delegated path validation, the client requesting a cert's > > status from an OCSP responder will be different from the > client at the > > other end of the SSL connection. Those two clients may have very > > different capabilities in terms of supported signature and hash > > algorithms. It's not realistic to expect that all SSL clients, all > > SCVP servers, and all CAs will be able to upgrade in > lockstep to new > > algorithms as they are developed. Allowing the OCSP client > and server > > to negotiate a mutually-acceptable set of algorithms is > essential to > > the deployment of newer, stronger algorithms. > > > > Likewise, companies that run large OCSP responders may wish to > > gradually move to ECC-based signatures for all their OCSP > responses, > > even those for certs with RSA or DSA keys, because ECC > signatures are > > cheaper to produce. If algorithm agility is added to OCSP, those > > companies can gradually achieve the move to ECC without > disrupting the > > installed base of OCSP clients that don't support ECC. > > > > -Rick Andrews > > > > > -----Original Message----- > > > From: owner-ietf-pkix@mail.imc.org > > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > Santosh Chokhani > > > Sent: Friday, September 21, 2007 2:45 PM > > > To: Paul Hoffman; Stephen Kent; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > Paul, > > > > > > Here are my views on this. > > > > > > The client should be first asking for the algorithm suite > > that signed > > > the certificate in question. There is no need for the > > client to ask > > > for anything stronger. The client can ask for stronger suites as > > > secondary, if client has them. > > > > > > In the scenario you cite, the Responder certificate will > > not include > > > RSA with SHA 1 any longer. So, client will know that > > Responder only > > > supported his second choice and he should be ok with it. > > > > > > -----Original Message----- > > > From: owner-ietf-pkix@mail.imc.org > > > [mailto:owner-ietf-pkix@mail.imc.org] > > > On Behalf Of Paul Hoffman > > > Sent: Friday, September 21, 2007 4:39 PM > > > To: Stephen Kent; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > At 2:07 PM -0400 9/21/07, Stephen Kent wrote: > > > >How about defining an extension to be included in the cert > > > issued to an > > > >OCSP responder by a CA. The extension would have an > > ordered list of > > > >algorithms (hash and signature if we want to address more > > > than the hash > > > >agility issue) accepted by the OCSP responder. An OCSP > > > client can use > > > >this info to determine what is the "best" algorithm (or alg > > > pair) that > > > >it and the responder share. The combination of this > > extension and an > > > >OCSP negotiation procedure will allow the client to detect MITM > > > >downgrade attacks. In fact, if the client acquires the > > > responder's cert > > > >prior to making a request, there would not even be a > need for real > > > >negotiation, since the client would know what alg to > request in a > > > >response. > > > > > > Imagine the list of algorithms is RSA-with-SHA1 first and > > > DSA-with-SHA1 second. How does your negotiation work? The > > client asks > > > for this message to be signed with RSA-with-SHA1. > > > But the server knows that RSA-with-SHA1 has been > > compromised since it > > > got that certificate from the CA. What does the server say to the > > > client to indicate that it only wants to sign with > > DSA-with-SHA1? What > > > prevents Mallory from saying the same thing to the client? > > > > > > --Paul Hoffman, Director > > > --VPN Consortium > > > > > > > > > > > > > > > > From owner-ietf-pkix@mail.imc.org Wed Oct 10 16:26:33 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ifi8X-0002iL-AR for pkix-archive@lists.ietf.org; Wed, 10 Oct 2007 16:26:33 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Ifi8M-0007lL-Uk for pkix-archive@lists.ietf.org; Wed, 10 Oct 2007 16:26:29 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9AJPoxs034450 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Oct 2007 12:25:50 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9AJPoCU034449; Wed, 10 Oct 2007 12:25:50 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from csexchange1.corestreet.com (host200.58.41.216.conversent.net [216.41.58.200]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9AJPmp4034442 for ; Wed, 10 Oct 2007 12:25:49 -0700 (MST) (envelope-from shitchings@corestreet.com) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Subject: RE: OCSP Algorithm Agility Date: Wed, 10 Oct 2007 15:25:47 -0400 Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_0239_01C80B51.D4DB2F90" Message-ID: X-MS-Has-Attach: yes X-MS-TNEF-Correlator: Thread-Topic: OCSP Algorithm Agility Thread-Index: Acf8l4NIxZexIh9rTveKgrEJmUDxVQAAJZEAAlba1eAAAH/7QAEC+OtgACFXyuAABd3wIAAA1HmAADQyQqA= References: <82D5657AE1F54347A734BDD33637C879096C9ABE@EXVS01.ex.dslextreme.net> <2788466ED3E31C418E9ACC5C31661557053771@mou1wnexmb09.vcorp.ad.vrsn.com> <82D5657AE1F54347A734BDD33637C879096CA5E3@EXVS01.ex.dslextreme.net> From: "Seth Hitchings" To: "Santosh Chokhani" , "Hallam-Baker, Phillip" , Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 6437e26f1586b9f35812ea5ebeedf4ad This is a multi-part message in MIME format. ------=_NextPart_000_0239_01C80B51.D4DB2F90 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit I'm generally in favor of simpler approaches, such as those suggested by Santosh, as they favor interoperability. Updating deployed applications to understand new elements of the protocol could take just as long to roll out as the new algorithm support that's purportedly lacking. I can see a situation in which the CA cannot assume that the entire user population understands a new algorithm such as SHA-256, and thus has to continue using SHA-1 with RSA when signing certificates. Individual clients that do understand SHA-256 may wish to receive OCSP responses signed using SHA-256 with RSA, and would need a way to signal their desires to the OCSP responder. The question is, then, is there any security benefit to having the signature algorithm on the OCSP response stronger than the signature algorithm on the certificate? If you can break the algorithm and cause me to accept a contrived OCSP response, could you not do the same thing with a certificate? Seth -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani Sent: Wednesday, October 10, 2007 2:28 PM To: Hallam-Baker, Phillip; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility See responses in-line below. -----Original Message----- From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com] Sent: Tuesday, October 09, 2007 2:07 PM To: Santosh Chokhani; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility Not if they don't know that the client can understand them they can't. [Santosh Chokhani] The Responder has two ways to know what the client understands. From certID or from CA. If the client does not understand the algorithm used in certificate signing, revocation information is useless. And the issue is not just hashing algorithms, it is signature algorithms. Like your previous posts you continue to assume that cipher strength is a linear quantity with only one dimension and that any client which supports strength 2X must automatically support strength X. [Santosh Chokhani] I am making no such assumptions. I am saying that if an algorithm is good enough for a certificate, it is good enough for revocation notification for that certificate. That is not the case if you consider the practicalities of deploying ECC in an RSA world. To give a practical example, VeriSign issues a cert for an ECC key signed with an ECC key. The email program on Alice's machine in the DHS supports ECC but not the DHS SCVP server or OCSP relay. [Santosh Chokhani] And what is the problem with that? They have no choice but to use RSA. In the real world the OCSP service does not have a necessary connection to the CA. There are plenty of commercial OCSP offerings that report on certificates issued by other CAs. [Santosh Chokhani] And how does this relate to algorithm agility? If the OCSP does not do ECDSA it won't. If OCSP supports both RSA and ECDSA, it can take the cue from the CA CRL to determine what algorithm to use for signing OCSP responses. If the OCSP does not consume CRL, the mechanism that tells it revocation information can also tell it the signature algorithm to use. > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > Sent: Tuesday, October 09, 2007 11:16 AM > To: Hallam-Baker, Phillip; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > The OCSP and SCVP can transition to stronger algorithms any > time they want. > > The OCSP can take their clue from the CA or the certID field > to decide the hashing algorithm. When multiple certID is > present, OCSP can take low water mark of these. > > SCVP is no different than a client in terms of validating a > path. In terms of signing a response, it can take the low > water mark of the hashing algorithms in the certificate chain. > > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] > On Behalf Of Hallam-Baker, Phillip > Sent: Monday, October 08, 2007 7:27 PM > To: Santosh Chokhani; Andrews, Rick; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > The objective here is to overcome a real deployment obstacle > that creates a lockstep issue when use of stronger algorithms > is attempted. > > The CA cannot issue a certificate that employs a new > algorithm until it is known that all clients that might rely > on the certificate are capable of processing the new > certificate. Requiring lockstep updates to the OCSP and SCVP > infrastructure to be made at the same time renders transition > to stronger algorithms a much lengthier and much less > practical proposition. > > > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > > Sent: Saturday, October 06, 2007 4:12 PM > > To: Andrews, Rick; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > > > Rick, > > > > SCVP or other intermediaries are red herring. Whoever > processes the > > certificate processes the revocation information for that > certificate. > > It does not change the following: > > > > 1. There is no security benefit in using a stronger algorithm for > > OCSP > > response than for the certificate in question. Neither, > there is any > > benefit from interoperability viewpoint for these two to be > different. > > > > 2. If the OCSP Responder does not get a CRL, it can use the same > > mechanism to get the hashing algorithm used as it uses to get the > > revocation information. > > > > -----Original Message----- > > From: Andrews, Rick [mailto:RAndrews@verisign.com] > > Sent: Wednesday, October 03, 2007 3:29 PM > > To: Santosh Chokhani; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > Santosh, > > > > Sorry for the long delay in responding - travel and vacation. > > > > Not all OCSP responders work from CRLs, so they won't take > their cue > > from the CRL. Nor should they take their cue from the > signature on the > > cert in question, I believe. Let me try to restate my argument in a > > different way. > > > > With SCVP delegated path validation, the client requesting a cert's > > status from an OCSP responder will be different from the > client at the > > other end of the SSL connection. Those two clients may have very > > different capabilities in terms of supported signature and hash > > algorithms. It's not realistic to expect that all SSL clients, all > > SCVP servers, and all CAs will be able to upgrade in > lockstep to new > > algorithms as they are developed. Allowing the OCSP client > and server > > to negotiate a mutually-acceptable set of algorithms is > essential to > > the deployment of newer, stronger algorithms. > > > > Likewise, companies that run large OCSP responders may wish to > > gradually move to ECC-based signatures for all their OCSP > responses, > > even those for certs with RSA or DSA keys, because ECC > signatures are > > cheaper to produce. If algorithm agility is added to OCSP, those > > companies can gradually achieve the move to ECC without > disrupting the > > installed base of OCSP clients that don't support ECC. > > > > -Rick Andrews > > > > > -----Original Message----- > > > From: owner-ietf-pkix@mail.imc.org > > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > Santosh Chokhani > > > Sent: Friday, September 21, 2007 2:45 PM > > > To: Paul Hoffman; Stephen Kent; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > Paul, > > > > > > Here are my views on this. > > > > > > The client should be first asking for the algorithm suite > > that signed > > > the certificate in question. There is no need for the > > client to ask > > > for anything stronger. The client can ask for stronger suites as > > > secondary, if client has them. > > > > > > In the scenario you cite, the Responder certificate will > > not include > > > RSA with SHA 1 any longer. So, client will know that > > Responder only > > > supported his second choice and he should be ok with it. > > > > > > -----Original Message----- > > > From: owner-ietf-pkix@mail.imc.org > > > [mailto:owner-ietf-pkix@mail.imc.org] > > > On Behalf Of Paul Hoffman > > > Sent: Friday, September 21, 2007 4:39 PM > > > To: Stephen Kent; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > At 2:07 PM -0400 9/21/07, Stephen Kent wrote: > > > >How about defining an extension to be included in the cert > > > issued to an > > > >OCSP responder by a CA. The extension would have an > > ordered list of > > > >algorithms (hash and signature if we want to address more > > > than the hash > > > >agility issue) accepted by the OCSP responder. An OCSP > > > client can use > > > >this info to determine what is the "best" algorithm (or alg > > > pair) that > > > >it and the responder share. The combination of this > > extension and an > > > >OCSP negotiation procedure will allow the client to detect MITM > > > >downgrade attacks. In fact, if the client acquires the > > > responder's cert > > > >prior to making a request, there would not even be a > need for real > > > >negotiation, since the client would know what alg to > request in a > > > >response. > > > > > > Imagine the list of algorithms is RSA-with-SHA1 first and > > > DSA-with-SHA1 second. How does your negotiation work? The > > client asks > > > for this message to be signed with RSA-with-SHA1. > > > But the server knows that RSA-with-SHA1 has been > > compromised since it > > > got that certificate from the CA. What does the server say to the > > > client to indicate that it only wants to sign with > > DSA-with-SHA1? What > > > prevents Mallory from saying the same thing to the client? > > > > > > --Paul Hoffman, Director > > > --VPN Consortium > > > > > > > > > > > > > > > > ------=_NextPart_000_0239_01C80B51.D4DB2F90 Content-Type: application/x-pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIII3DCCAoIw ggHroAMCAQICAQQwDQYJKoZIhvcNAQEEBQAwUzELMAkGA1UEBhMCVVMxHDAaBgNVBAoTE0VxdWlm YXggU2VjdXJlIEluYy4xJjAkBgNVBAMTHUVxdWlmYXggU2VjdXJlIGVCdXNpbmVzcyBDQS0xMB4X DTk5MDYyMTA0MDAwMFoXDTIwMDYyMTA0MDAwMFowUzELMAkGA1UEBhMCVVMxHDAaBgNVBAoTE0Vx dWlmYXggU2VjdXJlIEluYy4xJjAkBgNVBAMTHUVxdWlmYXggU2VjdXJlIGVCdXNpbmVzcyBDQS0x MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDOLxm8F7d33pOpX1oNF080GgyY9CLZWdTEaEbw tDXFhQMgxq9FpSFRRUHrFlg2Mm/iUGJk+f1RnKok2fSdgyqHCiHTEjg0bI0Ablqg2ULuGiGV+VJM VVrFDzhPRvpt+C411h186+LwsHWAyKkTrL6I7zpuq18qOGICsBJ7/o+mAwIDAQABo2YwZDARBglg hkgBhvhCAQEEBAMCAAcwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRKeDJSEdtZFjZe38EU NkBqR3xMoTAdBgNVHQ4EFgQUSngyUhHbWRY2Xt/BFDZAakd8TKEwDQYJKoZIhvcNAQEEBQADgYEA dVuomwMR5ulWTM35qUzADZrzzGVp5iV2zFm31lTDHc2ZrBndtIXV4D38YiCnhEtYZfHi+ZUhP/XU flgeR4dUPlihtbX4Ku9x57zD9rFJRuLXoGvlVnqaJ5h8RmIU58n8bgMSeYA4HUiCjfwX/iqWK7Vi pqY9vX+SWc1aKoKyN3kwggK8MIICJaADAgECAgIA2DANBgkqhkiG9w0BAQUFADBTMQswCQYDVQQG EwJVUzEcMBoGA1UEChMTRXF1aWZheCBTZWN1cmUgSW5jLjEmMCQGA1UEAxMdRXF1aWZheCBTZWN1 cmUgZUJ1c2luZXNzIENBLTEwHhcNMDQwNjAyMTk1NzQyWhcNMjAwNjIxMDQwMDAwWjBSMQswCQYD VQQGEwJVUzEYMBYGA1UEChMPQ29yZVN0cmVldCBMdGQuMSkwJwYDVQQDEyBDb3JlU3RyZWV0IENl cnRpZmljYXRlIEF1dGhvcml0eTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAr0HhHsWZ2xkS 6BbojMXvdGPoRJLcAs2nUBSZ6XnJvnHxBwVvRUkqrCSBwKBurhjqGqe3oOxh6tC6wUuGhwLdhyWT BSYO469PJUx02lyiohqUZ8u0yshCL35/lA+MkZubcmFxHsLlTPCkS/+A7PZwzIjKrLAUT0VmwNTL TYEg1F8CAwEAAaOBnzCBnDAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0OBBYEFNjsf5MYxWYDwxBsPAT2 d4U+/wu2MB8GA1UdIwQYMBaAFEp4MlIR21kWNl7fwRQ2QGpHfEyhMA8GA1UdEwEB/wQFMAMBAf8w OQYDVR0fBDIwMDAuoCygKoYoaHR0cDovL2NybC5nZW90cnVzdC5jb20vY3Jscy9lYml6Y2ExLmNy bDANBgkqhkiG9w0BAQUFAAOBgQDCHD9PBDwPPDktSLC/jRpe9Crdpj8Cj7GB1od44j1D+5IJji+w rhuJ3tlR3p5MlzXGUEj8eFBtZymYBiWdLvIVqwMz2nYWBeFWXou6T+n4akcF708jM3MhFXP82ove f/xJzw9IzlVmI9DjDrkL2wXXw/IR5XTP2iQYPcbxento6zCCA5IwggL7oAMCAQICAgDrMA0GCSqG SIb3DQEBBQUAMFIxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9Db3JlU3RyZWV0IEx0ZC4xKTAnBgNV BAMTIENvcmVTdHJlZXQgQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTA3MDkxOTE2MDc0MFoXDTA4 MTAwOTE2MDc0MFowajELMAkGA1UEBhMCVVMxGDAWBgNVBAoTD0NvcmVTdHJlZXQgTHRkLjEXMBUG A1UEAxMOU2V0aCBIaXRjaGluZ3MxKDAmBgkqhkiG9w0BCQEWGXNoaXRjaGluZ3NAY29yZXN0cmVl dC5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDe2gk83DQJIyr9LtZtLofu/k5p twZAipP8XpPbAHIbb+ZXbW6fsvC9u97/MlD1wBldBwO6OnSlz9ah0jnp9sRGp5kMg2WTgjI3/NER sJ3A00t0+EM6L1kiuZbSfRQA7l5au0jTmOWnH5uV5KCJuuO7GjK0j/ORU7/SXsxTGnWddMcWJeFI dDzfVS0096IeKt12+67EMckhaALhe3t0j0He79TFiNZ/08BV8ibPKpTCp7TC+DE8f4EuaEnyfKaL TQECatxkbpwhtamdTMIMhvI+dyeiUDDUFc7USZNIF1bfgWfpsLfylQRnGOFJYtzG7O8ZHUFu2j5K /o00+k9+RLFXAgMBAAGjgdowgdcwDgYDVR0PAQH/BAQDAgXgMDwGA1UdHwQ1MDMwMaAvoC2GK2h0 dHA6Ly9jcmwuZ2VvdHJ1c3QuY29tL2NybHMvY29yZXN0cmVldC5jcmwwJAYDVR0RBB0wG4EZc2hp dGNoaW5nc0Bjb3Jlc3RyZWV0LmNvbTAfBgNVHSMEGDAWgBTY7H+TGMVmA8MQbDwE9neFPv8LtjBA BggrBgEFBQcBAQQ0MDIwMAYIKwYBBQUHMAGGJGh0dHA6Ly9nZW90cnVzdC1vY3NwLmNvcmVzdHJl ZXQuY29tLzANBgkqhkiG9w0BAQUFAAOBgQAZGVVLONrcmpP8IVM2KQyqzFQXHwhRueqlTYSNBqwp YAfAxKsf9a3xgSXGlhsm1sLp+n+2YKlhKC4BeWmQRwPgX7xiHrp5O1HcRnXkVlRAeeKwtUCr0Yjf uJAQkm4uwxj1UOCObbHC/ZNGejxaJucuT5Zx8uWQ04DPR1beSmvXKDGCAx0wggMZAgEBMFgwUjEL MAkGA1UEBhMCVVMxGDAWBgNVBAoTD0NvcmVTdHJlZXQgTHRkLjEpMCcGA1UEAxMgQ29yZVN0cmVl dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkCAgDrMAkGBSsOAwIaBQCgggGaMBgGCSqGSIb3DQEJAzEL BgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTA3MTAxMDE5MjU0N1owIwYJKoZIhvcNAQkEMRYE FFjR2RM3C1G85eiiEW6V5FoKVOL4MGcGCSqGSIb3DQEJDzFaMFgwCgYIKoZIhvcNAwcwDgYIKoZI hvcNAwICAgCAMA0GCCqGSIb3DQMCAgFAMAcGBSsOAwIHMA0GCCqGSIb3DQMCAgEoMAcGBSsOAwIa MAoGCCqGSIb3DQIFMGcGCSsGAQQBgjcQBDFaMFgwUjELMAkGA1UEBhMCVVMxGDAWBgNVBAoTD0Nv cmVTdHJlZXQgTHRkLjEpMCcGA1UEAxMgQ29yZVN0cmVldCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkC AgDrMGkGCyqGSIb3DQEJEAILMVqgWDBSMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPQ29yZVN0cmVl dCBMdGQuMSkwJwYDVQQDEyBDb3JlU3RyZWV0IENlcnRpZmljYXRlIEF1dGhvcml0eQICAOswDQYJ KoZIhvcNAQEBBQAEggEAeLehbxr9PcXiF417E5jVxe3PqMXmBbJ5f61LRcXplcOmorux/qKZDk0M 59fsmoj0pDyi37isJQYp6v0tgWZzcTjM+466p3KxrSvPchLA8TMcFN99/qbOrXnTD6dC5rq1aAWj tLRNjrhYDW+36vyfZksMCX4V/li68E17K3rObI4/Rb3jnKXNOIJZaeeg8Y6Vmf5tO736Oov4fVfK 7No+TGOLNcHAbd4IUx4v3zD5flxR9xarmyTRthE5W2Q5lLKau6JrnxUf0Rqf09jz4D/L6Lc2kIX8 /j+10NKQQG/Nl/5qQYRboCKx9tlEj/wzcIqiGiaVMDCKd018HxEhq9JlLAAAAAAAAA== ------=_NextPart_000_0239_01C80B51.D4DB2F90-- From Rhodes@bluewrenberries.com Wed Oct 10 22:29:46 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ifno2-0001hK-D3 for pkix-archive@lists.ietf.org; Wed, 10 Oct 2007 22:29:46 -0400 Received: from p1166-ipbf1110souka.saitama.ocn.ne.jp ([122.30.152.166]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Ifnnq-0001hD-S4 for pkix-archive@lists.ietf.org; Wed, 10 Oct 2007 22:29:41 -0400 Received: from koutaki ([142.102.152.68]:27798 "EHLO koutaki" smtp-auth: TLS-CIPHER: TLS-PEER-CN1: ) by p1166-ipbf1110souka.saitama.ocn.ne.jp with ESMTP id S22SZWZUXXBMDAJL (ORCPT ); Thu, 11 Oct 2007 11:29:36 +0900 X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Thu, 11 Oct 2007 11:29:11 +0900 To: pkix-archive@lists.ietf.org From: "Rhodes Minkis" Subject: denka Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed X-Spam-Score: 1.4 (+) X-Scan-Signature: d6b246023072368de71562c0ab503126 Online iPhone Screensaver - be the first to win! http://81.95.149.26/data/iphone-online.scr What's up pkix-archive keep the one you love in your life and buy some of the #1 rated penis pills available today! Rhodes Minkis http://www.asfaldas.com/ From Lufftcomg@camasolutions.com Thu Oct 11 06:11:29 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ifv0r-0000uT-IJ for pkix-archive@lists.ietf.org; Thu, 11 Oct 2007 06:11:29 -0400 Received: from [62.204.230.2] (helo=cvoda.pecomp.cz) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1Ifv0a-0002bN-Fz for pkix-archive@lists.ietf.org; Thu, 11 Oct 2007 06:11:22 -0400 Received: by 10.111.115.48 with SMTP id RxBHHLuKKfQWm; Thu, 11 Oct 2007 12:11:03 +0200 (GMT) Received: by 192.168.93.177 with SMTP id vkYIjErOZcayDM.7636721347678; Thu, 11 Oct 2007 12:11:01 +0200 (GMT) Message-ID: <000501c80bef$04adfde0$02e6cc3e@d000> From: "Jovany Luff" To: Subject: nosuot Date: Thu, 11 Oct 2007 12:10:58 +0200 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0008_01C80BFF.C836CDE0" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 X-Spam-Score: 3.5 (+++) X-Scan-Signature: 52e1467c2184c31006318542db5614d5 ------=_NextPart_000_0008_01C80BFF.C836CDE0 Content-Type: text/plain; charset="iso-8859-2" Content-Transfer-Encoding: quoted-printable Haven't seen you for ages pkix-archive have a multi orgasm all the time and give her some too while your at it. Jovany Luff http://www.bryggis.com/ ------=_NextPart_000_0008_01C80BFF.C836CDE0 Content-Type: text/html; charset="iso-8859-2" Content-Transfer-Encoding: quoted-printable
Haven't seen you for ages = pkix-archive
have a multi orgasm all the time and give her = some too=20 while your at it.
Jovany Luff
http://www.bryggis.com/
------=_NextPart_000_0008_01C80BFF.C836CDE0-- From owner-ietf-pkix@mail.imc.org Thu Oct 11 08:37:17 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IfxHx-0005qi-9I for pkix-archive@lists.ietf.org; Thu, 11 Oct 2007 08:37:17 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IfxHk-0006nn-CN for pkix-archive@lists.ietf.org; Thu, 11 Oct 2007 08:37:12 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9BBFJuv008186 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 11 Oct 2007 04:15:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9BBFJLr008185; Thu, 11 Oct 2007 04:15:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp-dub.microsoft.com (smtp-dub.microsoft.com [213.199.138.181]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9BBFFvp008176 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Thu, 11 Oct 2007 04:15:16 -0700 (MST) (envelope-from stefans@microsoft.com) Received: from DUB-EXHUB-C303.europe.corp.microsoft.com (65.53.213.93) by DUB-EXGWY-E802.partners.extranet.microsoft.com (10.251.129.2) with Microsoft SMTP Server (TLS) id 8.1.177.2; Thu, 11 Oct 2007 12:15:14 +0100 Received: from EA-EXMSG-C320.europe.corp.microsoft.com ([65.53.221.75]) by DUB-EXHUB-C303.europe.corp.microsoft.com ([65.53.213.93]) with mapi; Thu, 11 Oct 2007 12:15:14 +0100 From: Stefan Santesson To: Seth Hitchings , Santosh Chokhani , "Hallam-Baker, Phillip" , "ietf-pkix@imc.org" Date: Thu, 11 Oct 2007 12:14:55 +0100 Subject: RE: OCSP Algorithm Agility Thread-Topic: OCSP Algorithm Agility Thread-Index: Acf8l4NIxZexIh9rTveKgrEJmUDxVQAAJZEAAlba1eAAAH/7QAEC+OtgACFXyuAABd3wIAAA1HmAADQyQqAAIEoZEA== Message-ID: References: <82D5657AE1F54347A734BDD33637C879096C9ABE@EXVS01.ex.dslextreme.net> <2788466ED3E31C418E9ACC5C31661557053771@mou1wnexmb09.vcorp.ad.vrsn.com> <82D5657AE1F54347A734BDD33637C879096CA5E3@EXVS01.ex.dslextreme.net> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: acceptlanguage: en-US Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l9BBFHvo008177 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: b5299d0955d21ceeb18e25a232290fec I'm generally supportive of the following statement. > I'm generally in favor of simpler approaches, such as those suggested by > Santosh, as they favor interoperability. Updating deployed applications to > understand new elements of the protocol could take just as long to roll out > as the new algorithm support that's purportedly lacking. I've been trying to take a step back to think what I would need from a more practical viewpoint. Security: None of the presented threats is not a great concern for me. Downgrade attacks is only useful if we use algorithms that can be broken. I would expect an organization to only allow algorithms that provide adequate security. The stolen OCSP key is neither a problem for me from a protocol perspective. We have revocation. Practical matters: I can only find one practical matter that concerns me. I have an OCSP server and of some reason I want to gradually transition responses to be based on say ECC with SHA 256. Some clients can only verify RSA with SHA-1. The reason for doing this transition may be entirely policy oriented. Now I would like to know which clients that can actually verify my upgraded responses. I see some value in the client knowing which algorithms the server can support, but not greatly. The client can mostly learn the capability of a server by observing its responses. What can I do today: The server can draw a number of conclusions today. 1) Looking at the hashAlgorithm of the CertID 2) Looking at the signatureAlgorithm used by the client to sign the response 3) Looking at the certificate actually being validated None of these are 100% bulletproof to cover all corner cases. But are they good enough and is the remaining gap big enough to motivate a protocol update? Possible updates: To cover the corner cases I have seen the following options: Client declaration - through a singleRequestExtension Server declaration - through responseExtensions, or through an extension in the responder certificate. Conclusion: I'm not convinced I need any update of OCSP. If we do an update anyway, I'm more interested in the client declaration than the server declaration problem. Stefan Santesson Senior Program Manager Windows Security, Standards > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf- > pkix@mail.imc.org] On Behalf Of Seth Hitchings > Sent: den 10 oktober 2007 21:26 > To: Santosh Chokhani; Hallam-Baker, Phillip; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > I'm generally in favor of simpler approaches, such as those suggested > by > Santosh, as they favor interoperability. Updating deployed applications > to > understand new elements of the protocol could take just as long to roll > out > as the new algorithm support that's purportedly lacking. > > I can see a situation in which the CA cannot assume that the entire > user > population understands a new algorithm such as SHA-256, and thus has to > continue using SHA-1 with RSA when signing certificates. Individual > clients > that do understand SHA-256 may wish to receive OCSP responses signed > using > SHA-256 with RSA, and would need a way to signal their desires to the > OCSP > responder. > > The question is, then, is there any security benefit to having the > signature > algorithm on the OCSP response stronger than the signature algorithm on > the > certificate? If you can break the algorithm and cause me to accept a > contrived OCSP response, could you not do the same thing with a > certificate? > > Seth > > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf- > pkix@mail.imc.org] On > Behalf Of Santosh Chokhani > Sent: Wednesday, October 10, 2007 2:28 PM > To: Hallam-Baker, Phillip; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > See responses in-line below. > > -----Original Message----- > From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com] > Sent: Tuesday, October 09, 2007 2:07 PM > To: Santosh Chokhani; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > Not if they don't know that the client can understand them they can't. > [Santosh Chokhani] The Responder has two ways to know what the client > understands. From certID or from CA. If the client does not > understand > the algorithm used in certificate signing, revocation information is > useless. > > And the issue is not just hashing algorithms, it is signature > algorithms. > Like your previous posts you continue to assume that cipher strength is > a linear quantity with only one dimension and that any client which > supports strength 2X must automatically support strength X. > [Santosh Chokhani] I am making no such assumptions. I am saying that > if > an algorithm is good enough for a certificate, it is good enough for > revocation notification for that certificate. > > That is not the case if you consider the practicalities of deploying > ECC > in an RSA world. > > To give a practical example, VeriSign issues a cert for an ECC key > signed with an ECC key. The email program on Alice's machine in the DHS > supports ECC but not the DHS SCVP server or OCSP relay. > [Santosh Chokhani] And what is the problem with that? They have no > choice but to use RSA. > > In the real world the OCSP service does not have a necessary connection > to the CA. There are plenty of commercial OCSP offerings that report on > certificates issued by other CAs. > [Santosh Chokhani] And how does this relate to algorithm agility? If > the OCSP does not do ECDSA it won't. If OCSP supports both RSA and > ECDSA, it can take the cue from the CA CRL to determine what algorithm > to use for signing OCSP responses. If the OCSP does not consume CRL, > the mechanism that tells it revocation information can also tell it the > signature algorithm to use. > > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > > Sent: Tuesday, October 09, 2007 11:16 AM > > To: Hallam-Baker, Phillip; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > > > The OCSP and SCVP can transition to stronger algorithms any > > time they want. > > > > The OCSP can take their clue from the CA or the certID field > > to decide the hashing algorithm. When multiple certID is > > present, OCSP can take low water mark of these. > > > > SCVP is no different than a client in terms of validating a > > path. In terms of signing a response, it can take the low > > water mark of the hashing algorithms in the certificate chain. > > > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] > > On Behalf Of Hallam-Baker, Phillip > > Sent: Monday, October 08, 2007 7:27 PM > > To: Santosh Chokhani; Andrews, Rick; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > > > The objective here is to overcome a real deployment obstacle > > that creates a lockstep issue when use of stronger algorithms > > is attempted. > > > > The CA cannot issue a certificate that employs a new > > algorithm until it is known that all clients that might rely > > on the certificate are capable of processing the new > > certificate. Requiring lockstep updates to the OCSP and SCVP > > infrastructure to be made at the same time renders transition > > to stronger algorithms a much lengthier and much less > > practical proposition. > > > > > > > -----Original Message----- > > > From: owner-ietf-pkix@mail.imc.org > > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > > > Sent: Saturday, October 06, 2007 4:12 PM > > > To: Andrews, Rick; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > Rick, > > > > > > SCVP or other intermediaries are red herring. Whoever > > processes the > > > certificate processes the revocation information for that > > certificate. > > > It does not change the following: > > > > > > 1. There is no security benefit in using a stronger algorithm for > > > OCSP > > > response than for the certificate in question. Neither, > > there is any > > > benefit from interoperability viewpoint for these two to be > > different. > > > > > > 2. If the OCSP Responder does not get a CRL, it can use the same > > > mechanism to get the hashing algorithm used as it uses to get the > > > revocation information. > > > > > > -----Original Message----- > > > From: Andrews, Rick [mailto:RAndrews@verisign.com] > > > Sent: Wednesday, October 03, 2007 3:29 PM > > > To: Santosh Chokhani; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > Santosh, > > > > > > Sorry for the long delay in responding - travel and vacation. > > > > > > Not all OCSP responders work from CRLs, so they won't take > > their cue > > > from the CRL. Nor should they take their cue from the > > signature on the > > > cert in question, I believe. Let me try to restate my argument in a > > > different way. > > > > > > With SCVP delegated path validation, the client requesting a cert's > > > status from an OCSP responder will be different from the > > client at the > > > other end of the SSL connection. Those two clients may have very > > > different capabilities in terms of supported signature and hash > > > algorithms. It's not realistic to expect that all SSL clients, all > > > SCVP servers, and all CAs will be able to upgrade in > > lockstep to new > > > algorithms as they are developed. Allowing the OCSP client > > and server > > > to negotiate a mutually-acceptable set of algorithms is > > essential to > > > the deployment of newer, stronger algorithms. > > > > > > Likewise, companies that run large OCSP responders may wish to > > > gradually move to ECC-based signatures for all their OCSP > > responses, > > > even those for certs with RSA or DSA keys, because ECC > > signatures are > > > cheaper to produce. If algorithm agility is added to OCSP, those > > > companies can gradually achieve the move to ECC without > > disrupting the > > > installed base of OCSP clients that don't support ECC. > > > > > > -Rick Andrews > > > > > > > -----Original Message----- > > > > From: owner-ietf-pkix@mail.imc.org > > > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > > Santosh Chokhani > > > > Sent: Friday, September 21, 2007 2:45 PM > > > > To: Paul Hoffman; Stephen Kent; ietf-pkix@imc.org > > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > > > > Paul, > > > > > > > > Here are my views on this. > > > > > > > > The client should be first asking for the algorithm suite > > > that signed > > > > the certificate in question. There is no need for the > > > client to ask > > > > for anything stronger. The client can ask for stronger suites as > > > > secondary, if client has them. > > > > > > > > In the scenario you cite, the Responder certificate will > > > not include > > > > RSA with SHA 1 any longer. So, client will know that > > > Responder only > > > > supported his second choice and he should be ok with it. > > > > > > > > -----Original Message----- > > > > From: owner-ietf-pkix@mail.imc.org > > > > [mailto:owner-ietf-pkix@mail.imc.org] > > > > On Behalf Of Paul Hoffman > > > > Sent: Friday, September 21, 2007 4:39 PM > > > > To: Stephen Kent; ietf-pkix@imc.org > > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > > > > At 2:07 PM -0400 9/21/07, Stephen Kent wrote: > > > > >How about defining an extension to be included in the cert > > > > issued to an > > > > >OCSP responder by a CA. The extension would have an > > > ordered list of > > > > >algorithms (hash and signature if we want to address more > > > > than the hash > > > > >agility issue) accepted by the OCSP responder. An OCSP > > > > client can use > > > > >this info to determine what is the "best" algorithm (or alg > > > > pair) that > > > > >it and the responder share. The combination of this > > > extension and an > > > > >OCSP negotiation procedure will allow the client to detect MITM > > > > >downgrade attacks. In fact, if the client acquires the > > > > responder's cert > > > > >prior to making a request, there would not even be a > > need for real > > > > >negotiation, since the client would know what alg to > > request in a > > > > >response. > > > > > > > > Imagine the list of algorithms is RSA-with-SHA1 first and > > > > DSA-with-SHA1 second. How does your negotiation work? The > > > client asks > > > > for this message to be signed with RSA-with-SHA1. > > > > But the server knows that RSA-with-SHA1 has been > > > compromised since it > > > > got that certificate from the CA. What does the server say to the > > > > client to indicate that it only wants to sign with > > > DSA-with-SHA1? What > > > > prevents Mallory from saying the same thing to the client? > > > > > > > > --Paul Hoffman, Director > > > > --VPN Consortium > > > > > > > > > > > > > > > > > > > > > > > > From owner-ietf-pkix@mail.imc.org Thu Oct 11 22:55:31 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IgAgV-0004NU-Gf for pkix-archive@lists.ietf.org; Thu, 11 Oct 2007 22:55:31 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IgAgL-00006p-87 for pkix-archive@lists.ietf.org; Thu, 11 Oct 2007 22:55:27 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9C11p0M087302 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 11 Oct 2007 18:01:51 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9C11pAw087301; Thu, 11 Oct 2007 18:01:51 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from host.eb2bcom.com (host.eb2bcom.com [72.232.34.10]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9C11mMB087287 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 11 Oct 2007 18:01:50 -0700 (MST) (envelope-from steven.legg@eb2bcom.com) Received: from [202.164.192.219] (helo=[192.168.99.100]) by host.eb2bcom.com with esmtpa (Exim 4.68) (envelope-from ) id 1Ig8uN-0003gB-V6; Fri, 12 Oct 2007 11:01:44 +1000 Message-ID: <470EC778.500@eb2bcom.com> Date: Fri, 12 Oct 2007 11:01:44 +1000 From: Steven Legg User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: Paul Hoffman CC: ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> <470C1C32.70603@eb2bcom.com> <470C1FA3.40000@eb2bcom.com> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - host.eb2bcom.com X-AntiAbuse: Original Domain - imc.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - eb2bcom.com X-Source: X-Source-Args: X-Source-Dir: Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 32b73d73e8047ed17386f9799119ce43 Paul, Paul Hoffman wrote: > > At 10:26 AM +1000 10/10/07, Steven Legg wrote: >> The way out of this dilemma is for PKIX, LDAP and X.500 to agree >> on the upper bounds. The consensus in the X.500 working group is >> to completely remove the (non-normative) upper bounds, rather than >> rejigging them. > > Has the X.500 working group communicated that to the PKIX WG, or the IETF? Yes, in the liaison statement where it says "We plan to remove the upper bounds specified in the standard". The example change to X.520 suggests that "the standard" means more than just X.509. > > At 10:41 AM +1000 10/10/07, Steven Legg wrote: >>> - Do we object to the ITU making the upper bound on DirectoryString >>> optional >> >> They've been optional since the second edition of X.500. The defect >> resolution will make that clearer, as well as steering away from >> any specific suggestions for the upper bounds. > > We disagree that this DR "will make it clearer". What was sent to the > PKIX WG said: > > In relation to resolve a Defect Report, it appears to majority within > the X.500 community to remove hard-coded length restriction whenever a > DirectoryString is used. > . . . > We plan to remove the upper bounds specified in the standard. In > particular we intend to eliminate the Upper Bounds for DirectoryString. > > That does not sound anything like "They've been optional since the > second edition of X.500." It has been established on this list that the upper bounds in X.500 have been non-normative since the second edition. If they are non-normative, then an implementation can set the upper bounds to whatever it wants, including the largest number anyone has ever thought of, effectively making the upper bounds optional. > > Could you get the X.500 working group to make it clear if they are > considering, or have already, removed the upper bounds on all the > X.500-related strings that Russ listed? I had a closer look at RFC 3280. Some of the upper bounds originate from X.500, but there is a bunch of upper bounds constraining component parts of ORAddress that come from X.400, primarily the upper bounds with names ending with "-length". The former are in scope for the change contemplated by the X.500 working group, but the latter are not. I've prodded some ITU-T folks to publicly confirm the situation. > >>> - Should we do anything to draft-ietf-pkix-rfc3280bis to reflect that >>> >>> The answer to the first should be "no, we don't". Russ gave a list >>> that shows the the ITU has a *long* way to go before it gets rid of >>> the silly maximum lengths in X.509. >> >> The defect resolution will throw them all out at the same time. > > Where does it say that? The DR listed exactly one string type, > DirectoryString. Again, having this be clearer would help us out a lot. The liaison statement said "We plan to remove the upper bounds specified in the standard". The following sentence beginning "In particular" suggests to me that DirectoryString is a pertinent case, but by no means the only case. By the way, the liaison statement is not the defect resolution, and in any case I've been informed there has been a change in strategy. The upper bounds will be removed via an extension to X.500 rather than through a defect resolution. I will leave it to someone from the ITU-T to confirm. Regards, Steven > > > --Paul Hoffman, Director > --VPN Consortium > From owner-ietf-pkix@mail.imc.org Fri Oct 12 11:50:29 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IgMmT-0000aj-LB for pkix-archive@lists.ietf.org; Fri, 12 Oct 2007 11:50:29 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IgMmL-0002bn-O4 for pkix-archive@lists.ietf.org; Fri, 12 Oct 2007 11:50:23 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9CEYaBO054666 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 12 Oct 2007 07:34:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9CEYaap054665; Fri, 12 Oct 2007 07:34:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from [192.168.1.3] (pool-72-76-39-171.nwrknj.fios.verizon.net [72.76.39.171]) (authenticated bits=0) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9CEYLe0054649 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 12 Oct 2007 07:34:23 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: <470EC778.500@eb2bcom.com> References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> <470C1C32.70603@eb2bcom.com> <470C1FA3.40000@eb2bcom.com> <470EC778.500@eb2bcom.com> Date: Fri, 12 Oct 2007 10:29:16 -0400 To: Steven Legg From: Paul Hoffman Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Cc: ietf-pkix@imc.org Content-Type: text/plain; charset="us-ascii" ; format="flowed" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 39bd8f8cbb76cae18b7e23f7cf6b2b9f At 11:01 AM +1000 10/12/07, Steven Legg wrote: >Paul Hoffman wrote: >>Has the X.500 working group communicated that to the PKIX WG, or the IETF? > >Yes, in the liaison statement where it says "We plan to remove the >upper bounds specified in the standard". The example change to X.520 >suggests that "the standard" means more than just X.509. With all due respect, "suggests" is not enough here. Further, the sentence you quoute is the only one in the whole liaison statement that talks about more than just DirectoryString. Before the PKIX WG acts (such as changing RFC3280bis), we should get a clearer liaison statement, hopefully one that says "all upper bounds have been removed". >It has been established on this list that the upper bounds in X.500 >have been non-normative since the second edition. You said that in an earlier message. Could you point us to a specific section of a specific version of X.500 where that is true? Most of us are not X.500 users. >I had a closer look at RFC 3280. Some of the upper bounds originate >from X.500, but there is a bunch of upper bounds constraining >component parts of ORAddress that come from X.400, primarily the >upper bounds with names ending with "-length". The former are in >scope for the change contemplated by the X.500 working group, but >the latter are not. We can probably change things relating to X.400 without fear of real-world interop problems. --Paul Hoffman, Director --VPN Consortium From owner-ietf-pkix@mail.imc.org Fri Oct 12 15:14:22 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IgPxm-0002lB-La for pkix-archive@lists.ietf.org; Fri, 12 Oct 2007 15:14:22 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IgPxd-0000sv-4o for pkix-archive@lists.ietf.org; Fri, 12 Oct 2007 15:14:18 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9CIEgmV073579 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 12 Oct 2007 11:14:42 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9CIEgQk073578; Fri, 12 Oct 2007 11:14:42 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from stingray.missi.ncsc.mil (stingray.missi.ncsc.mil [144.51.50.20]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9CIEf6D073567 for ; Fri, 12 Oct 2007 11:14:42 -0700 (MST) (envelope-from DPKemp@missi.ncsc.mil) Received: from Cerberus.missi.ncsc.mil (cerberus.missi.ncsc.mil [144.51.51.8]) by stingray.missi.ncsc.mil with SMTP id l9CIEa7e011545; Fri, 12 Oct 2007 14:14:36 -0400 (EDT) Received: from 144.51.60.33 by Cerberus.missi.ncsc.mil (InterScan VirusWall 6); Fri, 12 Oct 2007 14:14:36 -0400 Received: from EXCH.missi.ncsc.mil ([144.51.60.19]) by antigone.missi.ncsc.mil with Microsoft SMTPSVC(6.0.3790.3959); Fri, 12 Oct 2007 14:14:35 -0400 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Date: Fri, 12 Oct 2007 14:14:35 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Thread-Index: AcgM6CMUv38Kwxe1S2msNxc8hziXeAAElABw References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> <470C1C32.70603@eb2bcom.com> <470C1FA3.40000@eb2bcom.com> <470EC778.500@eb2bcom.com> From: "Kemp, David P." To: "Paul Hoffman" Cc: X-OriginalArrivalTime: 12 Oct 2007 18:14:35.0950 (UTC) FILETIME=[BEEBACE0:01C80CFB] X-TM-AS-Product-Ver: : ISVW-6.0.0.1396-3.6.0.1039-15480000 X-TM-AS-Result: : Yes--15.228700-0-31-1 X-TM-AS-Category-Info: : 31:0.000000 X-TM-AS-MatchedID: : =?us-ascii?B?MTUwNTY3LTEzOTAxMC03MDI2?= =?us-ascii?B?NDUtNzAwMDc1LTcwMjcyNi03MDE2MTgtNzAyMzY3LTcwMjExMy03?= =?us-ascii?B?MDE0NTUtNzA0MDQ5LTcwMDQ3Ni03MDU5MDEtMTM5NzAzLTcwODE5?= =?us-ascii?B?Ni03MDAzNDItNzAxNjI2LTcwMDE0Mi03MDkzOTctNzA2NjM5LTcw?= =?us-ascii?B?NjU2MS03MDE1NzYtNzA0MzMyLTEzOTUwNC0xMjE2NDgtNzAwODQ2?= =?us-ascii?B?LTcwMDkxOC03MDAyNzItMTQ4MDM5LTE0ODA1MC0yMDAxNi0yMDA0?= =?us-ascii?B?MA==?= Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l9CIEg6D073572 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 41c17b4b16d1eedaa8395c26e9a251c4 >Paul Hoffman wrote: >It has been established on this list that the upper bounds in X.500 >have been non-normative since the second edition. You said that in an earlier message. Could you point us to a specific section of a specific version of X.500 where that is true? Most of us are not X.500 users. ---------- 1993 --------- http://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-X.520-199311-S!!P DF-E&type=items ISO/IEC 9594-6 : 1995 (E) 22 ITU-T Rec. X.520 (1993 E) Superseded by a more recent version Annex A Selected attribute types in ASN.1 (This annex forms an integral part of this Recommendation | International Standard) This annex includes all of the ASN.1 type and value definitions contained in this Directory Specification in the form of the ASN.1 module SelectedAttributeTypes. ---------- 1997 --------- http://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-X.520-199708-S!!P DF-E&type=items ISO/IEC 9594-6 : 1998 (E) ITU-T Rec. X.520 (1997 E) 41 Annex C Upper bounds (This annex does not form an integral part of this Recommendation | International Standard) This annex includes all of the suggested upper bound value constraints used in these Directory Specifications, in the form of the ASN.1 module UpperBounds. ---------- 2001 --------- http://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-X.520-200102-I!!P DF-E&type=items ISO/IEC 9594-6:2001 (E) ITU-T X.520 (02/2001 E) 61 Annex C Upper bounds (This annex does not form an integral part of this Recommendation | International Standard) This annex includes all of the suggested upper bound value constraints used in these Directory Specifications, in the form of the ASN.1 module UpperBounds. ---------- 2005 --------- http://www.itu.int/rec/T-REC-X.520-200508-I/dologin.asp?lang=e&id=T-REC- X.520-200508-I!!PDF-E&type=items ISO/IEC 9594-6:2005 (E) 60 ITU-T Rec. X.520 (08/2005) Annex C Upper bounds (This annex does not form an integral part of this Recommendation | International Standard) This annex includes all of the suggested upper bound value constraints used in these Directory Specifications, in the form of the ASN.1 module UpperBounds. From owner-ietf-pkix@mail.imc.org Fri Oct 12 15:22:01 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IgQ5B-0003A9-3G for pkix-archive@lists.ietf.org; Fri, 12 Oct 2007 15:22:01 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IgQ53-0001AZ-Oy for pkix-archive@lists.ietf.org; Fri, 12 Oct 2007 15:21:55 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9CIg0i3075114 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 12 Oct 2007 11:42:00 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9CIg0nf075113; Fri, 12 Oct 2007 11:42:00 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.nist.gov (rimp1.nist.gov [129.6.16.226]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9CIfudZ075103 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Fri, 12 Oct 2007 11:41:59 -0700 (MST) (envelope-from david.cooper@nist.gov) Received: from postmark.nist.gov (emailha1.nist.gov [129.6.16.196]) by smtp.nist.gov (8.13.1/8.13.1) with ESMTP id l9CIfp4i016608 for ; Fri, 12 Oct 2007 14:41:52 -0400 Received: from st26.ncsl.nist.gov (st26.ncsl.nist.gov [129.6.54.72]) by postmark.nist.gov (8.13.1/8.13.1) with ESMTP id l9CIfQOW003035 for ; Fri, 12 Oct 2007 14:41:28 -0400 Message-ID: <470FC011.8080705@nist.gov> Date: Fri, 12 Oct 2007 14:42:25 -0400 From: "David A. Cooper" User-Agent: Thunderbird 2.0.0.4 (X11/20070620) MIME-Version: 1.0 To: pkix Subject: draft-ietf-pkix-rfc3280bis-09.txt Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-NIST-MailScanner-Information: X-NIST-MailScanner: Found to be clean X-NIST-MailScanner-From: david.cooper@nist.gov Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: ffa9dfbbe7cc58b3fa6b8ae3e57b0aa3 All, I just submitted draft -09 of 3280bis. A diff file highlighting the changes between drafts -08 and -09 is available at http://csrc.nist.gov/pki/documents/PKIX/draft3280bis-08todraft3280bis-09_diff.html. Here is a summary of the changes between drafts -08 and -09: 1) Replaced references to RFC 1738 with references to RFC 2616. 2) Replaced two instances of "NOT REQUIRED" (in all capital letters) with "not required" (in lower case), to address an issue raised by the idnits program. 3) In section 5.1.2.3, added the word "non-empty" to clarify that the issuer field in a CRL MUST contain a non-empty X.500 DN. This was a change that was agreed to on March 2 (see http://www.imc.org/ietf-pkix/mail-archive/msg04478.html). 4) Section 7.1 was modified to clarify that name comparison is always performed according to the matching rule specified for attribute. Dave From owner-ietf-pkix@mail.imc.org Fri Oct 12 16:03:01 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IgQir-000775-66 for pkix-archive@lists.ietf.org; Fri, 12 Oct 2007 16:03:01 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IgQil-0002me-Rx for pkix-archive@lists.ietf.org; Fri, 12 Oct 2007 16:02:57 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9CJF3xs077459 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 12 Oct 2007 12:15:03 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9CJF3FJ077458; Fri, 12 Oct 2007 12:15:03 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from ns1.neustar.com (ns1.neustar.com [156.154.16.138]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9CJF2US077451 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Fri, 12 Oct 2007 12:15:02 -0700 (MST) (envelope-from ietf@ietf.org) Received: from stiedprstage1.ietf.org (stiedprstage1.va.neustar.com [10.31.47.10]) by ns1.neustar.com (Postfix) with ESMTP id BCBDC26E78; Fri, 12 Oct 2007 19:15:01 +0000 (GMT) Received: from ietf by stiedprstage1.ietf.org with local (Exim 4.43) id 1IgPyP-00054Q-M3; Fri, 12 Oct 2007 15:15:01 -0400 Content-Type: Multipart/Mixed; Boundary="NextPart" Mime-Version: 1.0 To: i-d-announce@ietf.org Cc: ietf-pkix@imc.org From: Internet-Drafts@ietf.org Subject: I-D ACTION:draft-ietf-pkix-rfc3280bis-09.txt Message-Id: Date: Fri, 12 Oct 2007 15:15:01 -0400 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: b5d20af10c334b36874c0264b10f59f1 --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Public-Key Infrastructure (X.509) Working Group of the IETF. Title : Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile Author(s) : D. Cooper, et al. Filename : draft-ietf-pkix-rfc3280bis-09.txt Pages : 144 Date : 2007-10-12 This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model are provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-pkix-rfc3280bis-09.txt To remove yourself from the I-D Announcement list, send a message to i-d-announce-request@ietf.org with the word unsubscribe in the body of the message. You can also visit https://www1.ietf.org/mailman/listinfo/I-D-announce to change your subscription settings. Internet-Drafts are also available by anonymous FTP. Login with the username "anonymous" and a password of your e-mail address. After logging in, type "cd internet-drafts" and then "get draft-ietf-pkix-rfc3280bis-09.txt". A list of Internet-Drafts directories can be found in http://www.ietf.org/shadow.html or ftp://ftp.ietf.org/ietf/1shadow-sites.txt Internet-Drafts can also be obtained by e-mail. Send a message to: mailserv@ietf.org. In the body type: "FILE /internet-drafts/draft-ietf-pkix-rfc3280bis-09.txt". NOTE: The mail server at ietf.org can return the document in MIME-encoded form by using the "mpack" utility. To use this feature, insert the command "ENCODING mime" before the "FILE" command. To decode the response(s), you will need "munpack" or a MIME-compliant mail reader. Different MIME-compliant mail readers exhibit different behavior, especially when dealing with "multipart" MIME messages (i.e. documents which have been split up into multiple messages), so check your local documentation on how to manipulate these messages. Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Multipart/Alternative; Boundary="OtherAccess" --OtherAccess Content-Type: Message/External-body; access-type="mail-server"; server="mailserv@ietf.org" Content-Type: text/plain Content-ID: <2007-10-12144839.I-D@ietf.org> ENCODING mime FILE /internet-drafts/draft-ietf-pkix-rfc3280bis-09.txt --OtherAccess Content-Type: Message/External-body; name="draft-ietf-pkix-rfc3280bis-09.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <2007-10-12144839.I-D@ietf.org> --OtherAccess-- --NextPart-- From agent.kasia@allfreight.co.kr Fri Oct 12 18:20:31 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IgSrv-00021C-Gd for pkix-archive@lists.ietf.org; Fri, 12 Oct 2007 18:20:31 -0400 Received: from [190.41.19.231] (helo=iysgxnq) by ietf-mx.ietf.org with smtp (Exim 4.43) id 1IgSrn-0006of-OY for pkix-archive@lists.ietf.org; Fri, 12 Oct 2007 18:20:26 -0400 Received: from ewkbv ([136.236.33.24]) by iysgxnq with Microsoft SMTPSVC(5.0.2195.6713); Fri, 12 Oct 2007 17:20:05 -0500 Message-ID: <470FF315.5030404@allfreight.co.kr> Date: Fri, 12 Oct 2007 17:20:05 -0500 From: User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: pkix-archive@lists.ietf.org Subject: Your ecard horoscope is waiting! Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Score: 0.1 (/) X-Scan-Signature: 0f1ff0b0158b41ac6b9548d0972cdd31 Get your e-Cat Card. It is Crazy! http://69.211.137.237/ From cosmin-Kepecz@tp7.org Sat Oct 13 06:54:50 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Igedu-0004sk-Uc for pkix-archive@lists.ietf.org; Sat, 13 Oct 2007 06:54:50 -0400 Received: from e181080176.adsl.alicedsl.de ([85.181.80.176]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1Igedq-0004kY-CE for pkix-archive@lists.ietf.org; Sat, 13 Oct 2007 06:54:46 -0400 Received: from Stefan ([156.129.175.25] helo=Stefan) by e181080176.adsl.alicedsl.de ( sendmail 8.13.3/8.13.1) with esmtpa id 1LbkAx-000ZHA-vx for pkix-archive@lists.ietf.org; Sat, 13 Oct 2007 12:55:08 +0200 Message-ID: <000901c80d87$76cfb910$b050b555@Stefan> From: "cosmin Kepecz" To: Subject: terioles Date: Sat, 13 Oct 2007 12:54:44 +0200 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0008_01C80D98.3A588910" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 X-Spam-Score: 3.4 (+++) X-Scan-Signature: bb8f917bb6b8da28fc948aeffb74aa17 ------=_NextPart_000_0008_01C80D98.3A588910 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Howdy pkix-archive make her buckle and moan all night when you split that pussy wide open cosmin Kepecz http://www.aogelai.com/ ------=_NextPart_000_0008_01C80D98.3A588910 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
Howdy pkix-archive
make her buckle and moan all night when you = split that=20 pussy wide open
cosmin Kepecz
http://www.aogelai.com/
------=_NextPart_000_0008_01C80D98.3A588910-- From jodam@vilenski.org Sun Oct 14 15:50:04 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ih9TQ-0000kL-Lg for pkix-archive@lists.ietf.org; Sun, 14 Oct 2007 15:50:04 -0400 Received: from [190.128.77.197] (helo=qzva) by ietf-mx.ietf.org with smtp (Exim 4.43) id 1Ih9TK-0003Qw-CL for pkix-archive@lists.ietf.org; Sun, 14 Oct 2007 15:49:59 -0400 Received: from urq ([184.57.175.235]) by qzva (8.13.1/8.13.1) with SMTP id l9EJpMRV009653; Sun, 14 Oct 2007 14:51:22 -0500 Message-ID: <001101c80e9b$74f03c40$ebaf39b8@urq> From: To: Subject: did you see this on Friday Date: Sun, 14 Oct 2007 14:50:22 -0500 MIME-Version: 1.0 Content-Type: text/plain; format=flowed; charset="windows-1250"; reply-type=original Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2800.1106 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106 X-Spam-Score: 1.7 (+) X-Scan-Signature: 30ac594df0e66ffa5a93eb4c48bcb014 Check out Vision City, Its Next On The List. PHYSICAL PROPERTY (PPYH.OB) Price: $0.25 PPYH announced its intention to acquire units in Vision City. Keep your eyes open for the news rumored to hit Monday morning. Have your broker get on this one first thing Monday. From owner-ietf-pkix@mail.imc.org Mon Oct 15 13:57:20 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IhUBs-0004nq-22 for pkix-archive@lists.ietf.org; Mon, 15 Oct 2007 13:57:20 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IhUBi-0003zv-Ix for pkix-archive@lists.ietf.org; Mon, 15 Oct 2007 13:57:12 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9FGwxB4001604 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 15 Oct 2007 09:58:59 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9FGwxAj001603; Mon, 15 Oct 2007 09:58:59 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from colibri.verisign.com (colibri.verisign.com [65.205.251.74]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9FGwvwF001571 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Mon, 15 Oct 2007 09:58:58 -0700 (MST) (envelope-from pbaker@verisign.com) Received: from mou1wnexcn01.vcorp.ad.vrsn.com (mailer1.verisign.com [65.205.251.34]) by colibri.verisign.com (8.13.6/8.13.4) with ESMTP id l9FGtPMu006000; Mon, 15 Oct 2007 09:55:25 -0700 Received: from MOU1WNEXMB09.vcorp.ad.vrsn.com ([10.25.15.197]) by mou1wnexcn01.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.1830); Mon, 15 Oct 2007 09:58:46 -0700 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C80F4C.A6168FE2" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP Algorithm Agility Date: Mon, 15 Oct 2007 09:58:45 -0700 Message-ID: <2788466ED3E31C418E9ACC5C31661557084EC0@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP Algorithm Agility Thread-Index: Acf8l4NIxZexIh9rTveKgrEJmUDxVQAAJZEAAlba1eAAAH/7QAEC+OtgACFXyuAABd3wIAAA1HmAADQyQqAAIEoZEADVkoxj References: <82D5657AE1F54347A734BDD33637C879096C9ABE@EXVS01.ex.dslextreme.net> <2788466ED3E31C418E9ACC5C31661557053771@mou1wnexmb09.vcorp.ad.vrsn.com> <82D5657AE1F54347A734BDD33637C879096CA5E3@EXVS01.ex.dslextreme.net> From: "Hallam-Baker, Phillip" To: "Stefan Santesson" , "Seth Hitchings" , "Santosh Chokhani" , X-OriginalArrivalTime: 15 Oct 2007 16:58:46.0928 (UTC) FILETIME=[A6BB4100:01C80F4C] Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 1.8 (+) X-Scan-Signature: c54bc2f42d02429833c0ca4b8725abd7 This is a multi-part message in MIME format. ------_=_NextPart_001_01C80F4C.A6168FE2 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable From: owner-ietf-pkix@mail.imc.org on behalf of Stefan Santesson >Security: >None of the presented threats is not a great concern for me.=20 >Downgrade attacks is only useful if we use algorithms that can be = broken. >I would expect an organization to only allow algorithms that provide = adequate security. >The stolen OCSP key is neither a problem for me from a protocol = perspective. We have revocation. Agreed, the issue here is not security, it is interoperability.=20 >Practical matters: >I can only find one practical matter that concerns me. I have an OCSP = server and of=20 >some reason I want to gradually transition responses to be based on say = ECC with=20 >SHA 256. Some clients can only verify RSA with SHA-1. The reason for = doing this=20 >transition may be entirely policy oriented. Now I would like to know = which clients=20 >that can actually verify my upgraded responses. That is the concern that led to the proposal.=20 =20 The assumption that the OCSP client supports the same set of algorithms = as the=20 certificate relying application does not hold=20 =20 >What can I do today: >The server can draw a number of conclusions today. >1) Looking at the hashAlgorithm of the CertID >2) Looking at the signatureAlgorithm used by the client to sign the = response >3) Looking at the certificate actually being validated >None of these are 100% bulletproof to cover all corner cases. But are = they=20 >good enough and is the remaining gap big enough to motivate a protocol = update? =20 As a design principle I prefer a protocol where the client can specify what it wants over one where the only option is for the server to guess. =20 I find that approach is much more likely to lead to reliable = interoperation. =20 =20 The solution proposed is 100% backwards compatible, the old approach = being: 1 Server guesses what algorithms the client supports =20 The new approach is: 1 Server looks to see if the client specified what algorithms are = supported by the client 2 If none specified server guesses what algorithms the client supports = as before If either the client or the server does not support the proposed = extension=20 the other party simply downgrades to the status quo. =20 =20 ------_=_NextPart_001_01C80F4C.A6168FE2 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable RE: OCSP Algorithm Agility=0A= =0A= =0A= =0A=
=0A=
From: = owner-ietf-pkix@mail.imc.org on behalf of Stefan = Santesson
=0A=
>Security:
>None of the presented = threats is not a great concern for me.
=0A=
>Downgrade attacks is only useful if we = use algorithms that can be broken.
>I would expect an organization = to only allow algorithms that provide adequate security.
=0A=
>The stolen OCSP key is neither a = problem for me from a protocol perspective. We have = revocation.
=0A=
Agreed, the issue here is not security, it = is interoperability.
=0A=
=0A=


>Practical matters:
>I can only find one = practical matter that concerns me. I have an OCSP server and of
=0A=
>some reason I want to gradually transition responses = to be based on say ECC with
=0A=
>SHA 256. Some clients can only verify RSA with SHA-1. = The reason for doing this
=0A=
>transition may be entirely policy oriented. Now I = would like to know which clients
=0A=
>that can actually verify my upgraded = responses.
=0A=
That is the concern that led to the proposal.
=0A=
 
=0A=
The assumption that the OCSP client supports the same set = of algorithms as the
=0A=
certificate relying application does not hold
=0A=
 
=0A=

>What can I do today:
>The server can draw a = number of conclusions today.

>1) Looking at the hashAlgorithm = of the CertID
>2) Looking at the signatureAlgorithm used by the = client to sign the response
>3) Looking at the certificate = actually being validated

>None of these are 100% bulletproof = to cover all corner cases. But are they
=0A=
>good enough and is the remaining gap big enough to = motivate a protocol update?
=0A=
 
=0A=
As a design principle I prefer a protocol where the = client can specify
=0A=
what it wants over one where the only option is for the = server to guess.
=0A=
 
=0A=
I find that approach is much more likely to lead to = reliable interoperation.
=0A=
 
=0A=
 
=0A=
The solution proposed is 100% backwards compatible, the = old approach being:
=0A=
1 Server guesses what algorithms the client supports
=0A=
 
=0A=
The new approach is:
=0A=
1 Server looks to see if the client specified what = algorithms are supported by the client
=0A=
2 If none specified server guesses what algorithms the = client supports as before
=0A=
If either the client or the server does not support the = proposed extension
=0A=
the other party simply downgrades to the status quo.
=0A=
 
=0A=
 
------_=_NextPart_001_01C80F4C.A6168FE2-- From owner-ietf-pkix@mail.imc.org Mon Oct 15 14:19:54 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IhUXh-0006vS-Qn for pkix-archive@lists.ietf.org; Mon, 15 Oct 2007 14:19:53 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IhUXX-00057O-Ga for pkix-archive@lists.ietf.org; Mon, 15 Oct 2007 14:19:44 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9FHKd4n009266 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 15 Oct 2007 10:20:39 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9FHKdcM009263; Mon, 15 Oct 2007 10:20:39 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mx5.kent.ac.uk (mx5.kent.ac.uk [129.12.21.36]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9FHKYAR009225 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 15 Oct 2007 10:20:36 -0700 (MST) (envelope-from d.w.chadwick@kent.ac.uk) Received: from vpnd016.kent.ac.uk ([129.12.208.22]) by mx5.kent.ac.uk with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.62) (envelope-from ) id 1IhTbv-0001HO-1V; Mon, 15 Oct 2007 18:20:11 +0100 Message-ID: <4713A14B.5040906@kent.ac.uk> Date: Mon, 15 Oct 2007 18:20:11 +0100 From: David Chadwick Organization: University of Kent User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: "Kemp, David P." CC: Paul Hoffman , ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> <470C1C32.70603@eb2bcom.com> <470C1FA3.40000@eb2bcom.com> <470EC778.500@eb2bcom.com> In-Reply-To: Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit X-UKC-Mail-System: No virus detected X-UKC-SpamCheck: X-UKC-MailScanner-From: d.w.chadwick@kent.ac.uk Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: c83ccb5cc10e751496398f1233ca9c3a Hi David It is written at the start of Annex C of X.521, as copied below > Annex C > > Upper bounds > (This annex does not form an integral part of this Recommendation | International Standard) > This annex includes all of the suggested upper bound value constraints used in these Directory Specifications, in the form of the ASN.1 module UpperBounds. > > UpperBounds {joint-iso-itu-t ds(5) module(1) upperBounds(10) 5} > DEFINITIONS ::= > BEGIN regards David Kemp, David P. wrote: >> Paul Hoffman wrote: > >> It has been established on this list that the upper bounds in X.500 >> have been non-normative since the second edition. > > You said that in an earlier message. Could you point us to a specific > section of a specific version of X.500 where that is true? Most of us > are not X.500 users. > > > ---------- 1993 --------- > http://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-X.520-199311-S!!P > DF-E&type=items > > ISO/IEC 9594-6 : 1995 (E) > 22 ITU-T Rec. X.520 (1993 E) Superseded by a more recent version > Annex A > Selected attribute types in ASN.1 > (This annex forms an integral part of this Recommendation | > International Standard) > This annex includes all of the ASN.1 type and value definitions > contained in this Directory Specification in the form of > the ASN.1 module SelectedAttributeTypes. > > > ---------- 1997 --------- > http://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-X.520-199708-S!!P > DF-E&type=items > > ISO/IEC 9594-6 : 1998 (E) > ITU-T Rec. X.520 (1997 E) 41 > Annex C > Upper bounds > (This annex does not form an integral part of this Recommendation | > International Standard) > This annex includes all of the suggested upper bound value constraints > used in these Directory Specifications, in the form > of the ASN.1 module UpperBounds. > > ---------- 2001 --------- > http://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-X.520-200102-I!!P > DF-E&type=items > > ISO/IEC 9594-6:2001 (E) > ITU-T X.520 (02/2001 E) 61 > Annex C > Upper bounds > (This annex does not form an integral part of this Recommendation | > International Standard) > This annex includes all of the suggested upper bound value constraints > used in these Directory Specifications, in the > form of the ASN.1 module UpperBounds. > > ---------- 2005 --------- > http://www.itu.int/rec/T-REC-X.520-200508-I/dologin.asp?lang=e&id=T-REC- > X.520-200508-I!!PDF-E&type=items > > ISO/IEC 9594-6:2005 (E) > 60 ITU-T Rec. X.520 (08/2005) > Annex C > Upper bounds > (This annex does not form an integral part of this Recommendation | > International Standard) > This annex includes all of the suggested upper bound value constraints > used in these Directory Specifications, in the form > of the ASN.1 module UpperBounds. > > > -- ***************************************************************** David W. Chadwick, BSc PhD Professor of Information Systems Security The Computing Laboratory, University of Kent, Canterbury, CT2 7NF Skype Name: davidwchadwick Tel: +44 1227 82 3221 Fax +44 1227 762 811 Mobile: +44 77 96 44 7184 Email: D.W.Chadwick@kent.ac.uk Home Page: http://www.cs.kent.ac.uk/people/staff/dwc8/index.html Research Web site: http://www.cs.kent.ac.uk/research/groups/iss/index.html Entrust key validation string: MLJ9-DU5T-HV8J PGP Key ID is 0xBC238DE5 ***************************************************************** From owner-ietf-pkix@mail.imc.org Mon Oct 15 14:45:15 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IhUwF-0007mt-SF for pkix-archive@lists.ietf.org; Mon, 15 Oct 2007 14:45:15 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IhUw2-0006Qg-Uf for pkix-archive@lists.ietf.org; Mon, 15 Oct 2007 14:45:07 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9FHfg1a013679 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 15 Oct 2007 10:41:42 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9FHfg4t013677; Mon, 15 Oct 2007 10:41:42 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from [10.1.0.77] (dsl-63-249-108-169.cruzio.com [63.249.108.169]) (authenticated bits=0) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9FHfZku013650 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 15 Oct 2007 10:41:37 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: <4713A14B.5040906@kent.ac.uk> References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> <470C1C32.70603@eb2bcom.com> <470C1FA3.40000@eb2bcom.com> <470EC778.500@eb2bcom.com> <4713A14B.5040906@kent.ac.uk> Date: Mon, 15 Oct 2007 10:41:31 -0700 To: David Chadwick From: Paul Hoffman Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Cc: ietf-pkix@imc.org Content-Type: text/plain; charset="us-ascii" ; format="flowed" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 93238566e09e6e262849b4f805833007 At 6:20 PM +0100 10/15/07, David Chadwick wrote: >It is written at the start of Annex C of X.521, as copied below > >>Annex C >> >>Upper bounds >>(This annex does not form an integral part of this Recommendation | >>International Standard) >>This annex includes all of the suggested upper bound value >>constraints used in these Directory Specifications, in the form of >>the ASN.1 module UpperBounds. >> >>UpperBounds {joint-iso-itu-t ds(5) module(1) upperBounds(10) 5} >>DEFINITIONS ::= >>BEGIN Could you show the whole Annex? That is, could we see all the upper bounds listed? Or, is there just a blank line and "END"? :-) --Paul Hoffman, Director --VPN Consortium From owner-ietf-pkix@mail.imc.org Mon Oct 15 15:55:11 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IhW1v-00068f-1B for pkix-archive@lists.ietf.org; Mon, 15 Oct 2007 15:55:11 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IhW1g-0001Uj-2F for pkix-archive@lists.ietf.org; Mon, 15 Oct 2007 15:55:02 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9FJB5iW022810 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 15 Oct 2007 12:11:05 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9FJB5GS022809; Mon, 15 Oct 2007 12:11:05 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.nist.gov (rimp1.nist.gov [129.6.16.226]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9FJAx1c022782 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 15 Oct 2007 12:11:04 -0700 (MST) (envelope-from david.cooper@nist.gov) Received: from postmark.nist.gov (emailha1.nist.gov [129.6.16.196]) by smtp.nist.gov (8.13.1/8.13.1) with ESMTP id l9FJAoDC000413 for ; Mon, 15 Oct 2007 15:10:51 -0400 Received: from st26.ncsl.nist.gov (st26.ncsl.nist.gov [129.6.54.72]) by postmark.nist.gov (8.13.1/8.13.1) with ESMTP id l9FJAGIp027830 for ; Mon, 15 Oct 2007 15:10:17 -0400 Message-ID: <4713BB5A.6000801@nist.gov> Date: Mon, 15 Oct 2007 15:11:22 -0400 From: "David A. Cooper" User-Agent: Thunderbird 2.0.0.4 (X11/20070620) MIME-Version: 1.0 To: pkix Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> <470C1C32.70603@eb2bcom.com> <470C1FA3.40000@eb2bcom.com> <470EC778.500@eb2bcom.com> <4713A14B.5040906@kent.ac.uk> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-NIST-MailScanner-Information: X-NIST-MailScanner: Found to be clean X-NIST-MailScanner-From: david.cooper@nist.gov Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: e1e48a527f609d1be2bc8d8a70eb76cb Paul, Here is a web site that contains the ASN.1 modules for "X-Series Recommendations": http://www.itu.int/ITU-T/asn1/database/itu-t/x It appears that the upper bounds module, which appears in X.520, has changed with each edition. At least, the web site indicates that the OID for the module has changed from the 1997 edition to the 2001 edition, and again with the publication of the 2005 edition. I didn't attempt to compare the modules to see how they changed. Dave Paul Hoffman wrote: > > At 6:20 PM +0100 10/15/07, David Chadwick wrote: >> It is written at the start of Annex C of X.521, as copied below >> >>> Annex C >>> >>> Upper bounds >>> (This annex does not form an integral part of this Recommendation | >>> International Standard) >>> This annex includes all of the suggested upper bound value >>> constraints used in these Directory Specifications, in the form of >>> the ASN.1 module UpperBounds. >>> >>> UpperBounds {joint-iso-itu-t ds(5) module(1) upperBounds(10) 5} >>> DEFINITIONS ::= >>> BEGIN > > Could you show the whole Annex? That is, could we see all the upper > bounds listed? Or, is there just a blank line and "END"? :-) > > > --Paul Hoffman, Director > --VPN Consortium > > From owner-ietf-pkix@mail.imc.org Mon Oct 15 16:02:56 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IhW9Q-0005r5-Df for pkix-archive@lists.ietf.org; Mon, 15 Oct 2007 16:02:56 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IhW9F-0001q6-3C for pkix-archive@lists.ietf.org; Mon, 15 Oct 2007 16:02:46 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9FJNkx7023798 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 15 Oct 2007 12:23:46 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9FJNkYC023797; Mon, 15 Oct 2007 12:23:46 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from stingray.missi.ncsc.mil (stingray.missi.ncsc.mil [144.51.50.20]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9FJNk0Y023789 for ; Mon, 15 Oct 2007 12:23:46 -0700 (MST) (envelope-from DPKemp@missi.ncsc.mil) Received: from Cerberus.missi.ncsc.mil (cerberus.missi.ncsc.mil [144.51.51.8]) by stingray.missi.ncsc.mil with SMTP id l9FJNj7h014310 for ; Mon, 15 Oct 2007 15:23:45 -0400 (EDT) Received: from 144.51.60.33 by Cerberus.missi.ncsc.mil (InterScan VirusWall 6); Mon, 15 Oct 2007 15:23:45 -0400 Received: from EXCH.missi.ncsc.mil ([144.51.60.19]) by antigone.missi.ncsc.mil with Microsoft SMTPSVC(6.0.3790.3959); Mon, 15 Oct 2007 15:23:44 -0400 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Date: Mon, 15 Oct 2007 15:23:43 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Thread-Index: AcgPW9kueagIqlb3Tb+0CqWCK8inPwAAB6iA References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> <470C1C32.70603@eb2bcom.com> <470C1FA3.40000@eb2bcom.com> <470EC778.500@eb2bcom.com> <4713A14B.5040906@kent.ac.uk> From: "Kemp, David P." To: X-OriginalArrivalTime: 15 Oct 2007 19:23:44.0896 (UTC) FILETIME=[E71FD800:01C80F60] X-TM-AS-Product-Ver: : ISVW-6.0.0.1396-3.6.0.1039-15480001 X-TM-AS-Result: : Yes--18.257100-0-31-1 X-TM-AS-Category-Info: : 31:0.000000 X-TM-AS-MatchedID: : =?us-ascii?B?MTUwNTY3LTcwNzM3My03MDAy?= =?us-ascii?B?NzItNzAxOTI4LTcwNDE0MS03MDE1NzYtNzA1NTE4LTcwNjgxNy03?= =?us-ascii?B?MDA5NzEtNzAxODE0LTcwODIxNy03MDE2MjYtNzAzODM1LTcwMzUx?= =?us-ascii?B?Ny03MDU5MDEtMTA1MjcwLTcwMDkxOC03MDg3NTItMTM5NzAzLTcw?= =?us-ascii?B?ODE5Ni03MDAzNDItNzAwMTQyLTEzOTAwNi03MDQyODctNzAzODI5?= =?us-ascii?B?LTcwMjY0NS03MDA0NzMtNzAxMTc1LTcwNDQyNS03MDA2MDQtNzAw?= =?us-ascii?B?MDc1LTEzOTAxMC03MDA4NDYtNzA2NTYxLTEzOTUwNC03MDE0NTUt?= =?us-ascii?B?NzA5NTg0LTcwNTI2OS03MDUzMDMtNzAwMzcwLTE0ODAzOS0xNDgw?= =?us-ascii?B?NTAtMjAwNDI=?= Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l9FJNk0Y023792 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 02ec665d00de228c50c93ed6b5e4fc1a The links provided will retrieve a PDF copy of the full text of X.520 (1993, 1997, 2001, or 2005 edition). Unfortunately, some MUAs cannot grok URLs that span more than 1 line, so instead of clicking on them they must be copied and pasted manually into a browser address bar. After entering the URL and retrieving the PDF file, (which due to web-server-specific brain damage may also need to be renamed from "xxx.pdf.asp" to "xxx.pdf"), scroll down to Annex C to view the entire set of upper bounds. One would think that after nearly 14 years the web would have achieved point-and-click usability, but apparently not. (Note that the upper bounds module is included in X.520, not X.521). ---------- X.520 2005 --------- http://www.itu.int/rec/T-REC-X.520-200508-I/dologin.asp?lang=e&id=T-REC- X.520-200508-I!!PDF-E&type=items ---------- X.521 2005 --------- http://www.itu.int/rec/T-REC-X.521-200508-I/dologin.asp?lang=e&id=T-REC- X.521-200508-I!!PDF-E&type=items -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Paul Hoffman Sent: Monday, October 15, 2007 1:42 PM To: David Chadwick Cc: ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" At 6:20 PM +0100 10/15/07, David Chadwick wrote: >It is written at the start of Annex C of X.521, as copied below > >>Annex C >> >>Upper bounds >>(This annex does not form an integral part of this Recommendation | >>International Standard) >>This annex includes all of the suggested upper bound value >>constraints used in these Directory Specifications, in the form of >>the ASN.1 module UpperBounds. >> >>UpperBounds {joint-iso-itu-t ds(5) module(1) upperBounds(10) 5} >>DEFINITIONS ::= >>BEGIN Could you show the whole Annex? That is, could we see all the upper bounds listed? Or, is there just a blank line and "END"? :-) --Paul Hoffman, Director --VPN Consortium From shayleenkeim@drecway.com Mon Oct 15 16:24:01 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IhWTp-0007rg-9b for pkix-archive@lists.ietf.org; Mon, 15 Oct 2007 16:24:01 -0400 Received: from catv-5984457b.catv.broadband.hu ([89.132.69.123]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IhWTa-0002Wn-EG for pkix-archive@lists.ietf.org; Mon, 15 Oct 2007 16:23:52 -0400 Received: from user-bacc96b6a7 ([191.185.186.140] helo=user-bacc96b6a7) by catv-5984457b.catv.broadband.hu ( sendmail 8.13.3/8.13.1) with esmtpa id 1RipdC-000NLR-nQ for pkix-archive@lists.ietf.org; Mon, 15 Oct 2007 22:23:37 +0200 Message-ID: <000201c80f69$2f97f650$7b458459@userbacc96b6a7> From: "shayleen keim" To: Subject: ihiesnis Date: Mon, 15 Oct 2007 22:23:02 +0200 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0005_01C80F79.F320C650" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 X-Spam-Score: 1.9 (+) X-Scan-Signature: b19722fc8d3865b147c75ae2495625f2 ------=_NextPart_000_0005_01C80F79.F320C650 Content-Type: text/plain; charset="windows-1250" Content-Transfer-Encoding: quoted-printable hello beautiful pkix-archive be the playboy you have always wanted to be and have all the ladies http://giroufse.com/ shayleen keim ------=_NextPart_000_0005_01C80F79.F320C650 Content-Type: text/html; charset="windows-1250" Content-Transfer-Encoding: quoted-printable
hello beautiful pkix-archive
be the playboy you have always wanted to be = and have all=20 the ladies
http://giroufse.com/
shayleen keim
------=_NextPart_000_0005_01C80F79.F320C650-- From owner-ietf-pkix@mail.imc.org Tue Oct 16 00:31:31 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ihe5b-0007BM-45 for pkix-archive@lists.ietf.org; Tue, 16 Oct 2007 00:31:31 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Ihe5O-00027M-Bm for pkix-archive@lists.ietf.org; Tue, 16 Oct 2007 00:31:25 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9G3a65K061130 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 15 Oct 2007 20:36:06 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9G3a6Xv061129; Mon, 15 Oct 2007 20:36:06 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from robin.verisign.com (robin.verisign.com [65.205.251.75]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9G3a24v061116 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Mon, 15 Oct 2007 20:36:05 -0700 (MST) (envelope-from pbaker@verisign.com) Received: from mou1wnexcn01.vcorp.ad.vrsn.com (mailer1.verisign.com [65.205.251.34]) by robin.verisign.com (8.12.11/8.13.4) with ESMTP id l9G3WvVE032106; Mon, 15 Oct 2007 20:32:57 -0700 Received: from MOU1WNEXMB09.vcorp.ad.vrsn.com ([10.25.15.197]) by mou1wnexcn01.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.1830); Mon, 15 Oct 2007 20:35:50 -0700 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C80FA5.A59CF9BC" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP Algorithm Agility Date: Mon, 15 Oct 2007 20:35:50 -0700 Message-ID: <2788466ED3E31C418E9ACC5C31661557084EC5@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP Algorithm Agility Thread-Index: Acf8l4NIxZexIh9rTveKgrEJmUDxVQAAJZEAAlba1eAAAH/7QAEC+OtgACFXyuAABd3wIAAA1HmAADQyQqABDKGdvQ== References: <82D5657AE1F54347A734BDD33637C879096C9ABE@EXVS01.ex.dslextreme.net> <2788466ED3E31C418E9ACC5C31661557053771@mou1wnexmb09.vcorp.ad.vrsn.com> <82D5657AE1F54347A734BDD33637C879096CA5E3@EXVS01.ex.dslextreme.net> From: "Hallam-Baker, Phillip" To: "Seth Hitchings" , "Santosh Chokhani" , X-OriginalArrivalTime: 16 Oct 2007 03:35:50.0984 (UTC) FILETIME=[A60B5480:01C80FA5] Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: a2c4a3535d1556ada67f8703d3d31591 This is a multi-part message in MIME format. ------_=_NextPart_001_01C80FA5.A59CF9BC Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Whether a server could make a sensible choice is beside the point. =20 For a specification to provide an interoperable standard we must have a = definitive statement. Otherwise interoperability ends up depending on = heuristics and undocumented assumptions. =20 Unless I missed the section in the RFC that describes the algorithm = agility strategy it seems to me we must either: =20 1) Document the server algorithm selection as proposed by Santosh 2) Doucment the server algorithm selection as proposed by Santosh with = an optional extension to allow the client to specify the choices it = supports. =20 Either way we need a draft if we are going to meet the algorithm agility = requirement. ________________________________ From: owner-ietf-pkix@mail.imc.org on behalf of Seth Hitchings Sent: Wed 10/10/2007 3:25 PM To: Santosh Chokhani; Hallam-Baker, Phillip; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility I'm generally in favor of simpler approaches, such as those suggested by Santosh, as they favor interoperability. Updating deployed applications = to understand new elements of the protocol could take just as long to roll = out as the new algorithm support that's purportedly lacking. I can see a situation in which the CA cannot assume that the entire user population understands a new algorithm such as SHA-256, and thus has to continue using SHA-1 with RSA when signing certificates. Individual = clients that do understand SHA-256 may wish to receive OCSP responses signed = using SHA-256 with RSA, and would need a way to signal their desires to the = OCSP responder. The question is, then, is there any security benefit to having the = signature algorithm on the OCSP response stronger than the signature algorithm on = the certificate? If you can break the algorithm and cause me to accept a contrived OCSP response, could you not do the same thing with a = certificate? Seth -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] = On Behalf Of Santosh Chokhani Sent: Wednesday, October 10, 2007 2:28 PM To: Hallam-Baker, Phillip; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility See responses in-line below. -----Original Message----- From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com] Sent: Tuesday, October 09, 2007 2:07 PM To: Santosh Chokhani; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility Not if they don't know that the client can understand them they can't. [Santosh Chokhani] The Responder has two ways to know what the client understands. From certID or from CA. If the client does not understand the algorithm used in certificate signing, revocation information is useless. And the issue is not just hashing algorithms, it is signature algorithms. Like your previous posts you continue to assume that cipher strength is a linear quantity with only one dimension and that any client which supports strength 2X must automatically support strength X. [Santosh Chokhani] I am making no such assumptions. I am saying that if an algorithm is good enough for a certificate, it is good enough for revocation notification for that certificate. That is not the case if you consider the practicalities of deploying ECC in an RSA world. To give a practical example, VeriSign issues a cert for an ECC key signed with an ECC key. The email program on Alice's machine in the DHS supports ECC but not the DHS SCVP server or OCSP relay. [Santosh Chokhani] And what is the problem with that? They have no choice but to use RSA. In the real world the OCSP service does not have a necessary connection to the CA. There are plenty of commercial OCSP offerings that report on certificates issued by other CAs. [Santosh Chokhani] And how does this relate to algorithm agility? If the OCSP does not do ECDSA it won't. If OCSP supports both RSA and ECDSA, it can take the cue from the CA CRL to determine what algorithm to use for signing OCSP responses. If the OCSP does not consume CRL, the mechanism that tells it revocation information can also tell it the signature algorithm to use. > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > Sent: Tuesday, October 09, 2007 11:16 AM > To: Hallam-Baker, Phillip; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > The OCSP and SCVP can transition to stronger algorithms any > time they want. > > The OCSP can take their clue from the CA or the certID field > to decide the hashing algorithm. When multiple certID is > present, OCSP can take low water mark of these. > > SCVP is no different than a client in terms of validating a > path. In terms of signing a response, it can take the low > water mark of the hashing algorithms in the certificate chain. > > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] > On Behalf Of Hallam-Baker, Phillip > Sent: Monday, October 08, 2007 7:27 PM > To: Santosh Chokhani; Andrews, Rick; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > The objective here is to overcome a real deployment obstacle > that creates a lockstep issue when use of stronger algorithms > is attempted. > > The CA cannot issue a certificate that employs a new > algorithm until it is known that all clients that might rely > on the certificate are capable of processing the new > certificate. Requiring lockstep updates to the OCSP and SCVP > infrastructure to be made at the same time renders transition > to stronger algorithms a much lengthier and much less > practical proposition. > > > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > > Sent: Saturday, October 06, 2007 4:12 PM > > To: Andrews, Rick; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > > > Rick, > > > > SCVP or other intermediaries are red herring. Whoever > processes the > > certificate processes the revocation information for that > certificate. > > It does not change the following: > > > > 1. There is no security benefit in using a stronger algorithm for > > OCSP > > response than for the certificate in question. Neither, > there is any > > benefit from interoperability viewpoint for these two to be > different. > > > > 2. If the OCSP Responder does not get a CRL, it can use the same > > mechanism to get the hashing algorithm used as it uses to get the > > revocation information. > > > > -----Original Message----- > > From: Andrews, Rick [mailto:RAndrews@verisign.com] > > Sent: Wednesday, October 03, 2007 3:29 PM > > To: Santosh Chokhani; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > Santosh, > > > > Sorry for the long delay in responding - travel and vacation. > >=20 > > Not all OCSP responders work from CRLs, so they won't take > their cue > > from the CRL. Nor should they take their cue from the > signature on the > > cert in question, I believe. Let me try to restate my argument in a > > different way. > >=20 > > With SCVP delegated path validation, the client requesting a cert's > > status from an OCSP responder will be different from the > client at the > > other end of the SSL connection. Those two clients may have very > > different capabilities in terms of supported signature and hash > > algorithms. It's not realistic to expect that all SSL clients, all > > SCVP servers, and all CAs will be able to upgrade in > lockstep to new > > algorithms as they are developed. Allowing the OCSP client > and server > > to negotiate a mutually-acceptable set of algorithms is > essential to > > the deployment of newer, stronger algorithms. > >=20 > > Likewise, companies that run large OCSP responders may wish to > > gradually move to ECC-based signatures for all their OCSP > responses, > > even those for certs with RSA or DSA keys, because ECC > signatures are > > cheaper to produce. If algorithm agility is added to OCSP, those > > companies can gradually achieve the move to ECC without > disrupting the > > installed base of OCSP clients that don't support ECC. > >=20 > > -Rick Andrews > > > > > -----Original Message----- > > > From: owner-ietf-pkix@mail.imc.org > > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > Santosh Chokhani > > > Sent: Friday, September 21, 2007 2:45 PM > > > To: Paul Hoffman; Stephen Kent; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > Paul, > > > > > > Here are my views on this. > > > > > > The client should be first asking for the algorithm suite > > that signed > > > the certificate in question. There is no need for the > > client to ask > > > for anything stronger. The client can ask for stronger suites as > > > secondary, if client has them. > > > > > > In the scenario you cite, the Responder certificate will > > not include > > > RSA with SHA 1 any longer. So, client will know that > > Responder only > > > supported his second choice and he should be ok with it. > > > > > > -----Original Message----- > > > From: owner-ietf-pkix@mail.imc.org > > > [mailto:owner-ietf-pkix@mail.imc.org] > > > On Behalf Of Paul Hoffman > > > Sent: Friday, September 21, 2007 4:39 PM > > > To: Stephen Kent; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > At 2:07 PM -0400 9/21/07, Stephen Kent wrote: > > > >How about defining an extension to be included in the cert > > > issued to an > > > >OCSP responder by a CA. The extension would have an > > ordered list of > > > >algorithms (hash and signature if we want to address more > > > than the hash > > > >agility issue) accepted by the OCSP responder. An OCSP > > > client can use > > > >this info to determine what is the "best" algorithm (or alg > > > pair) that > > > >it and the responder share. The combination of this > > extension and an > > > >OCSP negotiation procedure will allow the client to detect MITM > > > >downgrade attacks. In fact, if the client acquires the > > > responder's cert > > > >prior to making a request, there would not even be a > need for real > > > >negotiation, since the client would know what alg to > request in a > > > >response. > > > > > > Imagine the list of algorithms is RSA-with-SHA1 first and > > > DSA-with-SHA1 second. How does your negotiation work? The > > client asks > > > for this message to be signed with RSA-with-SHA1. > > > But the server knows that RSA-with-SHA1 has been > > compromised since it > > > got that certificate from the CA. What does the server say to the > > > client to indicate that it only wants to sign with > > DSA-with-SHA1? What > > > prevents Mallory from saying the same thing to the client? > > > > > > --Paul Hoffman, Director > > > --VPN Consortium > > > > > > > > > > > > > > > > ------_=_NextPart_001_01C80FA5.A59CF9BC Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable RE: OCSP Algorithm Agility=0A= =0A= =0A= =0A=
=0A=
Whether a = server could make a sensible choice is beside the point.
=0A=
 
=0A=
For a specification to = provide an interoperable standard we must have a definitive statement. = Otherwise interoperability ends up depending on heuristics and = undocumented assumptions.
=0A=
 
=0A=
Unless I missed the section = in the RFC that describes the algorithm agility strategy it seems to me = we must either:
=0A=
 
=0A=
1) Document the server algorithm selection as = proposed by Santosh
=0A=
2) Doucment the server algorithm selection as = proposed by Santosh with an optional extension to allow the client to = specify the choices it supports.
=0A=
 
=0A=
Either way we need a draft if we are going to meet the = algorithm agility requirement.
=0A=

=0A=
=0A= From: owner-ietf-pkix@mail.imc.org = on behalf of Seth Hitchings
Sent: Wed 10/10/2007 3:25 = PM
To: Santosh Chokhani; Hallam-Baker, Phillip; = ietf-pkix@imc.org
Subject: RE: OCSP Algorithm = Agility

=0A=
=0A=

I'm generally in favor of simpler approaches, such as = those suggested by
Santosh, as they favor interoperability. Updating = deployed applications to
understand new elements of the protocol = could take just as long to roll out
as the new algorithm support = that's purportedly lacking.

I can see a situation in which the CA = cannot assume that the entire user
population understands a new = algorithm such as SHA-256, and thus has to
continue using SHA-1 with = RSA when signing certificates. Individual clients
that do understand = SHA-256 may wish to receive OCSP responses signed using
SHA-256 with = RSA, and would need a way to signal their desires to the = OCSP
responder.

The question is, then, is there any security = benefit to having the signature
algorithm on the OCSP response = stronger than the signature algorithm on the
certificate? If you can = break the algorithm and cause me to accept a
contrived OCSP response, = could you not do the same thing with a = certificate?

Seth

-----Original Message-----
From: = owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.= imc.org] On
Behalf Of Santosh Chokhani
Sent: Wednesday, = October 10, 2007 2:28 PM
To: Hallam-Baker, Phillip; = ietf-pkix@imc.org
Subject: RE: OCSP Algorithm Agility


See = responses in-line below.

-----Original Message-----
From: = Hallam-Baker, Phillip [mailto:pbaker@verisign.com]
Se= nt: Tuesday, October 09, 2007 2:07 PM
To: Santosh Chokhani; = ietf-pkix@imc.org
Subject: RE: OCSP Algorithm Agility

Not if = they don't know that the client can understand them they = can't.
[Santosh Chokhani] The Responder has two ways to know what the = client
understands.  From certID or from CA.  If the client = does not understand
the algorithm used in certificate signing, = revocation information is
useless.

And the issue is not just = hashing algorithms, it is signature
algorithms.
Like your previous = posts you continue to assume that cipher strength is
a linear = quantity with only one dimension and that any client which
supports = strength 2X must automatically support strength X.
[Santosh Chokhani] = I am making no such assumptions.  I am saying that if
an = algorithm is good enough for a certificate, it is good enough = for
revocation notification for that certificate.

That is not = the case if you consider the practicalities of deploying ECC
in an = RSA world.

To give a practical example, VeriSign issues a cert = for an ECC key
signed with an ECC key. The email program on Alice's = machine in the DHS
supports ECC but not the DHS SCVP server or OCSP = relay.
[Santosh Chokhani] And what is the problem with that?  = They have no
choice but to use RSA.

In the real world the OCSP = service does not have a necessary connection
to the CA. There are = plenty of commercial OCSP offerings that report on
certificates = issued by other CAs.
[Santosh Chokhani] And how does this relate to = algorithm agility?  If
the OCSP does not do ECDSA it = won't.  If OCSP supports both RSA and
ECDSA, it can take the cue = from the CA CRL to determine what algorithm
to use for signing OCSP = responses.  If the OCSP does not consume CRL,
the mechanism that = tells it revocation information can also tell it the
signature = algorithm to use.

> -----Original Message-----
> From: = owner-ietf-pkix@mail.imc.org
> [mailto:owner-ietf-pkix@mail.= imc.org] On Behalf Of Santosh Chokhani
> Sent: Tuesday, = October 09, 2007 11:16 AM
> To: Hallam-Baker, Phillip; = ietf-pkix@imc.org
> Subject: RE: OCSP Algorithm = Agility
>
>
> The OCSP and SCVP can transition to = stronger algorithms any
> time they want.
>
> The OCSP = can take their clue from the CA or the certID field
> to decide = the hashing algorithm.  When multiple certID is
> present, = OCSP can take low water mark of these.
>
> SCVP is no = different than a client in terms of validating a
> path.  In = terms of signing a response, it can take the low
> water mark of = the hashing algorithms in the certificate chain.
>
> = -----Original Message-----
> From: = owner-ietf-pkix@mail.imc.org
> [mailto:owner-ietf-pkix@mail.= imc.org]
> On Behalf Of Hallam-Baker, Phillip
> Sent: = Monday, October 08, 2007 7:27 PM
> To: Santosh Chokhani; Andrews, = Rick; ietf-pkix@imc.org
> Subject: RE: OCSP Algorithm = Agility
>
>
> The objective here is to overcome a real = deployment obstacle
> that creates a lockstep issue when use of = stronger algorithms
> is attempted.
>
> The CA cannot = issue a certificate that employs a new
> algorithm until it is = known that all clients that might rely
> on the certificate are = capable of processing the new
> certificate. Requiring lockstep = updates to the OCSP and SCVP
> infrastructure to be made at the = same time renders transition
> to stronger algorithms a much = lengthier and much less
> practical = proposition.
>
>
> > -----Original = Message-----
> > From: owner-ietf-pkix@mail.imc.org
> = > [mailto:owner-ietf-pkix@mail.= imc.org] On Behalf Of Santosh Chokhani
> > Sent: Saturday, = October 06, 2007 4:12 PM
> > To: Andrews, Rick; = ietf-pkix@imc.org
> > Subject: RE: OCSP Algorithm = Agility
> >
> >
> > Rick,
> = >
> > SCVP or other intermediaries are red herring.  = Whoever
> processes the
> > certificate processes the = revocation information for that
> certificate.
> > It = does not change the following:
> >
> > 1.  There = is no security benefit in using a stronger algorithm for
> > = OCSP
> > response than for the certificate in = question.   Neither,
> there is any
> > benefit = from interoperability viewpoint for these two to be
> = different.
> >
> > 2.  If the OCSP Responder does = not get a CRL, it can use the same
> > mechanism to get the = hashing algorithm used as it uses to get the
> > revocation = information.
> >
> > -----Original = Message-----
> > From: Andrews, Rick [mailto:RAndrews@verisign.com]> > Sent: Wednesday, October 03, 2007 3:29 PM
> > To: = Santosh Chokhani; ietf-pkix@imc.org
> > Subject: RE: OCSP = Algorithm Agility
> >
> > Santosh,
> = >
> > Sorry for the long delay in responding - travel and = vacation.
> > 
> > Not all OCSP responders work = from CRLs, so they won't take
> their cue
> > from the = CRL. Nor should they take their cue from the
> signature on = the
> > cert in question, I believe. Let me try to restate my = argument in a
> > different way.
> > 
> = > With SCVP delegated path validation, the client requesting a = cert's
> > status from an OCSP responder will be different from = the
> client at the
> > other end of the SSL connection. = Those two clients may have very
> > different capabilities in = terms of supported signature and hash
> > algorithms. It's not = realistic to expect that all SSL clients, all
> > SCVP servers, = and all CAs will be able to upgrade in
> lockstep to new
> = > algorithms as they are developed. Allowing the OCSP client
> = and server
> > to negotiate a mutually-acceptable set of = algorithms is
> essential to
> > the deployment of newer, = stronger algorithms.
> > 
> > Likewise, companies = that run large OCSP responders may wish to
> > gradually move = to ECC-based signatures for all their OCSP
> responses,
> = > even those for certs with RSA or DSA keys, because ECC
> = signatures are
> > cheaper to produce. If algorithm agility is = added to OCSP, those
> > companies can gradually achieve the = move to ECC without
> disrupting the
> > installed base = of OCSP clients that don't support ECC.
> > 
> > = -Rick Andrews
> >
> > > -----Original = Message-----
> > > From: = owner-ietf-pkix@mail.imc.org
> > > [mailto:owner-ietf-pkix@mail.= imc.org] On Behalf Of
> Santosh Chokhani
> > > = Sent: Friday, September 21, 2007 2:45 PM
> > > To: Paul = Hoffman; Stephen Kent; ietf-pkix@imc.org
> > > Subject: RE: = OCSP Algorithm Agility
> > >
> > >
> > = > Paul,
> > >
> > > Here are my views on = this.
> > >
> > > The client should be first = asking for the algorithm suite
> > that signed
> > = > the certificate in question.  There is no need for the
> = > client to ask
> > > for anything stronger.  The = client can ask for stronger suites as
> > > secondary, if = client has them.
> > >
> > > In the scenario you = cite, the Responder certificate will
> > not include
> = > > RSA with SHA 1 any longer.  So, client will know = that
> > Responder only
> > > supported his second = choice and he should be ok with it.
> > >
> > > = -----Original Message-----
> > > From: = owner-ietf-pkix@mail.imc.org
> > > [mailto:owner-ietf-pkix@mail.= imc.org]
> > > On Behalf Of Paul Hoffman
> > = > Sent: Friday, September 21, 2007 4:39 PM
> > > To: = Stephen Kent; ietf-pkix@imc.org
> > > Subject: RE: OCSP = Algorithm Agility
> > >
> > >
> > > = At 2:07 PM -0400 9/21/07, Stephen Kent wrote:
> > > >How = about defining an extension to be included in the cert
> > > = issued to an
> > > >OCSP responder by a CA.  The = extension would have an
> > ordered list of
> > > = >algorithms (hash and signature if we want to address more
> = > > than the hash
> > > >agility issue) accepted by = the OCSP responder.  An OCSP
> > > client can = use
> > > >this info to determine what is the "best" = algorithm (or alg
> > > pair) that
> > > >it = and the responder share. The combination of this
> > extension = and an
> > > >OCSP negotiation procedure will allow the = client to detect MITM
> > > >downgrade attacks. In fact, = if the client acquires the
> > > responder's cert
> = > > >prior to making a request, there would not even be = a
> need for real
> > > >negotiation, since the = client would know what alg to
> request in a
> > > = >response.
> > >
> > > Imagine the list of = algorithms is RSA-with-SHA1 first and
> > > DSA-with-SHA1 = second. How does your negotiation work? The
> > client = asks
> > > for this message to be signed with = RSA-with-SHA1.
> > > But the server knows that RSA-with-SHA1 = has been
> > compromised since it
> > > got that = certificate from the CA. What does the server say to the
> > = > client to indicate that it only wants to sign with
> > = DSA-with-SHA1? What
> > > prevents Mallory from saying the = same thing to the client?
> > >
> > > --Paul = Hoffman, Director
> > > --VPN Consortium
> > = >
> > >
> > >
> >
> = >
>
>
>

------_=_NextPart_001_01C80FA5.A59CF9BC-- From Maddin@aceautomotive.net Tue Oct 16 15:07:18 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ihrl8-0000gQ-4R for pkix-archive@lists.ietf.org; Tue, 16 Oct 2007 15:07:18 -0400 Received: from host-62-10-152-239.cust-adsl.tiscali.it ([62.10.152.239] helo=host-62-10-150-47.cust-adsl.tiscali.it) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Ihrkz-0000sd-MQ for pkix-archive@lists.ietf.org; Tue, 16 Oct 2007 15:07:16 -0400 Received: from d99e70cc0c8d443 ([185.190.178.109] helo=d99e70cc0c8d443) by host-62-10-150-47.cust-adsl.tiscali.it ( sendmail 8.13.3/8.13.1) with esmtpa id 1oxRrr-000LDF-ZR for pkix-archive@lists.ietf.org; Tue, 16 Oct 2007 21:07:38 +0200 X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Tue, 16 Oct 2007 21:07:04 +0200 To: pkix-archive@lists.ietf.org From: "Maddin legend" Subject: j|rnvall Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed X-Spam-Score: 3.5 (+++) X-Scan-Signature: 8ac499381112328dd60aea5b1ff596ea hello there pkix-archive keep her entertained and swinging off your manhood http://ginertte.com/ Maddin legend From owner-ietf-pkix@mail.imc.org Tue Oct 16 16:16:24 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ihsq0-0001q9-9I for pkix-archive@lists.ietf.org; Tue, 16 Oct 2007 16:16:24 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Ihspm-0003He-BY for pkix-archive@lists.ietf.org; Tue, 16 Oct 2007 16:16:17 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9GJBJiB043937 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 16 Oct 2007 12:11:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9GJBJ1J043936; Tue, 16 Oct 2007 12:11:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from EXVS01.ex.dslextreme.net ([66.51.199.86]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9GJBFnX043929 for ; Tue, 16 Oct 2007 12:11:18 -0700 (MST) (envelope-from chokhani@orionsec.com) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C81028.83DBBE2C" Subject: RE: OCSP Algorithm Agility Date: Tue, 16 Oct 2007 12:11:03 -0700 Message-ID: <82D5657AE1F54347A734BDD33637C879097D6663@EXVS01.ex.dslextreme.net> In-Reply-To: <2788466ED3E31C418E9ACC5C31661557084EC5@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP Algorithm Agility thread-index: Acf8l4NIxZexIh9rTveKgrEJmUDxVQAAJZEAAlba1eAAAH/7QAEC+OtgACFXyuAABd3wIAAA1HmAADQyQqABDKGdvQAggIfQ References: <82D5657AE1F54347A734BDD33637C879096C9ABE@EXVS01.ex.dslextreme.net> <2788466ED3E31C418E9ACC5C31661557053771@mou1wnexmb09.vcorp.ad.vrsn.com> <82D5657AE1F54347A734BDD33637C879096CA5E3@EXVS01.ex.dslextreme.net> <2788466ED3E31C418E9ACC5C31661557084EC5@mou1wnexmb09.vcorp.ad.vrsn.com> From: "Santosh Chokhani" To: "Hallam-Baker, Phillip" , "Seth Hitchings" , Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: dc579483fc0eb06c61df6380f5971f62 This is a multi-part message in MIME format. ------_=_NextPart_001_01C81028.83DBBE2C Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: quoted-printable I agree that the RFC 2560 should be revised for a variety of reasons. =20 It would be nice to have a set of client side request composition and response processing rules (a la Section 6 of RFC 3290). =20 We probably can not mandate that in delegated model certificate in question and OCSP Responder should be signed by the same CA key, but we can recommend it and add some language in the Security Considerations section the residual risk of not doing that. =20 For hashing algorithm, certID should be sufficient and should be the same the as the hashing algorithm, used for the certificate. We of course will need to spell this out in the revision. =20 For signature, we can add an extension, but this should state the algorithm used for the certificate. We of course will need to spell this out also in the revision. =20 ________________________________ From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Hallam-Baker, Phillip Sent: Monday, October 15, 2007 11:36 PM To: Seth Hitchings; Santosh Chokhani; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility =20 Whether a server could make a sensible choice is beside the point. =20 For a specification to provide an interoperable standard we must have a definitive statement. Otherwise interoperability ends up depending on heuristics and undocumented assumptions. =20 Unless I missed the section in the RFC that describes the algorithm agility strategy it seems to me we must either: =20 1) Document the server algorithm selection as proposed by Santosh 2) Doucment the server algorithm selection as proposed by Santosh with an optional extension to allow the client to specify the choices it supports. =20 Either way we need a draft if we are going to meet the algorithm agility requirement. =20 ________________________________ From: owner-ietf-pkix@mail.imc.org on behalf of Seth Hitchings Sent: Wed 10/10/2007 3:25 PM To: Santosh Chokhani; Hallam-Baker, Phillip; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility I'm generally in favor of simpler approaches, such as those suggested by Santosh, as they favor interoperability. Updating deployed applications to understand new elements of the protocol could take just as long to roll out as the new algorithm support that's purportedly lacking. I can see a situation in which the CA cannot assume that the entire user population understands a new algorithm such as SHA-256, and thus has to continue using SHA-1 with RSA when signing certificates. Individual clients that do understand SHA-256 may wish to receive OCSP responses signed using SHA-256 with RSA, and would need a way to signal their desires to the OCSP responder. The question is, then, is there any security benefit to having the signature algorithm on the OCSP response stronger than the signature algorithm on the certificate? If you can break the algorithm and cause me to accept a contrived OCSP response, could you not do the same thing with a certificate? Seth -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani Sent: Wednesday, October 10, 2007 2:28 PM To: Hallam-Baker, Phillip; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility See responses in-line below. -----Original Message----- From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com] Sent: Tuesday, October 09, 2007 2:07 PM To: Santosh Chokhani; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility Not if they don't know that the client can understand them they can't. [Santosh Chokhani] The Responder has two ways to know what the client understands. From certID or from CA. If the client does not understand the algorithm used in certificate signing, revocation information is useless. And the issue is not just hashing algorithms, it is signature algorithms. Like your previous posts you continue to assume that cipher strength is a linear quantity with only one dimension and that any client which supports strength 2X must automatically support strength X. [Santosh Chokhani] I am making no such assumptions. I am saying that if an algorithm is good enough for a certificate, it is good enough for revocation notification for that certificate. That is not the case if you consider the practicalities of deploying ECC in an RSA world. To give a practical example, VeriSign issues a cert for an ECC key signed with an ECC key. The email program on Alice's machine in the DHS supports ECC but not the DHS SCVP server or OCSP relay. [Santosh Chokhani] And what is the problem with that? They have no choice but to use RSA. In the real world the OCSP service does not have a necessary connection to the CA. There are plenty of commercial OCSP offerings that report on certificates issued by other CAs. [Santosh Chokhani] And how does this relate to algorithm agility? If the OCSP does not do ECDSA it won't. If OCSP supports both RSA and ECDSA, it can take the cue from the CA CRL to determine what algorithm to use for signing OCSP responses. If the OCSP does not consume CRL, the mechanism that tells it revocation information can also tell it the signature algorithm to use. > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > Sent: Tuesday, October 09, 2007 11:16 AM > To: Hallam-Baker, Phillip; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > The OCSP and SCVP can transition to stronger algorithms any > time they want. > > The OCSP can take their clue from the CA or the certID field > to decide the hashing algorithm. When multiple certID is > present, OCSP can take low water mark of these. > > SCVP is no different than a client in terms of validating a > path. In terms of signing a response, it can take the low > water mark of the hashing algorithms in the certificate chain. > > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] > On Behalf Of Hallam-Baker, Phillip > Sent: Monday, October 08, 2007 7:27 PM > To: Santosh Chokhani; Andrews, Rick; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > The objective here is to overcome a real deployment obstacle > that creates a lockstep issue when use of stronger algorithms > is attempted. > > The CA cannot issue a certificate that employs a new > algorithm until it is known that all clients that might rely > on the certificate are capable of processing the new > certificate. Requiring lockstep updates to the OCSP and SCVP > infrastructure to be made at the same time renders transition > to stronger algorithms a much lengthier and much less > practical proposition. > > > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > > Sent: Saturday, October 06, 2007 4:12 PM > > To: Andrews, Rick; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > > > Rick, > > > > SCVP or other intermediaries are red herring. Whoever > processes the > > certificate processes the revocation information for that > certificate. > > It does not change the following: > > > > 1. There is no security benefit in using a stronger algorithm for > > OCSP > > response than for the certificate in question. Neither, > there is any > > benefit from interoperability viewpoint for these two to be > different. > > > > 2. If the OCSP Responder does not get a CRL, it can use the same > > mechanism to get the hashing algorithm used as it uses to get the > > revocation information. > > > > -----Original Message----- > > From: Andrews, Rick [mailto:RAndrews@verisign.com] > > Sent: Wednesday, October 03, 2007 3:29 PM > > To: Santosh Chokhani; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > Santosh, > > > > Sorry for the long delay in responding - travel and vacation. > >=20 > > Not all OCSP responders work from CRLs, so they won't take > their cue > > from the CRL. Nor should they take their cue from the > signature on the > > cert in question, I believe. Let me try to restate my argument in a > > different way. > >=20 > > With SCVP delegated path validation, the client requesting a cert's > > status from an OCSP responder will be different from the > client at the > > other end of the SSL connection. Those two clients may have very > > different capabilities in terms of supported signature and hash > > algorithms. It's not realistic to expect that all SSL clients, all > > SCVP servers, and all CAs will be able to upgrade in > lockstep to new > > algorithms as they are developed. Allowing the OCSP client > and server > > to negotiate a mutually-acceptable set of algorithms is > essential to > > the deployment of newer, stronger algorithms. > >=20 > > Likewise, companies that run large OCSP responders may wish to > > gradually move to ECC-based signatures for all their OCSP > responses, > > even those for certs with RSA or DSA keys, because ECC > signatures are > > cheaper to produce. If algorithm agility is added to OCSP, those > > companies can gradually achieve the move to ECC without > disrupting the > > installed base of OCSP clients that don't support ECC. > >=20 > > -Rick Andrews > > > > > -----Original Message----- > > > From: owner-ietf-pkix@mail.imc.org > > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > Santosh Chokhani > > > Sent: Friday, September 21, 2007 2:45 PM > > > To: Paul Hoffman; Stephen Kent; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > Paul, > > > > > > Here are my views on this. > > > > > > The client should be first asking for the algorithm suite > > that signed > > > the certificate in question. There is no need for the > > client to ask > > > for anything stronger. The client can ask for stronger suites as > > > secondary, if client has them. > > > > > > In the scenario you cite, the Responder certificate will > > not include > > > RSA with SHA 1 any longer. So, client will know that > > Responder only > > > supported his second choice and he should be ok with it. > > > > > > -----Original Message----- > > > From: owner-ietf-pkix@mail.imc.org > > > [mailto:owner-ietf-pkix@mail.imc.org] > > > On Behalf Of Paul Hoffman > > > Sent: Friday, September 21, 2007 4:39 PM > > > To: Stephen Kent; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > At 2:07 PM -0400 9/21/07, Stephen Kent wrote: > > > >How about defining an extension to be included in the cert > > > issued to an > > > >OCSP responder by a CA. The extension would have an > > ordered list of > > > >algorithms (hash and signature if we want to address more > > > than the hash > > > >agility issue) accepted by the OCSP responder. An OCSP > > > client can use > > > >this info to determine what is the "best" algorithm (or alg > > > pair) that > > > >it and the responder share. The combination of this > > extension and an > > > >OCSP negotiation procedure will allow the client to detect MITM > > > >downgrade attacks. In fact, if the client acquires the > > > responder's cert > > > >prior to making a request, there would not even be a > need for real > > > >negotiation, since the client would know what alg to > request in a > > > >response. > > > > > > Imagine the list of algorithms is RSA-with-SHA1 first and > > > DSA-with-SHA1 second. How does your negotiation work? The > > client asks > > > for this message to be signed with RSA-with-SHA1. > > > But the server knows that RSA-with-SHA1 has been > > compromised since it > > > got that certificate from the CA. What does the server say to the > > > client to indicate that it only wants to sign with > > DSA-with-SHA1? What > > > prevents Mallory from saying the same thing to the client? > > > > > > --Paul Hoffman, Director > > > --VPN Consortium > > > > > > > > > > > > > > > > ------_=_NextPart_001_01C81028.83DBBE2C Content-Type: text/html; charset="US-ASCII" Content-Transfer-Encoding: quoted-printable RE: OCSP Algorithm Agility

I agree that the RFC 2560 should be revised for a variety of reasons.

 

It would be nice to have a set of = client side request composition and response processing rules (a la Section 6 = of RFC 3290).

 

We probably can not mandate that in delegated model certificate in question and OCSP Responder should be = signed by the same CA key, but we can recommend it and add some language in the = Security Considerations section the residual risk of not doing = that.

 

For hashing algorithm, certID = should be sufficient and should be the same the as the hashing algorithm, used for = the certificate.  We of course will need to spell this out in the = revision.

 

For signature, we can add an = extension, but this should state the algorithm used for the certificate.  We = of course will need to spell this out also in the = revision.

 


From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] = On Behalf Of Hallam-Baker, = Phillip
Sent: Monday, October 15, = 2007 11:36 PM
To: Seth Hitchings; = Santosh Chokhani; ietf-pkix@imc.org
Subject: RE: OCSP = Algorithm Agility

 

Whether a server could make a = sensible choice is beside the point.

 

For a specification to provide an interoperable = standard we must have a definitive statement. Otherwise interoperability ends up = depending on heuristics and undocumented assumptions.

 

Unless I missed the section in the RFC that describes = the algorithm agility strategy it seems to me we must = either:

 

1) Document the server algorithm selection as proposed = by Santosh

2) Doucment the server algorithm selection as proposed by = Santosh with an optional extension to allow the client to specify the choices it = supports.

 

Either way we need a draft if we are going to meet the algorithm agility requirement.

 


From: owner-ietf-pkix@mail.imc.org on behalf of Seth Hitchings
Sent: Wed 10/10/2007 3:25 = PM
To: Santosh Chokhani; Hallam-Baker, Phillip; ietf-pkix@imc.org
Subject: RE: OCSP = Algorithm Agility

I'm generally in favor of simpler approaches, = such as those suggested by
Santosh, as they favor interoperability. Updating deployed applications = to
understand new elements of the protocol could take just as long to roll = out
as the new algorithm support that's purportedly lacking.

I can see a situation in which the CA cannot assume that the entire = user
population understands a new algorithm such as SHA-256, and thus has = to
continue using SHA-1 with RSA when signing certificates. Individual = clients
that do understand SHA-256 may wish to receive OCSP responses signed = using
SHA-256 with RSA, and would need a way to signal their desires to the = OCSP
responder.

The question is, then, is there any security benefit to having the = signature
algorithm on the OCSP response stronger than the signature algorithm on = the
certificate? If you can break the algorithm and cause me to accept a
contrived OCSP response, could you not do the same thing with a = certificate?

Seth

-----Original Message-----
From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.= imc.org] On
Behalf Of Santosh = Chokhani
Sent: Wednesday, October 10, 2007 2:28 PM
To: Hallam-Baker, Phillip; ietf-pkix@imc.org
Subject: RE: OCSP Algorithm Agility


See responses in-line below.

-----Original Message-----
From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com]
Sent: Tuesday, October 09, 2007 2:07 PM
To: Santosh Chokhani; = ietf-pkix@imc.org
Subject: RE: OCSP Algorithm Agility

Not if they don't know that the client can understand them they = can't.
[Santosh Chokhani] The = Responder has two ways to know what the client
understands.  From certID or from CA.  If the client does not = understand
the algorithm used in certificate signing, revocation information is
useless.

And the issue is not just hashing algorithms, it is signature
algorithms.
Like your previous posts you continue to assume that cipher strength = is
a linear quantity with only one dimension and that any client which
supports strength 2X must automatically support strength X.
[Santosh Chokhani] I am = making no such assumptions.  I am saying that if
an algorithm is good enough for a certificate, it is good enough for
revocation notification for that certificate.

That is not the case if you consider the practicalities of deploying = ECC
in an RSA world.

To give a practical example, VeriSign issues a cert for an ECC key
signed with an ECC key. The email program on Alice's machine in the DHS
supports ECC but not the DHS SCVP server or OCSP relay.
[Santosh Chokhani] And what = is the problem with that?  They have no
choice but to use RSA.

In the real world the OCSP service does not have a necessary = connection
to the CA. There are plenty of commercial OCSP offerings that report = on
certificates issued by other CAs.
[Santosh Chokhani] And how = does this relate to algorithm agility?  If
the OCSP does not do ECDSA it won't.  If OCSP supports both RSA = and
ECDSA, it can take the cue from the CA CRL to determine what = algorithm
to use for signing OCSP responses.  If the OCSP does not consume = CRL,
the mechanism that tells it revocation information can also tell it = the
signature algorithm to use.

> -----Original Message-----
> From: owner-ietf-pkix@mail.imc.org
> [mailto:owner-ietf-pkix@mail.= imc.org] On Behalf Of Santosh = Chokhani
> Sent: Tuesday, October 09, 2007 11:16 AM
> To: Hallam-Baker, Phillip; ietf-pkix@imc.org
> Subject: RE: OCSP Algorithm Agility
>
>
> The OCSP and SCVP can transition to stronger algorithms any
> time they want.
>
> The OCSP can take their clue from the CA or the certID field
> to decide the hashing algorithm.  When multiple certID is
> present, OCSP can take low water mark of these.
>
> SCVP is no different than a client in terms of validating a
> path.  In terms of signing a response, it can take the low
> water mark of the hashing algorithms in the certificate chain.
>
> -----Original Message-----
> From: owner-ietf-pkix@mail.imc.org
> [mailto:owner-ietf-pkix@mail.= imc.org]
> On Behalf Of Hallam-Baker, Phillip
> Sent: Monday, October 08, 2007 7:27 PM
> To: Santosh Chokhani; = Andrews, Rick; ietf-pkix@imc.org
> Subject: RE: OCSP Algorithm Agility
>
>
> The objective here is to overcome a real deployment obstacle
> that creates a lockstep issue when use of stronger algorithms
> is attempted.
>
> The CA cannot issue a certificate that employs a new
> algorithm until it is known that all clients that might rely
> on the certificate are capable of processing the new
> certificate. Requiring lockstep updates to the OCSP and SCVP
> infrastructure to be made at the same time renders transition
> to stronger algorithms a much lengthier and much less
> practical proposition.
>
>
> > -----Original Message-----
> > From: owner-ietf-pkix@mail.imc.org
> > [mailto:owner-ietf-pkix@mail.= imc.org] On Behalf Of Santosh = Chokhani
> > Sent: Saturday, October 06, 2007 4:12 PM
> > To: Andrews, Rick; ietf-pkix@imc.org
> > Subject: RE: OCSP Algorithm Agility
> >
> >
> > Rick,
> >
> > SCVP or other intermediaries are red herring.  = Whoever
> processes the
> > certificate processes the revocation information for that
> certificate.
> > It does not change the following:
> >
> > 1.  There is no security benefit in using a stronger = algorithm for
> > OCSP
> > response than for the certificate in question.   = Neither,
> there is any
> > benefit from interoperability viewpoint for these two to = be
> different.
> >
> > 2.  If the OCSP Responder does not get a CRL, it can use = the same
> > mechanism to get the hashing algorithm used as it uses to get = the
> > revocation information.
> >
> > -----Original Message-----
> > From: Andrews, Rick [mailto:RAndrews@verisign.com] > > Sent: Wednesday, October 03, 2007 3:29 PM
> > To: Santosh = Chokhani; ietf-pkix@imc.org
> > Subject: RE: OCSP Algorithm Agility
> >
> > Santosh,
> >
> > Sorry for the long delay in responding - travel and = vacation.
> > 
> > Not all OCSP responders work from CRLs, so they won't take
> their cue
> > from the CRL. Nor should they take their cue from the
> signature on the
> > cert in question, I believe. Let me try to restate my argument = in a
> > different way.
> > 
> > With SCVP delegated path validation, the client requesting a = cert's
> > status from an OCSP responder will be different from the
> client at the
> > other end of the SSL connection. Those two clients may have = very
> > different capabilities in terms of supported signature and = hash
> > algorithms. It's not realistic to expect that all SSL clients, = all
> > SCVP servers, and all CAs will be able to upgrade in
> lockstep to new
> > algorithms as they are developed. Allowing the OCSP client
> and server
> > to negotiate a mutually-acceptable set of algorithms is
> essential to
> > the deployment of newer, stronger algorithms.
> > 
> > Likewise, companies that run large OCSP responders may wish = to
> > gradually move to ECC-based signatures for all their OCSP
> responses,
> > even those for certs with RSA or DSA keys, because ECC
> signatures are
> > cheaper to produce. If algorithm agility is added to OCSP, = those
> > companies can gradually achieve the move to ECC without
> disrupting the
> > installed base of OCSP clients that don't support ECC.
> > 
> > -Rick Andrews
> >
> > > -----Original Message-----
> > > From: owner-ietf-pkix@mail.imc.org
> > > [mailto:owner-ietf-pkix@mail.= imc.org] On Behalf Of
> Santosh Chokhani
> > > Sent: Friday, September 21, 2007 2:45 PM
> > > To: Paul Hoffman; Stephen Kent; ietf-pkix@imc.org
> > > Subject: RE: OCSP Algorithm Agility
> > >
> > >
> > > Paul,
> > >
> > > Here are my views on this.
> > >
> > > The client should be first asking for the algorithm = suite
> > that signed
> > > the certificate in question.  There is no need for = the
> > client to ask
> > > for anything stronger.  The client can ask for = stronger suites as
> > > secondary, if client has them.
> > >
> > > In the scenario you cite, the Responder certificate = will
> > not include
> > > RSA with SHA 1 any longer.  So, client will know = that
> > Responder only
> > > supported his second choice and he should be ok with = it.
> > >
> > > -----Original Message-----
> > > From: owner-ietf-pkix@mail.imc.org
> > > [mailto:owner-ietf-pkix@mail.= imc.org]
> > > On Behalf Of Paul Hoffman
> > > Sent: Friday, September 21, 2007 4:39 PM
> > > To: Stephen Kent; ietf-pkix@imc.org
> > > Subject: RE: OCSP Algorithm Agility
> > >
> > >
> > > At 2:07 PM -0400 9/21/07, Stephen Kent wrote:
> > > >How about defining an extension to be included in the = cert
> > > issued to an
> > > >OCSP responder by a CA.  The extension would = have an
> > ordered list of
> > > >algorithms (hash and signature if we want to address = more
> > > than the hash
> > > >agility issue) accepted by the OCSP responder.  = An OCSP
> > > client can use
> > > >this info to determine what is the "best" algorithm (or alg
> > > pair) that
> > > >it and the responder share. The combination of = this
> > extension and an
> > > >OCSP negotiation procedure will allow the client to = detect MITM
> > > >downgrade attacks. In fact, if the client acquires = the
> > > responder's cert
> > > >prior to making a request, there would not even be = a
> need for real
> > > >negotiation, since the client would know what alg = to
> request in a
> > > >response.
> > >
> > > Imagine the list of algorithms is RSA-with-SHA1 first = and
> > > DSA-with-SHA1 second. How does your negotiation work? = The
> > client asks
> > > for this message to be signed with RSA-with-SHA1.
> > > But the server knows that RSA-with-SHA1 has been
> > compromised since it
> > > got that certificate from the CA. What does the server = say to the
> > > client to indicate that it only wants to sign with
> > DSA-with-SHA1? What
> > > prevents Mallory from saying the same thing to the = client?
> > >
> > > --Paul Hoffman, Director
> > > --VPN Consortium
> > >
> > >
> > >
> >
> >
>
>
>

------_=_NextPart_001_01C81028.83DBBE2C-- From Dhrupal.Lasenby@1dim-kalymn.dod.sch.gr Wed Oct 17 06:26:01 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ii66D-0002ol-SG for pkix-archive@lists.ietf.org; Wed, 17 Oct 2007 06:26:01 -0400 Received: from [87.241.23.154] (helo=[87.241.23.154]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1Ii66D-00068o-CG for pkix-archive@lists.ietf.org; Wed, 17 Oct 2007 06:26:01 -0400 Received: by 10.97.121.32 with SMTP id FrYaLVhLzRhjw; Wed, 17 Oct 2007 12:51:29 +0200 (GMT) Received: by 192.168.117.175 with SMTP id eyYQbAXeGZQxNe.7512085744837; Wed, 17 Oct 2007 12:51:27 +0200 (GMT) Message-ID: Date: Wed, 17 Oct 2007 12:51:24 +0200 From: "Dhrupal Lasenby" User-Agent: Thunderbird 1.5.0.10 (Windows/20070221) MIME-Version: 1.0 To: pkix-archive@lists.ietf.org Subject: leisere Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Score: 3.5 (+++) X-Scan-Signature: 8ac499381112328dd60aea5b1ff596ea hey poppi pkix-archive penis pills make ya dick stand tall like the eiffel tower http://www.haienews.com/ Dhrupal Lasenby From ejcaouette@nsw.demoplus.com.au Wed Oct 17 07:23:51 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ii70B-0007BP-C1 for pkix-archive@lists.ietf.org; Wed, 17 Oct 2007 07:23:51 -0400 Received: from [122.164.254.45] (helo=dsl-tn-dynamic-045.254.164.122.airtelbroadband.in) by ietf-mx.ietf.org with smtp (Exim 4.43) id 1Ii705-0008JE-Ub for pkix-archive@lists.ietf.org; Wed, 17 Oct 2007 07:23:49 -0400 Received: from [207.80.58.185] (helo=hjv) by dsl-tn-dynamic-045.254.164.122.airtelbroadband.in with smtp (Exim 4.62 (FreeBSD)) id 1JT009-0001To-3N; Wed, 17 Oct 2007 16:53:49 +0530 Message-ID: <001b01c810af$df9738d0$b93a50cf@hjv> From: To: Subject: Why haven't you responded yet? Date: Wed, 17 Oct 2007 16:51:33 +0530 MIME-Version: 1.0 Content-Type: text/plain; format=flowed; charset="windows-1250"; reply-type=original Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.50.4131.1600 X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4131.1600 X-Spam-Score: 4.3 (++++) X-Scan-Signature: 1ac7cc0a4cd376402b85bc1961a86ac2 EXTO Is Ready To Take US By Storm. EXIT ONLY INC EXTO.PK $ 0.43 Market testing for EXTO's new Online used car market was overwhelming in Canada. The US Launch is expected to far exceed the amazing results seen in Canada. No hidden costs and no posting fees, is drawing sellers to the site. EXTO released news today that they are ahead of schedule and ready to lunch their US expansion. This thing has already been climbing since September. Now up over 100% this will rocket as it hits the US market. From EliFylling@bluenorthchalet.com Wed Oct 17 16:43:06 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IiFjO-0007L7-2d for pkix-archive@lists.ietf.org; Wed, 17 Oct 2007 16:43:06 -0400 Received: from abek51.neoplus.adsl.tpnet.pl ([83.7.22.51] helo=abep25.neoplus.adsl.tpnet.pl) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IiFjI-0002j4-Bf for pkix-archive@lists.ietf.org; Wed, 17 Oct 2007 16:43:00 -0400 Received: by 10.33.106.214 with SMTP id mYnhPDUVlScQB; Wed, 17 Oct 2007 22:43:03 +0200 (GMT) Received: by 192.168.209.143 with SMTP id qbIUujUJZShdbX.8053768795229; Wed, 17 Oct 2007 22:43:01 +0200 (GMT) Message-ID: <000b01c810fe$4d0a2ff0$191b0753@truegrte7fef58> From: "Eli Fylling" To: Subject: lih-dlog Date: Wed, 17 Oct 2007 22:42:58 +0200 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0008_01C8110F.1092FFF0" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 X-Spam-Score: 2.0 (++) X-Scan-Signature: 8abaac9e10c826e8252866cbe6766464 ------=_NextPart_000_0008_01C8110F.1092FFF0 Content-Type: text/plain; charset="iso-8859-2" Content-Transfer-Encoding: quoted-printable gud morning pkix-archive make ya dick big and she will spread wide everytime http://grroup.com/ Eli Fylling ------=_NextPart_000_0008_01C8110F.1092FFF0 Content-Type: text/html; charset="iso-8859-2" Content-Transfer-Encoding: quoted-printable
gud morning pkix-archive
make ya dick big and she will spread wide=20 everytime
http://grroup.com/
Eli Fylling
------=_NextPart_000_0008_01C8110F.1092FFF0-- From Tamas109@car-auctioncafe.com Thu Oct 18 19:38:02 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IiewE-0005EI-5u for pkix-archive@lists.ietf.org; Thu, 18 Oct 2007 19:38:02 -0400 Received: from dslb-088-073-126-020.pools.arcor-ip.net ([88.73.126.20] helo=[88.73.67.71]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Iiew6-00063L-NC for pkix-archive@lists.ietf.org; Thu, 18 Oct 2007 19:37:59 -0400 Received: by 10.239.135.88 with SMTP id TlpTrmfTGyEEX; Fri, 19 Oct 2007 01:37:48 +0200 (GMT) Received: by 192.168.182.215 with SMTP id sZICSqPXDhHVDm.2634429763194; Fri, 19 Oct 2007 01:37:46 +0200 (GMT) Message-ID: <000c01c811df$e0fff870$517e4958@rosi> From: "Tamas Plourde" To: Subject: wanblee Date: Fri, 19 Oct 2007 01:37:43 +0200 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0009_01C811F0.A488C870" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 X-Spam-Score: 4.0 (++++) X-Scan-Signature: 8abaac9e10c826e8252866cbe6766464 ------=_NextPart_000_0009_01C811F0.A488C870 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable hay you pkix-archive make your way through everyday with a massive penis http://hazerfen.com/ Tamas Plourde ------=_NextPart_000_0009_01C811F0.A488C870 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
hay you pkix-archive
make your way through everyday with a massive=20 penis
http://hazerfen.com/
Tamas Plourde
------=_NextPart_000_0009_01C811F0.A488C870-- From Rui_Reisert@fairtaxvolunteer.org Fri Oct 19 10:59:18 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IitJm-0006b0-SU for pkix-archive@lists.ietf.org; Fri, 19 Oct 2007 10:59:18 -0400 Received: from [61.153.7.150] (helo=[61.153.7.150]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IitJa-0002VF-3Z for pkix-archive@lists.ietf.org; Fri, 19 Oct 2007 10:59:07 -0400 Received: from mcc-wench ([115.117.2.157] helo=mcc-wench) by [61.153.7.150] ( sendmail 8.13.3/8.13.1) with esmtpa id 1Ksmpg-000UYK-NB for pkix-archive@lists.ietf.org; Fri, 19 Oct 2007 22:57:45 +0800 Date: Fri, 19 Oct 2007 22:57:28 +0800 From: "Rui Reisert" Reply-To: "Rui Reisert" Message-ID: <827367599250.784815989790@fairtaxvolunteer.org> To: Subject: neitisop MIME-Version: 1.0 Content-Type: text/plain; format=flowed; charset="gb2312"; reply-type=original X-Spam-Score: 4.0 (++++) X-Scan-Signature: 08170828343bcf1325e4a0fb4584481c Monday update. Symb: T A D F (Tactical Air Defense Services) Tactical Air Defense Services (TADS), a leading provider of tactical aviation training and services to the United States and Allied Nations, has quietly positioned itself to utilize a fleet of the most advanced fighter jets and aerial refueling tankers in the world for military aviation training needs. Those who get in now are likely to see profits soar through the stratosphere. Headquartered at the Grayson County Airport in Denison, Texas formerly the Perrin Air Force Base Tactical Air Defense has the capability to provide clients with the most comprehensive logistical, repair, and aircraft training support available. TADS IS AS CLOSE AS IT COMES TO A SUREFIRE MONEY-MAKER. From owner-ietf-pkix@mail.imc.org Fri Oct 19 11:18:51 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Iitch-0004Sz-Gr for pkix-archive@lists.ietf.org; Fri, 19 Oct 2007 11:18:51 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IitcZ-0003Jx-Vm for pkix-archive@lists.ietf.org; Fri, 19 Oct 2007 11:18:45 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9JEIvuV087213 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 19 Oct 2007 07:18:57 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9JEIvDR087212; Fri, 19 Oct 2007 07:18:57 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from pfepa.post.tele.dk (pfepa.post.tele.dk [195.41.46.235]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9JEIu0l087206 for ; Fri, 19 Oct 2007 07:18:56 -0700 (MST) (envelope-from era@tdcadsl.dk) Received: from morten (0x50a445ae.albnxx10.adsl-dhcp.tele.dk [80.164.69.174]) by pfepa.post.tele.dk (Postfix) with ESMTP id B693BFAC023 for ; Fri, 19 Oct 2007 16:18:52 +0200 (CEST) From: "Erik Andersen" To: "PKIX" Subject: Upper Bounds for X.509 Date: Fri, 19 Oct 2007 16:19:41 +0200 Message-ID: <001401c8125b$17c96e60$0100a8c0@morten> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0015_01C8126B.DB523E60" X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook, Build 10.0.6822 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198 Importance: Normal Thread-Index: AcgSWxbdXVLGsPu+R6eJXGWC7KKhOw== Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 453b1bfcf0292bffe4cab90ba115f503 This is a multi-part message in MIME format. ------=_NextPart_000_0015_01C8126B.DB523E60 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hi Folks, =20 As mentioned in a liaison statement from the directory meeting, = September 2007 in Geneva, we have decided to remove the Upper Bounds from any occurrence. A majority of those are on DirectoryString, which is also specified for many attribute types. =20 At one type we were considering removing the Upper Bound by the Defect Report procedure, but found the change to heavy for that procedure. By = the Defect Report procedure we corrected a inconsistency in the Upper Bounds = and expressed that Upper Bounds are only provided as examples. =20 It is our intention to remove the Upper Bound from the sixth edition of = the Directory Specification. We gave a possible approach in the liaison statement, but that may not be the final solution. Be assured that = whatever we do, it will be valid ASN.1. The example we came up with is actual = valid ASN.1 by using parameterized specification. However, we are faced with = the problem that directory object class definitions will be parameterized. = This does not change the definition as such, but only the ASN.1 appearance. = This could be a problem for implementations parsing such object class = definitions to set-up the directory schema. =20 Our fall-back solution is to define a new variant of DirectoryString = that is unbounded. =20 Erik Andersen Andersen's L-Service Mobile: +45 20 97 14 90 e-mail: era@tdcadsl.dk http://www.x500standard.com/ http://home20.inet.tele.dk/era/me =20 ------=_NextPart_000_0015_01C8126B.DB523E60 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Hi Folks,

 

As mentioned in a liaison statement from the directory meeting, September 2007 in Geneva, we have decided to remove the Upper Bounds from any occurrence. A = majority of those are on DirectoryString, which is also specified for many attribute = types.

 

At one type we were considering removing the = Upper Bound by the Defect Report procedure, but found the change to heavy for = that procedure. By the Defect Report procedure we corrected a inconsistency = in the Upper Bounds and expressed that Upper Bounds are only provided as = examples.

 

It is our intention to remove the Upper Bound = from the sixth edition of the Directory Specification. We gave a possible = approach in the liaison statement, but that may not be the final solution. Be = assured that whatever we do, it will be valid ASN.1. The example we came up with = is actual valid ASN.1 by using parameterized specification. However, we are = faced with the problem that directory object class definitions will be = parameterized. This does not change the definition as such, but only the ASN.1 = appearance. This could be a problem for implementations parsing such object class = definitions to set-up the directory schema.

 

Our fall-back solution is to define a new = variant of DirectoryString that is unbounded.

 

Erik Andersen

Andersen's L-Service

Mobile: +45 20 97 14 = 90

e-mail: era@tdcadsl.dk

http://www.x500standard.com/

http://home20.inet.tele.dk/era= /me

 

------=_NextPart_000_0015_01C8126B.DB523E60-- From owner-ietf-pkix@mail.imc.org Fri Oct 19 13:32:03 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Iivhb-0006tL-Ra for pkix-archive@lists.ietf.org; Fri, 19 Oct 2007 13:32:03 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IivhK-0001QV-Ov for pkix-archive@lists.ietf.org; Fri, 19 Oct 2007 13:31:53 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9JGcn2w001011 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 19 Oct 2007 09:38:49 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9JGcnEv001010; Fri, 19 Oct 2007 09:38:49 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from e2.ny.us.ibm.com (e2.ny.us.ibm.com [32.97.182.142]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9JGclR5000999 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Fri, 19 Oct 2007 09:38:48 -0700 (MST) (envelope-from tgindin@us.ibm.com) Received: from d01relay04.pok.ibm.com (d01relay04.pok.ibm.com [9.56.227.236]) by e2.ny.us.ibm.com (8.13.8/8.13.8) with ESMTP id l9JGclHw011826 for ; Fri, 19 Oct 2007 12:38:47 -0400 Received: from d01av03.pok.ibm.com (d01av03.pok.ibm.com [9.56.224.217]) by d01relay04.pok.ibm.com (8.13.8/8.13.8/NCO v8.5) with ESMTP id l9JGc2wD117738 for ; Fri, 19 Oct 2007 12:38:47 -0400 Received: from d01av03.pok.ibm.com (loopback [127.0.0.1]) by d01av03.pok.ibm.com (8.12.11.20060308/8.13.3) with ESMTP id l9JGbqN0026217 for ; Fri, 19 Oct 2007 12:37:52 -0400 Received: from d01ml062.pok.ibm.com (d01ml062.pok.ibm.com [9.56.228.115]) by d01av03.pok.ibm.com (8.12.11.20060308/8.12.11) with ESMTP id l9JGbqx0025736; Fri, 19 Oct 2007 12:37:52 -0400 In-Reply-To: To: Ryan Hurst Cc: Russ Housley , "ietf-pkix@imc.org" , Paul Hoffman MIME-Version: 1.0 Subject: RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" X-Mailer: Lotus Notes Release 7.0 HF277 June 21, 2006 From: Tom Gindin Message-ID: Date: Fri, 19 Oct 2007 12:37:41 -0400 X-MIMETrack: Serialize by Router on D01ML062/01/M/IBM(Release 7.0.2FP2 IGS702FP2HF2|August 8, 2007) at 10/19/2007 12:37:51, Serialize complete at 10/19/2007 12:37:51 Content-Type: text/plain; charset="US-ASCII" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: f66b12316365a3fe519e75911daf28a8 I know this response is a little late, but the main reason that there is no central repository for CA names is that there is no world-wide directory using X.500 names. For reasons which have been discussed many times on this list, there probably never will be. Of course, the IETF knows of an existing registry which could be used to avoid conflicts between CA names. How about the following wording: "Certificate Authorities SHOULD NOT use a value in the Organization or Common Name attribute of their Distinguished Name which is syntactically legal as a dNSName (i.e. an IA5 string containing one or more periods but no spaces) unless they are operated by an organization which has registered the domain name controlling that dNSName. Certificate Authorities wishing to ensure a globally unique issuer name MAY use an IA5 FQDN controlled by their organization in either the Organization or the Common Name attribute." Does anybody want to add Organizational Unit into the mix, and possibly even make it a SHOULD for newly allocated CA's? Given my unfamiliarity with non-alphabetic scripts, I hesitate to discuss internationalized DNS names in this connection unless Punycode is relevant. However, even without considering DR 320, using somebody else's domain name as your CN or O attribute is misleading. Tom Gindin P.S. - The opinions above are mine, and not necessarily those of my employer Ryan Hurst Sent by: owner-ietf-pkix@mail.imc.org 10/09/2007 08:47 PM To Paul Hoffman , Russ Housley , "ietf-pkix@imc.org" cc Subject RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" All of these statements are true. Words fail me is as fine a response to that as any... ________________________________________ From: owner-ietf-pkix@mail.imc.org [owner-ietf-pkix@mail.imc.org] On Behalf Of Paul Hoffman [paul.hoffman@vpnc.org] Sent: Tuesday, October 09, 2007 3:25 PM To: Russ Housley; ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" The ITU statement says the following: >>One of the participants in the directory meeting stated that >>Certification Authorities are being deployed with names not >>acquired from naming authorities but with names arbitrarily chosen >>assuming that no other CA is or will be operating under that name. That is, of course, true. There is no central repository for CA names because there is no central authority for CAs. >>That participant further stated that the IETF provides no >>guidelines on ensuring that the names of CAs are unambiguous. That is true. >>The directory group requests the IETF PKIX group to comment on this >>statement. Should we make a consensus call on "that is true"? >>If the statement is correct, we ask the IETF to consider putting a >>mechanism in place to prevent conflict, e.g. a list of existing CA >>names that deployers of new CAs could check for naming conflicts. Words fail me. --Paul Hoffman, Director --VPN Consortium From owner-ietf-pkix@mail.imc.org Fri Oct 19 13:58:04 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Iiw6m-00054v-FD for pkix-archive@lists.ietf.org; Fri, 19 Oct 2007 13:58:04 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Iiw6b-0002Tk-4A for pkix-archive@lists.ietf.org; Fri, 19 Oct 2007 13:57:54 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9JH7c8A004446 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 19 Oct 2007 10:07:38 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9JH7cUV004445; Fri, 19 Oct 2007 10:07:38 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from woodstock.binhost.com (woodstock.binhost.com [8.8.40.152]) by balder-227.proper.com (8.13.5/8.13.5) with SMTP id l9JH7bYE004435 for ; Fri, 19 Oct 2007 10:07:37 -0700 (MST) (envelope-from housley@vigilsec.com) Message-Id: <200710191707.l9JH7bYE004435@balder-227.proper.com> Received: (qmail 9073 invoked by uid 0); 19 Oct 2007 17:07:31 -0000 Received: from unknown (HELO THINKPADR52.vigilsec.com) (96.231.48.203) by woodstock.binhost.com with SMTP; 19 Oct 2007 17:07:31 -0000 X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Fri, 19 Oct 2007 13:06:46 -0400 To: "Erik Andersen" , "PKIX" From: Russ Housley Subject: Re: Upper Bounds for X.509 In-Reply-To: <001401c8125b$17c96e60$0100a8c0@morten> References: <001401c8125b$17c96e60$0100a8c0@morten> Mime-Version: 1.0 Content-Type: text/html; charset="us-ascii" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 3.2 (+++) X-Scan-Signature: c1c65599517f9ac32519d043c37c5336 I understand that an unbounded directory string may be useful in many contexts, but is it going to help interoperability to remove the bounds on naming attributes?

Russ

At 10:19 AM 10/19/2007, Erik Andersen wrote:
Hi Folks,
 
As mentioned in a liaison statement from the directory meeting, September 2007 in Geneva, we have decided to remove the Upper Bounds from any occurrence. A majority of those are on DirectoryString, which is also specified for many attribute types.
 
At one type we were considering removing the Upper Bound by the Defect Report procedure, but found the change to heavy for that procedure. By the Defect Report procedure we corrected a inconsistency in the Upper Bounds and expressed that Upper Bounds are only provided as examples.
 
It is our intention to remove the Upper Bound from the sixth edition of the Directory Specification. We gave a possible approach in the liaison statement, but that may not be the final solution. Be assured that whatever we do, it will be valid ASN.1. The example we came up with is actual valid ASN.1 by using parameterized specification. However, we are faced with the problem that directory object class definitions will be parameterized. This does not change the definition as such, but only the ASN.1 appearance. This could be a problem for implementations parsing such object class definitions to set-up the directory schema.
 
Our fall-back solution is to define a new variant of DirectoryString that is unbounded.
 
Erik Andersen
Andersen's L-Service
Mobile: +45 20 97 14 90
e-mail: era@tdcadsl.dk
http://www.x500standard.com/
http://home20.inet.tele.dk/era/me
 
From owner-ietf-pkix@mail.imc.org Fri Oct 19 14:22:34 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IiwUG-0003HE-Ef for pkix-archive@lists.ietf.org; Fri, 19 Oct 2007 14:22:20 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IiwU4-0003ZV-HB for pkix-archive@lists.ietf.org; Fri, 19 Oct 2007 14:22:10 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9JHLinu005897 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 19 Oct 2007 10:21:44 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9JHLioe005896; Fri, 19 Oct 2007 10:21:44 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from [10.20.30.150] (adsl-66-125-125-65.dsl.pltn13.pacbell.net [66.125.125.65]) (authenticated bits=0) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9JHLWdX005861 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 19 Oct 2007 10:21:33 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: References: Date: Fri, 19 Oct 2007 10:21:22 -0700 To: Tom Gindin From: Paul Hoffman Subject: RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Cc: Content-Type: text/plain; charset="us-ascii" ; format="flowed" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 82c9bddb247d9ba4471160a9a865a5f3 At 12:37 PM -0400 10/19/07, Tom Gindin wrote: > I know this response is a little late, but the main reason that >there is no central repository for CA names is that there is no world-wide >directory using X.500 names. While the latter is obviously true, it is not the "main reason". The "main reason" is that many (most?) CAs could get no real value out of a "world-wide directory using X.500 names". For example, when an organization becomes a CA by making its own trust anchor for internal use, having to register in a "world-wide directory" is a hindrance, not a feature. >For reasons which have been discussed many >times on this list, there probably never will be. "Probably" may be understating the likelihood. >Of course, the IETF >knows of an existing registry which could be used to avoid conflicts >between CA names. We do? > How about the following wording: "Certificate Authorities SHOULD >NOT use a value in the Organization or Common Name attribute of their >Distinguished Name which is syntactically legal as a dNSName (i.e. an IA5 >string containing one or more periods but no spaces) unless they are >operated by an organization which has registered the domain name >controlling that dNSName. Certificate Authorities wishing to ensure a >globally unique issuer name MAY use an IA5 FQDN controlled by their >organization in either the Organization or the Common Name attribute." This might be appropriate in an ITU document, but is it really appropriate for a standards-track IETF document? In specific, the latter makes it sound like using your domain name is safe. Might be, might not be. >Does anybody want to add Organizational Unit into the mix, and possibly >even make it a SHOULD for newly allocated CA's? I don't see how this would help. If you look at the OUs in IssuerNames of certificates flying around the net, you can see that few people understand OUs, > Given my unfamiliarity with non-alphabetic scripts, I hesitate to >discuss internationalized DNS names in this connection unless Punycode is >relevant. However, even without considering DR 320, using somebody else's >domain name as your CN or O attribute is misleading. True, but I do not think that it is the place of IETF documents to say what is or is not "misleading". --Paul Hoffman, Director --VPN Consortium From owner-ietf-pkix@mail.imc.org Fri Oct 19 14:32:48 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IiweO-0006Hr-2z for pkix-archive@lists.ietf.org; Fri, 19 Oct 2007 14:32:48 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IiweI-0004PL-O1 for pkix-archive@lists.ietf.org; Fri, 19 Oct 2007 14:32:44 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9JHeaSv007318 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 19 Oct 2007 10:40:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9JHeaLM007317; Fri, 19 Oct 2007 10:40:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from elasmtp-galgo.atl.sa.earthlink.net (elasmtp-galgo.atl.sa.earthlink.net [209.86.89.61]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9JHeXTh007311 for ; Fri, 19 Oct 2007 10:40:36 -0700 (MST) (envelope-from hoytkesterson@earthlink.net) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=dk20050327; d=earthlink.net; b=mDhTq8wCds+FWJI38ZzJmgUqCIAFrJmrucWyOM7poHXribCEeRDetxjaPpWEJOfw; h=Message-ID:Date:From:Reply-To:To:Subject:Mime-Version:Content-Type:Content-Transfer-Encoding:X-Mailer:X-ELNK-Trace:X-Originating-IP; Received: from [209.86.224.38] (helo=elwamui-lapwing.atl.sa.earthlink.net) by elasmtp-galgo.atl.sa.earthlink.net with asmtp (Exim 4.34) id 1Iivpp-0005Y4-JB; Fri, 19 Oct 2007 13:40:33 -0400 Received: from 143.192.1.185 by webmail.pas.earthlink.net with HTTP; Fri, 19 Oct 2007 13:40:33 -0400 Message-ID: <6982180.1192815633343.JavaMail.root@elwamui-lapwing.atl.sa.earthlink.net> Date: Fri, 19 Oct 2007 10:40:33 -0700 (GMT-07:00) From: Hoyt L Kesterson II Reply-To: Hoyt L Kesterson II To: Erik Andersen , PKIX Subject: Re: Upper Bounds for X.509 Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 X-Mailer: EarthLink Zoo Mail 1.0 X-ELNK-Trace: 59f3edefb26af0321a6f9084d36cbc6474bf435c0eb9d478986a28d8589f21696551fa7d907c5b1b0904351a597a646a350badd9bab72f9c350badd9bab72f9c X-Originating-IP: 209.86.224.38 X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l9JHeaTh007312 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Content-Transfer-Encoding: quoted-printable X-MIME-Autoconverted: from 8bit to quoted-printable by balder-227.proper.com id l9JHeaSv007318 X-Spam-Score: 0.0 (/) X-Scan-Signature: 386e0819b1192672467565a524848168 One minor clarification. Only the blue book (the original CCITT X.520 spe= cification) identified the Bounds annex as normative. That was in error. = When the corresponding ISO version was published (the first edition was n= ot done as common text) in 1990 the Bounds annex was correctly identified= as informative. All subsequent publications (done as common text) contained the following= line under the annex title =E2=80=94 "This annex does not form an integr= al part of this Recommendation | International Standard" The Foreword clause also contained this paragraph "Annex C, which is not an integral part of this Recommendation | Internat= ional Standard, provides suggested upper bounds value constraints used in= these Directory Specifications." Erik's phrase "expressed that Upper Bounds are only provided as examples"= means that we have further emphasized that the values are not mandated b= y the standard. Next we will try blinking red text. hoyt -----Original Message----- >From: Erik Andersen >Sent: Oct 19, 2007 7:19 AM >To: PKIX >Subject: Upper Bounds for X.509 > >Hi Folks, > >=20 > >As mentioned in a liaison statement from the directory meeting, Septembe= r >2007 in Geneva, we have decided to remove the Upper Bounds from any >occurrence. A majority of those are on DirectoryString, which is also >specified for many attribute types. > >=20 > >At one type we were considering removing the Upper Bound by the Defect >Report procedure, but found the change to heavy for that procedure. By t= he >Defect Report procedure we corrected a inconsistency in the Upper Bounds= and >expressed that Upper Bounds are only provided as examples. > >=20 > >It is our intention to remove the Upper Bound from the sixth edition of = the >Directory Specification. We gave a possible approach in the liaison >statement, but that may not be the final solution. Be assured that whate= ver >we do, it will be valid ASN.1. The example we came up with is actual val= id >ASN.1 by using parameterized specification. However, we are faced with t= he >problem that directory object class definitions will be parameterized. T= his >does not change the definition as such, but only the ASN.1 appearance. T= his >could be a problem for implementations parsing such object class definit= ions >to set-up the directory schema. > >=20 > >Our fall-back solution is to define a new variant of DirectoryString tha= t is >unbounded. > >=20 > >Erik Andersen > >Andersen's L-Service > >Mobile: +45 20 97 14 90 > >e-mail: era@tdcadsl.dk > >http://www.x500standard.com/ > >http://home20.inet.tele.dk/era/me > >=20 > From owner-ietf-pkix@mail.imc.org Fri Oct 19 14:40:17 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Iiwld-00067A-Rj for pkix-archive@lists.ietf.org; Fri, 19 Oct 2007 14:40:17 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IiwlY-0004le-Gi for pkix-archive@lists.ietf.org; Fri, 19 Oct 2007 14:40:13 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9JHneqq007926 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 19 Oct 2007 10:49:40 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9JHneW2007925; Fri, 19 Oct 2007 10:49:40 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from elasmtp-dupuy.atl.sa.earthlink.net (elasmtp-dupuy.atl.sa.earthlink.net [209.86.89.62]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9JHndJ6007919 for ; Fri, 19 Oct 2007 10:49:40 -0700 (MST) (envelope-from hoytkesterson@earthlink.net) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=dk20050327; d=earthlink.net; b=hKF0pAmonvsV73JJCRZK+aN4i8MO1FTsfVGDLB3Wg5/osjLWG/YpZnG51Edk5ufm; h=Message-ID:Date:From:Reply-To:To:Subject:Mime-Version:Content-Type:Content-Transfer-Encoding:X-Mailer:X-ELNK-Trace:X-Originating-IP; Received: from [209.86.224.38] (helo=elwamui-lapwing.atl.sa.earthlink.net) by elasmtp-dupuy.atl.sa.earthlink.net with asmtp (Exim 4.34) id 1Iivyd-0001In-J0; Fri, 19 Oct 2007 13:49:39 -0400 Received: from 143.192.1.185 by webmail.pas.earthlink.net with HTTP; Fri, 19 Oct 2007 13:49:39 -0400 Message-ID: <6077526.1192816179346.JavaMail.root@elwamui-lapwing.atl.sa.earthlink.net> Date: Fri, 19 Oct 2007 10:49:39 -0700 (GMT-07:00) From: Hoyt L Kesterson II Reply-To: Hoyt L Kesterson II To: PKIX , Erik Andersen , PKIX Subject: Re: Upper Bounds for X.509 Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 X-Mailer: EarthLink Zoo Mail 1.0 X-ELNK-Trace: 59f3edefb26af0321a6f9084d36cbc6474bf435c0eb9d478986a28d8589f2169176c18a13be9c9037ba2f6ee06469631350badd9bab72f9c350badd9bab72f9c X-Originating-IP: 209.86.224.38 X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l9JHneJ6007920 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Content-Transfer-Encoding: quoted-printable X-MIME-Autoconverted: from 8bit to quoted-printable by balder-227.proper.com id l9JHneqq007926 X-Spam-Score: 0.0 (/) X-Scan-Signature: 244a2fd369eaf00ce6820a760a3de2e8 I had hoped that the LDAP people would join this conversation. Unless I m= isunderstood, I was told that LDAP never utilized these bounds and that i= t did not cause interoperability problems. Another option is to keep the bounds as we have them and have the IETF st= andard mandate the bounds, choosing any values you like. Does anyone out there test conformance to these limits? If exceeded, what= error is generated? Does certificate generating software enforce the bou= nds? Does relying party software validate the bounds in received certific= ate? hoyt -----Original Message----- >From: Russ Housley >Sent: Oct 19, 2007 10:06 AM >To: Erik Andersen , PKIX >Subject: Re: Upper Bounds for X.509 > >I understand that an unbounded directory string may be useful in manycon= texts, but is it going to help interoperability to remove the boundson na= ming attributes? > >Russ > >At 10:19 AM 10/19/2007, Erik Andersen wrote: >Hi Folks, >=C2=A0 >As mentioned in a liaison statement from the directory meeting, Septembe= r2007 in Geneva, we have decided to remove the Upper Bounds from anyoccur= rence. A majority of those are on DirectoryString, which is alsospecified= for many attribute types. >=C2=A0 >At one type we were considering removing the Upper Bound by the DefectRe= port procedure, but found the change to heavy for that procedure. Bythe D= efect Report procedure we corrected a inconsistency in the UpperBounds an= d expressed that Upper Bounds are only provided asexamples. >=C2=A0 >It is our intention to remove the Upper Bound from the sixth edition oft= he Directory Specification. We gave a possible approach in the liaisonsta= tement, but that may not be the final solution. Be assured thatwhatever w= e do, it will be valid ASN.1. The example we came up with isactual valid = ASN.1 by using parameterized specification. However, we arefaced with the= problem that directory object class definitions will beparameterized. Th= is does not change the definition as such, but only theASN.1 appearance. = This could be a problem for implementations parsingsuch object class defi= nitions to set-up the directory schema. >=C2=A0 >Our fall-back solution is to define a new variant of DirectoryString tha= tis unbounded. >=C2=A0 >Erik Andersen >Andersen's L-Service >Mobile: +45 20 97 14 90 >e-mail: era@tdcadsl.dk >http://www.x500standard.com/ >http://home20.inet.tele.dk/era/me >=C2=A0 From Rissler@maplestreetguitars.com Fri Oct 19 18:39:29 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ij0V7-0004M1-7c for pkix-archive@lists.ietf.org; Fri, 19 Oct 2007 18:39:29 -0400 Received: from i59f5e5b7.versanet.de ([89.245.229.183]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1Ij0V3-000146-MI for pkix-archive@lists.ietf.org; Fri, 19 Oct 2007 18:39:26 -0400 Received: from xyz-ul41zgnits2 by maplestreetguitars.com with ASMTP id 485E9737 for ; Sat, 20 Oct 2007 00:37:48 +0200 Received: from xyz-ul41zgnits2 ([131.148.139.105]) by maplestreetguitars.com with ESMTP id 28D4F59E4DEE for ; Sat, 20 Oct 2007 00:37:48 +0200 X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Sat, 20 Oct 2007 00:37:19 +0200 To: pkix-archive@lists.ietf.org From: "Chett Rissler" Subject: accampar Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed X-Spam-Score: 1.6 (+) X-Scan-Signature: 8ac499381112328dd60aea5b1ff596ea What's happening pkix-archive a happy bigger dick results in happy hardcore sex http://katanco.com/ Chett Rissler From owner-ietf-pkix@mail.imc.org Sat Oct 20 08:59:07 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IjDv1-0001ET-81 for pkix-archive@lists.ietf.org; Sat, 20 Oct 2007 08:59:07 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IjDuv-0008Mh-SZ for pkix-archive@lists.ietf.org; Sat, 20 Oct 2007 08:59:03 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9KCBsfx091089 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 20 Oct 2007 05:11:54 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9KCBsPu091088; Sat, 20 Oct 2007 05:11:54 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mailhost.auckland.ac.nz (moe.its.auckland.ac.nz [130.216.12.35]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9KCBr78091047 for ; Sat, 20 Oct 2007 05:11:53 -0700 (MST) (envelope-from pgut001@cs.auckland.ac.nz) Received: from localhost (localhost.localdomain [127.0.0.1]) by mailhost.auckland.ac.nz (Postfix) with ESMTP id 4728748066F; Sun, 21 Oct 2007 01:11:48 +1300 (NZDT) X-Virus-Scanned: by amavisd-new at mailhost.auckland.ac.nz Received: from mailhost.auckland.ac.nz ([127.0.0.1]) by localhost (moe.its.auckland.ac.nz [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id orPH-zXGpuWi; Sun, 21 Oct 2007 01:11:48 +1300 (NZDT) Received: from iris.cs.auckland.ac.nz (iris.cs.auckland.ac.nz [130.216.33.152]) by mailhost.auckland.ac.nz (Postfix) with ESMTP id 2D2E848066D; Sun, 21 Oct 2007 01:11:48 +1300 (NZDT) Received: from wintermute01.cs.auckland.ac.nz (wintermute01.cs.auckland.ac.nz [130.216.34.38]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by iris.cs.auckland.ac.nz (Postfix) with ESMTP id C145EE080B5; Sun, 21 Oct 2007 01:11:46 +1300 (NZDT) Received: from pgut001 by wintermute01.cs.auckland.ac.nz with local (Exim 4.63) (envelope-from ) id 1IjDBC-00036E-MF; Sun, 21 Oct 2007 01:11:46 +1300 From: pgut001@cs.auckland.ac.nz (Peter Gutmann) To: hoytkesterson@earthlink.net Subject: Re: Upper Bounds for X.509 Cc: ietf-pkix@imc.org In-Reply-To: <6077526.1192816179346.JavaMail.root@elwamui-lapwing.atl.sa.earthlink.net> Message-Id: Date: Sun, 21 Oct 2007 01:11:46 +1300 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 0bc60ec82efc80c84b8d02f4b0e4de22 Hoyt L Kesterson II writes: >Does certificate generating software enforce the bounds? > >Does relying party software validate the bounds in received certificate? Yes. I think there should be some reasonable upper bound (1K perhaps) as a safety feature to prevent MPEG-of-cat certificates. People are going to stuff anything they feel like into certs, aided and abetted by software that hides the details of what they're doing (dragging an icon to a drop target doesn't convey the fact that adding a 20MB Flash animation at that location isn't very sensible). So making it unbounded is asking for trouble. Setting a reasonable upper bound (does anyone really have a common name more than a thousand characters long?) is a good safety setting. (Oh, and an aside: When I created the MPEG-of-cat cert, with a (by current standards) relatively small ~1MB MPEG in there, neither Windows nor Netscape (the two main cert apps at the time) complained about finding over a million characters in what should be a short field. However, both of them performed very erratically, and in the case of Netscape I had to delete the browser cert database after a couple of days to restore proper operation to the browser. So current apps will quite readily accept stupid sizes for these fields, and nicely DoS themselves in the process. Another argument for setting upper limits). Peter. From chafeuerstein@TECHNOCLIP.RU Sun Oct 21 18:59:51 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ijjlv-0002pp-BC for pkix-archive@lists.ietf.org; Sun, 21 Oct 2007 18:59:51 -0400 Received: from [200.119.62.247] (helo=adsl200-119062247.dyn.etb.net.co) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1Ijjln-0006dA-40 for pkix-archive@lists.ietf.org; Sun, 21 Oct 2007 18:59:43 -0400 Received: from NESTORESCOBAR ([138.148.128.118] helo=NESTORESCOBAR) by adsl200-119062247.dyn.etb.net.co ( sendmail 8.13.3/8.13.1) with esmtpa id 1PnKPD-000DIY-wO for pkix-archive@lists.ietf.org; Sun, 21 Oct 2007 17:59:57 -0500 X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Sun, 21 Oct 2007 17:59:43 -0500 To: pkix-archive@lists.ietf.org From: "cha feuerstein" Subject: oproteic Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed X-Spam-Score: 1.6 (+) X-Scan-Signature: 8ac499381112328dd60aea5b1ff596ea wats up pkix-archive stop wondering because now you really can make it big! http://www.ligabel.com/ cha feuerstein From owner-ietf-pkix@mail.imc.org Sun Oct 21 22:47:32 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IjnKG-0007FT-Br for pkix-archive@lists.ietf.org; Sun, 21 Oct 2007 22:47:32 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IjnKF-00087b-O0 for pkix-archive@lists.ietf.org; Sun, 21 Oct 2007 22:47:32 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9M1pXJf060105 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 21 Oct 2007 18:51:33 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9M1pX9h060104; Sun, 21 Oct 2007 18:51:33 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from host.eb2bcom.com (host.eb2bcom.com [72.232.34.10]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9M1pWTq060097 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Sun, 21 Oct 2007 18:51:33 -0700 (MST) (envelope-from steven.legg@eb2bcom.com) Received: from [202.164.192.219] (helo=[192.168.99.100]) by host.eb2bcom.com with esmtpa (Exim 4.68) (envelope-from ) id 1IjmS4-0003rf-2t; Mon, 22 Oct 2007 11:51:32 +1000 Message-ID: <471C021F.2000006@eb2bcom.com> Date: Mon, 22 Oct 2007 11:51:27 +1000 From: Steven Legg User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: Tom Gindin CC: "ietf-pkix@imc.org" Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" References: In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - host.eb2bcom.com X-AntiAbuse: Original Domain - imc.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - eb2bcom.com X-Source: X-Source-Args: X-Source-Dir: Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: e1b0e72ff1bbd457ceef31828f216a86 Tom Gindin wrote: > I know this response is a little late, but the main reason that > there is no central repository for CA names is that there is no world-wide > directory using X.500 names. For reasons which have been discussed many > times on this list, there probably never will be. Of course, the IETF > knows of an existing registry which could be used to avoid conflicts > between CA names. > How about the following wording: "Certificate Authorities SHOULD > NOT use a value in the Organization or Common Name attribute of their > Distinguished Name which is syntactically legal as a dNSName (i.e. an IA5 > string containing one or more periods but no spaces) unless they are > operated by an organization which has registered the domain name > controlling that dNSName. Certificate Authorities wishing to ensure a > globally unique issuer name MAY use an IA5 FQDN controlled by their > organization in either the Organization or the Common Name attribute." ... or use the dc naming attribute defined in RFC 4519. Regards, Steven > Does anybody want to add Organizational Unit into the mix, and possibly > even make it a SHOULD for newly allocated CA's? > Given my unfamiliarity with non-alphabetic scripts, I hesitate to > discuss internationalized DNS names in this connection unless Punycode is > relevant. However, even without considering DR 320, using somebody else's > domain name as your CN or O attribute is misleading. > > Tom Gindin > > P.S. - The opinions above are mine, and not necessarily those of my > employer > > > > Ryan Hurst > Sent by: owner-ietf-pkix@mail.imc.org > 10/09/2007 08:47 PM > > To > Paul Hoffman , Russ Housley , > "ietf-pkix@imc.org" > cc > > Subject > RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" > > > > > > > > All of these statements are true. > > Words fail me is as fine a response to that as any... > > ________________________________________ > From: owner-ietf-pkix@mail.imc.org [owner-ietf-pkix@mail.imc.org] On > Behalf Of Paul Hoffman [paul.hoffman@vpnc.org] > Sent: Tuesday, October 09, 2007 3:25 PM > To: Russ Housley; ietf-pkix@imc.org > Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of > DR320" > > The ITU statement says the following: > >>> One of the participants in the directory meeting stated that >>> Certification Authorities are being deployed with names not >>> acquired from naming authorities but with names arbitrarily chosen >>> assuming that no other CA is or will be operating under that name. > > That is, of course, true. There is no central repository for CA names > because there is no central authority for CAs. > >>> That participant further stated that the IETF provides no >>> guidelines on ensuring that the names of CAs are unambiguous. > > That is true. > >>> The directory group requests the IETF PKIX group to comment on this >>> statement. > > Should we make a consensus call on "that is true"? > >>> If the statement is correct, we ask the IETF to consider putting a >>> mechanism in place to prevent conflict, e.g. a list of existing CA >>> names that deployers of new CAs could check for naming conflicts. > > Words fail me. > > --Paul Hoffman, Director > --VPN Consortium > > > From owner-ietf-pkix@mail.imc.org Mon Oct 22 00:17:06 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ijoiw-0003Wk-Pg for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 00:17:06 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1Ijoiv-0004G8-Gz for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 00:17:05 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9M3WSqp064972 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 21 Oct 2007 20:32:28 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9M3WSTk064971; Sun, 21 Oct 2007 20:32:28 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from host.eb2bcom.com (host.eb2bcom.com [72.232.34.10]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9M3WRIH064965 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Sun, 21 Oct 2007 20:32:27 -0700 (MST) (envelope-from steven.legg@eb2bcom.com) Received: from cust3803.vic01.dataco.com.au ([202.164.192.219] helo=[192.168.99.100]) by host.eb2bcom.com with esmtpa (Exim 4.68) (envelope-from ) id 1Ijo1j-0008M6-4F; Mon, 22 Oct 2007 13:32:27 +1000 Message-ID: <471C19C5.3070902@eb2bcom.com> Date: Mon, 22 Oct 2007 13:32:21 +1000 From: Steven Legg User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: Russ Housley CC: PKIX Subject: Re: Upper Bounds for X.509 References: <001401c8125b$17c96e60$0100a8c0@morten> <200710191707.l9JH7bYE004435@balder-227.proper.com> In-Reply-To: <200710191707.l9JH7bYE004435@balder-227.proper.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - host.eb2bcom.com X-AntiAbuse: Original Domain - imc.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - eb2bcom.com X-Source: X-Source-Args: X-Source-Dir: Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 082a9cbf4d599f360ac7f815372a6a15 Russ, Russ Housley wrote: > I understand that an unbounded directory string may be useful in many > contexts, but is it going to help interoperability to remove the bounds > on naming attributes? As I recall, it was an upper bound on a naming attribute that we first bumped up against, and which prompted us to ignore all the upper bounds. Ignoring the upper bounds also allows us to claim conformance with LDAP, which imposes no upper bounds. Clearly there is the potential for interoperability problems if we interwork with an implementation that imposes upper bounds. To the best of my knowledge such problems haven't arisen with respect to our implementation. I assume that in each instance of interworking the other system also ignores the upper bounds, or else the shared data happen to be within that other system's upper bounds. Nonetheless, the potential for interoperability problems diminishes if the upper bounds are discarded. Regards, Steven > > Russ > > At 10:19 AM 10/19/2007, Erik Andersen wrote: >> Hi Folks, >> >> As mentioned in a liaison statement from the directory meeting, >> September 2007 in Geneva, we have decided to remove the Upper Bounds >> from any occurrence. A majority of those are on DirectoryString, which >> is also specified for many attribute types. >> >> At one type we were considering removing the Upper Bound by the Defect >> Report procedure, but found the change to heavy for that procedure. By >> the Defect Report procedure we corrected a inconsistency in the Upper >> Bounds and expressed that Upper Bounds are only provided as examples. >> >> It is our intention to remove the Upper Bound from the sixth edition >> of the Directory Specification. We gave a possible approach in the >> liaison statement, but that may not be the final solution. Be assured >> that whatever we do, it will be valid ASN.1. The example we came up >> with is actual valid ASN.1 by using parameterized specification. >> However, we are faced with the problem that directory object class >> definitions will be parameterized. This does not change the definition >> as such, but only the ASN.1 appearance. This could be a problem for >> implementations parsing such object class definitions to set-up the >> directory schema. >> >> Our fall-back solution is to define a new variant of DirectoryString >> that is unbounded. >> >> Erik Andersen >> Andersen's L-Service >> Mobile: +45 20 97 14 90 >> e-mail: era@tdcadsl.dk >> http://www.x500standard.com/ >> http://home20.inet.tele.dk/era/me >> From owner-ietf-pkix@mail.imc.org Mon Oct 22 00:28:50 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IjouH-0008On-W0 for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 00:28:50 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IjouH-0004ct-Jz for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 00:28:49 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9M3k3kR065609 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 21 Oct 2007 20:46:03 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9M3k3gY065608; Sun, 21 Oct 2007 20:46:03 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from host.eb2bcom.com (host.eb2bcom.com [72.232.34.10]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9M3k1sO065602 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Sun, 21 Oct 2007 20:46:02 -0700 (MST) (envelope-from steven.legg@eb2bcom.com) Received: from [202.164.192.219] (helo=[192.168.99.100]) by host.eb2bcom.com with esmtpa (Exim 4.68) (envelope-from ) id 1IjoEs-0000P2-6e; Mon, 22 Oct 2007 13:46:02 +1000 Message-ID: <471C1CF5.8090803@eb2bcom.com> Date: Mon, 22 Oct 2007 13:45:57 +1000 From: Steven Legg User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: Hoyt L Kesterson II CC: PKIX Subject: Re: Upper Bounds for X.509 References: <6077526.1192816179346.JavaMail.root@elwamui-lapwing.atl.sa.earthlink.net> In-Reply-To: <6077526.1192816179346.JavaMail.root@elwamui-lapwing.atl.sa.earthlink.net> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - host.eb2bcom.com X-AntiAbuse: Original Domain - imc.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - eb2bcom.com X-Source: X-Source-Args: X-Source-Dir: Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 1ac7cc0a4cd376402b85bc1961a86ac2 Hoyt, Hoyt L Kesterson II wrote: > Another option is to keep the bounds as we have them and have the IETF standard mandate the bounds, choosing any values you like. Then directory deployments would have to choose between being nice to PKIX applications by imposing PKIX's upper bounds, or being nice to other LDAP applications by not imposing upper bounds. Regards, Steven From owner-ietf-pkix@mail.imc.org Mon Oct 22 05:47:09 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IjtsL-0006Lr-6n for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 05:47:09 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Ijts4-0007Fz-U2 for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 05:46:59 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9M8YaSm087562 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 01:34:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9M8Yahi087561; Mon, 22 Oct 2007 01:34:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from elasmtp-masked.atl.sa.earthlink.net (elasmtp-masked.atl.sa.earthlink.net [209.86.89.68]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9M8YZnf087555 for ; Mon, 22 Oct 2007 01:34:35 -0700 (MST) (envelope-from hoytkesterson@earthlink.net) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=dk20050327; d=earthlink.net; b=nJBCUXwc6/xe9SVqztYqG2NmrNgqiv1Zh2dFCy7a0uxaoFtEo5T5d23xRpSQO+kC; h=Received:Mime-Version:Message-Id:In-Reply-To:References:Date:To:From:Subject:Content-Type:X-ELNK-Trace:X-Originating-IP; Received: from [151.118.180.188] (helo=[192.168.0.4]) by elasmtp-masked.atl.sa.earthlink.net with asmtp (TLSv1:AES256-SHA:256) (Exim 4.34) id 1Ijsk6-00022S-W9 for ietf-pkix@imc.org; Mon, 22 Oct 2007 04:34:35 -0400 Mime-Version: 1.0 Message-Id: In-Reply-To: <471C1CF5.8090803@eb2bcom.com> References: <6077526.1192816179346.JavaMail.root@elwamui-lapwing.atl.sa.earthlink.net> <471C1CF5.8090803@eb2bcom.com> Date: Mon, 22 Oct 2007 01:30:50 -0700 To: ietf-pkix@imc.org From: Hoyt L Kesterson II Subject: Re: Upper Bounds for X.509 Content-Type: text/plain; charset="us-ascii" X-ELNK-Trace: 59f3edefb26af0321a6f9084d36cbc6474bf435c0eb9d478100f810b5c66a190b0a6111f7b49939cfbdb5738f082ee71350badd9bab72f9c350badd9bab72f9c X-Originating-IP: 151.118.180.188 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 7d33c50f3756db14428398e2bdedd581 Steven, I didn't say it was an attractive option. I have always been against these limits. Peter Gutmann recommended that "reasonable" upper bounds be set, e.g. thousand characters for a common name. But it appears his concern is about erratic operation when the certificate itself it huge. It may be more reasonable to set a max size on the entire certificate than on the individual components that comprise it. hoyt >Hoyt, > >Hoyt L Kesterson II wrote: >>Another option is to keep the bounds as we have them and have the IETF standard mandate the bounds, choosing any values you like. > >Then directory deployments would have to choose between being nice >to PKIX applications by imposing PKIX's upper bounds, or being >nice to other LDAP applications by not imposing upper bounds. > >Regards, >Steven From owner-ietf-pkix@mail.imc.org Mon Oct 22 07:20:11 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IjvJS-0005et-0B for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 07:19:14 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IjvJI-0002n8-GQ for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 07:19:06 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MAYLxR097042 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 03:34:21 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MAYLOm097041; Mon, 22 Oct 2007 03:34:21 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from woodstock.binhost.com (woodstock.binhost.com [8.8.40.152]) by balder-227.proper.com (8.13.5/8.13.5) with SMTP id l9MAYKwt097035 for ; Mon, 22 Oct 2007 03:34:21 -0700 (MST) (envelope-from housley@vigilsec.com) Message-Id: <200710221034.l9MAYKwt097035@balder-227.proper.com> Received: (qmail 27076 invoked by uid 0); 22 Oct 2007 10:34:19 -0000 Received: from unknown (HELO THINKPADR52.vigilsec.com) (193.0.2.29) by woodstock.binhost.com with SMTP; 22 Oct 2007 10:34:19 -0000 X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Mon, 22 Oct 2007 06:33:38 -0400 To: Hoyt L Kesterson II , ietf-pkix@imc.org From: Russ Housley Subject: Re: Upper Bounds for X.509 In-Reply-To: References: <6077526.1192816179346.JavaMail.root@elwamui-lapwing.atl.sa.earthlink.net> <471C1CF5.8090803@eb2bcom.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 1.5 (+) X-Scan-Signature: 39bd8f8cbb76cae18b7e23f7cf6b2b9f Hoyt: One never knows which non-critical extensions might be put in a certificate. Remember when Bob Jueneman was advocating pictures in certificates.... Russ At 04:30 AM 10/22/2007, Hoyt L Kesterson II wrote: >Steven, I didn't say it was an attractive option. I have always been >against these limits. > >Peter Gutmann recommended that "reasonable" upper bounds be set, >e.g. thousand characters for a common name. But it appears his >concern is about erratic operation when the certificate itself it huge. > >It may be more reasonable to set a max size on the entire >certificate than on the individual components that comprise it. > > hoyt > > >Hoyt, > > > >Hoyt L Kesterson II wrote: > >>Another option is to keep the bounds as we have them and have the > IETF standard mandate the bounds, choosing any values you like. > > > >Then directory deployments would have to choose between being nice > >to PKIX applications by imposing PKIX's upper bounds, or being > >nice to other LDAP applications by not imposing upper bounds. > > > >Regards, > >Steven From owner-ietf-pkix@mail.imc.org Mon Oct 22 08:57:19 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IjwqN-0006s3-IN for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 08:57:19 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IjwqB-00081F-Jv for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 08:57:15 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MC1Yml005339 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 05:01:34 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MC1Ywq005338; Mon, 22 Oct 2007 05:01:34 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from odin2.bull.net (odin2.bull.net [129.184.85.11]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MC1S8o005306 for ; Mon, 22 Oct 2007 05:01:29 -0700 (MST) (envelope-from denis.pinkas@bull.net) Received: from MSGA-001.frcl.bull.fr (msga-mcl1.frcl.bull.fr [129.184.87.20]) by odin2.bull.net (8.9.3/8.9.3) with ESMTP id OAA100800; Mon, 22 Oct 2007 14:08:52 +0200 Received: from frcls4013 ([129.182.108.120]) by MSGA-001.frcl.bull.fr (Lotus Domino Release 5.0.11) with SMTP id 2007102213524618:169607 ; Mon, 22 Oct 2007 13:52:46 +0200 Date: Mon, 22 Oct 2007 13:52:42 +0200 From: "Denis Pinkas" To: "ietf-pkix@imc.org" Cc: "Russ Housley" Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" X-mailer: Foxmail 5.0 [-fr-] Mime-Version: 1.0 X-MIMETrack: Itemize by SMTP Server on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 22/10/2007 13:52:46, Serialize by Router on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 22/10/2007 14:01:16, Serialize complete at 22/10/2007 14:01:16 Message-ID: Content-Type: text/plain; charset="iso-8859-1" X-MIME-Autoconverted: from base64 to 8bit by balder-227.proper.com id l9MC1Y8o005332 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Content-Transfer-Encoding: quoted-printable X-MIME-Autoconverted: from 8bit to quoted-printable by balder-227.proper.com id l9MC1Yml005339 X-Spam-Score: 2.1 (++) X-Scan-Signature: 6cca30437e2d04f45110f2ff8dc1b1d5 Paul, I agree with what you say. However", Words fail me" may have multiple int= erpretations. We are going to invent a mechanism to prevent conflict, e.g. a list of ex= isting CA=20 names that deployers of new CAs could check for naming conflicts. We are not going either to mandate the use of the DC naming attribute to = guarantee DN uniqueness. The text from DR 320 is: On page 12, the current text states =93serialNumber is an integer assigne= d=20 by the CA to each certificate. The value of serialNumber shall be unique=20 for each certificate issued by a given CA (i.e., the issuer name and seri= al number=20 identify a unique certificate).=94 =20 The text inside the parenthesis should be deleted: the DN of the issuer n= ame=20 cannot be guaranteed to be unique (the collision may be deliberate or acc= idental)=20 and therefore the issuer name and serial number cannot uniquely identify = a certificate. The text of the answer to DR 320 states: "This DR advanced an argument that Distinguished Names may=20 not be unique and as such, the DN of the Certificate User may not be uniq= ue. The directory group believes that Distinguished Name values must be=20 unique and unambiguously identify a single entity, hence the use of=20 the term Distinguished". The implications are that DR 320 has been rejected by the directory group= on a wrong basis. Denis >The ITU statement says the following: >>>One of the participants in the directory meeting stated that=20 >>>Certification Authorities are being deployed with names not=20 >>>acquired from naming authorities but with names arbitrarily chosen=20 >>>assuming that no other CA is or will be operating under that name. >That is, of course, true. There is no central repository for CA names=20 >because there is no central authority for CAs. >>>That participant further stated that the IETF provides no=20 >>>guidelines on ensuring that the names of CAs are unambiguous. >That is true. >>>The directory group requests the IETF PKIX group to comment on this=20 >>>statement. >Should we make a consensus call on "that is true"? >>>If the statement is correct, we ask the IETF to consider putting a=20 >>>mechanism in place to prevent conflict, e.g. a list of existing CA=20 >>>names that deployers of new CAs could check for naming conflicts. >Words fail me. >--Paul Hoffman, Director >--VPN Consortium From owner-ietf-pkix@mail.imc.org Mon Oct 22 08:57:41 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ijwqj-0007RO-Ty for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 08:57:41 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Ijwqf-00087c-GP for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 08:57:41 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MC1Z9B005347 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 05:01:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MC1ZRn005346; Mon, 22 Oct 2007 05:01:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from odin2.bull.net (odin2.bull.net [129.184.85.11]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MC1Xr9005326 for ; Mon, 22 Oct 2007 05:01:34 -0700 (MST) (envelope-from denis.pinkas@bull.net) Received: from MSGA-001.frcl.bull.fr (msga-mcl1.frcl.bull.fr [129.184.87.20]) by odin2.bull.net (8.9.3/8.9.3) with ESMTP id OAA11860 for ; Mon, 22 Oct 2007 14:08:55 +0200 Received: from frcls4013 ([129.182.108.120]) by MSGA-001.frcl.bull.fr (Lotus Domino Release 5.0.11) with SMTP id 2007102213573596:169728 ; Mon, 22 Oct 2007 13:57:35 +0200 Date: Mon, 22 Oct 2007 13:57:33 +0200 From: "Denis Pinkas" To: "ietf-pkix@imc.org" Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" X-mailer: Foxmail 5.0 [-fr-] Mime-Version: 1.0 X-MIMETrack: Itemize by SMTP Server on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 22/10/2007 13:57:35, Serialize by Router on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 22/10/2007 14:01:22, Serialize complete at 22/10/2007 14:01:22 Message-ID: Content-Type: text/plain; charset="iso-8859-1" X-MIME-Autoconverted: from base64 to 8bit by balder-227.proper.com id l9MC1Zr9005341 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Content-Transfer-Encoding: quoted-printable X-MIME-Autoconverted: from 8bit to quoted-printable by balder-227.proper.com id l9MC1Z9B005347 X-Spam-Score: 2.1 (++) X-Scan-Signature: 87a3f533bb300b99e2a18357f3c1563d Russ said: >It seems to me that this is a trust anchor configuration concern. =20 Not only. > If two CAs adopt the same name and a user accepts both of these CAs as=20 >trust anchors, then there could be a problem. Just don't do it. This is correct, but insufficient. This does not prevent two CAs somewher= e=20 under this trust anchor to use the same name in different branches. >RFC 3280bis says: > While X.509 mandates that names be unambiguous, there is a risk that > two unrelated authorities will issue certificates and/or CRLs under > the same issuer name. =20 This is correct. This sentence contradicts the response to DR 320. > As a means of reducing problems and security > issues related to issuer name collisions, CA and CRL issuer names > SHOULD be formed in a way that reduces the likelihood of name > collisions. =20 This recommandation does not *prevent* "problems and security issues". This sentence should be deleted or changed.=20 > Implementers should take into account the possible > existence of multiple unrelated CAs and CRL issuers with the same > name. =20 This is fully correct. > At a minimum, implementations validating CRLs MUST ensure that > the certification path of a certificate and the CRL issuer > certification path used to validate the certificate terminate at the > same trust anchor. This "minimum" clause is both insufficient and insecure.=20 This sentence gives a false sense of security. This means that RFC3280bis currently provides no coorect guidance=20 on how implementers should address this issue.=20 The following text is an attempt to address this issue: "Implementations validating indirect CRLs MUST make sure that the=20 certificate of the CRL Issuer is indeed issued by the CA that issued=20 the certificate to be verified, which means that the sequence of DNs=20 of the certification path of the CRL issuer, up to the DN of a trust anch= or,=20 must be identical to the the sequence of DNs of the certification path=20 of the certificate to be verified, up to the DN of the same trust anchor". Denis >Russ > >At 08:12 AM 10/5/2007, ITU-T SG 17 wrote: > >>Title: Liaison to IETF on the resolution of DR320 >>Submission Date: 2007-10-05 >>URL of the IETF Web page:=20 >>https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=3D375 >>Please reply by 2008-03-01 >> >>From: Xiaoya Yang(ITU-T SG 17) >>To: IETF/PKIX(Russ Housley , Stefan Santesson=20 >>) >>Cc: Herbert Bertine >> >> >> >>Reponse Contact: Xiaoya YANG >> >>Technical Contact: >> >>Purpose: For action >>Body: At our recent ITU-T SG17 meeting in Geneva we discussed and=20 >>rejected Defect Report 320=20 >>(http://www.x500standard.com/uploads/Defects/DR_320.pdf) from=20 >>AFNOR. This DR advanced an argument that Distinguished Names may=20 >>not be unique and as such, the DN of the Certificate User may not be un= ique. >>The directory group believes that Distinguished Name values must be=20 >>unique and unambiguously identify a single entity, hence the use of=20 >>the term Distinguished. >>The DR states =E2=80=9Cthe DN of the issuer name cannot be guaranteed t= o=20 >>be unique=E2=80=9D. X.509 takes its definition of DN from X.501. Clau= se=20 >>9.2 of X.501 specifies the definition of DistinguishedName. This=20 >>clause states A name shall be unambiguous, that is, denotes just one ob= ject. >>Clause 9 goes on to state: It is the responsibility of the relevant=20 >>naming authority for an entry to ensure that this is so by=20 >>appropriately assigning distinguished attribute values. Allocation=20 >>of RDNs is considered an administrative undertaking that may or may=20 >>not require some negotiation between involved organizations or=20 >>administrations. This Directory Specification does not provide such=20 >>a negotiation mechanism, and makes no assumption as to how it is perfor= med. >>The standard takes an axiomatic view of the concept that a=20 >>distinguished name unambiguously identifies a single entity. Things=20 >>break if two entities identify themselves using the same name. We=20 >>don't let two entities have the same domain name or the same email=20 >>address. Why? - because things wouldn't work. >>The directory group does not accept the DR=E2=80=99s basic argument. W= e=20 >>believe that if two entities present the same name and a CA issues a=20 >>certificate to each, that CA made a mistake - not a naming authority=20 >>mistake, since a CA is not an naming authority (although one entity=20 >>can be both), but an entity to key binding mistake that leads to=20 >>confusion and even worse, a security risk. >>We believe that if two entities claim the same name as top level=20 >>CAs, there is a political/procedural breakdown much like the domain=20 >>ownership arguments we have seen. No one argues that the Internet=20 >>protocols should be modified to solve that problem. The conflict is=20 >>resolved and one entity is assigned the name. The group believes=20 >>that this is the only reasonable solution for Distinguished=20 >>Naming. One votes for the CA of choice by configuring it as an anchor. >>One of the participants in the directory meeting stated that=20 >>Certification Authorities are being deployed with names not acquired=20 >>from naming authorities but with names arbitrarily chosen assuming=20 >>that no other CA is or will be operating under that name. That=20 >>participant further stated that the IETF provides no guidelines on=20 >>ensuring that the names of CAs are unambiguous. >>The directory group requests the IETF PKIX group to comment on this=20 >>statement. If the statement is correct, we ask the IETF to consider=20 >>putting a mechanism in place to prevent conflict, e.g. a list of=20 >>existing CA names that deployers of new CAs could check for naming conf= licts. >>Attachment(s): >>No document has been attached > Regards, Denis Pinkas From owner-ietf-pkix@mail.imc.org Mon Oct 22 09:48:06 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IjxdW-00016U-IY for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 09:48:06 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IjxdI-0002iw-Km for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 09:48:01 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MCsB8b012038 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 05:54:11 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MCsBZo012037; Mon, 22 Oct 2007 05:54:11 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mallaury.nerim.net (smtp-101-monday.noc.nerim.net [62.4.17.101]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MCs9jL012028 for ; Mon, 22 Oct 2007 05:54:10 -0700 (MST) (envelope-from julien.stern@cryptolog.com) Received: from uranus.cry.pto (cryptolog2.pck.nerim.net [213.41.184.9]) by mallaury.nerim.net (Postfix) with ESMTP id 79F9D4F3CA for ; Mon, 22 Oct 2007 14:53:54 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by uranus.cry.pto (Postfix) with ESMTP id 5BC4E4428C for ; Mon, 22 Oct 2007 14:54:02 +0200 (CEST) X-Virus-Scanned: Debian amavisd-new at cryptolog.com Received: from uranus.cry.pto ([127.0.0.1]) by localhost (uranus.cry.pto [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yuQXUuKMRvNf for ; Mon, 22 Oct 2007 14:53:54 +0200 (CEST) Received: from mars.cry.pto (isonoe.cry.pto [10.0.1.15]) by uranus.cry.pto (Postfix) with SMTP id EA24B44006 for ; Mon, 22 Oct 2007 14:53:53 +0200 (CEST) Received: by mars.cry.pto (sSMTP sendmail emulation); Mon, 22 Oct 2007 14:53:53 +0200 From: "Julien Stern" Date: Mon, 22 Oct 2007 14:53:53 +0200 To: "ietf-pkix@imc.org" Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Message-ID: <20071022125353.GO4999@mars.cry.pto> Mail-Followup-To: Julien Stern , "ietf-pkix@imc.org" References: MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.13 (2006-08-11) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Content-Transfer-Encoding: quoted-printable X-MIME-Autoconverted: from 8bit to quoted-printable by balder-227.proper.com id l9MCsB8b012038 X-Spam-Score: 0.0 (/) X-Scan-Signature: 093efd19b5f651b2707595638f6c4003 On Mon, Oct 22, 2007 at 01:57:33PM +0200, Denis Pinkas wrote: > > [snip] Hi Denis, > This means that RFC3280bis currently provides no coorect guidance=20 > on how implementers should address this issue.=20 Agreed. There is a somewhat "matter of local policy-ish" issue here. > The following text is an attempt to address this issue: >=20 > "Implementations validating indirect CRLs MUST make sure that the=20 > certificate of the CRL Issuer is indeed issued by the CA that issued=20 > the certificate to be verified, which means that the sequence of DNs=20 > of the certification path of the CRL issuer, up to the DN of a trust an= chor,=20 > must be identical to the the sequence of DNs of the certification path=20 > of the certificate to be verified, up to the DN of the same trust ancho= r". Forcing the CA to directly issue the CRL issuer certificate is way too restrictive in my humble opinion. I have an example of a PKI where there is a single (indirect) CRL issuer for about 20 CAs. The CRL issuer certificate is issued by the (Root) CA that issued those 20 CA certificates. Regards, -- Julien > Denis >=20 > >Russ > > > >At 08:12 AM 10/5/2007, ITU-T SG 17 wrote: > > > >>Title: Liaison to IETF on the resolution of DR320 > >>Submission Date: 2007-10-05 > >>URL of the IETF Web page:=20 > >>https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=3D37= 5 > >>Please reply by 2008-03-01 > >> > >>From: Xiaoya Yang(ITU-T SG 17) > >>To: IETF/PKIX(Russ Housley , Stefan Santesson=20 > >>) > >>Cc: Herbert Bertine > >> > >> > >> > >>Reponse Contact: Xiaoya YANG > >> > >>Technical Contact: > >> > >>Purpose: For action > >>Body: At our recent ITU-T SG17 meeting in Geneva we discussed and=20 > >>rejected Defect Report 320=20 > >>(http://www.x500standard.com/uploads/Defects/DR_320.pdf) from=20 > >>AFNOR. This DR advanced an argument that Distinguished Names may=20 > >>not be unique and as such, the DN of the Certificate User may not be = unique. > >>The directory group believes that Distinguished Name values must be=20 > >>unique and unambiguously identify a single entity, hence the use of=20 > >>the term Distinguished. > >>The DR states =E2=80=9Cthe DN of the issuer name cannot be guaranteed= to=20 > >>be unique=E2=80=9D. X.509 takes its definition of DN from X.501. Cl= ause=20 > >>9.2 of X.501 specifies the definition of DistinguishedName. This=20 > >>clause states A name shall be unambiguous, that is, denotes just one = object. > >>Clause 9 goes on to state: It is the responsibility of the relevant=20 > >>naming authority for an entry to ensure that this is so by=20 > >>appropriately assigning distinguished attribute values. Allocation=20 > >>of RDNs is considered an administrative undertaking that may or may=20 > >>not require some negotiation between involved organizations or=20 > >>administrations. This Directory Specification does not provide such=20 > >>a negotiation mechanism, and makes no assumption as to how it is perf= ormed. > >>The standard takes an axiomatic view of the concept that a=20 > >>distinguished name unambiguously identifies a single entity. Things=20 > >>break if two entities identify themselves using the same name. We=20 > >>don't let two entities have the same domain name or the same email=20 > >>address. Why? - because things wouldn't work. > >>The directory group does not accept the DR=E2=80=99s basic argument. = We=20 > >>believe that if two entities present the same name and a CA issues a=20 > >>certificate to each, that CA made a mistake - not a naming authority=20 > >>mistake, since a CA is not an naming authority (although one entity=20 > >>can be both), but an entity to key binding mistake that leads to=20 > >>confusion and even worse, a security risk. > >>We believe that if two entities claim the same name as top level=20 > >>CAs, there is a political/procedural breakdown much like the domain=20 > >>ownership arguments we have seen. No one argues that the Internet=20 > >>protocols should be modified to solve that problem. The conflict is=20 > >>resolved and one entity is assigned the name. The group believes=20 > >>that this is the only reasonable solution for Distinguished=20 > >>Naming. One votes for the CA of choice by configuring it as an ancho= r. > >>One of the participants in the directory meeting stated that=20 > >>Certification Authorities are being deployed with names not acquired=20 > >>from naming authorities but with names arbitrarily chosen assuming=20 > >>that no other CA is or will be operating under that name. That=20 > >>participant further stated that the IETF provides no guidelines on=20 > >>ensuring that the names of CAs are unambiguous. > >>The directory group requests the IETF PKIX group to comment on this=20 > >>statement. If the statement is correct, we ask the IETF to consider=20 > >>putting a mechanism in place to prevent conflict, e.g. a list of=20 > >>existing CA names that deployers of new CAs could check for naming co= nflicts. > >>Attachment(s): > >>No document has been attached > > >=20 > Regards, >=20 > Denis Pinkas >=20 >=20 From owner-ietf-pkix@mail.imc.org Mon Oct 22 10:10:38 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IjxzK-0005r8-Pb for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 10:10:38 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IjxzJ-0004Ju-Bs for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 10:10:38 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MDHBLU015515 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 06:17:11 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MDHBdc015514; Mon, 22 Oct 2007 06:17:11 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from odin2.bull.net (odin2.bull.net [129.184.85.11]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MDH5Zh015494 for ; Mon, 22 Oct 2007 06:17:07 -0700 (MST) (envelope-from denis.pinkas@bull.net) Received: from MSGA-001.frcl.bull.fr (msga-mcl1.frcl.bull.fr [129.184.87.20]) by odin2.bull.net (8.9.3/8.9.3) with ESMTP id PAA35980 for ; Mon, 22 Oct 2007 15:24:31 +0200 Received: from frcls4013 ([129.182.108.120]) by MSGA-001.frcl.bull.fr (Lotus Domino Release 5.0.11) with SMTP id 2007102215163459:172002 ; Mon, 22 Oct 2007 15:16:34 +0200 Date: Mon, 22 Oct 2007 15:16:32 +0200 From: "Denis Pinkas" To: "ietf-pkix@imc.org" Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" X-mailer: Foxmail 5.0 [-fr-] Mime-Version: 1.0 X-MIMETrack: Itemize by SMTP Server on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 22/10/2007 15:16:34, Serialize by Router on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 22/10/2007 15:17:05, Serialize complete at 22/10/2007 15:17:05 Message-ID: Content-Type: text/plain; charset="iso-8859-1" X-MIME-Autoconverted: from base64 to 8bit by balder-227.proper.com id l9MDHBZh015509 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Content-Transfer-Encoding: quoted-printable X-MIME-Autoconverted: from 8bit to quoted-printable by balder-227.proper.com id l9MDHBLU015515 X-Spam-Score: 2.1 (++) X-Scan-Signature: 87a3f533bb300b99e2a18357f3c1563d Julien, >On Mon, Oct 22, 2007 at 01:57:33PM +0200, Denis Pinkas wrote: >> >> [snip] > >Hi Denis, > >> This means that RFC3280bis currently provides no coorect guidance=20 >> on how implementers should address this issue.=20 > >Agreed. There is a somewhat "matter of local policy-ish" issue here. > >> The following text is an attempt to address this issue: >>=20 >> "Implementations validating indirect CRLs MUST make sure that the=20 >> certificate of the CRL Issuer is indeed issued by the CA that issued=20 >> the certificate to be verified, which means that the sequence of DNs=20 >> of the certification path of the CRL issuer, up to the DN of a trust a= nchor,=20 >> must be identical to the the sequence of DNs of the certification path= =20 >> of the certificate to be verified, up to the DN of the same trust anch= or". > >Forcing the CA to directly issue the CRL issuer certificate is way too >restrictive in my humble opinion. I have an example of a PKI where there >is a single (indirect) CRL issuer for about 20 CAs. > >The CRL issuer certificate is issued by the (Root) CA that issued >those 20 CA certificates. What about: Unless a local policy states otherwise, implementations validating indire= ct CRLs=20 MUST make sure that the certificate of the CRL Issuer is indeed issued by= the CA=20 that issued the certificate to be verified, which means that the sequenc= e of DNs=20 of the certification path of the CRL issuer, up to the DN of a trust anch= or,=20 must be identical to the the sequence of DNs of the certification path=20 of the certificate to be verified, up to the DN of the same trust anchor". Denis >Regards, > >-- >Julien > >> Denis >>=20 >> >Russ >> > >> >At 08:12 AM 10/5/2007, ITU-T SG 17 wrote: >> > >> >>Title: Liaison to IETF on the resolution of DR320 >> >>Submission Date: 2007-10-05 >> >>URL of the IETF Web page:=20 >> >>https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=3D3= 75 >> >>Please reply by 2008-03-01 >> >> >> >>From: Xiaoya Yang(ITU-T SG 17) >> >>To: IETF/PKIX(Russ Housley , Stefan Santesson=20 >> >>) >> >>Cc: Herbert Bertine >> >> >> >> >> >> >> >>Reponse Contact: Xiaoya YANG >> >> >> >>Technical Contact: >> >> >> >>Purpose: For action >> >>Body: At our recent ITU-T SG17 meeting in Geneva we discussed and=20 >> >>rejected Defect Report 320=20 >> >>(http://www.x500standard.com/uploads/Defects/DR_320.pdf) from=20 >> >>AFNOR. This DR advanced an argument that Distinguished Names may=20 >> >>not be unique and as such, the DN of the Certificate User may not be= unique. >> >>The directory group believes that Distinguished Name values must be=20 >> >>unique and unambiguously identify a single entity, hence the use of=20 >> >>the term Distinguished. >> >>The DR states =E2=80=9Cthe DN of the issuer name cannot be guarantee= d to=20 >> >>be unique=E2=80=9D. X.509 takes its definition of DN from X.501. C= lause=20 >> >>9.2 of X.501 specifies the definition of DistinguishedName. This=20 >> >>clause states A name shall be unambiguous, that is, denotes just one= object. >> >>Clause 9 goes on to state: It is the responsibility of the relevant=20 >> >>naming authority for an entry to ensure that this is so by=20 >> >>appropriately assigning distinguished attribute values. Allocation=20 >> >>of RDNs is considered an administrative undertaking that may or may=20 >> >>not require some negotiation between involved organizations or=20 >> >>administrations. This Directory Specification does not provide such= =20 >> >>a negotiation mechanism, and makes no assumption as to how it is per= formed. >> >>The standard takes an axiomatic view of the concept that a=20 >> >>distinguished name unambiguously identifies a single entity. Things= =20 >> >>break if two entities identify themselves using the same name. We=20 >> >>don't let two entities have the same domain name or the same email=20 >> >>address. Why? - because things wouldn't work. >> >>The directory group does not accept the DR=E2=80=99s basic argument.= We=20 >> >>believe that if two entities present the same name and a CA issues a= =20 >> >>certificate to each, that CA made a mistake - not a naming authority= =20 >> >>mistake, since a CA is not an naming authority (although one entity=20 >> >>can be both), but an entity to key binding mistake that leads to=20 >> >>confusion and even worse, a security risk. >> >>We believe that if two entities claim the same name as top level=20 >> >>CAs, there is a political/procedural breakdown much like the domain=20 >> >>ownership arguments we have seen. No one argues that the Internet=20 >> >>protocols should be modified to solve that problem. The conflict is= =20 >> >>resolved and one entity is assigned the name. The group believes=20 >> >>that this is the only reasonable solution for Distinguished=20 >> >>Naming. One votes for the CA of choice by configuring it as an anch= or. >> >>One of the participants in the directory meeting stated that=20 >> >>Certification Authorities are being deployed with names not acquired= =20 >> >>from naming authorities but with names arbitrarily chosen assuming=20 >> >>that no other CA is or will be operating under that name. That=20 >> >>participant further stated that the IETF provides no guidelines on=20 >> >>ensuring that the names of CAs are unambiguous. >> >>The directory group requests the IETF PKIX group to comment on this=20 >> >>statement. If the statement is correct, we ask the IETF to consider= =20 >> >>putting a mechanism in place to prevent conflict, e.g. a list of=20 >> >>existing CA names that deployers of new CAs could check for naming c= onflicts. >> >>Attachment(s): >> >>No document has been attached From owner-ietf-pkix@mail.imc.org Mon Oct 22 10:13:26 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ijy1L-0001l8-Gh for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 10:12:43 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Ijy0p-0004R8-MI for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 10:12:43 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MDIlv2015692 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 06:18:47 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MDIlar015691; Mon, 22 Oct 2007 06:18:47 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from EXVS01.ex.dslextreme.net ([66.51.199.86]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MDIkKn015685 for ; Mon, 22 Oct 2007 06:18:46 -0700 (MST) (envelope-from chokhani@orionsec.com) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Subject: RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Date: Mon, 22 Oct 2007 06:18:22 -0700 Message-ID: <82D5657AE1F54347A734BDD33637C8790987D3BC@EXVS01.ex.dslextreme.net> In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: New Liaison Statement, "Liaison to IETF on the resolution of DR320" thread-index: AcgUrOA/zJMTWYymSuqXK8WAICIFXAAAGv4w References: From: "Santosh Chokhani" To: "Denis Pinkas" , X-MIME-Autoconverted: from base64 to 8bit by balder-227.proper.com id l9MDIlKn015686 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Content-Transfer-Encoding: quoted-printable X-MIME-Autoconverted: from 8bit to quoted-printable by balder-227.proper.com id l9MDIlv2015692 X-Spam-Score: 0.0 (/) X-Scan-Signature: ee80a2074afbfe28d15369f4e74e579d We have been down this route before. See my presentation to PKIX in Fall 2004 IETF meeting in Washington DC. My understanding from 2004 presentation was that Russ Housley proposed in= stead of ensuring certificate certification path and CRL certification pa= th matching, we make sure that we ensure that the paths begin at the same= trust anchor. It was felt by the group (not I) that coupled with name c= onstraints in cross certified environment is sufficient to mitigate the r= isk to an acceptably low level. Of course, my argument always has been t= hat using the certificate certification path to constrain the CRL certifi= cation path provides you both with security and efficiency, something you= do not always get. The primary reason to not adopt my suggestion is tha= t it requires change to client software. Also see our paper in NIST PKI Research Workshop in 2005 for a discussion= of this. -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] = On Behalf Of Denis Pinkas Sent: Monday, October 22, 2007 7:58 AM To: ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of= DR320" Russ said: >It seems to me that this is a trust anchor configuration concern. =20 Not only. > If two CAs adopt the same name and a user accepts both of these CAs as=20 >trust anchors, then there could be a problem. Just don't do it. This is correct, but insufficient. This does not prevent two CAs somewher= e=20 under this trust anchor to use the same name in different branches. >RFC 3280bis says: > While X.509 mandates that names be unambiguous, there is a risk that > two unrelated authorities will issue certificates and/or CRLs under > the same issuer name. =20 This is correct. This sentence contradicts the response to DR 320. > As a means of reducing problems and security > issues related to issuer name collisions, CA and CRL issuer names > SHOULD be formed in a way that reduces the likelihood of name > collisions. =20 This recommandation does not *prevent* "problems and security issues". This sentence should be deleted or changed.=20 > Implementers should take into account the possible > existence of multiple unrelated CAs and CRL issuers with the same > name. =20 This is fully correct. > At a minimum, implementations validating CRLs MUST ensure that > the certification path of a certificate and the CRL issuer > certification path used to validate the certificate terminate at the > same trust anchor. This "minimum" clause is both insufficient and insecure.=20 This sentence gives a false sense of security. This means that RFC3280bis currently provides no coorect guidance=20 on how implementers should address this issue.=20 The following text is an attempt to address this issue: "Implementations validating indirect CRLs MUST make sure that the=20 certificate of the CRL Issuer is indeed issued by the CA that issued=20 the certificate to be verified, which means that the sequence of DNs=20 of the certification path of the CRL issuer, up to the DN of a trust anch= or,=20 must be identical to the the sequence of DNs of the certification path=20 of the certificate to be verified, up to the DN of the same trust anchor". Denis >Russ > >At 08:12 AM 10/5/2007, ITU-T SG 17 wrote: > >>Title: Liaison to IETF on the resolution of DR320 >>Submission Date: 2007-10-05 >>URL of the IETF Web page:=20 >>https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=3D375 >>Please reply by 2008-03-01 >> >>From: Xiaoya Yang(ITU-T SG 17) >>To: IETF/PKIX(Russ Housley , Stefan Santesson=20 >>) >>Cc: Herbert Bertine >> >> >> >>Reponse Contact: Xiaoya YANG >> >>Technical Contact: >> >>Purpose: For action >>Body: At our recent ITU-T SG17 meeting in Geneva we discussed and=20 >>rejected Defect Report 320=20 >>(http://www.x500standard.com/uploads/Defects/DR_320.pdf) from=20 >>AFNOR. This DR advanced an argument that Distinguished Names may=20 >>not be unique and as such, the DN of the Certificate User may not be un= ique. >>The directory group believes that Distinguished Name values must be=20 >>unique and unambiguously identify a single entity, hence the use of=20 >>the term Distinguished. >>The DR states =C3=A2=E2=82=AC=C5=93the DN of the issuer name cannot be = guaranteed to=20 >>be unique=C3=A2=E2=82=AC=C2=9D. X.509 takes its definition of DN from = X.501. Clause=20 >>9.2 of X.501 specifies the definition of DistinguishedName. This=20 >>clause states A name shall be unambiguous, that is, denotes just one ob= ject. >>Clause 9 goes on to state: It is the responsibility of the relevant=20 >>naming authority for an entry to ensure that this is so by=20 >>appropriately assigning distinguished attribute values. Allocation=20 >>of RDNs is considered an administrative undertaking that may or may=20 >>not require some negotiation between involved organizations or=20 >>administrations. This Directory Specification does not provide such=20 >>a negotiation mechanism, and makes no assumption as to how it is perfor= med. >>The standard takes an axiomatic view of the concept that a=20 >>distinguished name unambiguously identifies a single entity. Things=20 >>break if two entities identify themselves using the same name. We=20 >>don't let two entities have the same domain name or the same email=20 >>address. Why? - because things wouldn't work. >>The directory group does not accept the DR=C3=A2=E2=82=AC=E2=84=A2s bas= ic argument. We=20 >>believe that if two entities present the same name and a CA issues a=20 >>certificate to each, that CA made a mistake - not a naming authority=20 >>mistake, since a CA is not an naming authority (although one entity=20 >>can be both), but an entity to key binding mistake that leads to=20 >>confusion and even worse, a security risk. >>We believe that if two entities claim the same name as top level=20 >>CAs, there is a political/procedural breakdown much like the domain=20 >>ownership arguments we have seen. No one argues that the Internet=20 >>protocols should be modified to solve that problem. The conflict is=20 >>resolved and one entity is assigned the name. The group believes=20 >>that this is the only reasonable solution for Distinguished=20 >>Naming. One votes for the CA of choice by configuring it as an anchor. >>One of the participants in the directory meeting stated that=20 >>Certification Authorities are being deployed with names not acquired=20 >>from naming authorities but with names arbitrarily chosen assuming=20 >>that no other CA is or will be operating under that name. That=20 >>participant further stated that the IETF provides no guidelines on=20 >>ensuring that the names of CAs are unambiguous. >>The directory group requests the IETF PKIX group to comment on this=20 >>statement. If the statement is correct, we ask the IETF to consider=20 >>putting a mechanism in place to prevent conflict, e.g. a list of=20 >>existing CA names that deployers of new CAs could check for naming conf= licts. >>Attachment(s): >>No document has been attached > Regards, Denis Pinkas From owner-ietf-pkix@mail.imc.org Mon Oct 22 10:41:58 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IjyTe-0000xu-7m for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 10:41:58 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IjyTR-0005hI-9x for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 10:41:52 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MDbcpG017855 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 06:37:38 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MDbcVP017854; Mon, 22 Oct 2007 06:37:38 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from odin2.bull.net (odin2.bull.net [129.184.85.11]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MDbWip017829 for ; Mon, 22 Oct 2007 06:37:36 -0700 (MST) (envelope-from denis.pinkas@bull.net) Received: from MSGA-001.frcl.bull.fr (msga-mcl1.frcl.bull.fr [129.184.87.20]) by odin2.bull.net (8.9.3/8.9.3) with ESMTP id PAA57722 for ; Mon, 22 Oct 2007 15:44:57 +0200 Received: from frcls4013 ([129.182.108.120]) by MSGA-001.frcl.bull.fr (Lotus Domino Release 5.0.11) with SMTP id 2007102215371323:172571 ; Mon, 22 Oct 2007 15:37:13 +0200 Date: Mon, 22 Oct 2007 15:37:09 +0200 From: "Denis Pinkas" To: "ietf-pkix@imc.org" Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" X-mailer: Foxmail 5.0 [-fr-] Mime-Version: 1.0 X-MIMETrack: Itemize by SMTP Server on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 22/10/2007 15:37:13, Serialize by Router on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 22/10/2007 15:37:31, Serialize complete at 22/10/2007 15:37:31 Message-ID: Content-Type: text/plain; charset="iso-8859-1" X-MIME-Autoconverted: from base64 to 8bit by balder-227.proper.com id l9MDbcip017849 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Content-Transfer-Encoding: quoted-printable X-MIME-Autoconverted: from 8bit to quoted-printable by balder-227.proper.com id l9MDbcpG017855 X-Spam-Score: 2.1 (++) X-Scan-Signature: 926f893f9bbbfa169f045f85f0cdb955 Santosh, >We have been down this route before. >See my presentation to PKIX in Fall 2004 IETF meeting in Washington DC. > My understanding from 2004 presentation was that Russ Housley proposed = instead of=20 > ensuring certificate certification path and CRL certification path matc= hing,=20 Unless the client software knows by "other means" what to do, this is the= default way=20 to make the whole system secure. =20 > we make sure that we ensure that the paths begin at the same trust anch= or. =20 This helps, but it is fra from sufficient. > It was felt by the group (not I) that coupled with name constraints in = cross certified=20 > environment is sufficient to mitigate the risk to an acceptably low lev= el. =20 Reducing the risk does not suppress it. > Of course, my argument always has been that using the certificate=20 > certification path to constrain the CRL certification path provides you= both with security and=20 > efficiency, something you do not always get. =20 "Constraining" does not mean "identical". Would you be more precise ? > The primary reason to not adopt my suggestion is that it requires chang= e to client software. Since most of the clients are insecure today in case of a DN name collisi= on, it is time to fix it. >Also see our paper in NIST PKI Research Workshop in 2005 for a discussio= n of this. Would you have a link ? Denis >-----Original Message----- >From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org]= On Behalf Of Denis Pinkas >Sent: Monday, October 22, 2007 7:58 AM >To: ietf-pkix@imc.org >Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution o= f DR320" > > >Russ said: > >>It seems to me that this is a trust anchor configuration concern. =20 > >Not only. > >> If two CAs adopt the same name and a user accepts both of these CAs as= =20 >>trust anchors, then there could be a problem. Just don't do it. > >This is correct, but insufficient. This does not prevent two CAs somewhe= re=20 >under this trust anchor to use the same name in different branches. > >>RFC 3280bis says: > >> While X.509 mandates that names be unambiguous, there is a risk tha= t >> two unrelated authorities will issue certificates and/or CRLs under >> the same issuer name. =20 > >This is correct. This sentence contradicts the response to DR 320. > >> As a means of reducing problems and security >> issues related to issuer name collisions, CA and CRL issuer names >> SHOULD be formed in a way that reduces the likelihood of name >> collisions. =20 > >This recommandation does not *prevent* "problems and security issues". >This sentence should be deleted or changed.=20 > >> Implementers should take into account the possible >> existence of multiple unrelated CAs and CRL issuers with the same >> name. =20 > >This is fully correct. > >> At a minimum, implementations validating CRLs MUST ensure that >> the certification path of a certificate and the CRL issuer >> certification path used to validate the certificate terminate at th= e >> same trust anchor. > >This "minimum" clause is both insufficient and insecure.=20 >This sentence gives a false sense of security. > >This means that RFC3280bis currently provides no coorect guidance=20 >on how implementers should address this issue.=20 > >The following text is an attempt to address this issue: > >"Implementations validating indirect CRLs MUST make sure that the=20 >certificate of the CRL Issuer is indeed issued by the CA that issued=20 >the certificate to be verified, which means that the sequence of DNs=20 >of the certification path of the CRL issuer, up to the DN of a trust anc= hor,=20 >must be identical to the the sequence of DNs of the certification path=20 >of the certificate to be verified, up to the DN of the same trust anchor= ". > >Denis > >>Russ >> >>At 08:12 AM 10/5/2007, ITU-T SG 17 wrote: >> >>>Title: Liaison to IETF on the resolution of DR320 >>>Submission Date: 2007-10-05 >>>URL of the IETF Web page:=20 >>>https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=3D375 >>>Please reply by 2008-03-01 >>> >>>From: Xiaoya Yang(ITU-T SG 17) >>>To: IETF/PKIX(Russ Housley , Stefan Santesson=20 >>>) >>>Cc: Herbert Bertine >>> >>> >>> >>>Reponse Contact: Xiaoya YANG >>> >>>Technical Contact: >>> >>>Purpose: For action >>>Body: At our recent ITU-T SG17 meeting in Geneva we discussed and=20 >>>rejected Defect Report 320=20 >>>(http://www.x500standard.com/uploads/Defects/DR_320.pdf) from=20 >>>AFNOR. This DR advanced an argument that Distinguished Names may=20 >>>not be unique and as such, the DN of the Certificate User may not be u= nique. >>>The directory group believes that Distinguished Name values must be=20 >>>unique and unambiguously identify a single entity, hence the use of=20 >>>the term Distinguished. >>>The DR states =E2=80=9Cthe DN of the issuer name cannot be guaranteed = to=20 >>>be unique=E2=80=9D. X.509 takes its definition of DN from X.501. Cla= use=20 >>>9.2 of X.501 specifies the definition of DistinguishedName. This=20 >>>clause states A name shall be unambiguous, that is, denotes just one o= bject. >>>Clause 9 goes on to state: It is the responsibility of the relevant=20 >>>naming authority for an entry to ensure that this is so by=20 >>>appropriately assigning distinguished attribute values. Allocation=20 >>>of RDNs is considered an administrative undertaking that may or may=20 >>>not require some negotiation between involved organizations or=20 >>>administrations. This Directory Specification does not provide such=20 >>>a negotiation mechanism, and makes no assumption as to how it is perfo= rmed. >>>The standard takes an axiomatic view of the concept that a=20 >>>distinguished name unambiguously identifies a single entity. Things=20 >>>break if two entities identify themselves using the same name. We=20 >>>don't let two entities have the same domain name or the same email=20 >>>address. Why? - because things wouldn't work. >>>The directory group does not accept the DR=E2=80=99s basic argument. = We=20 >>>believe that if two entities present the same name and a CA issues a=20 >>>certificate to each, that CA made a mistake - not a naming authority=20 >>>mistake, since a CA is not an naming authority (although one entity=20 >>>can be both), but an entity to key binding mistake that leads to=20 >>>confusion and even worse, a security risk. >>>We believe that if two entities claim the same name as top level=20 >>>CAs, there is a political/procedural breakdown much like the domain=20 >>>ownership arguments we have seen. No one argues that the Internet=20 >>>protocols should be modified to solve that problem. The conflict is=20 >>>resolved and one entity is assigned the name. The group believes=20 >>>that this is the only reasonable solution for Distinguished=20 >>>Naming. One votes for the CA of choice by configuring it as an anchor. >>>One of the participants in the directory meeting stated that=20 >>>Certification Authorities are being deployed with names not acquired=20 >>>from naming authorities but with names arbitrarily chosen assuming=20 >>>that no other CA is or will be operating under that name. That=20 >>>participant further stated that the IETF provides no guidelines on=20 >>>ensuring that the names of CAs are unambiguous. >>>The directory group requests the IETF PKIX group to comment on this=20 >>>statement. If the statement is correct, we ask the IETF to consider=20 >>>putting a mechanism in place to prevent conflict, e.g. a list of=20 >>>existing CA names that deployers of new CAs could check for naming con= flicts. >>>Attachment(s): >>>No document has been attached >> > >Regards, > >Denis Pinkas > > Regards, Denis Pinkas From owner-ietf-pkix@mail.imc.org Mon Oct 22 11:19:06 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ijz3a-0006VA-2o for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 11:19:06 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Ijz3L-0007P8-4f for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 11:18:58 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MELUn9023305 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 07:21:31 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MELUUE023304; Mon, 22 Oct 2007 07:21:30 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from kraid.nerim.net (smtp-101-monday.nerim.net [62.4.16.101]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MELTfj023283 for ; Mon, 22 Oct 2007 07:21:29 -0700 (MST) (envelope-from julien.stern@cryptolog.com) Received: from uranus.cry.pto (cryptolog2.pck.nerim.net [213.41.184.9]) by kraid.nerim.net (Postfix) with ESMTP id E324ACF0E7 for ; Mon, 22 Oct 2007 16:21:27 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by uranus.cry.pto (Postfix) with ESMTP id EEE954428C for ; Mon, 22 Oct 2007 16:21:27 +0200 (CEST) X-Virus-Scanned: Debian amavisd-new at cryptolog.com Received: from uranus.cry.pto ([127.0.0.1]) by localhost (uranus.cry.pto [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 43sPUcKST8h7 for ; Mon, 22 Oct 2007 16:21:23 +0200 (CEST) Received: from mars.cry.pto (isonoe.cry.pto [10.0.1.15]) by uranus.cry.pto (Postfix) with SMTP id 91BC144006 for ; Mon, 22 Oct 2007 16:21:22 +0200 (CEST) Received: by mars.cry.pto (sSMTP sendmail emulation); Mon, 22 Oct 2007 16:21:22 +0200 From: "Julien Stern" Date: Mon, 22 Oct 2007 16:21:22 +0200 To: "ietf-pkix@imc.org" Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Message-ID: <20071022142122.GP4999@mars.cry.pto> Mail-Followup-To: Julien Stern , "ietf-pkix@imc.org" References: MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.13 (2006-08-11) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Content-Transfer-Encoding: quoted-printable X-MIME-Autoconverted: from 8bit to quoted-printable by balder-227.proper.com id l9MELUn9023305 X-Spam-Score: 0.0 (/) X-Scan-Signature: df9edf1223802dd4cf213867a3af6121 Denis, As you might have seen from some of my old posting on the list, I initially believed that there was a true "security flaw" in X.509 regarding revocation. Now, my understanding is that the fact there is no name collision is an _assumption_ in X.509. If one wants to cope with name collisions there are several routes one can take depending on what the "adversary" is and the constraint one wants to put on the PKI topology. 1) The first one is simply to assume that it can be detected and fixed. 2) One can cope with "accidental" name collision: I believe that is the route currently taken by PKIX by mandating trust anchor matching. 3) Your proposed wording copes with less accidental and more malicious attacks. I believe this is in the same spirit as Santosh Chokani proposal in 2004, (isn't it ?). However, it restricts the PKI topology an= d I believe it is still open to some exotic attacts (see my posting from early November 2004). 4) One can put even more restrictions on the PKI topology by mandating that a CA signs the CRL issuer keys with an explicit "CRL issuer" extensi= on (similar to OCSP) and that the AuthorityKeyExtension (containing the hash of the key) be explicitely checked during the path building. All in all, I believe it is close to impossible to define a general rule in the standard because some core assumptions regarding the uniqueness of the DNs and the adversarial model may not be the same between different PKIs. Regards, -- Julien On Mon, Oct 22, 2007 at 03:16:32PM +0200, Denis Pinkas wrote: >=20 > Julien, >=20 > >On Mon, Oct 22, 2007 at 01:57:33PM +0200, Denis Pinkas wrote: > >> > >> [snip] > > > >Hi Denis, > > > >> This means that RFC3280bis currently provides no coorect guidance=20 > >> on how implementers should address this issue.=20 > > > >Agreed. There is a somewhat "matter of local policy-ish" issue here. > > > >> The following text is an attempt to address this issue: > >>=20 > >> "Implementations validating indirect CRLs MUST make sure that the=20 > >> certificate of the CRL Issuer is indeed issued by the CA that issued= =20 > >> the certificate to be verified, which means that the sequence of DNs= =20 > >> of the certification path of the CRL issuer, up to the DN of a trust= anchor,=20 > >> must be identical to the the sequence of DNs of the certification pa= th=20 > >> of the certificate to be verified, up to the DN of the same trust an= chor". > > > >Forcing the CA to directly issue the CRL issuer certificate is way too > >restrictive in my humble opinion. I have an example of a PKI where the= re > >is a single (indirect) CRL issuer for about 20 CAs. > > > >The CRL issuer certificate is issued by the (Root) CA that issued > >those 20 CA certificates. >=20 > What about: >=20 > Unless a local policy states otherwise, implementations validating indi= rect CRLs=20 > MUST make sure that the certificate of the CRL Issuer is indeed issued = by the CA=20 > that issued the certificate to be verified, which means that the seque= nce of DNs=20 > of the certification path of the CRL issuer, up to the DN of a trust an= chor,=20 > must be identical to the the sequence of DNs of the certification path=20 > of the certificate to be verified, up to the DN of the same trust ancho= r". >=20 > Denis >=20 > >Regards, > > > >-- > >Julien > > > >> Denis > >>=20 > >> >Russ > >> > > >> >At 08:12 AM 10/5/2007, ITU-T SG 17 wrote: > >> > > >> >>Title: Liaison to IETF on the resolution of DR320 > >> >>Submission Date: 2007-10-05 > >> >>URL of the IETF Web page:=20 > >> >>https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=3D= 375 > >> >>Please reply by 2008-03-01 > >> >> > >> >>From: Xiaoya Yang(ITU-T SG 17) > >> >>To: IETF/PKIX(Russ Housley , Stefan Santesso= n=20 > >> >>) > >> >>Cc: Herbert Bertine > >> >> > >> >> > >> >> > >> >>Reponse Contact: Xiaoya YANG > >> >> > >> >>Technical Contact: > >> >> > >> >>Purpose: For action > >> >>Body: At our recent ITU-T SG17 meeting in Geneva we discussed and=20 > >> >>rejected Defect Report 320=20 > >> >>(http://www.x500standard.com/uploads/Defects/DR_320.pdf) from=20 > >> >>AFNOR. This DR advanced an argument that Distinguished Names may=20 > >> >>not be unique and as such, the DN of the Certificate User may not = be unique. > >> >>The directory group believes that Distinguished Name values must b= e=20 > >> >>unique and unambiguously identify a single entity, hence the use o= f=20 > >> >>the term Distinguished. > >> >>The DR states =E2=80=9Cthe DN of the issuer name cannot be guarant= eed to=20 > >> >>be unique=E2=80=9D. X.509 takes its definition of DN from X.501. = Clause=20 > >> >>9.2 of X.501 specifies the definition of DistinguishedName. This=20 > >> >>clause states A name shall be unambiguous, that is, denotes just o= ne object. > >> >>Clause 9 goes on to state: It is the responsibility of the relevan= t=20 > >> >>naming authority for an entry to ensure that this is so by=20 > >> >>appropriately assigning distinguished attribute values. Allocatio= n=20 > >> >>of RDNs is considered an administrative undertaking that may or ma= y=20 > >> >>not require some negotiation between involved organizations or=20 > >> >>administrations. This Directory Specification does not provide su= ch=20 > >> >>a negotiation mechanism, and makes no assumption as to how it is p= erformed. > >> >>The standard takes an axiomatic view of the concept that a=20 > >> >>distinguished name unambiguously identifies a single entity. Thin= gs=20 > >> >>break if two entities identify themselves using the same name. We= =20 > >> >>don't let two entities have the same domain name or the same email= =20 > >> >>address. Why? - because things wouldn't work. > >> >>The directory group does not accept the DR=E2=80=99s basic argumen= t. We=20 > >> >>believe that if two entities present the same name and a CA issues= a=20 > >> >>certificate to each, that CA made a mistake - not a naming authori= ty=20 > >> >>mistake, since a CA is not an naming authority (although one entit= y=20 > >> >>can be both), but an entity to key binding mistake that leads to=20 > >> >>confusion and even worse, a security risk. > >> >>We believe that if two entities claim the same name as top level=20 > >> >>CAs, there is a political/procedural breakdown much like the domai= n=20 > >> >>ownership arguments we have seen. No one argues that the Internet= =20 > >> >>protocols should be modified to solve that problem. The conflict = is=20 > >> >>resolved and one entity is assigned the name. The group believes=20 > >> >>that this is the only reasonable solution for Distinguished=20 > >> >>Naming. One votes for the CA of choice by configuring it as an an= chor. > >> >>One of the participants in the directory meeting stated that=20 > >> >>Certification Authorities are being deployed with names not acquir= ed=20 > >> >>from naming authorities but with names arbitrarily chosen assuming= =20 > >> >>that no other CA is or will be operating under that name. That=20 > >> >>participant further stated that the IETF provides no guidelines on= =20 > >> >>ensuring that the names of CAs are unambiguous. > >> >>The directory group requests the IETF PKIX group to comment on thi= s=20 > >> >>statement. If the statement is correct, we ask the IETF to consid= er=20 > >> >>putting a mechanism in place to prevent conflict, e.g. a list of=20 > >> >>existing CA names that deployers of new CAs could check for naming= conflicts. > >> >>Attachment(s): > >> >>No document has been attached >=20 >=20 From owner-ietf-pkix@mail.imc.org Mon Oct 22 11:32:09 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IjzDY-0002GT-35 for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 11:29:24 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IjzDM-0008HQ-PV for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 11:29:14 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MEXdJZ025950 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 07:33:39 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MEXd5T025949; Mon, 22 Oct 2007 07:33:39 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from kraid.nerim.net (smtp-101-monday.nerim.net [62.4.16.101]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MEXbdY025941 for ; Mon, 22 Oct 2007 07:33:38 -0700 (MST) (envelope-from julien.stern@cryptolog.com) Received: from uranus.cry.pto (cryptolog2.pck.nerim.net [213.41.184.9]) by kraid.nerim.net (Postfix) with ESMTP id 0902BCF0CE for ; Mon, 22 Oct 2007 16:33:37 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by uranus.cry.pto (Postfix) with ESMTP id 13C8D4428C for ; Mon, 22 Oct 2007 16:33:37 +0200 (CEST) X-Virus-Scanned: Debian amavisd-new at cryptolog.com Received: from uranus.cry.pto ([127.0.0.1]) by localhost (uranus.cry.pto [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aEhfP+H9zqdQ for ; Mon, 22 Oct 2007 16:33:31 +0200 (CEST) Received: from mars.cry.pto (isonoe.cry.pto [10.0.1.15]) by uranus.cry.pto (Postfix) with SMTP id 6726744006 for ; Mon, 22 Oct 2007 16:33:30 +0200 (CEST) Received: by mars.cry.pto (sSMTP sendmail emulation); Mon, 22 Oct 2007 16:33:30 +0200 From: "Julien Stern" Date: Mon, 22 Oct 2007 16:33:30 +0200 To: ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Message-ID: <20071022143330.GQ4999@mars.cry.pto> Mail-Followup-To: Julien Stern , ietf-pkix@imc.org References: <82D5657AE1F54347A734BDD33637C8790987D3BC@EXVS01.ex.dslextreme.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <82D5657AE1F54347A734BDD33637C8790987D3BC@EXVS01.ex.dslextreme.net> User-Agent: Mutt/1.5.13 (2006-08-11) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 97adf591118a232206bdb5a27b217034 On Mon, Oct 22, 2007 at 06:18:22AM -0700, Santosh Chokhani wrote: > > We have been down this route before. Oooooh Yes. Lots of fun and (gentle) arguments... > See my presentation to PKIX in Fall 2004 IETF meeting in Washington DC. > > My understanding from 2004 presentation was that Russ Housley proposed instead of ensuring certificate certification path and CRL certification path matching, we make sure that we ensure that the paths begin at the same trust anchor. It was felt by the group (not I) that coupled with name constraints in cross certified environment is sufficient to mitigate the risk to an acceptably low level. Of course, my argument always has been that using the certificate certification path to constrain the CRL certification path provides you both with security and efficiency, something you do not always get. The primary reason to not adopt my suggestion is that it requires change to client software. I did not feel either that trust anchor matching was sufficient enough. As you may remember, I also felt that your proposed solution, while improving the situation, did not close every possible attacks, and I proposed an alternative that was (in my humble opinion) even more secure but with even more changes on the client software. Anyway, my current take on the subject would be roughly the following. RFC3280bis could include something in the line of: "The uniqueness of DN of all entities in all the Trust Anchors hierarchies SHOULD be enforced. If the uniqueness cannot be guaranteed in some circonstances, client software MAY implement additional checks in order to lower the risk of outputing an incorrect revocation value during path validation. [We could give example of additional checks here: checking the trust anchor matching, check the full path matching, checking the AuthorityKeyIdentifier hash matching, etc]. Client implementors should however be aware that these additional checks may hinder interoperability in the general case." -- Julien From owner-ietf-pkix@mail.imc.org Mon Oct 22 11:48:37 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IjzW8-0003Uy-Va for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 11:48:36 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IjzVv-00014J-4v for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 11:48:26 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MEtnDG028726 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 07:55:49 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MEtn8n028725; Mon, 22 Oct 2007 07:55:49 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from odin2.bull.net (odin2.bull.net [129.184.85.11]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MEtk4l028715 for ; Mon, 22 Oct 2007 07:55:48 -0700 (MST) (envelope-from denis.pinkas@bull.net) Received: from MSGA-001.frcl.bull.fr (msga-mcl1.frcl.bull.fr [129.184.87.20]) by odin2.bull.net (8.9.3/8.9.3) with ESMTP id RAA69048 for ; Mon, 22 Oct 2007 17:03:12 +0200 Received: from frcls4013 ([129.182.108.120]) by MSGA-001.frcl.bull.fr (Lotus Domino Release 5.0.11) with SMTP id 2007102216551528:174750 ; Mon, 22 Oct 2007 16:55:15 +0200 Date: Mon, 22 Oct 2007 16:55:12 +0200 From: "Denis Pinkas" To: "ietf-pkix@imc.org" Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" X-mailer: Foxmail 5.0 [-fr-] Mime-Version: 1.0 X-MIMETrack: Itemize by SMTP Server on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 22/10/2007 16:55:15, Serialize by Router on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 22/10/2007 16:55:46, Serialize complete at 22/10/2007 16:55:46 Message-ID: Content-Type: text/plain; charset="iso-8859-1" X-MIME-Autoconverted: from base64 to 8bit by balder-227.proper.com id l9MEtn4l028720 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Content-Transfer-Encoding: quoted-printable X-MIME-Autoconverted: from 8bit to quoted-printable by balder-227.proper.com id l9MEtnDG028726 X-Spam-Score: 2.1 (++) X-Scan-Signature: 2a9ffb6f997442a3b543bcdaf483b990 >Denis, > >As you might have seen from some of my old posting on the list, >I initially believed that there was a true "security flaw" in X.509 >regarding revocation. > >Now, my understanding is that the fact there is no name >collision is an _assumption_ in X.509. No name collision is simply an invalid assumption. >If one wants to cope with name collisions there are several >routes one can take depending on what the "adversary" is and >the constraint one wants to put on the PKI topology. > >1) The first one is simply to assume that it can be detected >and fixed. It can't. >2) One can cope with "accidental" name collision: I believe that is >the route currently taken by PKIX by mandating trust anchor matching. Same trust anchor is insufiicient. >3) Your proposed wording copes with less accidental and more malicious >attacks.=20 It addresses the general case. > I believe this is in the same spirit as Santosh Chokani >proposal in 2004, (isn't it ?).=20 No. Santosh was certainly mandating the same trust anchor, but this is no= t sufficient. But I let Santosh explains.=20 > However, it restricts the PKI topology and It does not. >I believe it is still open to some exotic attacts (see my posting from >early November 2004). I do not recall that you have explained an attack on that scheme. >4) One can put even more restrictions on the PKI topology by mandating >that a CA signs the CRL issuer keys with an explicit "CRL issuer" extens= ion >(similar to OCSP) and that the AuthorityKeyExtension (containing the >hash of the key) be explicitely checked during the path building. The AuthorityKeyExtension is not done for this. >All in all, I believe it is close to impossible to define a general rule >in the standard because some core assumptions regarding the uniqueness >of the DNs and the adversarial model may not be the same between >different PKIs. It is possible to define a default rule. Remember: A DN issued by one CA is unique for that CA, but for that CA only. Only a chain of DNs may be unique, starting from a trust anchor. which means, as Russ noticed, that it is not allowed to have two differen= t roots=20 in a validation policy (or a signature policy) with the same DN. Denis >Regards, > >-- >Julien > >On Mon, Oct 22, 2007 at 03:16:32PM +0200, Denis Pinkas wrote: >>=20 >> Julien, >>=20 >> >On Mon, Oct 22, 2007 at 01:57:33PM +0200, Denis Pinkas wrote: >> >> >> >> [snip] >> > >> >Hi Denis, >> > >> >> This means that RFC3280bis currently provides no coorect guidance=20 >> >> on how implementers should address this issue.=20 >> > >> >Agreed. There is a somewhat "matter of local policy-ish" issue here. >> > >> >> The following text is an attempt to address this issue: >> >>=20 >> >> "Implementations validating indirect CRLs MUST make sure that the=20 >> >> certificate of the CRL Issuer is indeed issued by the CA that issue= d=20 >> >> the certificate to be verified, which means that the sequence of DN= s=20 >> >> of the certification path of the CRL issuer, up to the DN of a trus= t anchor,=20 >> >> must be identical to the the sequence of DNs of the certification p= ath=20 >> >> of the certificate to be verified, up to the DN of the same trust a= nchor". >> > >> >Forcing the CA to directly issue the CRL issuer certificate is way to= o >> >restrictive in my humble opinion. I have an example of a PKI where th= ere >> >is a single (indirect) CRL issuer for about 20 CAs. >> > >> >The CRL issuer certificate is issued by the (Root) CA that issued >> >those 20 CA certificates. >>=20 >> What about: >>=20 >> Unless a local policy states otherwise, implementations validating ind= irect CRLs=20 >> MUST make sure that the certificate of the CRL Issuer is indeed issued= by the CA=20 >> that issued the certificate to be verified, which means that the sequ= ence of DNs=20 >> of the certification path of the CRL issuer, up to the DN of a trust a= nchor,=20 >> must be identical to the the sequence of DNs of the certification path= =20 >> of the certificate to be verified, up to the DN of the same trust anch= or". >>=20 >> Denis >>=20 >> >Regards, >> > >> >-- >> >Julien >> > >> >> Denis >> >>=20 >> >> >Russ >> >> > >> >> >At 08:12 AM 10/5/2007, ITU-T SG 17 wrote: >> >> > >> >> >>Title: Liaison to IETF on the resolution of DR320 >> >> >>Submission Date: 2007-10-05 >> >> >>URL of the IETF Web page:=20 >> >> >>https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=3D= 375 >> >> >>Please reply by 2008-03-01 >> >> >> >> >> >>From: Xiaoya Yang(ITU-T SG 17) >> >> >>To: IETF/PKIX(Russ Housley , Stefan Santess= on=20 >> >> >>) >> >> >>Cc: Herbert Bertine >> >> >> >> >> >> >> >> >> >> >> >>Reponse Contact: Xiaoya YANG >> >> >> >> >> >>Technical Contact: >> >> >> >> >> >>Purpose: For action >> >> >>Body: At our recent ITU-T SG17 meeting in Geneva we discussed and= =20 >> >> >>rejected Defect Report 320=20 >> >> >>(http://www.x500standard.com/uploads/Defects/DR_320.pdf) from=20 >> >> >>AFNOR. This DR advanced an argument that Distinguished Names may= =20 >> >> >>not be unique and as such, the DN of the Certificate User may not= be unique. >> >> >>The directory group believes that Distinguished Name values must = be=20 >> >> >>unique and unambiguously identify a single entity, hence the use = of=20 >> >> >>the term Distinguished. >> >> >>The DR states =E2=80=9Cthe DN of the issuer name cannot be guaran= teed to=20 >> >> >>be unique=E2=80=9D. X.509 takes its definition of DN from X.501.= Clause=20 >> >> >>9.2 of X.501 specifies the definition of DistinguishedName. This= =20 >> >> >>clause states A name shall be unambiguous, that is, denotes just = one object. >> >> >>Clause 9 goes on to state: It is the responsibility of the releva= nt=20 >> >> >>naming authority for an entry to ensure that this is so by=20 >> >> >>appropriately assigning distinguished attribute values. Allocati= on=20 >> >> >>of RDNs is considered an administrative undertaking that may or m= ay=20 >> >> >>not require some negotiation between involved organizations or=20 >> >> >>administrations. This Directory Specification does not provide s= uch=20 >> >> >>a negotiation mechanism, and makes no assumption as to how it is = performed. >> >> >>The standard takes an axiomatic view of the concept that a=20 >> >> >>distinguished name unambiguously identifies a single entity. Thi= ngs=20 >> >> >>break if two entities identify themselves using the same name. W= e=20 >> >> >>don't let two entities have the same domain name or the same emai= l=20 >> >> >>address. Why? - because things wouldn't work. >> >> >>The directory group does not accept the DR=E2=80=99s basic argume= nt. We=20 >> >> >>believe that if two entities present the same name and a CA issue= s a=20 >> >> >>certificate to each, that CA made a mistake - not a naming author= ity=20 >> >> >>mistake, since a CA is not an naming authority (although one enti= ty=20 >> >> >>can be both), but an entity to key binding mistake that leads to=20 >> >> >>confusion and even worse, a security risk. >> >> >>We believe that if two entities claim the same name as top level=20 >> >> >>CAs, there is a political/procedural breakdown much like the doma= in=20 >> >> >>ownership arguments we have seen. No one argues that the Interne= t=20 >> >> >>protocols should be modified to solve that problem. The conflict= is=20 >> >> >>resolved and one entity is assigned the name. The group believes= =20 >> >> >>that this is the only reasonable solution for Distinguished=20 >> >> >>Naming. One votes for the CA of choice by configuring it as an a= nchor. >> >> >>One of the participants in the directory meeting stated that=20 >> >> >>Certification Authorities are being deployed with names not acqui= red=20 >> >> >>from naming authorities but with names arbitrarily chosen assumin= g=20 >> >> >>that no other CA is or will be operating under that name. That=20 >> >> >>participant further stated that the IETF provides no guidelines o= n=20 >> >> >>ensuring that the names of CAs are unambiguous. >> >> >>The directory group requests the IETF PKIX group to comment on th= is=20 >> >> >>statement. If the statement is correct, we ask the IETF to consi= der=20 >> >> >>putting a mechanism in place to prevent conflict, e.g. a list of=20 >> >> >>existing CA names that deployers of new CAs could check for namin= g conflicts. >> >> >>Attachment(s): >> >> >>No document has been attached >>=20 >>=20 > Regards, Denis Pinkas From Gillelandogskj@tabor-hannover.de Mon Oct 22 12:46:51 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ik0QV-0007Fk-Hc for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 12:46:51 -0400 Received: from co508754-a.almel1.ov.home.nl ([82.72.129.241]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1Ik0QO-00082U-So for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 12:46:45 -0400 Received: from co508754-a ([162.164.90.12] helo=co508754-a) by co508754-a.almel1.ov.home.nl ( sendmail 8.13.3/8.13.1) with esmtpa id 1EMJge-000HVU-ql for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 18:49:25 -0000 Message-ID: <000d01c814dc$2f9120a0$f1814852@co508754a> From: "Noeline Gilleland" To: Subject: itrairep Date: Mon, 22 Oct 2007 18:48:50 -0000 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0004_01C814DC.2F9120A0" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 X-Spam-Score: 3.6 (+++) X-Scan-Signature: b19722fc8d3865b147c75ae2495625f2 ------=_NextPart_000_0004_01C814DC.2F9120A0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable hello from the heart pkix-archive if you have trouble keeping it hard how will you survive? http://www.omnnis.com/ Noeline Gilleland ------=_NextPart_000_0004_01C814DC.2F9120A0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
hello from the heart pkix-archive
if you have trouble keeping it hard how will = you=20 survive?
http://www.omnnis.com/
Noeline Gilleland
------=_NextPart_000_0004_01C814DC.2F9120A0-- From owner-ietf-pkix@mail.imc.org Mon Oct 22 14:38:58 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ik2B0-0006eu-83 for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 14:38:58 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1Ik2Az-0008US-Mw for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 14:38:58 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MHfUFa047087 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 10:41:30 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MHfUUG047086; Mon, 22 Oct 2007 10:41:30 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from EXVS01.ex.dslextreme.net ([66.51.199.86]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MHfRwU047077 for ; Mon, 22 Oct 2007 10:41:30 -0700 (MST) (envelope-from chokhani@orionsec.com) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Subject: RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Date: Mon, 22 Oct 2007 10:41:10 -0700 Message-ID: <82D5657AE1F54347A734BDD33637C8790987D7E4@EXVS01.ex.dslextreme.net> In-Reply-To: <20071022143330.GQ4999@mars.cry.pto> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: New Liaison Statement, "Liaison to IETF on the resolution of DR320" thread-index: AcgUwnff3lW8VmZOQoeRcmJP01PqnAAD/cfQ References: <82D5657AE1F54347A734BDD33637C8790987D3BC@EXVS01.ex.dslextreme.net> <20071022143330.GQ4999@mars.cry.pto> From: "Santosh Chokhani" To: "Julien Stern" , Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l9MHfUwU047081 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 4b800b1eab964a31702fa68f1ff0e955 Julien, What I recall is that your attack was a CA trusted to issue CA certificates by the relying party going rogue. X.509 does not protect against that. You also mentioned that you had protection against it, you were unwilling to share it, and you said that you will share it after you publish your work. I have yet to see your proposal. As a matter of fact on PKIX or X.500 forum within last year again I asked you to share your proposal and you never replied. -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Julien Stern Sent: Monday, October 22, 2007 10:34 AM To: ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" On Mon, Oct 22, 2007 at 06:18:22AM -0700, Santosh Chokhani wrote: > > We have been down this route before. Oooooh Yes. Lots of fun and (gentle) arguments... > See my presentation to PKIX in Fall 2004 IETF meeting in Washington DC. > > My understanding from 2004 presentation was that Russ Housley proposed instead of ensuring certificate certification path and CRL certification path matching, we make sure that we ensure that the paths begin at the same trust anchor. It was felt by the group (not I) that coupled with name constraints in cross certified environment is sufficient to mitigate the risk to an acceptably low level. Of course, my argument always has been that using the certificate certification path to constrain the CRL certification path provides you both with security and efficiency, something you do not always get. The primary reason to not adopt my suggestion is that it requires change to client software. I did not feel either that trust anchor matching was sufficient enough. As you may remember, I also felt that your proposed solution, while improving the situation, did not close every possible attacks, and I proposed an alternative that was (in my humble opinion) even more secure but with even more changes on the client software. Anyway, my current take on the subject would be roughly the following. RFC3280bis could include something in the line of: "The uniqueness of DN of all entities in all the Trust Anchors hierarchies SHOULD be enforced. If the uniqueness cannot be guaranteed in some circonstances, client software MAY implement additional checks in order to lower the risk of outputing an incorrect revocation value during path validation. [We could give example of additional checks here: checking the trust anchor matching, check the full path matching, checking the AuthorityKeyIdentifier hash matching, etc]. Client implementors should however be aware that these additional checks may hinder interoperability in the general case." -- Julien From owner-ietf-pkix@mail.imc.org Mon Oct 22 14:39:16 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ik2Ax-0006Zh-1E for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 14:38:55 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Ik28h-0001Tb-7l for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 14:38:55 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MHaVde046714 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 10:36:31 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MHaVle046713; Mon, 22 Oct 2007 10:36:31 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp-dub.microsoft.com (smtp-dub.microsoft.com [213.199.138.191]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MHaTIe046703 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Mon, 22 Oct 2007 10:36:30 -0700 (MST) (envelope-from stefans@microsoft.com) Received: from dub-exhub-c302.europe.corp.microsoft.com (65.53.213.92) by DUB-EXGWY-E801.partners.extranet.microsoft.com (10.251.129.1) with Microsoft SMTP Server (TLS) id 8.1.222.3; Mon, 22 Oct 2007 18:36:28 +0100 Received: from EA-EXMSG-C320.europe.corp.microsoft.com ([65.53.221.77]) by dub-exhub-c302.europe.corp.microsoft.com ([65.53.213.92]) with mapi; Mon, 22 Oct 2007 18:36:27 +0100 From: Stefan Santesson To: "ietf-pkix@imc.org" Date: Mon, 22 Oct 2007 18:36:23 +0100 Subject: Call for agenda items - Vancouver IETF Thread-Topic: Call for agenda items - Vancouver IETF Thread-Index: AcgU0hCHXWJbPwVPT7+3o4MRnK6r3w== Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: acceptlanguage: en-US Content-Type: multipart/alternative; boundary="_000_E75F200AF1718F45B2024A88C3141A1D0647534474EAEXMSGC320eu_" MIME-Version: 1.0 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 8f374d0786b25a451ef87d82c076f593 --_000_E75F200AF1718F45B2024A88C3141A1D0647534474EAEXMSGC320eu_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Vancouver IETF is coming up. Please send me requests for agenda slots. As usual I would appreciate if editors of current documents let me know if = they want a slot and their assessment of the current status. I would appreciate requests to be sent to me as soon as possible and at lat= est Friday November 2nd. Thank you. Stefan Santesson Senior Program Manager Windows Security, Standards --_000_E75F200AF1718F45B2024A88C3141A1D0647534474EAEXMSGC320eu_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Vancouver IETF is coming up.

 

Please send me requests for agenda = slots.

As usual I would appreciate if edit= ors of current documents let me know if they want a slot and their assessment of t= he current status.

 

I would appreciate requests to be s= ent to me as soon as possible and at latest Friday November 2nd.

 

Thank you.

 

 

Stefan Santesson

Senior Program Manager=

Windows Security, Standards<= span lang=3DEN-US style=3D'color:#1F497D'>

 

--_000_E75F200AF1718F45B2024A88C3141A1D0647534474EAEXMSGC320eu_-- From owner-ietf-pkix@mail.imc.org Mon Oct 22 18:36:22 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ik5sk-0004Cf-1t for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 18:36:22 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1Ik5si-0000qm-U1 for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 18:36:21 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MLhrai071577 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 14:43:53 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MLhrYH071576; Mon, 22 Oct 2007 14:43:53 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from EXVS01.ex.dslextreme.net ([66.51.199.86]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MLhoku071567 for ; Mon, 22 Oct 2007 14:43:50 -0700 (MST) (envelope-from chokhani@orionsec.com) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Subject: RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Date: Mon, 22 Oct 2007 14:43:39 -0700 Message-ID: <82D5657AE1F54347A734BDD33637C879098EBEB1@EXVS01.ex.dslextreme.net> In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: New Liaison Statement, "Liaison to IETF on the resolution of DR320" thread-index: AcgUu9IEbsO12Gd2RuqXfdVK2x2/lwAFxXjA References: From: "Santosh Chokhani" To: "Denis Pinkas" , X-MIME-Autoconverted: from base64 to 8bit by balder-227.proper.com id l9MLhoku071569 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Content-Transfer-Encoding: quoted-printable X-MIME-Autoconverted: from 8bit to quoted-printable by balder-227.proper.com id l9MLhrai071577 X-Spam-Score: 0.0 (/) X-Scan-Signature: 32029c790f79bd4a84a26bd2915c54b9 Denis, I am not sure you and I should be discussing this on the mail list, if th= e goal of our effort is to facilitate consensus. Last time we did that, = we put people to sleep. It is time for others to comment on the topic. = I know we are trying to fill a security hole using technical means as opp= osed to assuming that there are no CA name collisions. As to my proposal, it calls for an exact match of DNs in the certificatio= n path, but accounts for self-issued certificates due to CA re-key. I en= courage you to look at the detailed briefing presented at PKIX Fall 2004.= I assume it is still available via IETF. As to the paper presented at NIST 2005 Research Conference, it is actuall= y NIST 2006 Research Conference. The URL is provided below. This also h= as been posted on PKIX before. The briefing (NIST workshop, not IETF) is at: http://middleware.internet2.edu/pki06/proceedings/ The full paper is at: http://csrc.nist.gov/publications/nistir/ir-7313/NIST-IR-7313_Final.pdf -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] = On Behalf Of Denis Pinkas Sent: Monday, October 22, 2007 9:37 AM To: ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of= DR320" Santosh, >We have been down this route before. >See my presentation to PKIX in Fall 2004 IETF meeting in Washington DC. > My understanding from 2004 presentation was that Russ Housley proposed = instead of=20 > ensuring certificate certification path and CRL certification path matc= hing,=20 Unless the client software knows by "other means" what to do, this is the= default way=20 to make the whole system secure. =20 > we make sure that we ensure that the paths begin at the same trust anch= or. =20 This helps, but it is fra from sufficient. > It was felt by the group (not I) that coupled with name constraints in = cross certified=20 > environment is sufficient to mitigate the risk to an acceptably low lev= el. =20 Reducing the risk does not suppress it. > Of course, my argument always has been that using the certificate=20 > certification path to constrain the CRL certification path provides you= both with security and=20 > efficiency, something you do not always get. =20 "Constraining" does not mean "identical". Would you be more precise ? > The primary reason to not adopt my suggestion is that it requires chang= e to client software. Since most of the clients are insecure today in case of a DN name collisi= on, it is time to fix it. >Also see our paper in NIST PKI Research Workshop in 2005 for a discussio= n of this. Would you have a link ? Denis >-----Original Message----- >From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org]= On Behalf Of Denis Pinkas >Sent: Monday, October 22, 2007 7:58 AM >To: ietf-pkix@imc.org >Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution o= f DR320" > > >Russ said: > >>It seems to me that this is a trust anchor configuration concern. =20 > >Not only. > >> If two CAs adopt the same name and a user accepts both of these CAs as= =20 >>trust anchors, then there could be a problem. Just don't do it. > >This is correct, but insufficient. This does not prevent two CAs somewhe= re=20 >under this trust anchor to use the same name in different branches. > >>RFC 3280bis says: > >> While X.509 mandates that names be unambiguous, there is a risk tha= t >> two unrelated authorities will issue certificates and/or CRLs under >> the same issuer name. =20 > >This is correct. This sentence contradicts the response to DR 320. > >> As a means of reducing problems and security >> issues related to issuer name collisions, CA and CRL issuer names >> SHOULD be formed in a way that reduces the likelihood of name >> collisions. =20 > >This recommandation does not *prevent* "problems and security issues". >This sentence should be deleted or changed.=20 > >> Implementers should take into account the possible >> existence of multiple unrelated CAs and CRL issuers with the same >> name. =20 > >This is fully correct. > >> At a minimum, implementations validating CRLs MUST ensure that >> the certification path of a certificate and the CRL issuer >> certification path used to validate the certificate terminate at th= e >> same trust anchor. > >This "minimum" clause is both insufficient and insecure.=20 >This sentence gives a false sense of security. > >This means that RFC3280bis currently provides no coorect guidance=20 >on how implementers should address this issue.=20 > >The following text is an attempt to address this issue: > >"Implementations validating indirect CRLs MUST make sure that the=20 >certificate of the CRL Issuer is indeed issued by the CA that issued=20 >the certificate to be verified, which means that the sequence of DNs=20 >of the certification path of the CRL issuer, up to the DN of a trust anc= hor,=20 >must be identical to the the sequence of DNs of the certification path=20 >of the certificate to be verified, up to the DN of the same trust anchor= ". > >Denis > >>Russ >> >>At 08:12 AM 10/5/2007, ITU-T SG 17 wrote: >> >>>Title: Liaison to IETF on the resolution of DR320 >>>Submission Date: 2007-10-05 >>>URL of the IETF Web page:=20 >>>https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=3D375 >>>Please reply by 2008-03-01 >>> >>>From: Xiaoya Yang(ITU-T SG 17) >>>To: IETF/PKIX(Russ Housley , Stefan Santesson=20 >>>) >>>Cc: Herbert Bertine >>> >>> >>> >>>Reponse Contact: Xiaoya YANG >>> >>>Technical Contact: >>> >>>Purpose: For action >>>Body: At our recent ITU-T SG17 meeting in Geneva we discussed and=20 >>>rejected Defect Report 320=20 >>>(http://www.x500standard.com/uploads/Defects/DR_320.pdf) from=20 >>>AFNOR. This DR advanced an argument that Distinguished Names may=20 >>>not be unique and as such, the DN of the Certificate User may not be u= nique. >>>The directory group believes that Distinguished Name values must be=20 >>>unique and unambiguously identify a single entity, hence the use of=20 >>>the term Distinguished. >>>The DR states =C3=A2=E2=82=AC=C5=93the DN of the issuer name cannot be= guaranteed to=20 >>>be unique=C3=A2=E2=82=AC=C2=9D. X.509 takes its definition of DN from= X.501. Clause=20 >>>9.2 of X.501 specifies the definition of DistinguishedName. This=20 >>>clause states A name shall be unambiguous, that is, denotes just one o= bject. >>>Clause 9 goes on to state: It is the responsibility of the relevant=20 >>>naming authority for an entry to ensure that this is so by=20 >>>appropriately assigning distinguished attribute values. Allocation=20 >>>of RDNs is considered an administrative undertaking that may or may=20 >>>not require some negotiation between involved organizations or=20 >>>administrations. This Directory Specification does not provide such=20 >>>a negotiation mechanism, and makes no assumption as to how it is perfo= rmed. >>>The standard takes an axiomatic view of the concept that a=20 >>>distinguished name unambiguously identifies a single entity. Things=20 >>>break if two entities identify themselves using the same name. We=20 >>>don't let two entities have the same domain name or the same email=20 >>>address. Why? - because things wouldn't work. >>>The directory group does not accept the DR=C3=A2=E2=82=AC=E2=84=A2s ba= sic argument. We=20 >>>believe that if two entities present the same name and a CA issues a=20 >>>certificate to each, that CA made a mistake - not a naming authority=20 >>>mistake, since a CA is not an naming authority (although one entity=20 >>>can be both), but an entity to key binding mistake that leads to=20 >>>confusion and even worse, a security risk. >>>We believe that if two entities claim the same name as top level=20 >>>CAs, there is a political/procedural breakdown much like the domain=20 >>>ownership arguments we have seen. No one argues that the Internet=20 >>>protocols should be modified to solve that problem. The conflict is=20 >>>resolved and one entity is assigned the name. The group believes=20 >>>that this is the only reasonable solution for Distinguished=20 >>>Naming. One votes for the CA of choice by configuring it as an anchor. >>>One of the participants in the directory meeting stated that=20 >>>Certification Authorities are being deployed with names not acquired=20 >>>from naming authorities but with names arbitrarily chosen assuming=20 >>>that no other CA is or will be operating under that name. That=20 >>>participant further stated that the IETF provides no guidelines on=20 >>>ensuring that the names of CAs are unambiguous. >>>The directory group requests the IETF PKIX group to comment on this=20 >>>statement. If the statement is correct, we ask the IETF to consider=20 >>>putting a mechanism in place to prevent conflict, e.g. a list of=20 >>>existing CA names that deployers of new CAs could check for naming con= flicts. >>>Attachment(s): >>>No document has been attached >> > >Regards, > >Denis Pinkas > > Regards, Denis Pinkas From owner-ietf-pkix@mail.imc.org Mon Oct 22 20:08:22 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ik7Jm-0007Ja-9O for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 20:08:22 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1Ik7Jl-0007tU-Mq for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 20:08:22 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MNIHjr078959 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 16:18:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MNIHKP078958; Mon, 22 Oct 2007 16:18:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from [165.227.249.203] (adsl-66-125-125-65.dsl.pltn13.pacbell.net [66.125.125.65]) (authenticated bits=0) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MNHfUd078933 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 16:17:42 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: References: Date: Mon, 22 Oct 2007 16:16:09 -0700 To: "Denis Pinkas" , "ietf-pkix@imc.org" From: Paul Hoffman Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Cc: "Russ Housley" Content-Type: text/plain; charset="us-ascii" ; format="flowed" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 798b2e660f1819ae38035ac1d8d5e3ab At 1:52 PM +0200 10/22/07, Denis Pinkas wrote: >I agree with what you say. However", Words fail me" may have >multiple interpretations. >We are going to invent a mechanism to prevent conflict, e.g. a list >of existing CA >names that deployers of new CAs could check for naming conflicts. When you say "We", if you mean the IETF, then, yes, you have indeed gotten the wrong sense of my statement. >The implications are that DR 320 has been rejected by the directory >group on a wrong basis. It would be unwise for the PKIX WG to get embroiled in the ITU's disagreements here. We should wait for a clear statement from them about what they believe is their response to the issue, then we can work with that. --Paul Hoffman, Director --VPN Consortium From owner-ietf-pkix@mail.imc.org Mon Oct 22 20:59:32 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ik87H-0000ki-W9 for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 20:59:32 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1Ik87H-0002SV-IR for pkix-archive@lists.ietf.org; Mon, 22 Oct 2007 20:59:31 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9N0BrEn081980 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 17:11:53 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9N0Bq7A081979; Mon, 22 Oct 2007 17:11:52 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from elasmtp-kukur.atl.sa.earthlink.net (elasmtp-kukur.atl.sa.earthlink.net [209.86.89.65]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9N0BoeN081951 for ; Mon, 22 Oct 2007 17:11:51 -0700 (MST) (envelope-from hoytkesterson@earthlink.net) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=dk20050327; d=earthlink.net; b=ACQ+pWxKv+MMWTNHLE0AZGWYL+XS6Qj0NPMnZh5srxPyASRMKzRqViKN1FC4qR83; h=Message-ID:Date:From:Reply-To:To:Subject:Mime-Version:Content-Type:Content-Transfer-Encoding:X-Mailer:X-ELNK-Trace:X-Originating-IP; Received: from [209.86.224.53] (helo=elwamui-wigeon.atl.sa.earthlink.net) by elasmtp-kukur.atl.sa.earthlink.net with asmtp (Exim 4.34) id 1Ik7N7-0003vL-Pg; Mon, 22 Oct 2007 20:11:50 -0400 Received: from 143.192.1.185 by webmail.pas.earthlink.net with HTTP; Mon, 22 Oct 2007 20:11:49 -0400 Message-ID: <12352707.1193098309804.JavaMail.root@elwamui-wigeon.atl.sa.earthlink.net> Date: Mon, 22 Oct 2007 20:11:49 -0400 (EDT) From: Hoyt L Kesterson II Reply-To: Hoyt L Kesterson II To: ietf-pkix@imc.org Subject: Re: New Liaison Statement, Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Mailer: EarthLink Zoo Mail 1.0 X-ELNK-Trace: 59f3edefb26af0321a6f9084d36cbc6474bf435c0eb9d478100f810b5c66a19032c6ea75cad3e433297c17fac106dbbb350badd9bab72f9c350badd9bab72f9c X-Originating-IP: 209.86.224.53 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 8b30eb7682a596edff707698f4a80f7d The ITU is not in disagreement. Its Study Group Plenary sent the IETF (not just PKIX) a liaison stating that it had rejected DR 320. It believes that the problems described by DR 320 would not exist if the concept of unambiguous naming is followed as described in the standard. It believes that if such a problem exists, those environments that permit such duplicate naming should address the problem. If the IETF feels that the problem need not be addressed for whatever reason, then the IETF can respond with that position. I only advise that "words fail me" would not be an understandable response to the folks back in Geneva. hoyt -----Original Message----- >From: Paul Hoffman >Sent: Oct 22, 2007 7:16 PM >To: Denis Pinkas , "ietf-pkix@imc.org" >Cc: Russ Housley >Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" > > >At 1:52 PM +0200 10/22/07, Denis Pinkas wrote: >>I agree with what you say. However", Words fail me" may have >>multiple interpretations. >>We are going to invent a mechanism to prevent conflict, e.g. a list >>of existing CA >>names that deployers of new CAs could check for naming conflicts. > >When you say "We", if you mean the IETF, then, yes, you have indeed >gotten the wrong sense of my statement. > >>The implications are that DR 320 has been rejected by the directory >>group on a wrong basis. > >It would be unwise for the PKIX WG to get embroiled in the ITU's >disagreements here. We should wait for a clear statement from them >about what they believe is their response to the issue, then we can >work with that. > >--Paul Hoffman, Director >--VPN Consortium > From owner-ietf-pkix@mail.imc.org Tue Oct 23 06:49:41 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IkHKP-0000QV-9K for pkix-archive@lists.ietf.org; Tue, 23 Oct 2007 06:49:41 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IkHKA-00019C-A8 for pkix-archive@lists.ietf.org; Tue, 23 Oct 2007 06:49:32 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9N9h7UB025378 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 23 Oct 2007 02:43:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9N9h7rn025377; Tue, 23 Oct 2007 02:43:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.cs.tcd.ie (relay.cs.tcd.ie [134.226.32.56]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9N9h14T025369 for ; Tue, 23 Oct 2007 02:43:03 -0700 (MST) (envelope-from stephen.farrell@cs.tcd.ie) Received: from localhost (localhost [127.0.0.1]) by relay.cs.tcd.ie (Postfix) with ESMTP id 26DD438BB; Tue, 23 Oct 2007 10:43:00 +0100 (IST) X-Virus-Scanned: amavisd-new at cs.tcd.ie Received: from smtp.cs.tcd.ie ([127.0.0.1]) by localhost (smtp.cs.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l3CleLceDL8Q; Tue, 23 Oct 2007 10:42:59 +0100 (IST) Received: from webmail.cs.tcd.ie (wilde.cs.tcd.ie [IPv6:2001:770:10:200:203:baff:fe96:d2b3]) by smtp.cs.tcd.ie (Postfix) with ESMTP id F15CA384D; Tue, 23 Oct 2007 10:42:51 +0100 (IST) Received: from 195.56.169.116 (SquirrelMail authenticated user sfarrel6) by webmail.cs.tcd.ie with HTTP; Tue, 23 Oct 2007 10:42:59 +0100 (IST) Message-ID: <50643.195.56.169.116.1193132579.squirrel@webmail.cs.tcd.ie> In-Reply-To: <82D5657AE1F54347A734BDD33637C879098EBEB1@EXVS01.ex.dslextreme.net> References: <82D5657AE1F54347A734BDD33637C879098EBEB1@EXVS01.ex.dslextreme.net> Date: Tue, 23 Oct 2007 10:42:59 +0100 (IST) Subject: RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" From: stephen.farrell@cs.tcd.ie To: "Santosh Chokhani" Cc: "Denis Pinkas" , ietf-pkix@imc.org Reply-To: stephen.farrell@cs.tcd.ie User-Agent: SquirrelMail/1.4.10a MIME-Version: 1.0 Content-Type: text/plain;charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-Priority: 3 (Normal) Importance: Normal Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 7bac9cb154eb5790ae3b2913587a40de As pointed out, we discussed this some time ago and ended up with the current 3280bis text. Repeating the arguments will only consume cycles. Stephen. From owner-ietf-pkix@mail.imc.org Tue Oct 23 08:07:29 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IkIXh-0001lC-F8 for pkix-archive@lists.ietf.org; Tue, 23 Oct 2007 08:07:29 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IkIXc-0004RT-5n for pkix-archive@lists.ietf.org; Tue, 23 Oct 2007 08:07:25 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9NBF90l035031 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 23 Oct 2007 04:15:09 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9NBF9On035030; Tue, 23 Oct 2007 04:15:09 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from EXVS01.ex.dslextreme.net ([66.51.199.86]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9NBF8Vv035024 for ; Tue, 23 Oct 2007 04:15:08 -0700 (MST) (envelope-from chokhani@orionsec.com) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Subject: RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Date: Tue, 23 Oct 2007 04:14:56 -0700 Message-ID: <82D5657AE1F54347A734BDD33637C879098EC07A@EXVS01.ex.dslextreme.net> In-Reply-To: <50643.195.56.169.116.1193132579.squirrel@webmail.cs.tcd.ie> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: New Liaison Statement, "Liaison to IETF on the resolution of DR320" thread-index: AcgVZEOy4jxvPSLHTGamc53wC8IHXgAAViaA References: <82D5657AE1F54347A734BDD33637C879098EBEB1@EXVS01.ex.dslextreme.net> <50643.195.56.169.116.1193132579.squirrel@webmail.cs.tcd.ie> From: "Santosh Chokhani" To: Cc: "Denis Pinkas" , Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l9NBF8Vv035025 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 9182cfff02fae4f1b6e9349e01d62f32 It is a bit worse than that. This has become our Autumn Ritual since 2004. May be we should make a movie on this "Same Time, Same Place, Same Debate Next Year" -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of stephen.farrell@cs.tcd.ie Sent: Tuesday, October 23, 2007 5:43 AM To: Santosh Chokhani Cc: Denis Pinkas; ietf-pkix@imc.org Subject: RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" As pointed out, we discussed this some time ago and ended up with the current 3280bis text. Repeating the arguments will only consume cycles. Stephen. From Kwame@japandolls.com Tue Oct 23 13:47:08 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IkNqO-0007hi-GY for pkix-archive@lists.ietf.org; Tue, 23 Oct 2007 13:47:08 -0400 Received: from acnh37.neoplus.adsl.tpnet.pl ([83.10.161.37] helo=acni91.neoplus.adsl.tpnet.pl) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IkNqJ-0001dC-Q5 for pkix-archive@lists.ietf.org; Tue, 23 Oct 2007 13:47:04 -0400 Received: by 10.154.29.35 with SMTP id fvgzMaaeiBohi; Tue, 23 Oct 2007 19:47:10 +0200 (GMT) Received: by 192.168.7.142 with SMTP id edqFeAQkXCvdoy.2088253181476; Tue, 23 Oct 2007 19:47:08 +0200 (GMT) Message-ID: <000e01c8159c$b9cd9a80$5ba20a53@komp94aec60f51> From: "Kwame Lidstone" To: Subject: e'etobas Date: Tue, 23 Oct 2007 19:47:05 +0200 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0004_01C815AD.7D566A80" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 X-Spam-Score: 1.8 (+) X-Scan-Signature: 8abaac9e10c826e8252866cbe6766464 ------=_NextPart_000_0004_01C815AD.7D566A80 Content-Type: text/plain; charset="windows-1250" Content-Transfer-Encoding: quoted-printable How are things? pkix-archive dont get caught out with a soft cock, make it solid http://www.panggya.com/ Kwame Lidstone ------=_NextPart_000_0004_01C815AD.7D566A80 Content-Type: text/html; charset="windows-1250" Content-Transfer-Encoding: quoted-printable
How are things? pkix-archive
dont get caught out with a soft cock, make it=20 solid
http://www.panggya.com/
Kwame Lidstone
------=_NextPart_000_0004_01C815AD.7D566A80-- From HSIANG454@intelmail.com.au Wed Oct 24 04:04:42 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IkbEI-0000Eg-PB for pkix-archive@lists.ietf.org; Wed, 24 Oct 2007 04:04:42 -0400 Received: from [201.19.67.39] (helo=[201.19.68.41]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IkbDv-0004k8-Oc for pkix-archive@lists.ietf.org; Wed, 24 Oct 2007 04:04:20 -0400 Received: from renan ([137.112.29.168] helo=renan) by [201.19.68.41] ( sendmail 8.13.3/8.13.1) with esmtpa id 1LIGiP-000QOS-mi for pkix-archive@lists.ietf.org; Wed, 24 Oct 2007 06:04:32 -0300 Message-ID: <000301c8161c$da8713c0$294413c9@renan> From: "HSIANG Klien" To: Subject: itnodigt Date: Wed, 24 Oct 2007 06:04:16 -0300 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0005_01C81603.B539DBC0" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 X-Spam-Score: 2.1 (++) X-Scan-Signature: 97adf591118a232206bdb5a27b217034 ------=_NextPart_000_0005_01C81603.B539DBC0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable hallo whats up! pkix-archive believe me, if she could make it bigger she really would http://www.pansarex.com/ HSIANG Klien ------=_NextPart_000_0005_01C81603.B539DBC0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
hallo whats up! pkix-archive
believe me, if she could make it bigger she = really=20 would
http://www.pansarex.com/
HSIANG Klien
------=_NextPart_000_0005_01C81603.B539DBC0-- From Plutaygmv@hjcgas.com Wed Oct 24 06:24:30 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IkdPa-00025Q-Bf for pkix-archive@lists.ietf.org; Wed, 24 Oct 2007 06:24:30 -0400 Received: from e179087164.adsl.alicedsl.de ([85.179.87.164] helo=e181177106.adsl.alicedsl.de) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IkdPW-0008DY-JP for pkix-archive@lists.ietf.org; Wed, 24 Oct 2007 06:24:27 -0400 Received: from 59aede1cd2dd46b ([115.174.152.31]:13987 "EHLO 59aede1cd2dd46b" smtp-auth: TLS-CIPHER: TLS-PEER-CN1: ) by [85.179.206.167] with ESMTP id S22QDRJHLATKLKDG (ORCPT ); Wed, 24 Oct 2007 12:24:42 +0200 Message-ID: <000401c81628$103809b0$a7ceb355@59aede1cd2dd46b> From: "mauricio Pluta" To: Subject: versets Date: Wed, 24 Oct 2007 12:24:30 +0200 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0004_01C81638.D3C0D9B0" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 X-Spam-Score: 2.0 (++) X-Scan-Signature: b19722fc8d3865b147c75ae2495625f2 ------=_NextPart_000_0004_01C81638.D3C0D9B0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable hola pkix-archive give her the full sausage when you increase your cock size http://resxxx.com/ mauricio Pluta ------=_NextPart_000_0004_01C81638.D3C0D9B0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
hola pkix-archive
give her the full sausage when you increase = your cock=20 size
http://resxxx.com/
mauricio Pluta
------=_NextPart_000_0004_01C81638.D3C0D9B0-- From cip-pinkard@neox-tech.com Thu Oct 25 05:07:59 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ikyh5-0006jP-16 for pkix-archive@lists.ietf.org; Thu, 25 Oct 2007 05:07:59 -0400 Received: from [189.32.124.142] (helo=BD207C8E.poa.virtua.com.br) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1Ikygj-0000GL-QJ for pkix-archive@lists.ietf.org; Thu, 25 Oct 2007 05:07:38 -0400 Received: from rafael ([104.195.31.36] helo=rafael) by BD207C8E.poa.virtua.com.br ( sendmail 8.13.3/8.13.1) with esmtpa id 1ImbiQ-000DQA-Qb for pkix-archive@lists.ietf.org; Thu, 25 Oct 2007 07:04:31 -0200 Message-ID: <000201c816e6$0736a510$8e7c20bd@rafael> From: "cip pinkard" To: Subject: ticohadi Date: Thu, 25 Oct 2007 07:04:19 -0200 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0009_01C816D5.43ADD510" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 X-Spam-Score: 4.7 (++++) X-Scan-Signature: 8abaac9e10c826e8252866cbe6766464 ------=_NextPart_000_0009_01C816D5.43ADD510 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable How's tricks? pkix-archive dont waste another minute, make your penis massive http://www.rtfil.com/ cip pinkard ------=_NextPart_000_0009_01C816D5.43ADD510 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
How's tricks? pkix-archive
dont waste another minute, make your penis=20 massive
http://www.rtfil.com/
cip pinkard
------=_NextPart_000_0009_01C816D5.43ADD510-- From owner-ietf-pkix@mail.imc.org Thu Oct 25 05:51:17 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IkzMz-0003fg-05 for pkix-archive@lists.ietf.org; Thu, 25 Oct 2007 05:51:17 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IkzMk-00066L-0x for pkix-archive@lists.ietf.org; Thu, 25 Oct 2007 05:51:08 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9P8i7hd079848 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 25 Oct 2007 01:44:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9P8i7bO079847; Thu, 25 Oct 2007 01:44:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from kraid.nerim.net (smtp-104-thursday.nerim.net [62.4.16.104]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9P8i6WW079839 for ; Thu, 25 Oct 2007 01:44:07 -0700 (MST) (envelope-from julien.stern@cryptolog.com) Received: from uranus.cry.pto (cryptolog2.pck.nerim.net [213.41.184.9]) by kraid.nerim.net (Postfix) with ESMTP id 95F00CF0AE for ; Thu, 25 Oct 2007 10:44:04 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by uranus.cry.pto (Postfix) with ESMTP id 2045D4428C for ; Thu, 25 Oct 2007 10:44:04 +0200 (CEST) X-Virus-Scanned: Debian amavisd-new at cryptolog.com Received: from uranus.cry.pto ([127.0.0.1]) by localhost (uranus.cry.pto [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EPISboNCw3ck for ; Thu, 25 Oct 2007 10:44:00 +0200 (CEST) Received: from mars.cry.pto (isonoe.cry.pto [10.0.1.15]) by uranus.cry.pto (Postfix) with SMTP id 092DA4427F for ; Thu, 25 Oct 2007 10:43:59 +0200 (CEST) Received: by mars.cry.pto (sSMTP sendmail emulation); Thu, 25 Oct 2007 10:43:59 +0200 From: "Julien Stern" Date: Thu, 25 Oct 2007 10:43:58 +0200 To: ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Message-ID: <20071025084358.GD4999@mars.cry.pto> Mail-Followup-To: Julien Stern , ietf-pkix@imc.org References: <82D5657AE1F54347A734BDD33637C8790987D3BC@EXVS01.ex.dslextreme.net> <20071022143330.GQ4999@mars.cry.pto> <82D5657AE1F54347A734BDD33637C8790987D7E4@EXVS01.ex.dslextreme.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <82D5657AE1F54347A734BDD33637C8790987D7E4@EXVS01.ex.dslextreme.net> User-Agent: Mutt/1.5.13 (2006-08-11) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 10d3e4e3c32e363f129e380e644649be Santosh, I think you are being a bit unfair, as I did explain on the list as clearly as I could the attack and the protection (early Nov 2004). Anyway, I do not feel like boring other readers to death by starting the whole discussion once again. Maybe we can sit down at a table and chat if we happen to meet at a conference someday :) Regards, -- Julien On Mon, Oct 22, 2007 at 10:41:10AM -0700, Santosh Chokhani wrote: > Julien, > > What I recall is that your attack was a CA trusted to issue CA > certificates by the relying party going rogue. X.509 does not protect > against that. > > You also mentioned that you had protection against it, you were > unwilling to share it, and you said that you will share it after you > publish your work. > > I have yet to see your proposal. > > As a matter of fact on PKIX or X.500 forum within last year again I > asked you to share your proposal and you never replied. > > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] > On Behalf Of Julien Stern > Sent: Monday, October 22, 2007 10:34 AM > To: ietf-pkix@imc.org > Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution > of DR320" > > > On Mon, Oct 22, 2007 at 06:18:22AM -0700, Santosh Chokhani wrote: > > > > We have been down this route before. > > Oooooh Yes. Lots of fun and (gentle) arguments... > > > See my presentation to PKIX in Fall 2004 IETF meeting in Washington > DC. > > > > My understanding from 2004 presentation was that Russ Housley proposed > instead of ensuring certificate certification path and CRL certification > path matching, we make sure that we ensure that the paths begin at the > same trust anchor. It was felt by the group (not I) that coupled with > name constraints in cross certified environment is sufficient to > mitigate the risk to an acceptably low level. Of course, my argument > always has been that using the certificate certification path to > constrain the CRL certification path provides you both with security and > efficiency, something you do not always get. The primary reason to not > adopt my suggestion is that it requires change to client software. > > I did not feel either that trust anchor matching was sufficient enough. > > As you may remember, I also felt that your proposed solution, while > improving the situation, did not close every possible attacks, and I > proposed an alternative that was (in my humble opinion) even more secure > but with even more changes on the client software. > > Anyway, my current take on the subject would be roughly the following. > RFC3280bis could include something in the line of: > > "The uniqueness of DN of all entities in all the Trust Anchors > hierarchies SHOULD be enforced. If the uniqueness cannot be guaranteed > in some circonstances, client software MAY implement additional checks > in order to lower the risk of outputing an incorrect revocation value > during > path validation. [We could give example of additional checks here: > checking the trust anchor matching, check the full path matching, > checking the AuthorityKeyIdentifier hash matching, etc]. Client > implementors should however be aware that these additional checks may > hinder interoperability in the general case." > > -- > Julien > > From owner-ietf-pkix@mail.imc.org Thu Oct 25 09:53:52 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Il39k-0004QX-HX for pkix-archive@lists.ietf.org; Thu, 25 Oct 2007 09:53:52 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Il39Z-0004Aj-7T for pkix-archive@lists.ietf.org; Thu, 25 Oct 2007 09:53:42 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9PCoQQx000686 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 25 Oct 2007 05:50:27 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9PCoQoU000685; Thu, 25 Oct 2007 05:50:26 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from EXVS01.ex.dslextreme.net ([66.51.199.86]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9PCoPVb000676 for ; Thu, 25 Oct 2007 05:50:26 -0700 (MST) (envelope-from chokhani@orionsec.com) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Subject: RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Date: Thu, 25 Oct 2007 05:50:10 -0700 Message-ID: <82D5657AE1F54347A734BDD33637C87909945C47@EXVS01.ex.dslextreme.net> In-Reply-To: <20071025084358.GD4999@mars.cry.pto> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: New Liaison Statement, "Liaison to IETF on the resolution of DR320" thread-index: AcgW7nGtamqKqlMNTXKUbsczXflWXQAFwyxA References: <82D5657AE1F54347A734BDD33637C8790987D3BC@EXVS01.ex.dslextreme.net> <20071022143330.GQ4999@mars.cry.pto> <82D5657AE1F54347A734BDD33637C8790987D7E4@EXVS01.ex.dslextreme.net> <20071025084358.GD4999@mars.cry.pto> From: "Santosh Chokhani" To: "Julien Stern" , Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l9PCoQVb000680 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 287c806b254c6353fcb09ee0e53bbc5e Julien, It is very simple. Point to me to the specific post or e-mail me (not the entire mail list) your protection approach. -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Julien Stern Sent: Thursday, October 25, 2007 4:44 AM To: ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Santosh, I think you are being a bit unfair, as I did explain on the list as clearly as I could the attack and the protection (early Nov 2004). Anyway, I do not feel like boring other readers to death by starting the whole discussion once again. Maybe we can sit down at a table and chat if we happen to meet at a conference someday :) Regards, -- Julien On Mon, Oct 22, 2007 at 10:41:10AM -0700, Santosh Chokhani wrote: > Julien, > > What I recall is that your attack was a CA trusted to issue CA > certificates by the relying party going rogue. X.509 does not protect > against that. > > You also mentioned that you had protection against it, you were > unwilling to share it, and you said that you will share it after you > publish your work. > > I have yet to see your proposal. > > As a matter of fact on PKIX or X.500 forum within last year again I > asked you to share your proposal and you never replied. > > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] > On Behalf Of Julien Stern > Sent: Monday, October 22, 2007 10:34 AM > To: ietf-pkix@imc.org > Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution > of DR320" > > > On Mon, Oct 22, 2007 at 06:18:22AM -0700, Santosh Chokhani wrote: > > > > We have been down this route before. > > Oooooh Yes. Lots of fun and (gentle) arguments... > > > See my presentation to PKIX in Fall 2004 IETF meeting in Washington > DC. > > > > My understanding from 2004 presentation was that Russ Housley proposed > instead of ensuring certificate certification path and CRL certification > path matching, we make sure that we ensure that the paths begin at the > same trust anchor. It was felt by the group (not I) that coupled with > name constraints in cross certified environment is sufficient to > mitigate the risk to an acceptably low level. Of course, my argument > always has been that using the certificate certification path to > constrain the CRL certification path provides you both with security and > efficiency, something you do not always get. The primary reason to not > adopt my suggestion is that it requires change to client software. > > I did not feel either that trust anchor matching was sufficient enough. > > As you may remember, I also felt that your proposed solution, while > improving the situation, did not close every possible attacks, and I > proposed an alternative that was (in my humble opinion) even more secure > but with even more changes on the client software. > > Anyway, my current take on the subject would be roughly the following. > RFC3280bis could include something in the line of: > > "The uniqueness of DN of all entities in all the Trust Anchors > hierarchies SHOULD be enforced. If the uniqueness cannot be guaranteed > in some circonstances, client software MAY implement additional checks > in order to lower the risk of outputing an incorrect revocation value > during > path validation. [We could give example of additional checks here: > checking the trust anchor matching, check the full path matching, > checking the AuthorityKeyIdentifier hash matching, etc]. Client > implementors should however be aware that these additional checks may > hinder interoperability in the general case." > > -- > Julien > > From owner-ietf-pkix@mail.imc.org Fri Oct 26 06:32:34 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IlMUU-0007vE-Eu for pkix-archive@lists.ietf.org; Fri, 26 Oct 2007 06:32:34 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IlMUG-0007J6-U7 for pkix-archive@lists.ietf.org; Fri, 26 Oct 2007 06:32:32 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9Q9RrXF045874 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 26 Oct 2007 02:27:53 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9Q9Rrhu045873; Fri, 26 Oct 2007 02:27:53 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from pfepa.post.tele.dk (pfepa.post.tele.dk [195.41.46.235]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9Q9RpO7045864 for ; Fri, 26 Oct 2007 02:27:52 -0700 (MST) (envelope-from era@tdcadsl.dk) Received: from morten (0x503ff080.albnxx10.adsl-dhcp.tele.dk [80.63.240.128]) by pfepa.post.tele.dk (Postfix) with ESMTP id 87826FAC04E; Fri, 26 Oct 2007 11:27:48 +0200 (CEST) From: "Erik Andersen" To: "'Russ Housley'" , "'Hoyt L Kesterson II'" , Subject: RE: Upper Bounds for X.509 Date: Fri, 26 Oct 2007 11:28:41 +0200 Message-ID: <000101c817b2$99ff1db0$0100a8c0@morten> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook, Build 10.0.6822 In-Reply-To: <200710221034.l9MAYKwt097035@balder-227.proper.com> Importance: Normal Thread-Index: AcgUofmawl/U3apHTzSftthhyN1X/gDEF5dg X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 82c9bddb247d9ba4471160a9a865a5f3 PKIX could impose upper bounds on anything they want without this being reflected in the ASN.1, but in English text. Erik Andersen Andersen's L-Service Mobile: +45 20 97 14 90 e-mail: era@tdcadsl.dk http://www.x500standard.com/ http://home20.inet.tele.dk/era/me > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] > On Behalf Of Russ Housley > Sent: 22. oktober 2007 11:34 > To: Hoyt L Kesterson II; ietf-pkix@imc.org > Subject: Re: Upper Bounds for X.509 > > > Hoyt: > > One never knows which non-critical extensions might be put in a > certificate. Remember when Bob Jueneman was advocating pictures in > certificates.... > > Russ > > > At 04:30 AM 10/22/2007, Hoyt L Kesterson II wrote: > > >Steven, I didn't say it was an attractive option. I have always been > >against these limits. > > > >Peter Gutmann recommended that "reasonable" upper bounds be set, > >e.g. thousand characters for a common name. But it appears his > >concern is about erratic operation when the certificate itself it huge. > > > >It may be more reasonable to set a max size on the entire > >certificate than on the individual components that comprise it. > > > > hoyt > > > > >Hoyt, > > > > > >Hoyt L Kesterson II wrote: > > >>Another option is to keep the bounds as we have them and have the > > IETF standard mandate the bounds, choosing any values you like. > > > > > >Then directory deployments would have to choose between being nice > > >to PKIX applications by imposing PKIX's upper bounds, or being > > >nice to other LDAP applications by not imposing upper bounds. > > > > > >Regards, > > >Steven From ingman@altcom.pl Fri Oct 26 08:49:38 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IlOd8-0006EC-FU for pkix-archive@lists.ietf.org; Fri, 26 Oct 2007 08:49:38 -0400 Received: from [81.215.1.168] (helo=dsl.static812151168.ttnet.net.tr) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IlOd4-0002ul-U2 for pkix-archive@lists.ietf.org; Fri, 26 Oct 2007 08:49:36 -0400 Received: by 10.175.38.206 with SMTP id sruvTAOEnpYiG; Fri, 26 Oct 2007 15:49:41 +0300 (GMT) Received: by 192.168.174.96 with SMTP id imddBQYpThjwxd.2066581578347; Fri, 26 Oct 2007 15:49:39 +0300 (GMT) Message-ID: <000901c817ce$aa190f50$a801d751@pc> From: "Kari ingman" To: Subject: 0greater Date: Fri, 26 Oct 2007 15:49:36 +0300 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0008_01C817E7.CF664750" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 X-Spam-Score: 1.5 (+) X-Scan-Signature: 8abaac9e10c826e8252866cbe6766464 ------=_NextPart_000_0008_01C817E7.CF664750 Content-Type: text/plain; charset="iso-8859-9" Content-Transfer-Encoding: quoted-printable Hallo pkix-archive dont waste another minute, make your penis massive http://rtfil.com/ Kari ingman ------=_NextPart_000_0008_01C817E7.CF664750 Content-Type: text/html; charset="iso-8859-9" Content-Transfer-Encoding: quoted-printable
Hallo pkix-archive
dont waste another minute, make your penis=20 massive
http://rtfil.com/
Kari ingman
------=_NextPart_000_0008_01C817E7.CF664750-- From chasady.Josefsson@uncleduckyoutfitters.com Sat Oct 27 13:03:05 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Ilp3x-0000YV-CZ for pkix-archive@lists.ietf.org; Sat, 27 Oct 2007 13:03:05 -0400 Received: from [85.99.212.238] (helo=dsl.dynamic8599212238.ttnet.net.tr) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1Ilp3s-00011f-Iu for pkix-archive@lists.ietf.org; Sat, 27 Oct 2007 13:03:01 -0400 Received: from i5c8a6 ([155.173.187.58] helo=i5c8a6) by dsl.dynamic8599212238.ttnet.net.tr ( sendmail 8.13.3/8.13.1) with esmtpa id 1ypUBZ-000KED-SH for pkix-archive@lists.ietf.org; Sat, 27 Oct 2007 20:03:25 +0300 Message-ID: <000401c818bb$3a4ec190$eed46355@i5c8a6> From: "chasady Josefsson" To: Subject: kousanky Date: Sat, 27 Oct 2007 20:02:59 +0300 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0005_01C818D4.5F9BF990" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 X-Spam-Score: 3.5 (+++) X-Scan-Signature: 8abaac9e10c826e8252866cbe6766464 ------=_NextPart_000_0005_01C818D4.5F9BF990 Content-Type: text/plain; charset="iso-8859-9" Content-Transfer-Encoding: quoted-printable hellow pkix-archive her pussy is screaming for some seriously big dick http://takipark.com/ chasady Josefsson ------=_NextPart_000_0005_01C818D4.5F9BF990 Content-Type: text/html; charset="iso-8859-9" Content-Transfer-Encoding: quoted-printable
hellow pkix-archive
her pussy is screaming for some seriously big=20 dick
http://takipark.com/
chasady Josefsson
------=_NextPart_000_0005_01C818D4.5F9BF990-- From owner-ietf-pkix@mail.imc.org Mon Oct 29 06:42:33 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1ImS4n-0004cp-9l for pkix-archive@lists.ietf.org; Mon, 29 Oct 2007 06:42:33 -0400 Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1ImS4Z-0006wD-Af for pkix-archive@lists.ietf.org; Mon, 29 Oct 2007 06:42:27 -0400 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9T9ZHuh095742 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 29 Oct 2007 02:35:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9T9ZHdG095741; Mon, 29 Oct 2007 02:35:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp-dub.microsoft.com (smtp-dub.microsoft.com [213.199.138.181]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9T9ZFLg095727 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Mon, 29 Oct 2007 02:35:16 -0700 (MST) (envelope-from stefans@microsoft.com) Received: from dub-exhub-c302.europe.corp.microsoft.com (65.53.213.92) by DUB-EXGWY-E802.partners.extranet.microsoft.com (10.251.129.2) with Microsoft SMTP Server (TLS) id 8.1.222.3; Mon, 29 Oct 2007 09:35:14 +0000 Received: from EA-EXMSG-C320.europe.corp.microsoft.com ([65.53.221.77]) by dub-exhub-c302.europe.corp.microsoft.com ([65.53.213.92]) with mapi; Mon, 29 Oct 2007 09:35:13 +0000 From: Stefan Santesson To: Stefan Santesson , "ietf-pkix@imc.org" Date: Mon, 29 Oct 2007 09:35:07 +0000 Subject: RE: Call for agenda items - Vancouver IETF Thread-Topic: Call for agenda items - Vancouver IETF Thread-Index: AcgU0hCHXWJbPwVPT7+3o4MRnK6r3wFPKLeA Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: acceptlanguage: en-US Content-Type: multipart/alternative; boundary="_000_E75F200AF1718F45B2024A88C3141A1D06478B0E9DEAEXMSGC320eu_" MIME-Version: 1.0 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: X-Spam-Score: 0.0 (/) X-Scan-Signature: 515708a075ffdf0a79d1c83b601e2afd --_000_E75F200AF1718F45B2024A88C3141A1D06478B0E9DEAEXMSGC320eu_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Just a friendly reminder. So far the number of received requests is 0. Thanks. Stefan Santesson Senior Program Manager Windows Security, Standards From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On= Behalf Of Stefan Santesson Sent: den 22 oktober 2007 19:36 To: ietf-pkix@imc.org Subject: Call for agenda items - Vancouver IETF Vancouver IETF is coming up. Please send me requests for agenda slots. As usual I would appreciate if editors of current documents let me know if = they want a slot and their assessment of the current status. I would appreciate requests to be sent to me as soon as possible and at lat= est Friday November 2nd. Thank you. Stefan Santesson Senior Program Manager Windows Security, Standards --_000_E75F200AF1718F45B2024A88C3141A1D06478B0E9DEAEXMSGC320eu_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Just a friendly reminder.

 =

So far the = number of received requests is 0.

Thanks.

 =

Stefan Santesson

Senior Program Manager=

Windows Security, Standards<= span lang=3DEN-US style=3D'color:#1F497D'>

 =

From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stefan Santesson<= br> Sent: den 22 oktober 2007 19:36
To: ietf-pkix@imc.org
Subject: Call for agenda items - Vancouver IETF

 

Vancouver IETF is coming up.

 

Please send me requests for agenda = slots.

As usual I would appreciate if edit= ors of current documents let me know if they want a slot and their assessment of the curre= nt status.

 

I would appreciate requests to be s= ent to me as soon as possible and at latest Friday November 2nd.

 

Thank you.

 

 

Stefan Santesson

Senior Program Manager=

Windows Security, Standards<= span lang=3DEN-US style=3D'color:#1F497D'>

 

--_000_E75F200AF1718F45B2024A88C3141A1D06478B0E9DEAEXMSGC320eu_-- From Bary392@dennisackley.com Mon Oct 29 06:58:34 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1ImSKI-0003ok-2c for pkix-archive@lists.ietf.org; Mon, 29 Oct 2007 06:58:34 -0400 Received: from adsl-225-85.eunet.yu ([213.198.225.85]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1ImSKC-0003qD-CU for pkix-archive@lists.ietf.org; Mon, 29 Oct 2007 06:58:28 -0400 Received: from Desktop ([140.190.42.62] helo=Desktop) by adsl-225-85.eunet.yu ( sendmail 8.13.3/8.13.1) with esmtpa id 1mJiIC-000HZS-FW for pkix-archive@lists.ietf.org; Mon, 29 Oct 2007 11:58:42 +0100 Message-ID: <79A86B4C.E85550D6@dennisackley.com> Date: Mon, 29 Oct 2007 11:58:31 +0100 From: "Bary Darris" User-Agent: Thunderbird 1.5.0.10 (Windows/20070221) MIME-Version: 1.0 To: pkix-archive@lists.ietf.org Subject: setiuqin Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Score: 3.6 (+++) X-Scan-Signature: 8ac499381112328dd60aea5b1ff596ea hey baby pkix-archive shes frustrated when you make love so why dont you sort it out? http://www.tahfm.com/ Bary Darris From magdas@physics.purdue.edu Tue Oct 30 21:08:23 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1In24F-0005ZK-7E for pkix-archive@lists.ietf.org; Tue, 30 Oct 2007 21:08:23 -0400 Received: from [190.42.124.241] (helo=ekaf) by ietf-mx.ietf.org with smtp (Exim 4.43) id 1In24A-0008Tr-Qp for pkix-archive@lists.ietf.org; Tue, 30 Oct 2007 21:08:20 -0400 Received: (qmail 3988 invoked from network); Tue, 30 Oct 2007 20:08:06 -0500 Received: from unknown (HELO uyxph) (76.177.26.235) by ekaf with SMTP; Tue, 30 Oct 2007 20:08:06 -0500 Message-ID: <000701c81b5a$7e9eebd0$eb1ab14c@uyxph> From: To: Subject: If your in your office, keep the speakers low, lol Date: Tue, 30 Oct 2007 20:08:06 -0500 MIME-Version: 1.0 Content-Type: text/plain; format=flowed; charset="windows-1252"; reply-type=original Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.2180 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180 X-Spam-Score: 2.8 (++) X-Scan-Signature: 01485d64dfa90b45a74269b3ca9d5574 I know you will like this. Heck you might even pass it on. LOL http://76.98.230.239/ From Grattonnhs@alm-bauplanung.de Tue Oct 30 22:41:24 2007 Return-path: Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1In3WG-0007Xn-EQ for pkix-archive@lists.ietf.org; Tue, 30 Oct 2007 22:41:24 -0400 Received: from host153-63-dynamic.21-87-r.retail.telecomitalia.it ([87.21.63.153] helo=host129-96-dynamic.1-79-r.retail.telecomitalia.it) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1In3WD-0006Ql-TF for pkix-archive@lists.ietf.org; Tue, 30 Oct 2007 22:41:22 -0400 Received: from sajjad ([198.157.163.58]:10577 "EHLO sajjad" smtp-auth: TLS-CIPHER: TLS-PEER-CN1: ) by host129-96-dynamic.1-79-r.retail.telecomitalia.it with ESMTP id S22TABJVHAFAAFJN (ORCPT ); Tue, 30 Oct 2007 03:42:24 +0100 Message-ID: <000401c81a9e$70c34720$8160014f@sajjad> From: "fdsafsfa Gratton" To: Subject: fadesen Date: Tue, 30 Oct 2007 03:41:57 +0100 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0009_01C81AA6.D287AF20" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 X-Spam-Score: 2.8 (++) X-Scan-Signature: b19722fc8d3865b147c75ae2495625f2 ------=_NextPart_000_0009_01C81AA6.D287AF20 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable whats poppin pkix-archive let your dick do all the talking, just make it bigger! http://www.bbrerto.com/ fdsafsfa Gratton ------=_NextPart_000_0009_01C81AA6.D287AF20 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
whats poppin pkix-archive
let your dick do all the talking, just make it = bigger!
http://www.bbrerto.com/
fdsafsfa Gratton
------=_NextPart_000_0009_01C81AA6.D287AF20-- From shoaib.Heshiki@888-5spycam.com Wed Oct 31 17:58:51 2007 Return-path: Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1InLaN-00053W-Ug for pkix-archive@lists.ietf.org; Wed, 31 Oct 2007 17:58:51 -0400 Received: from host34-2-static.88-82-b.business.telecomitalia.it ([82.88.2.34]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1InLaH-0006rZ-Gl for pkix-archive@lists.ietf.org; Wed, 31 Oct 2007 17:58:51 -0400 Received: by 10.53.219.88 with SMTP id ZQdRZoqxIUskP; Wed, 31 Oct 2007 23:00:49 +0100 (GMT) Received: by 192.168.78.58 with SMTP id AAqkEmmaghNyFE.7390307994060; Wed, 31 Oct 2007 23:00:47 +0100 (GMT) Message-ID: <5E0E3AB9.56357BD5@888-5spycam.com> Date: Wed, 31 Oct 2007 23:00:44 +0100 From: "shoaib Heshiki" User-Agent: Thunderbird 1.5.0.10 (Windows/20070221) MIME-Version: 1.0 To: pkix-archive@lists.ietf.org Subject: scottano Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Score: 0.0 (/) X-Scan-Signature: 8ac499381112328dd60aea5b1ff596ea hello mom pkix-archive she said she was impossible to please, may be you can with 3 inches more http://www.chayzy.com/ shoaib Heshiki Received: from [190.41.157.76] ([190.41.157.76]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9VKtsP6014171 for ; Wed, 31 Oct 2007 13:55:58 -0700 (MST) (envelope-from DeOliveiracrqr@idmx.com) Received: from nutica_radio ([168.159.157.31] helo=nutica_radio) by [190.41.157.76] ( sendmail 8.13.3/8.13.1) with esmtpa id 1KlYjv-000QCF-Fa for ietf-pkix-archive@imc.org; Wed, 31 Oct 2007 15:56:24 -0500 Date: Wed, 31 Oct 2007 15:55:58 -0500 From: "Akil DeOliveira" Reply-To: "Akil DeOliveira" Message-ID: <989111912790.765073928989@idmx.com> To: Subject: atiot MIME-Version: 1.0 Content-Type: text/plain; format=flowed; charset="iso-8859-1"; reply-type=original hey you ietf-pkix-archive as far as everyone can see, your dick needs some serious improvement http://babaztag.com/ Akil DeOliveira Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9T9ZHuh095742 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 29 Oct 2007 02:35:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9T9ZHdG095741; Mon, 29 Oct 2007 02:35:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp-dub.microsoft.com (smtp-dub.microsoft.com [213.199.138.181]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9T9ZFLg095727 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Mon, 29 Oct 2007 02:35:16 -0700 (MST) (envelope-from stefans@microsoft.com) Received: from dub-exhub-c302.europe.corp.microsoft.com (65.53.213.92) by DUB-EXGWY-E802.partners.extranet.microsoft.com (10.251.129.2) with Microsoft SMTP Server (TLS) id 8.1.222.3; Mon, 29 Oct 2007 09:35:14 +0000 Received: from EA-EXMSG-C320.europe.corp.microsoft.com ([65.53.221.77]) by dub-exhub-c302.europe.corp.microsoft.com ([65.53.213.92]) with mapi; Mon, 29 Oct 2007 09:35:13 +0000 From: Stefan Santesson To: Stefan Santesson , "ietf-pkix@imc.org" Date: Mon, 29 Oct 2007 09:35:07 +0000 Subject: RE: Call for agenda items - Vancouver IETF Thread-Topic: Call for agenda items - Vancouver IETF Thread-Index: AcgU0hCHXWJbPwVPT7+3o4MRnK6r3wFPKLeA Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: acceptlanguage: en-US Content-Type: multipart/alternative; boundary="_000_E75F200AF1718F45B2024A88C3141A1D06478B0E9DEAEXMSGC320eu_" MIME-Version: 1.0 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --_000_E75F200AF1718F45B2024A88C3141A1D06478B0E9DEAEXMSGC320eu_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Just a friendly reminder. So far the number of received requests is 0. Thanks. Stefan Santesson Senior Program Manager Windows Security, Standards From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On= Behalf Of Stefan Santesson Sent: den 22 oktober 2007 19:36 To: ietf-pkix@imc.org Subject: Call for agenda items - Vancouver IETF Vancouver IETF is coming up. Please send me requests for agenda slots. As usual I would appreciate if editors of current documents let me know if = they want a slot and their assessment of the current status. I would appreciate requests to be sent to me as soon as possible and at lat= est Friday November 2nd. Thank you. Stefan Santesson Senior Program Manager Windows Security, Standards --_000_E75F200AF1718F45B2024A88C3141A1D06478B0E9DEAEXMSGC320eu_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Just a friendly reminder.

 =

So far the = number of received requests is 0.

Thanks.

 =

Stefan Santesson

Senior Program Manager=

Windows Security, Standards<= span lang=3DEN-US style=3D'color:#1F497D'>

 =

From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stefan Santesson<= br> Sent: den 22 oktober 2007 19:36
To: ietf-pkix@imc.org
Subject: Call for agenda items - Vancouver IETF

 

Vancouver IETF is coming up.

 

Please send me requests for agenda = slots.

As usual I would appreciate if edit= ors of current documents let me know if they want a slot and their assessment of the curre= nt status.

 

I would appreciate requests to be s= ent to me as soon as possible and at latest Friday November 2nd.

 

Thank you.

 

 

Stefan Santesson

Senior Program Manager=

Windows Security, Standards<= span lang=3DEN-US style=3D'color:#1F497D'>

 

--_000_E75F200AF1718F45B2024A88C3141A1D06478B0E9DEAEXMSGC320eu_-- Received: from 80.178.31.113.adsl.012.net.il (80.178.31.113.adsl.012.net.il [80.178.31.113]) by balder-227.proper.com (8.13.5/8.13.5) with SMTP id l9R1pSo8041315; Fri, 26 Oct 2007 18:51:30 -0700 (MST) (envelope-from costello@326.cc) Date: Fri, 26 Oct 2007 22:51:47 -0400 From: "Rosalie Monroe" Message-ID: <83618446.06042026@ulysses.com> To: press@imc.org Subject: Good clothes open all doors. MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: 7bit If your "prick-horse" is not glad for you and give brake for you come to us. You'll feel that curb "it" is impossible. You must come to us now and you'll be a real cowboy legend. We wait you today, because the hot week of discounts is now. Don't miss your chance. http://ovloxq.partywill.cn/?808817644044 Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9Q9RrXF045874 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 26 Oct 2007 02:27:53 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9Q9Rrhu045873; Fri, 26 Oct 2007 02:27:53 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from pfepa.post.tele.dk (pfepa.post.tele.dk [195.41.46.235]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9Q9RpO7045864 for ; Fri, 26 Oct 2007 02:27:52 -0700 (MST) (envelope-from era@tdcadsl.dk) Received: from morten (0x503ff080.albnxx10.adsl-dhcp.tele.dk [80.63.240.128]) by pfepa.post.tele.dk (Postfix) with ESMTP id 87826FAC04E; Fri, 26 Oct 2007 11:27:48 +0200 (CEST) From: "Erik Andersen" To: "'Russ Housley'" , "'Hoyt L Kesterson II'" , Subject: RE: Upper Bounds for X.509 Date: Fri, 26 Oct 2007 11:28:41 +0200 Message-ID: <000101c817b2$99ff1db0$0100a8c0@morten> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook, Build 10.0.6822 In-Reply-To: <200710221034.l9MAYKwt097035@balder-227.proper.com> Importance: Normal Thread-Index: AcgUofmawl/U3apHTzSftthhyN1X/gDEF5dg X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: PKIX could impose upper bounds on anything they want without this being reflected in the ASN.1, but in English text. Erik Andersen Andersen's L-Service Mobile: +45 20 97 14 90 e-mail: era@tdcadsl.dk http://www.x500standard.com/ http://home20.inet.tele.dk/era/me > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] > On Behalf Of Russ Housley > Sent: 22. oktober 2007 11:34 > To: Hoyt L Kesterson II; ietf-pkix@imc.org > Subject: Re: Upper Bounds for X.509 > > > Hoyt: > > One never knows which non-critical extensions might be put in a > certificate. Remember when Bob Jueneman was advocating pictures in > certificates.... > > Russ > > > At 04:30 AM 10/22/2007, Hoyt L Kesterson II wrote: > > >Steven, I didn't say it was an attractive option. I have always been > >against these limits. > > > >Peter Gutmann recommended that "reasonable" upper bounds be set, > >e.g. thousand characters for a common name. But it appears his > >concern is about erratic operation when the certificate itself it huge. > > > >It may be more reasonable to set a max size on the entire > >certificate than on the individual components that comprise it. > > > > hoyt > > > > >Hoyt, > > > > > >Hoyt L Kesterson II wrote: > > >>Another option is to keep the bounds as we have them and have the > > IETF standard mandate the bounds, choosing any values you like. > > > > > >Then directory deployments would have to choose between being nice > > >to PKIX applications by imposing PKIX's upper bounds, or being > > >nice to other LDAP applications by not imposing upper bounds. > > > > > >Regards, > > >Steven Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9PCoQQx000686 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 25 Oct 2007 05:50:27 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9PCoQoU000685; Thu, 25 Oct 2007 05:50:26 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from EXVS01.ex.dslextreme.net ([66.51.199.86]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9PCoPVb000676 for ; Thu, 25 Oct 2007 05:50:26 -0700 (MST) (envelope-from chokhani@orionsec.com) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Subject: RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Date: Thu, 25 Oct 2007 05:50:10 -0700 Message-ID: <82D5657AE1F54347A734BDD33637C87909945C47@EXVS01.ex.dslextreme.net> In-Reply-To: <20071025084358.GD4999@mars.cry.pto> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: New Liaison Statement, "Liaison to IETF on the resolution of DR320" thread-index: AcgW7nGtamqKqlMNTXKUbsczXflWXQAFwyxA References: <82D5657AE1F54347A734BDD33637C8790987D3BC@EXVS01.ex.dslextreme.net> <20071022143330.GQ4999@mars.cry.pto> <82D5657AE1F54347A734BDD33637C8790987D7E4@EXVS01.ex.dslextreme.net> <20071025084358.GD4999@mars.cry.pto> From: "Santosh Chokhani" To: "Julien Stern" , Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l9PCoQVb000680 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Julien, It is very simple. Point to me to the specific post or e-mail me (not the entire mail list) your protection approach. -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Julien Stern Sent: Thursday, October 25, 2007 4:44 AM To: ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Santosh, I think you are being a bit unfair, as I did explain on the list as clearly as I could the attack and the protection (early Nov 2004). Anyway, I do not feel like boring other readers to death by starting the whole discussion once again. Maybe we can sit down at a table and chat if we happen to meet at a conference someday :) Regards, -- Julien On Mon, Oct 22, 2007 at 10:41:10AM -0700, Santosh Chokhani wrote: > Julien, > > What I recall is that your attack was a CA trusted to issue CA > certificates by the relying party going rogue. X.509 does not protect > against that. > > You also mentioned that you had protection against it, you were > unwilling to share it, and you said that you will share it after you > publish your work. > > I have yet to see your proposal. > > As a matter of fact on PKIX or X.500 forum within last year again I > asked you to share your proposal and you never replied. > > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] > On Behalf Of Julien Stern > Sent: Monday, October 22, 2007 10:34 AM > To: ietf-pkix@imc.org > Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution > of DR320" > > > On Mon, Oct 22, 2007 at 06:18:22AM -0700, Santosh Chokhani wrote: > > > > We have been down this route before. > > Oooooh Yes. Lots of fun and (gentle) arguments... > > > See my presentation to PKIX in Fall 2004 IETF meeting in Washington > DC. > > > > My understanding from 2004 presentation was that Russ Housley proposed > instead of ensuring certificate certification path and CRL certification > path matching, we make sure that we ensure that the paths begin at the > same trust anchor. It was felt by the group (not I) that coupled with > name constraints in cross certified environment is sufficient to > mitigate the risk to an acceptably low level. Of course, my argument > always has been that using the certificate certification path to > constrain the CRL certification path provides you both with security and > efficiency, something you do not always get. The primary reason to not > adopt my suggestion is that it requires change to client software. > > I did not feel either that trust anchor matching was sufficient enough. > > As you may remember, I also felt that your proposed solution, while > improving the situation, did not close every possible attacks, and I > proposed an alternative that was (in my humble opinion) even more secure > but with even more changes on the client software. > > Anyway, my current take on the subject would be roughly the following. > RFC3280bis could include something in the line of: > > "The uniqueness of DN of all entities in all the Trust Anchors > hierarchies SHOULD be enforced. If the uniqueness cannot be guaranteed > in some circonstances, client software MAY implement additional checks > in order to lower the risk of outputing an incorrect revocation value > during > path validation. [We could give example of additional checks here: > checking the trust anchor matching, check the full path matching, > checking the AuthorityKeyIdentifier hash matching, etc]. Client > implementors should however be aware that these additional checks may > hinder interoperability in the general case." > > -- > Julien > > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9P8i7hd079848 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 25 Oct 2007 01:44:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9P8i7bO079847; Thu, 25 Oct 2007 01:44:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from kraid.nerim.net (smtp-104-thursday.nerim.net [62.4.16.104]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9P8i6WW079839 for ; Thu, 25 Oct 2007 01:44:07 -0700 (MST) (envelope-from julien.stern@cryptolog.com) Received: from uranus.cry.pto (cryptolog2.pck.nerim.net [213.41.184.9]) by kraid.nerim.net (Postfix) with ESMTP id 95F00CF0AE for ; Thu, 25 Oct 2007 10:44:04 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by uranus.cry.pto (Postfix) with ESMTP id 2045D4428C for ; Thu, 25 Oct 2007 10:44:04 +0200 (CEST) X-Virus-Scanned: Debian amavisd-new at cryptolog.com Received: from uranus.cry.pto ([127.0.0.1]) by localhost (uranus.cry.pto [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EPISboNCw3ck for ; Thu, 25 Oct 2007 10:44:00 +0200 (CEST) Received: from mars.cry.pto (isonoe.cry.pto [10.0.1.15]) by uranus.cry.pto (Postfix) with SMTP id 092DA4427F for ; Thu, 25 Oct 2007 10:43:59 +0200 (CEST) Received: by mars.cry.pto (sSMTP sendmail emulation); Thu, 25 Oct 2007 10:43:59 +0200 From: "Julien Stern" Date: Thu, 25 Oct 2007 10:43:58 +0200 To: ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Message-ID: <20071025084358.GD4999@mars.cry.pto> Mail-Followup-To: Julien Stern , ietf-pkix@imc.org References: <82D5657AE1F54347A734BDD33637C8790987D3BC@EXVS01.ex.dslextreme.net> <20071022143330.GQ4999@mars.cry.pto> <82D5657AE1F54347A734BDD33637C8790987D7E4@EXVS01.ex.dslextreme.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <82D5657AE1F54347A734BDD33637C8790987D7E4@EXVS01.ex.dslextreme.net> User-Agent: Mutt/1.5.13 (2006-08-11) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Santosh, I think you are being a bit unfair, as I did explain on the list as clearly as I could the attack and the protection (early Nov 2004). Anyway, I do not feel like boring other readers to death by starting the whole discussion once again. Maybe we can sit down at a table and chat if we happen to meet at a conference someday :) Regards, -- Julien On Mon, Oct 22, 2007 at 10:41:10AM -0700, Santosh Chokhani wrote: > Julien, > > What I recall is that your attack was a CA trusted to issue CA > certificates by the relying party going rogue. X.509 does not protect > against that. > > You also mentioned that you had protection against it, you were > unwilling to share it, and you said that you will share it after you > publish your work. > > I have yet to see your proposal. > > As a matter of fact on PKIX or X.500 forum within last year again I > asked you to share your proposal and you never replied. > > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] > On Behalf Of Julien Stern > Sent: Monday, October 22, 2007 10:34 AM > To: ietf-pkix@imc.org > Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution > of DR320" > > > On Mon, Oct 22, 2007 at 06:18:22AM -0700, Santosh Chokhani wrote: > > > > We have been down this route before. > > Oooooh Yes. Lots of fun and (gentle) arguments... > > > See my presentation to PKIX in Fall 2004 IETF meeting in Washington > DC. > > > > My understanding from 2004 presentation was that Russ Housley proposed > instead of ensuring certificate certification path and CRL certification > path matching, we make sure that we ensure that the paths begin at the > same trust anchor. It was felt by the group (not I) that coupled with > name constraints in cross certified environment is sufficient to > mitigate the risk to an acceptably low level. Of course, my argument > always has been that using the certificate certification path to > constrain the CRL certification path provides you both with security and > efficiency, something you do not always get. The primary reason to not > adopt my suggestion is that it requires change to client software. > > I did not feel either that trust anchor matching was sufficient enough. > > As you may remember, I also felt that your proposed solution, while > improving the situation, did not close every possible attacks, and I > proposed an alternative that was (in my humble opinion) even more secure > but with even more changes on the client software. > > Anyway, my current take on the subject would be roughly the following. > RFC3280bis could include something in the line of: > > "The uniqueness of DN of all entities in all the Trust Anchors > hierarchies SHOULD be enforced. If the uniqueness cannot be guaranteed > in some circonstances, client software MAY implement additional checks > in order to lower the risk of outputing an incorrect revocation value > during > path validation. [We could give example of additional checks here: > checking the trust anchor matching, check the full path matching, > checking the AuthorityKeyIdentifier hash matching, etc]. Client > implementors should however be aware that these additional checks may > hinder interoperability in the general case." > > -- > Julien > > Received: from 202-133-68-138-sat.net.pk (202-133-68-138-sat.net.pk [202.133.68.138] (may be forged)) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9NHWbcg072029; Tue, 23 Oct 2007 10:32:40 -0700 (MST) (envelope-from darad@erai.ann.com) Received: from [192.168.0.1] by p5B0746F6.dip.t-dialin.net id PTFW5zgPC2Wx; Tue, 23 Oct 2007 20:32:33 +0300 Received: from 192.168.68.177 ([192.168.68.177]) by 192.168.0.1 (WinRoute Pro 4.2.8) with SMTP; Tue, 23 Oct 2007 20:32:33 +0300 Message-ID: <007a01c8159a$a1936f00$0100a8c0@p5B0746F6.dip.t-dialin.net> From: "Marika" To: "Tim" Subject: i want to know you! Date: Tue, 23 Oct 2007 20:32:33 +0300 MIME-Version: 1.0 Content-Type: text/plain; charset="windows-1251" Content-Transfer-Encoding: 8bit Aloha, my gentleman! Please, open windows into your heart. I know that you are embarrassed, what you can have common with woman from far Ukraine, the country which is situated at the another part of the world. Before writing to you this letter, I was puzzled by this question too till I have not found the answer and you here. We are both lonely and want the same: to find love and to be happy. Am I right? I am not risky person, but I want to risk this time, because it is the one chance to get acquainted with you and to create couple with you. I am kind-hearted, pretty woman who is able to love and take care. If my words touched your heart and you want to find your love, write me here http://russobride.info/?idAff=101 Yourth faithfully Marinochka Received: from [195.22.21.202] ([195.22.21.202]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9NDmsTI049866 for ; Tue, 23 Oct 2007 06:48:57 -0700 (MST) (envelope-from manju@artworkdental.com) Received: from rita ([145.146.3.179]:12115 "EHLO rita" smtp-auth: TLS-CIPHER: TLS-PEER-CN1: ) by [195.22.21.202] with ESMTP id S22JVXEVCDUKMZQX (ORCPT ); Tue, 23 Oct 2007 14:44:52 +0100 Message-ID: <000701c8157a$cf047b70$ca1516c3@rita> From: "manju DeBenedictis" To: Subject: 0tnuah Date: Tue, 23 Oct 2007 14:44:18 +0100 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0006_01C81583.30C8E370" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 X-Antivirus: avast! (VPS 000783-1, 22-10-2007), Outbound message X-Antivirus-Status: Clean ------=_NextPart_000_0006_01C81583.30C8E370 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Watcha! ietf-pkix-archive is she faking it? take care of that and make your dick big http://www.parsno.com/ manju DeBenedictis ------=_NextPart_000_0006_01C81583.30C8E370 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
Watcha! ietf-pkix-archive
is she faking it? take care of that and make = your dick=20 big
http://www.parsno.com/
manju DeBenedictis
------=_NextPart_000_0006_01C81583.30C8E370-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9NBF90l035031 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 23 Oct 2007 04:15:09 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9NBF9On035030; Tue, 23 Oct 2007 04:15:09 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from EXVS01.ex.dslextreme.net ([66.51.199.86]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9NBF8Vv035024 for ; Tue, 23 Oct 2007 04:15:08 -0700 (MST) (envelope-from chokhani@orionsec.com) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Subject: RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Date: Tue, 23 Oct 2007 04:14:56 -0700 Message-ID: <82D5657AE1F54347A734BDD33637C879098EC07A@EXVS01.ex.dslextreme.net> In-Reply-To: <50643.195.56.169.116.1193132579.squirrel@webmail.cs.tcd.ie> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: New Liaison Statement, "Liaison to IETF on the resolution of DR320" thread-index: AcgVZEOy4jxvPSLHTGamc53wC8IHXgAAViaA References: <82D5657AE1F54347A734BDD33637C879098EBEB1@EXVS01.ex.dslextreme.net> <50643.195.56.169.116.1193132579.squirrel@webmail.cs.tcd.ie> From: "Santosh Chokhani" To: Cc: "Denis Pinkas" , Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l9NBF8Vv035025 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: It is a bit worse than that. This has become our Autumn Ritual since 2004. May be we should make a movie on this "Same Time, Same Place, Same Debate Next Year" -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of stephen.farrell@cs.tcd.ie Sent: Tuesday, October 23, 2007 5:43 AM To: Santosh Chokhani Cc: Denis Pinkas; ietf-pkix@imc.org Subject: RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" As pointed out, we discussed this some time ago and ended up with the current 3280bis text. Repeating the arguments will only consume cycles. Stephen. Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9N9h7UB025378 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 23 Oct 2007 02:43:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9N9h7rn025377; Tue, 23 Oct 2007 02:43:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.cs.tcd.ie (relay.cs.tcd.ie [134.226.32.56]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9N9h14T025369 for ; Tue, 23 Oct 2007 02:43:03 -0700 (MST) (envelope-from stephen.farrell@cs.tcd.ie) Received: from localhost (localhost [127.0.0.1]) by relay.cs.tcd.ie (Postfix) with ESMTP id 26DD438BB; Tue, 23 Oct 2007 10:43:00 +0100 (IST) X-Virus-Scanned: amavisd-new at cs.tcd.ie Received: from smtp.cs.tcd.ie ([127.0.0.1]) by localhost (smtp.cs.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l3CleLceDL8Q; Tue, 23 Oct 2007 10:42:59 +0100 (IST) Received: from webmail.cs.tcd.ie (wilde.cs.tcd.ie [IPv6:2001:770:10:200:203:baff:fe96:d2b3]) by smtp.cs.tcd.ie (Postfix) with ESMTP id F15CA384D; Tue, 23 Oct 2007 10:42:51 +0100 (IST) Received: from 195.56.169.116 (SquirrelMail authenticated user sfarrel6) by webmail.cs.tcd.ie with HTTP; Tue, 23 Oct 2007 10:42:59 +0100 (IST) Message-ID: <50643.195.56.169.116.1193132579.squirrel@webmail.cs.tcd.ie> In-Reply-To: <82D5657AE1F54347A734BDD33637C879098EBEB1@EXVS01.ex.dslextreme.net> References: <82D5657AE1F54347A734BDD33637C879098EBEB1@EXVS01.ex.dslextreme.net> Date: Tue, 23 Oct 2007 10:42:59 +0100 (IST) Subject: RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" From: stephen.farrell@cs.tcd.ie To: "Santosh Chokhani" Cc: "Denis Pinkas" , ietf-pkix@imc.org Reply-To: stephen.farrell@cs.tcd.ie User-Agent: SquirrelMail/1.4.10a MIME-Version: 1.0 Content-Type: text/plain;charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-Priority: 3 (Normal) Importance: Normal Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: As pointed out, we discussed this some time ago and ended up with the current 3280bis text. Repeating the arguments will only consume cycles. Stephen. Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9N0BrEn081980 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 17:11:53 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9N0Bq7A081979; Mon, 22 Oct 2007 17:11:52 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from elasmtp-kukur.atl.sa.earthlink.net (elasmtp-kukur.atl.sa.earthlink.net [209.86.89.65]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9N0BoeN081951 for ; Mon, 22 Oct 2007 17:11:51 -0700 (MST) (envelope-from hoytkesterson@earthlink.net) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=dk20050327; d=earthlink.net; b=ACQ+pWxKv+MMWTNHLE0AZGWYL+XS6Qj0NPMnZh5srxPyASRMKzRqViKN1FC4qR83; h=Message-ID:Date:From:Reply-To:To:Subject:Mime-Version:Content-Type:Content-Transfer-Encoding:X-Mailer:X-ELNK-Trace:X-Originating-IP; Received: from [209.86.224.53] (helo=elwamui-wigeon.atl.sa.earthlink.net) by elasmtp-kukur.atl.sa.earthlink.net with asmtp (Exim 4.34) id 1Ik7N7-0003vL-Pg; Mon, 22 Oct 2007 20:11:50 -0400 Received: from 143.192.1.185 by webmail.pas.earthlink.net with HTTP; Mon, 22 Oct 2007 20:11:49 -0400 Message-ID: <12352707.1193098309804.JavaMail.root@elwamui-wigeon.atl.sa.earthlink.net> Date: Mon, 22 Oct 2007 20:11:49 -0400 (EDT) From: Hoyt L Kesterson II Reply-To: Hoyt L Kesterson II To: ietf-pkix@imc.org Subject: Re: New Liaison Statement, Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Mailer: EarthLink Zoo Mail 1.0 X-ELNK-Trace: 59f3edefb26af0321a6f9084d36cbc6474bf435c0eb9d478100f810b5c66a19032c6ea75cad3e433297c17fac106dbbb350badd9bab72f9c350badd9bab72f9c X-Originating-IP: 209.86.224.53 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: The ITU is not in disagreement. Its Study Group Plenary sent the IETF (not just PKIX) a liaison stating that it had rejected DR 320. It believes that the problems described by DR 320 would not exist if the concept of unambiguous naming is followed as described in the standard. It believes that if such a problem exists, those environments that permit such duplicate naming should address the problem. If the IETF feels that the problem need not be addressed for whatever reason, then the IETF can respond with that position. I only advise that "words fail me" would not be an understandable response to the folks back in Geneva. hoyt -----Original Message----- >From: Paul Hoffman >Sent: Oct 22, 2007 7:16 PM >To: Denis Pinkas , "ietf-pkix@imc.org" >Cc: Russ Housley >Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" > > >At 1:52 PM +0200 10/22/07, Denis Pinkas wrote: >>I agree with what you say. However", Words fail me" may have >>multiple interpretations. >>We are going to invent a mechanism to prevent conflict, e.g. a list >>of existing CA >>names that deployers of new CAs could check for naming conflicts. > >When you say "We", if you mean the IETF, then, yes, you have indeed >gotten the wrong sense of my statement. > >>The implications are that DR 320 has been rejected by the directory >>group on a wrong basis. > >It would be unwise for the PKIX WG to get embroiled in the ITU's >disagreements here. We should wait for a clear statement from them >about what they believe is their response to the issue, then we can >work with that. > >--Paul Hoffman, Director >--VPN Consortium > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MNIHjr078959 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 16:18:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MNIHKP078958; Mon, 22 Oct 2007 16:18:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from [165.227.249.203] (adsl-66-125-125-65.dsl.pltn13.pacbell.net [66.125.125.65]) (authenticated bits=0) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MNHfUd078933 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 16:17:42 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: References: Date: Mon, 22 Oct 2007 16:16:09 -0700 To: "Denis Pinkas" , "ietf-pkix@imc.org" From: Paul Hoffman Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Cc: "Russ Housley" Content-Type: text/plain; charset="us-ascii" ; format="flowed" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: At 1:52 PM +0200 10/22/07, Denis Pinkas wrote: >I agree with what you say. However", Words fail me" may have >multiple interpretations. >We are going to invent a mechanism to prevent conflict, e.g. a list >of existing CA >names that deployers of new CAs could check for naming conflicts. When you say "We", if you mean the IETF, then, yes, you have indeed gotten the wrong sense of my statement. >The implications are that DR 320 has been rejected by the directory >group on a wrong basis. It would be unwise for the PKIX WG to get embroiled in the ITU's disagreements here. We should wait for a clear statement from them about what they believe is their response to the issue, then we can work with that. --Paul Hoffman, Director --VPN Consortium Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MLhrai071577 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 14:43:53 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MLhrYH071576; Mon, 22 Oct 2007 14:43:53 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from EXVS01.ex.dslextreme.net ([66.51.199.86]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MLhoku071567 for ; Mon, 22 Oct 2007 14:43:50 -0700 (MST) (envelope-from chokhani@orionsec.com) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Subject: RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Date: Mon, 22 Oct 2007 14:43:39 -0700 Message-ID: <82D5657AE1F54347A734BDD33637C879098EBEB1@EXVS01.ex.dslextreme.net> In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: New Liaison Statement, "Liaison to IETF on the resolution of DR320" thread-index: AcgUu9IEbsO12Gd2RuqXfdVK2x2/lwAFxXjA References: From: "Santosh Chokhani" To: "Denis Pinkas" , Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from base64 to 8bit by balder-227.proper.com id l9MLhoku071569 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Denis, I am not sure you and I should be discussing this on the mail list, if the goal of our effort is to facilitate consensus. Last time we did that, we put people to sleep. It is time for others to comment on the topic. I know we are trying to fill a security hole using technical means as opposed to assuming that there are no CA name collisions. As to my proposal, it calls for an exact match of DNs in the certification path, but accounts for self-issued certificates due to CA re-key. I encourage you to look at the detailed briefing presented at PKIX Fall 2004. I assume it is still available via IETF. As to the paper presented at NIST 2005 Research Conference, it is actually NIST 2006 Research Conference. The URL is provided below. This also has been posted on PKIX before. The briefing (NIST workshop, not IETF) is at: http://middleware.internet2.edu/pki06/proceedings/ The full paper is at: http://csrc.nist.gov/publications/nistir/ir-7313/NIST-IR-7313_Final.pdf -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Denis Pinkas Sent: Monday, October 22, 2007 9:37 AM To: ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Santosh, >We have been down this route before. >See my presentation to PKIX in Fall 2004 IETF meeting in Washington DC. > My understanding from 2004 presentation was that Russ Housley proposed instead of > ensuring certificate certification path and CRL certification path matching, Unless the client software knows by "other means" what to do, this is the default way to make the whole system secure. > we make sure that we ensure that the paths begin at the same trust anchor. This helps, but it is fra from sufficient. > It was felt by the group (not I) that coupled with name constraints in cross certified > environment is sufficient to mitigate the risk to an acceptably low level. Reducing the risk does not suppress it. > Of course, my argument always has been that using the certificate > certification path to constrain the CRL certification path provides you both with security and > efficiency, something you do not always get. "Constraining" does not mean "identical". Would you be more precise ? > The primary reason to not adopt my suggestion is that it requires change to client software. Since most of the clients are insecure today in case of a DN name collision, it is time to fix it. >Also see our paper in NIST PKI Research Workshop in 2005 for a discussion of this. Would you have a link ? Denis >-----Original Message----- >From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Denis Pinkas >Sent: Monday, October 22, 2007 7:58 AM >To: ietf-pkix@imc.org >Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" > > >Russ said: > >>It seems to me that this is a trust anchor configuration concern. > >Not only. > >> If two CAs adopt the same name and a user accepts both of these CAs as >>trust anchors, then there could be a problem. Just don't do it. > >This is correct, but insufficient. This does not prevent two CAs somewhere >under this trust anchor to use the same name in different branches. > >>RFC 3280bis says: > >> While X.509 mandates that names be unambiguous, there is a risk that >> two unrelated authorities will issue certificates and/or CRLs under >> the same issuer name. > >This is correct. This sentence contradicts the response to DR 320. > >> As a means of reducing problems and security >> issues related to issuer name collisions, CA and CRL issuer names >> SHOULD be formed in a way that reduces the likelihood of name >> collisions. > >This recommandation does not *prevent* "problems and security issues". >This sentence should be deleted or changed. > >> Implementers should take into account the possible >> existence of multiple unrelated CAs and CRL issuers with the same >> name. > >This is fully correct. > >> At a minimum, implementations validating CRLs MUST ensure that >> the certification path of a certificate and the CRL issuer >> certification path used to validate the certificate terminate at the >> same trust anchor. > >This "minimum" clause is both insufficient and insecure. >This sentence gives a false sense of security. > >This means that RFC3280bis currently provides no coorect guidance >on how implementers should address this issue. > >The following text is an attempt to address this issue: > >"Implementations validating indirect CRLs MUST make sure that the >certificate of the CRL Issuer is indeed issued by the CA that issued >the certificate to be verified, which means that the sequence of DNs >of the certification path of the CRL issuer, up to the DN of a trust anchor, >must be identical to the the sequence of DNs of the certification path >of the certificate to be verified, up to the DN of the same trust anchor". > >Denis > >>Russ >> >>At 08:12 AM 10/5/2007, ITU-T SG 17 wrote: >> >>>Title: Liaison to IETF on the resolution of DR320 >>>Submission Date: 2007-10-05 >>>URL of the IETF Web page: >>>https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=375 >>>Please reply by 2008-03-01 >>> >>>From: Xiaoya Yang(ITU-T SG 17) >>>To: IETF/PKIX(Russ Housley , Stefan Santesson >>>) >>>Cc: Herbert Bertine >>> >>> >>> >>>Reponse Contact: Xiaoya YANG >>> >>>Technical Contact: >>> >>>Purpose: For action >>>Body: At our recent ITU-T SG17 meeting in Geneva we discussed and >>>rejected Defect Report 320 >>>(http://www.x500standard.com/uploads/Defects/DR_320.pdf) from >>>AFNOR. This DR advanced an argument that Distinguished Names may >>>not be unique and as such, the DN of the Certificate User may not be unique. >>>The directory group believes that Distinguished Name values must be >>>unique and unambiguously identify a single entity, hence the use of >>>the term Distinguished. >>>The DR states “the DN of the issuer name cannot be guaranteed to >>>be unique”. X.509 takes its definition of DN from X.501. Clause >>>9.2 of X.501 specifies the definition of DistinguishedName. This >>>clause states A name shall be unambiguous, that is, denotes just one object. >>>Clause 9 goes on to state: It is the responsibility of the relevant >>>naming authority for an entry to ensure that this is so by >>>appropriately assigning distinguished attribute values. Allocation >>>of RDNs is considered an administrative undertaking that may or may >>>not require some negotiation between involved organizations or >>>administrations. This Directory Specification does not provide such >>>a negotiation mechanism, and makes no assumption as to how it is performed. >>>The standard takes an axiomatic view of the concept that a >>>distinguished name unambiguously identifies a single entity. Things >>>break if two entities identify themselves using the same name. We >>>don't let two entities have the same domain name or the same email >>>address. Why? - because things wouldn't work. >>>The directory group does not accept the DR’s basic argument. We >>>believe that if two entities present the same name and a CA issues a >>>certificate to each, that CA made a mistake - not a naming authority >>>mistake, since a CA is not an naming authority (although one entity >>>can be both), but an entity to key binding mistake that leads to >>>confusion and even worse, a security risk. >>>We believe that if two entities claim the same name as top level >>>CAs, there is a political/procedural breakdown much like the domain >>>ownership arguments we have seen. No one argues that the Internet >>>protocols should be modified to solve that problem. The conflict is >>>resolved and one entity is assigned the name. The group believes >>>that this is the only reasonable solution for Distinguished >>>Naming. One votes for the CA of choice by configuring it as an anchor. >>>One of the participants in the directory meeting stated that >>>Certification Authorities are being deployed with names not acquired >>>from naming authorities but with names arbitrarily chosen assuming >>>that no other CA is or will be operating under that name. That >>>participant further stated that the IETF provides no guidelines on >>>ensuring that the names of CAs are unambiguous. >>>The directory group requests the IETF PKIX group to comment on this >>>statement. If the statement is correct, we ask the IETF to consider >>>putting a mechanism in place to prevent conflict, e.g. a list of >>>existing CA names that deployers of new CAs could check for naming conflicts. >>>Attachment(s): >>>No document has been attached >> > >Regards, > >Denis Pinkas > > Regards, Denis Pinkas Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MHfUFa047087 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 10:41:30 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MHfUUG047086; Mon, 22 Oct 2007 10:41:30 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from EXVS01.ex.dslextreme.net ([66.51.199.86]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MHfRwU047077 for ; Mon, 22 Oct 2007 10:41:30 -0700 (MST) (envelope-from chokhani@orionsec.com) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Subject: RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Date: Mon, 22 Oct 2007 10:41:10 -0700 Message-ID: <82D5657AE1F54347A734BDD33637C8790987D7E4@EXVS01.ex.dslextreme.net> In-Reply-To: <20071022143330.GQ4999@mars.cry.pto> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: New Liaison Statement, "Liaison to IETF on the resolution of DR320" thread-index: AcgUwnff3lW8VmZOQoeRcmJP01PqnAAD/cfQ References: <82D5657AE1F54347A734BDD33637C8790987D3BC@EXVS01.ex.dslextreme.net> <20071022143330.GQ4999@mars.cry.pto> From: "Santosh Chokhani" To: "Julien Stern" , Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l9MHfUwU047081 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Julien, What I recall is that your attack was a CA trusted to issue CA certificates by the relying party going rogue. X.509 does not protect against that. You also mentioned that you had protection against it, you were unwilling to share it, and you said that you will share it after you publish your work. I have yet to see your proposal. As a matter of fact on PKIX or X.500 forum within last year again I asked you to share your proposal and you never replied. -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Julien Stern Sent: Monday, October 22, 2007 10:34 AM To: ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" On Mon, Oct 22, 2007 at 06:18:22AM -0700, Santosh Chokhani wrote: > > We have been down this route before. Oooooh Yes. Lots of fun and (gentle) arguments... > See my presentation to PKIX in Fall 2004 IETF meeting in Washington DC. > > My understanding from 2004 presentation was that Russ Housley proposed instead of ensuring certificate certification path and CRL certification path matching, we make sure that we ensure that the paths begin at the same trust anchor. It was felt by the group (not I) that coupled with name constraints in cross certified environment is sufficient to mitigate the risk to an acceptably low level. Of course, my argument always has been that using the certificate certification path to constrain the CRL certification path provides you both with security and efficiency, something you do not always get. The primary reason to not adopt my suggestion is that it requires change to client software. I did not feel either that trust anchor matching was sufficient enough. As you may remember, I also felt that your proposed solution, while improving the situation, did not close every possible attacks, and I proposed an alternative that was (in my humble opinion) even more secure but with even more changes on the client software. Anyway, my current take on the subject would be roughly the following. RFC3280bis could include something in the line of: "The uniqueness of DN of all entities in all the Trust Anchors hierarchies SHOULD be enforced. If the uniqueness cannot be guaranteed in some circonstances, client software MAY implement additional checks in order to lower the risk of outputing an incorrect revocation value during path validation. [We could give example of additional checks here: checking the trust anchor matching, check the full path matching, checking the AuthorityKeyIdentifier hash matching, etc]. Client implementors should however be aware that these additional checks may hinder interoperability in the general case." -- Julien Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MHaVde046714 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 10:36:31 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MHaVle046713; Mon, 22 Oct 2007 10:36:31 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp-dub.microsoft.com (smtp-dub.microsoft.com [213.199.138.191]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MHaTIe046703 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Mon, 22 Oct 2007 10:36:30 -0700 (MST) (envelope-from stefans@microsoft.com) Received: from dub-exhub-c302.europe.corp.microsoft.com (65.53.213.92) by DUB-EXGWY-E801.partners.extranet.microsoft.com (10.251.129.1) with Microsoft SMTP Server (TLS) id 8.1.222.3; Mon, 22 Oct 2007 18:36:28 +0100 Received: from EA-EXMSG-C320.europe.corp.microsoft.com ([65.53.221.77]) by dub-exhub-c302.europe.corp.microsoft.com ([65.53.213.92]) with mapi; Mon, 22 Oct 2007 18:36:27 +0100 From: Stefan Santesson To: "ietf-pkix@imc.org" Date: Mon, 22 Oct 2007 18:36:23 +0100 Subject: Call for agenda items - Vancouver IETF Thread-Topic: Call for agenda items - Vancouver IETF Thread-Index: AcgU0hCHXWJbPwVPT7+3o4MRnK6r3w== Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: acceptlanguage: en-US Content-Type: multipart/alternative; boundary="_000_E75F200AF1718F45B2024A88C3141A1D0647534474EAEXMSGC320eu_" MIME-Version: 1.0 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --_000_E75F200AF1718F45B2024A88C3141A1D0647534474EAEXMSGC320eu_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Vancouver IETF is coming up. Please send me requests for agenda slots. As usual I would appreciate if editors of current documents let me know if = they want a slot and their assessment of the current status. I would appreciate requests to be sent to me as soon as possible and at lat= est Friday November 2nd. Thank you. Stefan Santesson Senior Program Manager Windows Security, Standards --_000_E75F200AF1718F45B2024A88C3141A1D0647534474EAEXMSGC320eu_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Vancouver IETF is coming up.

 

Please send me requests for agenda = slots.

As usual I would appreciate if edit= ors of current documents let me know if they want a slot and their assessment of t= he current status.

 

I would appreciate requests to be s= ent to me as soon as possible and at latest Friday November 2nd.

 

Thank you.

 

 

Stefan Santesson

Senior Program Manager=

Windows Security, Standards<= span lang=3DEN-US style=3D'color:#1F497D'>

 

--_000_E75F200AF1718F45B2024A88C3141A1D0647534474EAEXMSGC320eu_-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MEtnDG028726 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 07:55:49 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MEtn8n028725; Mon, 22 Oct 2007 07:55:49 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from odin2.bull.net (odin2.bull.net [129.184.85.11]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MEtk4l028715 for ; Mon, 22 Oct 2007 07:55:48 -0700 (MST) (envelope-from denis.pinkas@bull.net) Received: from MSGA-001.frcl.bull.fr (msga-mcl1.frcl.bull.fr [129.184.87.20]) by odin2.bull.net (8.9.3/8.9.3) with ESMTP id RAA69048 for ; Mon, 22 Oct 2007 17:03:12 +0200 Received: from frcls4013 ([129.182.108.120]) by MSGA-001.frcl.bull.fr (Lotus Domino Release 5.0.11) with SMTP id 2007102216551528:174750 ; Mon, 22 Oct 2007 16:55:15 +0200 Date: Mon, 22 Oct 2007 16:55:12 +0200 From: "Denis Pinkas" To: "ietf-pkix@imc.org" Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" X-mailer: Foxmail 5.0 [-fr-] Mime-Version: 1.0 X-MIMETrack: Itemize by SMTP Server on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 22/10/2007 16:55:15, Serialize by Router on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 22/10/2007 16:55:46, Serialize complete at 22/10/2007 16:55:46 Message-ID: Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from base64 to 8bit by balder-227.proper.com id l9MEtn4l028720 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: >Denis, > >As you might have seen from some of my old posting on the list, >I initially believed that there was a true "security flaw" in X.509 >regarding revocation. > >Now, my understanding is that the fact there is no name >collision is an _assumption_ in X.509. No name collision is simply an invalid assumption. >If one wants to cope with name collisions there are several >routes one can take depending on what the "adversary" is and >the constraint one wants to put on the PKI topology. > >1) The first one is simply to assume that it can be detected >and fixed. It can't. >2) One can cope with "accidental" name collision: I believe that is >the route currently taken by PKIX by mandating trust anchor matching. Same trust anchor is insufiicient. >3) Your proposed wording copes with less accidental and more malicious >attacks. It addresses the general case. > I believe this is in the same spirit as Santosh Chokani >proposal in 2004, (isn't it ?). No. Santosh was certainly mandating the same trust anchor, but this is not sufficient. But I let Santosh explains. > However, it restricts the PKI topology and It does not. >I believe it is still open to some exotic attacts (see my posting from >early November 2004). I do not recall that you have explained an attack on that scheme. >4) One can put even more restrictions on the PKI topology by mandating >that a CA signs the CRL issuer keys with an explicit "CRL issuer" extension >(similar to OCSP) and that the AuthorityKeyExtension (containing the >hash of the key) be explicitely checked during the path building. The AuthorityKeyExtension is not done for this. >All in all, I believe it is close to impossible to define a general rule >in the standard because some core assumptions regarding the uniqueness >of the DNs and the adversarial model may not be the same between >different PKIs. It is possible to define a default rule. Remember: A DN issued by one CA is unique for that CA, but for that CA only. Only a chain of DNs may be unique, starting from a trust anchor. which means, as Russ noticed, that it is not allowed to have two different roots in a validation policy (or a signature policy) with the same DN. Denis >Regards, > >-- >Julien > >On Mon, Oct 22, 2007 at 03:16:32PM +0200, Denis Pinkas wrote: >> >> Julien, >> >> >On Mon, Oct 22, 2007 at 01:57:33PM +0200, Denis Pinkas wrote: >> >> >> >> [snip] >> > >> >Hi Denis, >> > >> >> This means that RFC3280bis currently provides no coorect guidance >> >> on how implementers should address this issue. >> > >> >Agreed. There is a somewhat "matter of local policy-ish" issue here. >> > >> >> The following text is an attempt to address this issue: >> >> >> >> "Implementations validating indirect CRLs MUST make sure that the >> >> certificate of the CRL Issuer is indeed issued by the CA that issued >> >> the certificate to be verified, which means that the sequence of DNs >> >> of the certification path of the CRL issuer, up to the DN of a trust anchor, >> >> must be identical to the the sequence of DNs of the certification path >> >> of the certificate to be verified, up to the DN of the same trust anchor". >> > >> >Forcing the CA to directly issue the CRL issuer certificate is way too >> >restrictive in my humble opinion. I have an example of a PKI where there >> >is a single (indirect) CRL issuer for about 20 CAs. >> > >> >The CRL issuer certificate is issued by the (Root) CA that issued >> >those 20 CA certificates. >> >> What about: >> >> Unless a local policy states otherwise, implementations validating indirect CRLs >> MUST make sure that the certificate of the CRL Issuer is indeed issued by the CA >> that issued the certificate to be verified, which means that the sequence of DNs >> of the certification path of the CRL issuer, up to the DN of a trust anchor, >> must be identical to the the sequence of DNs of the certification path >> of the certificate to be verified, up to the DN of the same trust anchor". >> >> Denis >> >> >Regards, >> > >> >-- >> >Julien >> > >> >> Denis >> >> >> >> >Russ >> >> > >> >> >At 08:12 AM 10/5/2007, ITU-T SG 17 wrote: >> >> > >> >> >>Title: Liaison to IETF on the resolution of DR320 >> >> >>Submission Date: 2007-10-05 >> >> >>URL of the IETF Web page: >> >> >>https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=375 >> >> >>Please reply by 2008-03-01 >> >> >> >> >> >>From: Xiaoya Yang(ITU-T SG 17) >> >> >>To: IETF/PKIX(Russ Housley , Stefan Santesson >> >> >>) >> >> >>Cc: Herbert Bertine >> >> >> >> >> >> >> >> >> >> >> >>Reponse Contact: Xiaoya YANG >> >> >> >> >> >>Technical Contact: >> >> >> >> >> >>Purpose: For action >> >> >>Body: At our recent ITU-T SG17 meeting in Geneva we discussed and >> >> >>rejected Defect Report 320 >> >> >>(http://www.x500standard.com/uploads/Defects/DR_320.pdf) from >> >> >>AFNOR. This DR advanced an argument that Distinguished Names may >> >> >>not be unique and as such, the DN of the Certificate User may not be unique. >> >> >>The directory group believes that Distinguished Name values must be >> >> >>unique and unambiguously identify a single entity, hence the use of >> >> >>the term Distinguished. >> >> >>The DR states “the DN of the issuer name cannot be guaranteed to >> >> >>be unique”. X.509 takes its definition of DN from X.501. Clause >> >> >>9.2 of X.501 specifies the definition of DistinguishedName. This >> >> >>clause states A name shall be unambiguous, that is, denotes just one object. >> >> >>Clause 9 goes on to state: It is the responsibility of the relevant >> >> >>naming authority for an entry to ensure that this is so by >> >> >>appropriately assigning distinguished attribute values. Allocation >> >> >>of RDNs is considered an administrative undertaking that may or may >> >> >>not require some negotiation between involved organizations or >> >> >>administrations. This Directory Specification does not provide such >> >> >>a negotiation mechanism, and makes no assumption as to how it is performed. >> >> >>The standard takes an axiomatic view of the concept that a >> >> >>distinguished name unambiguously identifies a single entity. Things >> >> >>break if two entities identify themselves using the same name. We >> >> >>don't let two entities have the same domain name or the same email >> >> >>address. Why? - because things wouldn't work. >> >> >>The directory group does not accept the DR’s basic argument. We >> >> >>believe that if two entities present the same name and a CA issues a >> >> >>certificate to each, that CA made a mistake - not a naming authority >> >> >>mistake, since a CA is not an naming authority (although one entity >> >> >>can be both), but an entity to key binding mistake that leads to >> >> >>confusion and even worse, a security risk. >> >> >>We believe that if two entities claim the same name as top level >> >> >>CAs, there is a political/procedural breakdown much like the domain >> >> >>ownership arguments we have seen. No one argues that the Internet >> >> >>protocols should be modified to solve that problem. The conflict is >> >> >>resolved and one entity is assigned the name. The group believes >> >> >>that this is the only reasonable solution for Distinguished >> >> >>Naming. One votes for the CA of choice by configuring it as an anchor. >> >> >>One of the participants in the directory meeting stated that >> >> >>Certification Authorities are being deployed with names not acquired >> >> >>from naming authorities but with names arbitrarily chosen assuming >> >> >>that no other CA is or will be operating under that name. That >> >> >>participant further stated that the IETF provides no guidelines on >> >> >>ensuring that the names of CAs are unambiguous. >> >> >>The directory group requests the IETF PKIX group to comment on this >> >> >>statement. If the statement is correct, we ask the IETF to consider >> >> >>putting a mechanism in place to prevent conflict, e.g. a list of >> >> >>existing CA names that deployers of new CAs could check for naming conflicts. >> >> >>Attachment(s): >> >> >>No document has been attached >> >> > Regards, Denis Pinkas Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MEXdJZ025950 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 07:33:39 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MEXd5T025949; Mon, 22 Oct 2007 07:33:39 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from kraid.nerim.net (smtp-101-monday.nerim.net [62.4.16.101]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MEXbdY025941 for ; Mon, 22 Oct 2007 07:33:38 -0700 (MST) (envelope-from julien.stern@cryptolog.com) Received: from uranus.cry.pto (cryptolog2.pck.nerim.net [213.41.184.9]) by kraid.nerim.net (Postfix) with ESMTP id 0902BCF0CE for ; Mon, 22 Oct 2007 16:33:37 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by uranus.cry.pto (Postfix) with ESMTP id 13C8D4428C for ; Mon, 22 Oct 2007 16:33:37 +0200 (CEST) X-Virus-Scanned: Debian amavisd-new at cryptolog.com Received: from uranus.cry.pto ([127.0.0.1]) by localhost (uranus.cry.pto [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aEhfP+H9zqdQ for ; Mon, 22 Oct 2007 16:33:31 +0200 (CEST) Received: from mars.cry.pto (isonoe.cry.pto [10.0.1.15]) by uranus.cry.pto (Postfix) with SMTP id 6726744006 for ; Mon, 22 Oct 2007 16:33:30 +0200 (CEST) Received: by mars.cry.pto (sSMTP sendmail emulation); Mon, 22 Oct 2007 16:33:30 +0200 From: "Julien Stern" Date: Mon, 22 Oct 2007 16:33:30 +0200 To: ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Message-ID: <20071022143330.GQ4999@mars.cry.pto> Mail-Followup-To: Julien Stern , ietf-pkix@imc.org References: <82D5657AE1F54347A734BDD33637C8790987D3BC@EXVS01.ex.dslextreme.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <82D5657AE1F54347A734BDD33637C8790987D3BC@EXVS01.ex.dslextreme.net> User-Agent: Mutt/1.5.13 (2006-08-11) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: On Mon, Oct 22, 2007 at 06:18:22AM -0700, Santosh Chokhani wrote: > > We have been down this route before. Oooooh Yes. Lots of fun and (gentle) arguments... > See my presentation to PKIX in Fall 2004 IETF meeting in Washington DC. > > My understanding from 2004 presentation was that Russ Housley proposed instead of ensuring certificate certification path and CRL certification path matching, we make sure that we ensure that the paths begin at the same trust anchor. It was felt by the group (not I) that coupled with name constraints in cross certified environment is sufficient to mitigate the risk to an acceptably low level. Of course, my argument always has been that using the certificate certification path to constrain the CRL certification path provides you both with security and efficiency, something you do not always get. The primary reason to not adopt my suggestion is that it requires change to client software. I did not feel either that trust anchor matching was sufficient enough. As you may remember, I also felt that your proposed solution, while improving the situation, did not close every possible attacks, and I proposed an alternative that was (in my humble opinion) even more secure but with even more changes on the client software. Anyway, my current take on the subject would be roughly the following. RFC3280bis could include something in the line of: "The uniqueness of DN of all entities in all the Trust Anchors hierarchies SHOULD be enforced. If the uniqueness cannot be guaranteed in some circonstances, client software MAY implement additional checks in order to lower the risk of outputing an incorrect revocation value during path validation. [We could give example of additional checks here: checking the trust anchor matching, check the full path matching, checking the AuthorityKeyIdentifier hash matching, etc]. Client implementors should however be aware that these additional checks may hinder interoperability in the general case." -- Julien Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MELUn9023305 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 07:21:31 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MELUUE023304; Mon, 22 Oct 2007 07:21:30 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from kraid.nerim.net (smtp-101-monday.nerim.net [62.4.16.101]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MELTfj023283 for ; Mon, 22 Oct 2007 07:21:29 -0700 (MST) (envelope-from julien.stern@cryptolog.com) Received: from uranus.cry.pto (cryptolog2.pck.nerim.net [213.41.184.9]) by kraid.nerim.net (Postfix) with ESMTP id E324ACF0E7 for ; Mon, 22 Oct 2007 16:21:27 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by uranus.cry.pto (Postfix) with ESMTP id EEE954428C for ; Mon, 22 Oct 2007 16:21:27 +0200 (CEST) X-Virus-Scanned: Debian amavisd-new at cryptolog.com Received: from uranus.cry.pto ([127.0.0.1]) by localhost (uranus.cry.pto [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 43sPUcKST8h7 for ; Mon, 22 Oct 2007 16:21:23 +0200 (CEST) Received: from mars.cry.pto (isonoe.cry.pto [10.0.1.15]) by uranus.cry.pto (Postfix) with SMTP id 91BC144006 for ; Mon, 22 Oct 2007 16:21:22 +0200 (CEST) Received: by mars.cry.pto (sSMTP sendmail emulation); Mon, 22 Oct 2007 16:21:22 +0200 From: "Julien Stern" Date: Mon, 22 Oct 2007 16:21:22 +0200 To: "ietf-pkix@imc.org" Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Message-ID: <20071022142122.GP4999@mars.cry.pto> Mail-Followup-To: Julien Stern , "ietf-pkix@imc.org" References: MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.5.13 (2006-08-11) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Denis, As you might have seen from some of my old posting on the list, I initially believed that there was a true "security flaw" in X.509 regarding revocation. Now, my understanding is that the fact there is no name collision is an _assumption_ in X.509. If one wants to cope with name collisions there are several routes one can take depending on what the "adversary" is and the constraint one wants to put on the PKI topology. 1) The first one is simply to assume that it can be detected and fixed. 2) One can cope with "accidental" name collision: I believe that is the route currently taken by PKIX by mandating trust anchor matching. 3) Your proposed wording copes with less accidental and more malicious attacks. I believe this is in the same spirit as Santosh Chokani proposal in 2004, (isn't it ?). However, it restricts the PKI topology and I believe it is still open to some exotic attacts (see my posting from early November 2004). 4) One can put even more restrictions on the PKI topology by mandating that a CA signs the CRL issuer keys with an explicit "CRL issuer" extension (similar to OCSP) and that the AuthorityKeyExtension (containing the hash of the key) be explicitely checked during the path building. All in all, I believe it is close to impossible to define a general rule in the standard because some core assumptions regarding the uniqueness of the DNs and the adversarial model may not be the same between different PKIs. Regards, -- Julien On Mon, Oct 22, 2007 at 03:16:32PM +0200, Denis Pinkas wrote: > > Julien, > > >On Mon, Oct 22, 2007 at 01:57:33PM +0200, Denis Pinkas wrote: > >> > >> [snip] > > > >Hi Denis, > > > >> This means that RFC3280bis currently provides no coorect guidance > >> on how implementers should address this issue. > > > >Agreed. There is a somewhat "matter of local policy-ish" issue here. > > > >> The following text is an attempt to address this issue: > >> > >> "Implementations validating indirect CRLs MUST make sure that the > >> certificate of the CRL Issuer is indeed issued by the CA that issued > >> the certificate to be verified, which means that the sequence of DNs > >> of the certification path of the CRL issuer, up to the DN of a trust anchor, > >> must be identical to the the sequence of DNs of the certification path > >> of the certificate to be verified, up to the DN of the same trust anchor". > > > >Forcing the CA to directly issue the CRL issuer certificate is way too > >restrictive in my humble opinion. I have an example of a PKI where there > >is a single (indirect) CRL issuer for about 20 CAs. > > > >The CRL issuer certificate is issued by the (Root) CA that issued > >those 20 CA certificates. > > What about: > > Unless a local policy states otherwise, implementations validating indirect CRLs > MUST make sure that the certificate of the CRL Issuer is indeed issued by the CA > that issued the certificate to be verified, which means that the sequence of DNs > of the certification path of the CRL issuer, up to the DN of a trust anchor, > must be identical to the the sequence of DNs of the certification path > of the certificate to be verified, up to the DN of the same trust anchor". > > Denis > > >Regards, > > > >-- > >Julien > > > >> Denis > >> > >> >Russ > >> > > >> >At 08:12 AM 10/5/2007, ITU-T SG 17 wrote: > >> > > >> >>Title: Liaison to IETF on the resolution of DR320 > >> >>Submission Date: 2007-10-05 > >> >>URL of the IETF Web page: > >> >>https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=375 > >> >>Please reply by 2008-03-01 > >> >> > >> >>From: Xiaoya Yang(ITU-T SG 17) > >> >>To: IETF/PKIX(Russ Housley , Stefan Santesson > >> >>) > >> >>Cc: Herbert Bertine > >> >> > >> >> > >> >> > >> >>Reponse Contact: Xiaoya YANG > >> >> > >> >>Technical Contact: > >> >> > >> >>Purpose: For action > >> >>Body: At our recent ITU-T SG17 meeting in Geneva we discussed and > >> >>rejected Defect Report 320 > >> >>(http://www.x500standard.com/uploads/Defects/DR_320.pdf) from > >> >>AFNOR. This DR advanced an argument that Distinguished Names may > >> >>not be unique and as such, the DN of the Certificate User may not be unique. > >> >>The directory group believes that Distinguished Name values must be > >> >>unique and unambiguously identify a single entity, hence the use of > >> >>the term Distinguished. > >> >>The DR states “the DN of the issuer name cannot be guaranteed to > >> >>be unique”. X.509 takes its definition of DN from X.501. Clause > >> >>9.2 of X.501 specifies the definition of DistinguishedName. This > >> >>clause states A name shall be unambiguous, that is, denotes just one object. > >> >>Clause 9 goes on to state: It is the responsibility of the relevant > >> >>naming authority for an entry to ensure that this is so by > >> >>appropriately assigning distinguished attribute values. Allocation > >> >>of RDNs is considered an administrative undertaking that may or may > >> >>not require some negotiation between involved organizations or > >> >>administrations. This Directory Specification does not provide such > >> >>a negotiation mechanism, and makes no assumption as to how it is performed. > >> >>The standard takes an axiomatic view of the concept that a > >> >>distinguished name unambiguously identifies a single entity. Things > >> >>break if two entities identify themselves using the same name. We > >> >>don't let two entities have the same domain name or the same email > >> >>address. Why? - because things wouldn't work. > >> >>The directory group does not accept the DR’s basic argument. We > >> >>believe that if two entities present the same name and a CA issues a > >> >>certificate to each, that CA made a mistake - not a naming authority > >> >>mistake, since a CA is not an naming authority (although one entity > >> >>can be both), but an entity to key binding mistake that leads to > >> >>confusion and even worse, a security risk. > >> >>We believe that if two entities claim the same name as top level > >> >>CAs, there is a political/procedural breakdown much like the domain > >> >>ownership arguments we have seen. No one argues that the Internet > >> >>protocols should be modified to solve that problem. The conflict is > >> >>resolved and one entity is assigned the name. The group believes > >> >>that this is the only reasonable solution for Distinguished > >> >>Naming. One votes for the CA of choice by configuring it as an anchor. > >> >>One of the participants in the directory meeting stated that > >> >>Certification Authorities are being deployed with names not acquired > >> >>from naming authorities but with names arbitrarily chosen assuming > >> >>that no other CA is or will be operating under that name. That > >> >>participant further stated that the IETF provides no guidelines on > >> >>ensuring that the names of CAs are unambiguous. > >> >>The directory group requests the IETF PKIX group to comment on this > >> >>statement. If the statement is correct, we ask the IETF to consider > >> >>putting a mechanism in place to prevent conflict, e.g. a list of > >> >>existing CA names that deployers of new CAs could check for naming conflicts. > >> >>Attachment(s): > >> >>No document has been attached > > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MDbcpG017855 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 06:37:38 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MDbcVP017854; Mon, 22 Oct 2007 06:37:38 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from odin2.bull.net (odin2.bull.net [129.184.85.11]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MDbWip017829 for ; Mon, 22 Oct 2007 06:37:36 -0700 (MST) (envelope-from denis.pinkas@bull.net) Received: from MSGA-001.frcl.bull.fr (msga-mcl1.frcl.bull.fr [129.184.87.20]) by odin2.bull.net (8.9.3/8.9.3) with ESMTP id PAA57722 for ; Mon, 22 Oct 2007 15:44:57 +0200 Received: from frcls4013 ([129.182.108.120]) by MSGA-001.frcl.bull.fr (Lotus Domino Release 5.0.11) with SMTP id 2007102215371323:172571 ; Mon, 22 Oct 2007 15:37:13 +0200 Date: Mon, 22 Oct 2007 15:37:09 +0200 From: "Denis Pinkas" To: "ietf-pkix@imc.org" Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" X-mailer: Foxmail 5.0 [-fr-] Mime-Version: 1.0 X-MIMETrack: Itemize by SMTP Server on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 22/10/2007 15:37:13, Serialize by Router on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 22/10/2007 15:37:31, Serialize complete at 22/10/2007 15:37:31 Message-ID: Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from base64 to 8bit by balder-227.proper.com id l9MDbcip017849 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Santosh, >We have been down this route before. >See my presentation to PKIX in Fall 2004 IETF meeting in Washington DC. > My understanding from 2004 presentation was that Russ Housley proposed instead of > ensuring certificate certification path and CRL certification path matching, Unless the client software knows by "other means" what to do, this is the default way to make the whole system secure. > we make sure that we ensure that the paths begin at the same trust anchor. This helps, but it is fra from sufficient. > It was felt by the group (not I) that coupled with name constraints in cross certified > environment is sufficient to mitigate the risk to an acceptably low level. Reducing the risk does not suppress it. > Of course, my argument always has been that using the certificate > certification path to constrain the CRL certification path provides you both with security and > efficiency, something you do not always get. "Constraining" does not mean "identical". Would you be more precise ? > The primary reason to not adopt my suggestion is that it requires change to client software. Since most of the clients are insecure today in case of a DN name collision, it is time to fix it. >Also see our paper in NIST PKI Research Workshop in 2005 for a discussion of this. Would you have a link ? Denis >-----Original Message----- >From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Denis Pinkas >Sent: Monday, October 22, 2007 7:58 AM >To: ietf-pkix@imc.org >Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" > > >Russ said: > >>It seems to me that this is a trust anchor configuration concern. > >Not only. > >> If two CAs adopt the same name and a user accepts both of these CAs as >>trust anchors, then there could be a problem. Just don't do it. > >This is correct, but insufficient. This does not prevent two CAs somewhere >under this trust anchor to use the same name in different branches. > >>RFC 3280bis says: > >> While X.509 mandates that names be unambiguous, there is a risk that >> two unrelated authorities will issue certificates and/or CRLs under >> the same issuer name. > >This is correct. This sentence contradicts the response to DR 320. > >> As a means of reducing problems and security >> issues related to issuer name collisions, CA and CRL issuer names >> SHOULD be formed in a way that reduces the likelihood of name >> collisions. > >This recommandation does not *prevent* "problems and security issues". >This sentence should be deleted or changed. > >> Implementers should take into account the possible >> existence of multiple unrelated CAs and CRL issuers with the same >> name. > >This is fully correct. > >> At a minimum, implementations validating CRLs MUST ensure that >> the certification path of a certificate and the CRL issuer >> certification path used to validate the certificate terminate at the >> same trust anchor. > >This "minimum" clause is both insufficient and insecure. >This sentence gives a false sense of security. > >This means that RFC3280bis currently provides no coorect guidance >on how implementers should address this issue. > >The following text is an attempt to address this issue: > >"Implementations validating indirect CRLs MUST make sure that the >certificate of the CRL Issuer is indeed issued by the CA that issued >the certificate to be verified, which means that the sequence of DNs >of the certification path of the CRL issuer, up to the DN of a trust anchor, >must be identical to the the sequence of DNs of the certification path >of the certificate to be verified, up to the DN of the same trust anchor". > >Denis > >>Russ >> >>At 08:12 AM 10/5/2007, ITU-T SG 17 wrote: >> >>>Title: Liaison to IETF on the resolution of DR320 >>>Submission Date: 2007-10-05 >>>URL of the IETF Web page: >>>https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=375 >>>Please reply by 2008-03-01 >>> >>>From: Xiaoya Yang(ITU-T SG 17) >>>To: IETF/PKIX(Russ Housley , Stefan Santesson >>>) >>>Cc: Herbert Bertine >>> >>> >>> >>>Reponse Contact: Xiaoya YANG >>> >>>Technical Contact: >>> >>>Purpose: For action >>>Body: At our recent ITU-T SG17 meeting in Geneva we discussed and >>>rejected Defect Report 320 >>>(http://www.x500standard.com/uploads/Defects/DR_320.pdf) from >>>AFNOR. This DR advanced an argument that Distinguished Names may >>>not be unique and as such, the DN of the Certificate User may not be unique. >>>The directory group believes that Distinguished Name values must be >>>unique and unambiguously identify a single entity, hence the use of >>>the term Distinguished. >>>The DR states “the DN of the issuer name cannot be guaranteed to >>>be unique”. X.509 takes its definition of DN from X.501. Clause >>>9.2 of X.501 specifies the definition of DistinguishedName. This >>>clause states A name shall be unambiguous, that is, denotes just one object. >>>Clause 9 goes on to state: It is the responsibility of the relevant >>>naming authority for an entry to ensure that this is so by >>>appropriately assigning distinguished attribute values. Allocation >>>of RDNs is considered an administrative undertaking that may or may >>>not require some negotiation between involved organizations or >>>administrations. This Directory Specification does not provide such >>>a negotiation mechanism, and makes no assumption as to how it is performed. >>>The standard takes an axiomatic view of the concept that a >>>distinguished name unambiguously identifies a single entity. Things >>>break if two entities identify themselves using the same name. We >>>don't let two entities have the same domain name or the same email >>>address. Why? - because things wouldn't work. >>>The directory group does not accept the DR’s basic argument. We >>>believe that if two entities present the same name and a CA issues a >>>certificate to each, that CA made a mistake - not a naming authority >>>mistake, since a CA is not an naming authority (although one entity >>>can be both), but an entity to key binding mistake that leads to >>>confusion and even worse, a security risk. >>>We believe that if two entities claim the same name as top level >>>CAs, there is a political/procedural breakdown much like the domain >>>ownership arguments we have seen. No one argues that the Internet >>>protocols should be modified to solve that problem. The conflict is >>>resolved and one entity is assigned the name. The group believes >>>that this is the only reasonable solution for Distinguished >>>Naming. One votes for the CA of choice by configuring it as an anchor. >>>One of the participants in the directory meeting stated that >>>Certification Authorities are being deployed with names not acquired >>>from naming authorities but with names arbitrarily chosen assuming >>>that no other CA is or will be operating under that name. That >>>participant further stated that the IETF provides no guidelines on >>>ensuring that the names of CAs are unambiguous. >>>The directory group requests the IETF PKIX group to comment on this >>>statement. If the statement is correct, we ask the IETF to consider >>>putting a mechanism in place to prevent conflict, e.g. a list of >>>existing CA names that deployers of new CAs could check for naming conflicts. >>>Attachment(s): >>>No document has been attached >> > >Regards, > >Denis Pinkas > > Regards, Denis Pinkas Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MDIlv2015692 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 06:18:47 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MDIlar015691; Mon, 22 Oct 2007 06:18:47 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from EXVS01.ex.dslextreme.net ([66.51.199.86]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MDIkKn015685 for ; Mon, 22 Oct 2007 06:18:46 -0700 (MST) (envelope-from chokhani@orionsec.com) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Subject: RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Date: Mon, 22 Oct 2007 06:18:22 -0700 Message-ID: <82D5657AE1F54347A734BDD33637C8790987D3BC@EXVS01.ex.dslextreme.net> In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: New Liaison Statement, "Liaison to IETF on the resolution of DR320" thread-index: AcgUrOA/zJMTWYymSuqXK8WAICIFXAAAGv4w References: From: "Santosh Chokhani" To: "Denis Pinkas" , Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from base64 to 8bit by balder-227.proper.com id l9MDIlKn015686 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: We have been down this route before. See my presentation to PKIX in Fall 2004 IETF meeting in Washington DC. My understanding from 2004 presentation was that Russ Housley proposed instead of ensuring certificate certification path and CRL certification path matching, we make sure that we ensure that the paths begin at the same trust anchor. It was felt by the group (not I) that coupled with name constraints in cross certified environment is sufficient to mitigate the risk to an acceptably low level. Of course, my argument always has been that using the certificate certification path to constrain the CRL certification path provides you both with security and efficiency, something you do not always get. The primary reason to not adopt my suggestion is that it requires change to client software. Also see our paper in NIST PKI Research Workshop in 2005 for a discussion of this. -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Denis Pinkas Sent: Monday, October 22, 2007 7:58 AM To: ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Russ said: >It seems to me that this is a trust anchor configuration concern. Not only. > If two CAs adopt the same name and a user accepts both of these CAs as >trust anchors, then there could be a problem. Just don't do it. This is correct, but insufficient. This does not prevent two CAs somewhere under this trust anchor to use the same name in different branches. >RFC 3280bis says: > While X.509 mandates that names be unambiguous, there is a risk that > two unrelated authorities will issue certificates and/or CRLs under > the same issuer name. This is correct. This sentence contradicts the response to DR 320. > As a means of reducing problems and security > issues related to issuer name collisions, CA and CRL issuer names > SHOULD be formed in a way that reduces the likelihood of name > collisions. This recommandation does not *prevent* "problems and security issues". This sentence should be deleted or changed. > Implementers should take into account the possible > existence of multiple unrelated CAs and CRL issuers with the same > name. This is fully correct. > At a minimum, implementations validating CRLs MUST ensure that > the certification path of a certificate and the CRL issuer > certification path used to validate the certificate terminate at the > same trust anchor. This "minimum" clause is both insufficient and insecure. This sentence gives a false sense of security. This means that RFC3280bis currently provides no coorect guidance on how implementers should address this issue. The following text is an attempt to address this issue: "Implementations validating indirect CRLs MUST make sure that the certificate of the CRL Issuer is indeed issued by the CA that issued the certificate to be verified, which means that the sequence of DNs of the certification path of the CRL issuer, up to the DN of a trust anchor, must be identical to the the sequence of DNs of the certification path of the certificate to be verified, up to the DN of the same trust anchor". Denis >Russ > >At 08:12 AM 10/5/2007, ITU-T SG 17 wrote: > >>Title: Liaison to IETF on the resolution of DR320 >>Submission Date: 2007-10-05 >>URL of the IETF Web page: >>https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=375 >>Please reply by 2008-03-01 >> >>From: Xiaoya Yang(ITU-T SG 17) >>To: IETF/PKIX(Russ Housley , Stefan Santesson >>) >>Cc: Herbert Bertine >> >> >> >>Reponse Contact: Xiaoya YANG >> >>Technical Contact: >> >>Purpose: For action >>Body: At our recent ITU-T SG17 meeting in Geneva we discussed and >>rejected Defect Report 320 >>(http://www.x500standard.com/uploads/Defects/DR_320.pdf) from >>AFNOR. This DR advanced an argument that Distinguished Names may >>not be unique and as such, the DN of the Certificate User may not be unique. >>The directory group believes that Distinguished Name values must be >>unique and unambiguously identify a single entity, hence the use of >>the term Distinguished. >>The DR states “the DN of the issuer name cannot be guaranteed to >>be unique”. X.509 takes its definition of DN from X.501. Clause >>9.2 of X.501 specifies the definition of DistinguishedName. This >>clause states A name shall be unambiguous, that is, denotes just one object. >>Clause 9 goes on to state: It is the responsibility of the relevant >>naming authority for an entry to ensure that this is so by >>appropriately assigning distinguished attribute values. Allocation >>of RDNs is considered an administrative undertaking that may or may >>not require some negotiation between involved organizations or >>administrations. This Directory Specification does not provide such >>a negotiation mechanism, and makes no assumption as to how it is performed. >>The standard takes an axiomatic view of the concept that a >>distinguished name unambiguously identifies a single entity. Things >>break if two entities identify themselves using the same name. We >>don't let two entities have the same domain name or the same email >>address. Why? - because things wouldn't work. >>The directory group does not accept the DR’s basic argument. We >>believe that if two entities present the same name and a CA issues a >>certificate to each, that CA made a mistake - not a naming authority >>mistake, since a CA is not an naming authority (although one entity >>can be both), but an entity to key binding mistake that leads to >>confusion and even worse, a security risk. >>We believe that if two entities claim the same name as top level >>CAs, there is a political/procedural breakdown much like the domain >>ownership arguments we have seen. No one argues that the Internet >>protocols should be modified to solve that problem. The conflict is >>resolved and one entity is assigned the name. The group believes >>that this is the only reasonable solution for Distinguished >>Naming. One votes for the CA of choice by configuring it as an anchor. >>One of the participants in the directory meeting stated that >>Certification Authorities are being deployed with names not acquired >>from naming authorities but with names arbitrarily chosen assuming >>that no other CA is or will be operating under that name. That >>participant further stated that the IETF provides no guidelines on >>ensuring that the names of CAs are unambiguous. >>The directory group requests the IETF PKIX group to comment on this >>statement. If the statement is correct, we ask the IETF to consider >>putting a mechanism in place to prevent conflict, e.g. a list of >>existing CA names that deployers of new CAs could check for naming conflicts. >>Attachment(s): >>No document has been attached > Regards, Denis Pinkas Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MDHBLU015515 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 06:17:11 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MDHBdc015514; Mon, 22 Oct 2007 06:17:11 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from odin2.bull.net (odin2.bull.net [129.184.85.11]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MDH5Zh015494 for ; Mon, 22 Oct 2007 06:17:07 -0700 (MST) (envelope-from denis.pinkas@bull.net) Received: from MSGA-001.frcl.bull.fr (msga-mcl1.frcl.bull.fr [129.184.87.20]) by odin2.bull.net (8.9.3/8.9.3) with ESMTP id PAA35980 for ; Mon, 22 Oct 2007 15:24:31 +0200 Received: from frcls4013 ([129.182.108.120]) by MSGA-001.frcl.bull.fr (Lotus Domino Release 5.0.11) with SMTP id 2007102215163459:172002 ; Mon, 22 Oct 2007 15:16:34 +0200 Date: Mon, 22 Oct 2007 15:16:32 +0200 From: "Denis Pinkas" To: "ietf-pkix@imc.org" Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" X-mailer: Foxmail 5.0 [-fr-] Mime-Version: 1.0 X-MIMETrack: Itemize by SMTP Server on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 22/10/2007 15:16:34, Serialize by Router on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 22/10/2007 15:17:05, Serialize complete at 22/10/2007 15:17:05 Message-ID: Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from base64 to 8bit by balder-227.proper.com id l9MDHBZh015509 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Julien, >On Mon, Oct 22, 2007 at 01:57:33PM +0200, Denis Pinkas wrote: >> >> [snip] > >Hi Denis, > >> This means that RFC3280bis currently provides no coorect guidance >> on how implementers should address this issue. > >Agreed. There is a somewhat "matter of local policy-ish" issue here. > >> The following text is an attempt to address this issue: >> >> "Implementations validating indirect CRLs MUST make sure that the >> certificate of the CRL Issuer is indeed issued by the CA that issued >> the certificate to be verified, which means that the sequence of DNs >> of the certification path of the CRL issuer, up to the DN of a trust anchor, >> must be identical to the the sequence of DNs of the certification path >> of the certificate to be verified, up to the DN of the same trust anchor". > >Forcing the CA to directly issue the CRL issuer certificate is way too >restrictive in my humble opinion. I have an example of a PKI where there >is a single (indirect) CRL issuer for about 20 CAs. > >The CRL issuer certificate is issued by the (Root) CA that issued >those 20 CA certificates. What about: Unless a local policy states otherwise, implementations validating indirect CRLs MUST make sure that the certificate of the CRL Issuer is indeed issued by the CA that issued the certificate to be verified, which means that the sequence of DNs of the certification path of the CRL issuer, up to the DN of a trust anchor, must be identical to the the sequence of DNs of the certification path of the certificate to be verified, up to the DN of the same trust anchor". Denis >Regards, > >-- >Julien > >> Denis >> >> >Russ >> > >> >At 08:12 AM 10/5/2007, ITU-T SG 17 wrote: >> > >> >>Title: Liaison to IETF on the resolution of DR320 >> >>Submission Date: 2007-10-05 >> >>URL of the IETF Web page: >> >>https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=375 >> >>Please reply by 2008-03-01 >> >> >> >>From: Xiaoya Yang(ITU-T SG 17) >> >>To: IETF/PKIX(Russ Housley , Stefan Santesson >> >>) >> >>Cc: Herbert Bertine >> >> >> >> >> >> >> >>Reponse Contact: Xiaoya YANG >> >> >> >>Technical Contact: >> >> >> >>Purpose: For action >> >>Body: At our recent ITU-T SG17 meeting in Geneva we discussed and >> >>rejected Defect Report 320 >> >>(http://www.x500standard.com/uploads/Defects/DR_320.pdf) from >> >>AFNOR. This DR advanced an argument that Distinguished Names may >> >>not be unique and as such, the DN of the Certificate User may not be unique. >> >>The directory group believes that Distinguished Name values must be >> >>unique and unambiguously identify a single entity, hence the use of >> >>the term Distinguished. >> >>The DR states “the DN of the issuer name cannot be guaranteed to >> >>be unique”. X.509 takes its definition of DN from X.501. Clause >> >>9.2 of X.501 specifies the definition of DistinguishedName. This >> >>clause states A name shall be unambiguous, that is, denotes just one object. >> >>Clause 9 goes on to state: It is the responsibility of the relevant >> >>naming authority for an entry to ensure that this is so by >> >>appropriately assigning distinguished attribute values. Allocation >> >>of RDNs is considered an administrative undertaking that may or may >> >>not require some negotiation between involved organizations or >> >>administrations. This Directory Specification does not provide such >> >>a negotiation mechanism, and makes no assumption as to how it is performed. >> >>The standard takes an axiomatic view of the concept that a >> >>distinguished name unambiguously identifies a single entity. Things >> >>break if two entities identify themselves using the same name. We >> >>don't let two entities have the same domain name or the same email >> >>address. Why? - because things wouldn't work. >> >>The directory group does not accept the DR’s basic argument. We >> >>believe that if two entities present the same name and a CA issues a >> >>certificate to each, that CA made a mistake - not a naming authority >> >>mistake, since a CA is not an naming authority (although one entity >> >>can be both), but an entity to key binding mistake that leads to >> >>confusion and even worse, a security risk. >> >>We believe that if two entities claim the same name as top level >> >>CAs, there is a political/procedural breakdown much like the domain >> >>ownership arguments we have seen. No one argues that the Internet >> >>protocols should be modified to solve that problem. The conflict is >> >>resolved and one entity is assigned the name. The group believes >> >>that this is the only reasonable solution for Distinguished >> >>Naming. One votes for the CA of choice by configuring it as an anchor. >> >>One of the participants in the directory meeting stated that >> >>Certification Authorities are being deployed with names not acquired >> >>from naming authorities but with names arbitrarily chosen assuming >> >>that no other CA is or will be operating under that name. That >> >>participant further stated that the IETF provides no guidelines on >> >>ensuring that the names of CAs are unambiguous. >> >>The directory group requests the IETF PKIX group to comment on this >> >>statement. If the statement is correct, we ask the IETF to consider >> >>putting a mechanism in place to prevent conflict, e.g. a list of >> >>existing CA names that deployers of new CAs could check for naming conflicts. >> >>Attachment(s): >> >>No document has been attached Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MCsB8b012038 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 05:54:11 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MCsBZo012037; Mon, 22 Oct 2007 05:54:11 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mallaury.nerim.net (smtp-101-monday.noc.nerim.net [62.4.17.101]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MCs9jL012028 for ; Mon, 22 Oct 2007 05:54:10 -0700 (MST) (envelope-from julien.stern@cryptolog.com) Received: from uranus.cry.pto (cryptolog2.pck.nerim.net [213.41.184.9]) by mallaury.nerim.net (Postfix) with ESMTP id 79F9D4F3CA for ; Mon, 22 Oct 2007 14:53:54 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by uranus.cry.pto (Postfix) with ESMTP id 5BC4E4428C for ; Mon, 22 Oct 2007 14:54:02 +0200 (CEST) X-Virus-Scanned: Debian amavisd-new at cryptolog.com Received: from uranus.cry.pto ([127.0.0.1]) by localhost (uranus.cry.pto [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yuQXUuKMRvNf for ; Mon, 22 Oct 2007 14:53:54 +0200 (CEST) Received: from mars.cry.pto (isonoe.cry.pto [10.0.1.15]) by uranus.cry.pto (Postfix) with SMTP id EA24B44006 for ; Mon, 22 Oct 2007 14:53:53 +0200 (CEST) Received: by mars.cry.pto (sSMTP sendmail emulation); Mon, 22 Oct 2007 14:53:53 +0200 From: "Julien Stern" Date: Mon, 22 Oct 2007 14:53:53 +0200 To: "ietf-pkix@imc.org" Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Message-ID: <20071022125353.GO4999@mars.cry.pto> Mail-Followup-To: Julien Stern , "ietf-pkix@imc.org" References: MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.5.13 (2006-08-11) Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: On Mon, Oct 22, 2007 at 01:57:33PM +0200, Denis Pinkas wrote: > > [snip] Hi Denis, > This means that RFC3280bis currently provides no coorect guidance > on how implementers should address this issue. Agreed. There is a somewhat "matter of local policy-ish" issue here. > The following text is an attempt to address this issue: > > "Implementations validating indirect CRLs MUST make sure that the > certificate of the CRL Issuer is indeed issued by the CA that issued > the certificate to be verified, which means that the sequence of DNs > of the certification path of the CRL issuer, up to the DN of a trust anchor, > must be identical to the the sequence of DNs of the certification path > of the certificate to be verified, up to the DN of the same trust anchor". Forcing the CA to directly issue the CRL issuer certificate is way too restrictive in my humble opinion. I have an example of a PKI where there is a single (indirect) CRL issuer for about 20 CAs. The CRL issuer certificate is issued by the (Root) CA that issued those 20 CA certificates. Regards, -- Julien > Denis > > >Russ > > > >At 08:12 AM 10/5/2007, ITU-T SG 17 wrote: > > > >>Title: Liaison to IETF on the resolution of DR320 > >>Submission Date: 2007-10-05 > >>URL of the IETF Web page: > >>https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=375 > >>Please reply by 2008-03-01 > >> > >>From: Xiaoya Yang(ITU-T SG 17) > >>To: IETF/PKIX(Russ Housley , Stefan Santesson > >>) > >>Cc: Herbert Bertine > >> > >> > >> > >>Reponse Contact: Xiaoya YANG > >> > >>Technical Contact: > >> > >>Purpose: For action > >>Body: At our recent ITU-T SG17 meeting in Geneva we discussed and > >>rejected Defect Report 320 > >>(http://www.x500standard.com/uploads/Defects/DR_320.pdf) from > >>AFNOR. This DR advanced an argument that Distinguished Names may > >>not be unique and as such, the DN of the Certificate User may not be unique. > >>The directory group believes that Distinguished Name values must be > >>unique and unambiguously identify a single entity, hence the use of > >>the term Distinguished. > >>The DR states “the DN of the issuer name cannot be guaranteed to > >>be unique”. X.509 takes its definition of DN from X.501. Clause > >>9.2 of X.501 specifies the definition of DistinguishedName. This > >>clause states A name shall be unambiguous, that is, denotes just one object. > >>Clause 9 goes on to state: It is the responsibility of the relevant > >>naming authority for an entry to ensure that this is so by > >>appropriately assigning distinguished attribute values. Allocation > >>of RDNs is considered an administrative undertaking that may or may > >>not require some negotiation between involved organizations or > >>administrations. This Directory Specification does not provide such > >>a negotiation mechanism, and makes no assumption as to how it is performed. > >>The standard takes an axiomatic view of the concept that a > >>distinguished name unambiguously identifies a single entity. Things > >>break if two entities identify themselves using the same name. We > >>don't let two entities have the same domain name or the same email > >>address. Why? - because things wouldn't work. > >>The directory group does not accept the DR’s basic argument. We > >>believe that if two entities present the same name and a CA issues a > >>certificate to each, that CA made a mistake - not a naming authority > >>mistake, since a CA is not an naming authority (although one entity > >>can be both), but an entity to key binding mistake that leads to > >>confusion and even worse, a security risk. > >>We believe that if two entities claim the same name as top level > >>CAs, there is a political/procedural breakdown much like the domain > >>ownership arguments we have seen. No one argues that the Internet > >>protocols should be modified to solve that problem. The conflict is > >>resolved and one entity is assigned the name. The group believes > >>that this is the only reasonable solution for Distinguished > >>Naming. One votes for the CA of choice by configuring it as an anchor. > >>One of the participants in the directory meeting stated that > >>Certification Authorities are being deployed with names not acquired > >>from naming authorities but with names arbitrarily chosen assuming > >>that no other CA is or will be operating under that name. That > >>participant further stated that the IETF provides no guidelines on > >>ensuring that the names of CAs are unambiguous. > >>The directory group requests the IETF PKIX group to comment on this > >>statement. If the statement is correct, we ask the IETF to consider > >>putting a mechanism in place to prevent conflict, e.g. a list of > >>existing CA names that deployers of new CAs could check for naming conflicts. > >>Attachment(s): > >>No document has been attached > > > > Regards, > > Denis Pinkas > > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MC1Z9B005347 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 05:01:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MC1ZRn005346; Mon, 22 Oct 2007 05:01:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from odin2.bull.net (odin2.bull.net [129.184.85.11]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MC1Xr9005326 for ; Mon, 22 Oct 2007 05:01:34 -0700 (MST) (envelope-from denis.pinkas@bull.net) Received: from MSGA-001.frcl.bull.fr (msga-mcl1.frcl.bull.fr [129.184.87.20]) by odin2.bull.net (8.9.3/8.9.3) with ESMTP id OAA11860 for ; Mon, 22 Oct 2007 14:08:55 +0200 Received: from frcls4013 ([129.182.108.120]) by MSGA-001.frcl.bull.fr (Lotus Domino Release 5.0.11) with SMTP id 2007102213573596:169728 ; Mon, 22 Oct 2007 13:57:35 +0200 Date: Mon, 22 Oct 2007 13:57:33 +0200 From: "Denis Pinkas" To: "ietf-pkix@imc.org" Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" X-mailer: Foxmail 5.0 [-fr-] Mime-Version: 1.0 X-MIMETrack: Itemize by SMTP Server on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 22/10/2007 13:57:35, Serialize by Router on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 22/10/2007 14:01:22, Serialize complete at 22/10/2007 14:01:22 Message-ID: Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from base64 to 8bit by balder-227.proper.com id l9MC1Zr9005341 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Russ said: >It seems to me that this is a trust anchor configuration concern. Not only. > If two CAs adopt the same name and a user accepts both of these CAs as >trust anchors, then there could be a problem. Just don't do it. This is correct, but insufficient. This does not prevent two CAs somewhere under this trust anchor to use the same name in different branches. >RFC 3280bis says: > While X.509 mandates that names be unambiguous, there is a risk that > two unrelated authorities will issue certificates and/or CRLs under > the same issuer name. This is correct. This sentence contradicts the response to DR 320. > As a means of reducing problems and security > issues related to issuer name collisions, CA and CRL issuer names > SHOULD be formed in a way that reduces the likelihood of name > collisions. This recommandation does not *prevent* "problems and security issues". This sentence should be deleted or changed. > Implementers should take into account the possible > existence of multiple unrelated CAs and CRL issuers with the same > name. This is fully correct. > At a minimum, implementations validating CRLs MUST ensure that > the certification path of a certificate and the CRL issuer > certification path used to validate the certificate terminate at the > same trust anchor. This "minimum" clause is both insufficient and insecure. This sentence gives a false sense of security. This means that RFC3280bis currently provides no coorect guidance on how implementers should address this issue. The following text is an attempt to address this issue: "Implementations validating indirect CRLs MUST make sure that the certificate of the CRL Issuer is indeed issued by the CA that issued the certificate to be verified, which means that the sequence of DNs of the certification path of the CRL issuer, up to the DN of a trust anchor, must be identical to the the sequence of DNs of the certification path of the certificate to be verified, up to the DN of the same trust anchor". Denis >Russ > >At 08:12 AM 10/5/2007, ITU-T SG 17 wrote: > >>Title: Liaison to IETF on the resolution of DR320 >>Submission Date: 2007-10-05 >>URL of the IETF Web page: >>https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=375 >>Please reply by 2008-03-01 >> >>From: Xiaoya Yang(ITU-T SG 17) >>To: IETF/PKIX(Russ Housley , Stefan Santesson >>) >>Cc: Herbert Bertine >> >> >> >>Reponse Contact: Xiaoya YANG >> >>Technical Contact: >> >>Purpose: For action >>Body: At our recent ITU-T SG17 meeting in Geneva we discussed and >>rejected Defect Report 320 >>(http://www.x500standard.com/uploads/Defects/DR_320.pdf) from >>AFNOR. This DR advanced an argument that Distinguished Names may >>not be unique and as such, the DN of the Certificate User may not be unique. >>The directory group believes that Distinguished Name values must be >>unique and unambiguously identify a single entity, hence the use of >>the term Distinguished. >>The DR states “the DN of the issuer name cannot be guaranteed to >>be unique”. X.509 takes its definition of DN from X.501. Clause >>9.2 of X.501 specifies the definition of DistinguishedName. This >>clause states A name shall be unambiguous, that is, denotes just one object. >>Clause 9 goes on to state: It is the responsibility of the relevant >>naming authority for an entry to ensure that this is so by >>appropriately assigning distinguished attribute values. Allocation >>of RDNs is considered an administrative undertaking that may or may >>not require some negotiation between involved organizations or >>administrations. This Directory Specification does not provide such >>a negotiation mechanism, and makes no assumption as to how it is performed. >>The standard takes an axiomatic view of the concept that a >>distinguished name unambiguously identifies a single entity. Things >>break if two entities identify themselves using the same name. We >>don't let two entities have the same domain name or the same email >>address. Why? - because things wouldn't work. >>The directory group does not accept the DR’s basic argument. We >>believe that if two entities present the same name and a CA issues a >>certificate to each, that CA made a mistake - not a naming authority >>mistake, since a CA is not an naming authority (although one entity >>can be both), but an entity to key binding mistake that leads to >>confusion and even worse, a security risk. >>We believe that if two entities claim the same name as top level >>CAs, there is a political/procedural breakdown much like the domain >>ownership arguments we have seen. No one argues that the Internet >>protocols should be modified to solve that problem. The conflict is >>resolved and one entity is assigned the name. The group believes >>that this is the only reasonable solution for Distinguished >>Naming. One votes for the CA of choice by configuring it as an anchor. >>One of the participants in the directory meeting stated that >>Certification Authorities are being deployed with names not acquired >>from naming authorities but with names arbitrarily chosen assuming >>that no other CA is or will be operating under that name. That >>participant further stated that the IETF provides no guidelines on >>ensuring that the names of CAs are unambiguous. >>The directory group requests the IETF PKIX group to comment on this >>statement. If the statement is correct, we ask the IETF to consider >>putting a mechanism in place to prevent conflict, e.g. a list of >>existing CA names that deployers of new CAs could check for naming conflicts. >>Attachment(s): >>No document has been attached > Regards, Denis Pinkas Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MC1Yml005339 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 05:01:34 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MC1Ywq005338; Mon, 22 Oct 2007 05:01:34 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from odin2.bull.net (odin2.bull.net [129.184.85.11]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MC1S8o005306 for ; Mon, 22 Oct 2007 05:01:29 -0700 (MST) (envelope-from denis.pinkas@bull.net) Received: from MSGA-001.frcl.bull.fr (msga-mcl1.frcl.bull.fr [129.184.87.20]) by odin2.bull.net (8.9.3/8.9.3) with ESMTP id OAA100800; Mon, 22 Oct 2007 14:08:52 +0200 Received: from frcls4013 ([129.182.108.120]) by MSGA-001.frcl.bull.fr (Lotus Domino Release 5.0.11) with SMTP id 2007102213524618:169607 ; Mon, 22 Oct 2007 13:52:46 +0200 Date: Mon, 22 Oct 2007 13:52:42 +0200 From: "Denis Pinkas" To: "ietf-pkix@imc.org" Cc: "Russ Housley" Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" X-mailer: Foxmail 5.0 [-fr-] Mime-Version: 1.0 X-MIMETrack: Itemize by SMTP Server on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 22/10/2007 13:52:46, Serialize by Router on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 22/10/2007 14:01:16, Serialize complete at 22/10/2007 14:01:16 Message-ID: Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from base64 to 8bit by balder-227.proper.com id l9MC1Y8o005332 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Paul, I agree with what you say. However", Words fail me" may have multiple interpretations. We are going to invent a mechanism to prevent conflict, e.g. a list of existing CA names that deployers of new CAs could check for naming conflicts. We are not going either to mandate the use of the DC naming attribute to guarantee DN uniqueness. The text from DR 320 is: On page 12, the current text states serialNumber is an integer assigned by the CA to each certificate. The value of serialNumber shall be unique for each certificate issued by a given CA (i.e., the issuer name and serial number identify a unique certificate). The text inside the parenthesis should be deleted: the DN of the issuer name cannot be guaranteed to be unique (the collision may be deliberate or accidental) and therefore the issuer name and serial number cannot uniquely identify a certificate. The text of the answer to DR 320 states: "This DR advanced an argument that Distinguished Names may not be unique and as such, the DN of the Certificate User may not be unique. The directory group believes that Distinguished Name values must be unique and unambiguously identify a single entity, hence the use of the term Distinguished". The implications are that DR 320 has been rejected by the directory group on a wrong basis. Denis >The ITU statement says the following: >>>One of the participants in the directory meeting stated that >>>Certification Authorities are being deployed with names not >>>acquired from naming authorities but with names arbitrarily chosen >>>assuming that no other CA is or will be operating under that name. >That is, of course, true. There is no central repository for CA names >because there is no central authority for CAs. >>>That participant further stated that the IETF provides no >>>guidelines on ensuring that the names of CAs are unambiguous. >That is true. >>>The directory group requests the IETF PKIX group to comment on this >>>statement. >Should we make a consensus call on "that is true"? >>>If the statement is correct, we ask the IETF to consider putting a >>>mechanism in place to prevent conflict, e.g. a list of existing CA >>>names that deployers of new CAs could check for naming conflicts. >Words fail me. >--Paul Hoffman, Director >--VPN Consortium Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9MAYLxR097042 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 03:34:21 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9MAYLOm097041; Mon, 22 Oct 2007 03:34:21 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from woodstock.binhost.com (woodstock.binhost.com [8.8.40.152]) by balder-227.proper.com (8.13.5/8.13.5) with SMTP id l9MAYKwt097035 for ; Mon, 22 Oct 2007 03:34:21 -0700 (MST) (envelope-from housley@vigilsec.com) Message-Id: <200710221034.l9MAYKwt097035@balder-227.proper.com> Received: (qmail 27076 invoked by uid 0); 22 Oct 2007 10:34:19 -0000 Received: from unknown (HELO THINKPADR52.vigilsec.com) (193.0.2.29) by woodstock.binhost.com with SMTP; 22 Oct 2007 10:34:19 -0000 X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Mon, 22 Oct 2007 06:33:38 -0400 To: Hoyt L Kesterson II , ietf-pkix@imc.org From: Russ Housley Subject: Re: Upper Bounds for X.509 In-Reply-To: References: <6077526.1192816179346.JavaMail.root@elwamui-lapwing.atl.sa.earthlink.net> <471C1CF5.8090803@eb2bcom.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Hoyt: One never knows which non-critical extensions might be put in a certificate. Remember when Bob Jueneman was advocating pictures in certificates.... Russ At 04:30 AM 10/22/2007, Hoyt L Kesterson II wrote: >Steven, I didn't say it was an attractive option. I have always been >against these limits. > >Peter Gutmann recommended that "reasonable" upper bounds be set, >e.g. thousand characters for a common name. But it appears his >concern is about erratic operation when the certificate itself it huge. > >It may be more reasonable to set a max size on the entire >certificate than on the individual components that comprise it. > > hoyt > > >Hoyt, > > > >Hoyt L Kesterson II wrote: > >>Another option is to keep the bounds as we have them and have the > IETF standard mandate the bounds, choosing any values you like. > > > >Then directory deployments would have to choose between being nice > >to PKIX applications by imposing PKIX's upper bounds, or being > >nice to other LDAP applications by not imposing upper bounds. > > > >Regards, > >Steven Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9M8YaSm087562 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2007 01:34:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9M8Yahi087561; Mon, 22 Oct 2007 01:34:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from elasmtp-masked.atl.sa.earthlink.net (elasmtp-masked.atl.sa.earthlink.net [209.86.89.68]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9M8YZnf087555 for ; Mon, 22 Oct 2007 01:34:35 -0700 (MST) (envelope-from hoytkesterson@earthlink.net) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=dk20050327; d=earthlink.net; b=nJBCUXwc6/xe9SVqztYqG2NmrNgqiv1Zh2dFCy7a0uxaoFtEo5T5d23xRpSQO+kC; h=Received:Mime-Version:Message-Id:In-Reply-To:References:Date:To:From:Subject:Content-Type:X-ELNK-Trace:X-Originating-IP; Received: from [151.118.180.188] (helo=[192.168.0.4]) by elasmtp-masked.atl.sa.earthlink.net with asmtp (TLSv1:AES256-SHA:256) (Exim 4.34) id 1Ijsk6-00022S-W9 for ietf-pkix@imc.org; Mon, 22 Oct 2007 04:34:35 -0400 Mime-Version: 1.0 Message-Id: In-Reply-To: <471C1CF5.8090803@eb2bcom.com> References: <6077526.1192816179346.JavaMail.root@elwamui-lapwing.atl.sa.earthlink.net> <471C1CF5.8090803@eb2bcom.com> Date: Mon, 22 Oct 2007 01:30:50 -0700 To: ietf-pkix@imc.org From: Hoyt L Kesterson II Subject: Re: Upper Bounds for X.509 Content-Type: text/plain; charset="us-ascii" X-ELNK-Trace: 59f3edefb26af0321a6f9084d36cbc6474bf435c0eb9d478100f810b5c66a190b0a6111f7b49939cfbdb5738f082ee71350badd9bab72f9c350badd9bab72f9c X-Originating-IP: 151.118.180.188 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Steven, I didn't say it was an attractive option. I have always been against these limits. Peter Gutmann recommended that "reasonable" upper bounds be set, e.g. thousand characters for a common name. But it appears his concern is about erratic operation when the certificate itself it huge. It may be more reasonable to set a max size on the entire certificate than on the individual components that comprise it. hoyt >Hoyt, > >Hoyt L Kesterson II wrote: >>Another option is to keep the bounds as we have them and have the IETF standard mandate the bounds, choosing any values you like. > >Then directory deployments would have to choose between being nice >to PKIX applications by imposing PKIX's upper bounds, or being >nice to other LDAP applications by not imposing upper bounds. > >Regards, >Steven Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9M3k3kR065609 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 21 Oct 2007 20:46:03 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9M3k3gY065608; Sun, 21 Oct 2007 20:46:03 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from host.eb2bcom.com (host.eb2bcom.com [72.232.34.10]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9M3k1sO065602 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Sun, 21 Oct 2007 20:46:02 -0700 (MST) (envelope-from steven.legg@eb2bcom.com) Received: from [202.164.192.219] (helo=[192.168.99.100]) by host.eb2bcom.com with esmtpa (Exim 4.68) (envelope-from ) id 1IjoEs-0000P2-6e; Mon, 22 Oct 2007 13:46:02 +1000 Message-ID: <471C1CF5.8090803@eb2bcom.com> Date: Mon, 22 Oct 2007 13:45:57 +1000 From: Steven Legg User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: Hoyt L Kesterson II CC: PKIX Subject: Re: Upper Bounds for X.509 References: <6077526.1192816179346.JavaMail.root@elwamui-lapwing.atl.sa.earthlink.net> In-Reply-To: <6077526.1192816179346.JavaMail.root@elwamui-lapwing.atl.sa.earthlink.net> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - host.eb2bcom.com X-AntiAbuse: Original Domain - imc.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - eb2bcom.com X-Source: X-Source-Args: X-Source-Dir: Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Hoyt, Hoyt L Kesterson II wrote: > Another option is to keep the bounds as we have them and have the IETF standard mandate the bounds, choosing any values you like. Then directory deployments would have to choose between being nice to PKIX applications by imposing PKIX's upper bounds, or being nice to other LDAP applications by not imposing upper bounds. Regards, Steven Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9M3WSqp064972 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 21 Oct 2007 20:32:28 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9M3WSTk064971; Sun, 21 Oct 2007 20:32:28 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from host.eb2bcom.com (host.eb2bcom.com [72.232.34.10]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9M3WRIH064965 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Sun, 21 Oct 2007 20:32:27 -0700 (MST) (envelope-from steven.legg@eb2bcom.com) Received: from cust3803.vic01.dataco.com.au ([202.164.192.219] helo=[192.168.99.100]) by host.eb2bcom.com with esmtpa (Exim 4.68) (envelope-from ) id 1Ijo1j-0008M6-4F; Mon, 22 Oct 2007 13:32:27 +1000 Message-ID: <471C19C5.3070902@eb2bcom.com> Date: Mon, 22 Oct 2007 13:32:21 +1000 From: Steven Legg User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: Russ Housley CC: PKIX Subject: Re: Upper Bounds for X.509 References: <001401c8125b$17c96e60$0100a8c0@morten> <200710191707.l9JH7bYE004435@balder-227.proper.com> In-Reply-To: <200710191707.l9JH7bYE004435@balder-227.proper.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - host.eb2bcom.com X-AntiAbuse: Original Domain - imc.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - eb2bcom.com X-Source: X-Source-Args: X-Source-Dir: Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Russ, Russ Housley wrote: > I understand that an unbounded directory string may be useful in many > contexts, but is it going to help interoperability to remove the bounds > on naming attributes? As I recall, it was an upper bound on a naming attribute that we first bumped up against, and which prompted us to ignore all the upper bounds. Ignoring the upper bounds also allows us to claim conformance with LDAP, which imposes no upper bounds. Clearly there is the potential for interoperability problems if we interwork with an implementation that imposes upper bounds. To the best of my knowledge such problems haven't arisen with respect to our implementation. I assume that in each instance of interworking the other system also ignores the upper bounds, or else the shared data happen to be within that other system's upper bounds. Nonetheless, the potential for interoperability problems diminishes if the upper bounds are discarded. Regards, Steven > > Russ > > At 10:19 AM 10/19/2007, Erik Andersen wrote: >> Hi Folks, >> >> As mentioned in a liaison statement from the directory meeting, >> September 2007 in Geneva, we have decided to remove the Upper Bounds >> from any occurrence. A majority of those are on DirectoryString, which >> is also specified for many attribute types. >> >> At one type we were considering removing the Upper Bound by the Defect >> Report procedure, but found the change to heavy for that procedure. By >> the Defect Report procedure we corrected a inconsistency in the Upper >> Bounds and expressed that Upper Bounds are only provided as examples. >> >> It is our intention to remove the Upper Bound from the sixth edition >> of the Directory Specification. We gave a possible approach in the >> liaison statement, but that may not be the final solution. Be assured >> that whatever we do, it will be valid ASN.1. The example we came up >> with is actual valid ASN.1 by using parameterized specification. >> However, we are faced with the problem that directory object class >> definitions will be parameterized. This does not change the definition >> as such, but only the ASN.1 appearance. This could be a problem for >> implementations parsing such object class definitions to set-up the >> directory schema. >> >> Our fall-back solution is to define a new variant of DirectoryString >> that is unbounded. >> >> Erik Andersen >> Andersen's L-Service >> Mobile: +45 20 97 14 90 >> e-mail: era@tdcadsl.dk >> http://www.x500standard.com/ >> http://home20.inet.tele.dk/era/me >> Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9M1pXJf060105 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 21 Oct 2007 18:51:33 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9M1pX9h060104; Sun, 21 Oct 2007 18:51:33 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from host.eb2bcom.com (host.eb2bcom.com [72.232.34.10]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9M1pWTq060097 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Sun, 21 Oct 2007 18:51:33 -0700 (MST) (envelope-from steven.legg@eb2bcom.com) Received: from [202.164.192.219] (helo=[192.168.99.100]) by host.eb2bcom.com with esmtpa (Exim 4.68) (envelope-from ) id 1IjmS4-0003rf-2t; Mon, 22 Oct 2007 11:51:32 +1000 Message-ID: <471C021F.2000006@eb2bcom.com> Date: Mon, 22 Oct 2007 11:51:27 +1000 From: Steven Legg User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: Tom Gindin CC: "ietf-pkix@imc.org" Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" References: In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - host.eb2bcom.com X-AntiAbuse: Original Domain - imc.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - eb2bcom.com X-Source: X-Source-Args: X-Source-Dir: Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Tom Gindin wrote: > I know this response is a little late, but the main reason that > there is no central repository for CA names is that there is no world-wide > directory using X.500 names. For reasons which have been discussed many > times on this list, there probably never will be. Of course, the IETF > knows of an existing registry which could be used to avoid conflicts > between CA names. > How about the following wording: "Certificate Authorities SHOULD > NOT use a value in the Organization or Common Name attribute of their > Distinguished Name which is syntactically legal as a dNSName (i.e. an IA5 > string containing one or more periods but no spaces) unless they are > operated by an organization which has registered the domain name > controlling that dNSName. Certificate Authorities wishing to ensure a > globally unique issuer name MAY use an IA5 FQDN controlled by their > organization in either the Organization or the Common Name attribute." ... or use the dc naming attribute defined in RFC 4519. Regards, Steven > Does anybody want to add Organizational Unit into the mix, and possibly > even make it a SHOULD for newly allocated CA's? > Given my unfamiliarity with non-alphabetic scripts, I hesitate to > discuss internationalized DNS names in this connection unless Punycode is > relevant. However, even without considering DR 320, using somebody else's > domain name as your CN or O attribute is misleading. > > Tom Gindin > > P.S. - The opinions above are mine, and not necessarily those of my > employer > > > > Ryan Hurst > Sent by: owner-ietf-pkix@mail.imc.org > 10/09/2007 08:47 PM > > To > Paul Hoffman , Russ Housley , > "ietf-pkix@imc.org" > cc > > Subject > RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" > > > > > > > > All of these statements are true. > > Words fail me is as fine a response to that as any... > > ________________________________________ > From: owner-ietf-pkix@mail.imc.org [owner-ietf-pkix@mail.imc.org] On > Behalf Of Paul Hoffman [paul.hoffman@vpnc.org] > Sent: Tuesday, October 09, 2007 3:25 PM > To: Russ Housley; ietf-pkix@imc.org > Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of > DR320" > > The ITU statement says the following: > >>> One of the participants in the directory meeting stated that >>> Certification Authorities are being deployed with names not >>> acquired from naming authorities but with names arbitrarily chosen >>> assuming that no other CA is or will be operating under that name. > > That is, of course, true. There is no central repository for CA names > because there is no central authority for CAs. > >>> That participant further stated that the IETF provides no >>> guidelines on ensuring that the names of CAs are unambiguous. > > That is true. > >>> The directory group requests the IETF PKIX group to comment on this >>> statement. > > Should we make a consensus call on "that is true"? > >>> If the statement is correct, we ask the IETF to consider putting a >>> mechanism in place to prevent conflict, e.g. a list of existing CA >>> names that deployers of new CAs could check for naming conflicts. > > Words fail me. > > --Paul Hoffman, Director > --VPN Consortium > > > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9KCBsfx091089 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 20 Oct 2007 05:11:54 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9KCBsPu091088; Sat, 20 Oct 2007 05:11:54 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mailhost.auckland.ac.nz (moe.its.auckland.ac.nz [130.216.12.35]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9KCBr78091047 for ; Sat, 20 Oct 2007 05:11:53 -0700 (MST) (envelope-from pgut001@cs.auckland.ac.nz) Received: from localhost (localhost.localdomain [127.0.0.1]) by mailhost.auckland.ac.nz (Postfix) with ESMTP id 4728748066F; Sun, 21 Oct 2007 01:11:48 +1300 (NZDT) X-Virus-Scanned: by amavisd-new at mailhost.auckland.ac.nz Received: from mailhost.auckland.ac.nz ([127.0.0.1]) by localhost (moe.its.auckland.ac.nz [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id orPH-zXGpuWi; Sun, 21 Oct 2007 01:11:48 +1300 (NZDT) Received: from iris.cs.auckland.ac.nz (iris.cs.auckland.ac.nz [130.216.33.152]) by mailhost.auckland.ac.nz (Postfix) with ESMTP id 2D2E848066D; Sun, 21 Oct 2007 01:11:48 +1300 (NZDT) Received: from wintermute01.cs.auckland.ac.nz (wintermute01.cs.auckland.ac.nz [130.216.34.38]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by iris.cs.auckland.ac.nz (Postfix) with ESMTP id C145EE080B5; Sun, 21 Oct 2007 01:11:46 +1300 (NZDT) Received: from pgut001 by wintermute01.cs.auckland.ac.nz with local (Exim 4.63) (envelope-from ) id 1IjDBC-00036E-MF; Sun, 21 Oct 2007 01:11:46 +1300 From: pgut001@cs.auckland.ac.nz (Peter Gutmann) To: hoytkesterson@earthlink.net Subject: Re: Upper Bounds for X.509 Cc: ietf-pkix@imc.org In-Reply-To: <6077526.1192816179346.JavaMail.root@elwamui-lapwing.atl.sa.earthlink.net> Message-Id: Date: Sun, 21 Oct 2007 01:11:46 +1300 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Hoyt L Kesterson II writes: >Does certificate generating software enforce the bounds? > >Does relying party software validate the bounds in received certificate? Yes. I think there should be some reasonable upper bound (1K perhaps) as a safety feature to prevent MPEG-of-cat certificates. People are going to stuff anything they feel like into certs, aided and abetted by software that hides the details of what they're doing (dragging an icon to a drop target doesn't convey the fact that adding a 20MB Flash animation at that location isn't very sensible). So making it unbounded is asking for trouble. Setting a reasonable upper bound (does anyone really have a common name more than a thousand characters long?) is a good safety setting. (Oh, and an aside: When I created the MPEG-of-cat cert, with a (by current standards) relatively small ~1MB MPEG in there, neither Windows nor Netscape (the two main cert apps at the time) complained about finding over a million characters in what should be a short field. However, both of them performed very erratically, and in the case of Netscape I had to delete the browser cert database after a couple of days to restore proper operation to the browser. So current apps will quite readily accept stupid sizes for these fields, and nicely DoS themselves in the process. Another argument for setting upper limits). Peter. Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9JHneqq007926 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 19 Oct 2007 10:49:40 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9JHneW2007925; Fri, 19 Oct 2007 10:49:40 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from elasmtp-dupuy.atl.sa.earthlink.net (elasmtp-dupuy.atl.sa.earthlink.net [209.86.89.62]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9JHndJ6007919 for ; Fri, 19 Oct 2007 10:49:40 -0700 (MST) (envelope-from hoytkesterson@earthlink.net) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=dk20050327; d=earthlink.net; b=hKF0pAmonvsV73JJCRZK+aN4i8MO1FTsfVGDLB3Wg5/osjLWG/YpZnG51Edk5ufm; h=Message-ID:Date:From:Reply-To:To:Subject:Mime-Version:Content-Type:Content-Transfer-Encoding:X-Mailer:X-ELNK-Trace:X-Originating-IP; Received: from [209.86.224.38] (helo=elwamui-lapwing.atl.sa.earthlink.net) by elasmtp-dupuy.atl.sa.earthlink.net with asmtp (Exim 4.34) id 1Iivyd-0001In-J0; Fri, 19 Oct 2007 13:49:39 -0400 Received: from 143.192.1.185 by webmail.pas.earthlink.net with HTTP; Fri, 19 Oct 2007 13:49:39 -0400 Message-ID: <6077526.1192816179346.JavaMail.root@elwamui-lapwing.atl.sa.earthlink.net> Date: Fri, 19 Oct 2007 10:49:39 -0700 (GMT-07:00) From: Hoyt L Kesterson II Reply-To: Hoyt L Kesterson II To: PKIX , Erik Andersen , PKIX Subject: Re: Upper Bounds for X.509 Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 X-Mailer: EarthLink Zoo Mail 1.0 X-ELNK-Trace: 59f3edefb26af0321a6f9084d36cbc6474bf435c0eb9d478986a28d8589f2169176c18a13be9c9037ba2f6ee06469631350badd9bab72f9c350badd9bab72f9c X-Originating-IP: 209.86.224.38 Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l9JHneJ6007920 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: I had hoped that the LDAP people would join this conversation. Unless I misunderstood, I was told that LDAP never utilized these bounds and that it did not cause interoperability problems. Another option is to keep the bounds as we have them and have the IETF standard mandate the bounds, choosing any values you like. Does anyone out there test conformance to these limits? If exceeded, what error is generated? Does certificate generating software enforce the bounds? Does relying party software validate the bounds in received certificate? hoyt -----Original Message----- >From: Russ Housley >Sent: Oct 19, 2007 10:06 AM >To: Erik Andersen , PKIX >Subject: Re: Upper Bounds for X.509 > >I understand that an unbounded directory string may be useful in manycontexts, but is it going to help interoperability to remove the boundson naming attributes? > >Russ > >At 10:19 AM 10/19/2007, Erik Andersen wrote: >Hi Folks, >  >As mentioned in a liaison statement from the directory meeting, September2007 in Geneva, we have decided to remove the Upper Bounds from anyoccurrence. A majority of those are on DirectoryString, which is alsospecified for many attribute types. >  >At one type we were considering removing the Upper Bound by the DefectReport procedure, but found the change to heavy for that procedure. Bythe Defect Report procedure we corrected a inconsistency in the UpperBounds and expressed that Upper Bounds are only provided asexamples. >  >It is our intention to remove the Upper Bound from the sixth edition ofthe Directory Specification. We gave a possible approach in the liaisonstatement, but that may not be the final solution. Be assured thatwhatever we do, it will be valid ASN.1. The example we came up with isactual valid ASN.1 by using parameterized specification. However, we arefaced with the problem that directory object class definitions will beparameterized. This does not change the definition as such, but only theASN.1 appearance. This could be a problem for implementations parsingsuch object class definitions to set-up the directory schema. >  >Our fall-back solution is to define a new variant of DirectoryString thatis unbounded. >  >Erik Andersen >Andersen's L-Service >Mobile: +45 20 97 14 90 >e-mail: era@tdcadsl.dk >http://www.x500standard.com/ >http://home20.inet.tele.dk/era/me >  Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9JHeaSv007318 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 19 Oct 2007 10:40:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9JHeaLM007317; Fri, 19 Oct 2007 10:40:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from elasmtp-galgo.atl.sa.earthlink.net (elasmtp-galgo.atl.sa.earthlink.net [209.86.89.61]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9JHeXTh007311 for ; Fri, 19 Oct 2007 10:40:36 -0700 (MST) (envelope-from hoytkesterson@earthlink.net) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=dk20050327; d=earthlink.net; b=mDhTq8wCds+FWJI38ZzJmgUqCIAFrJmrucWyOM7poHXribCEeRDetxjaPpWEJOfw; h=Message-ID:Date:From:Reply-To:To:Subject:Mime-Version:Content-Type:Content-Transfer-Encoding:X-Mailer:X-ELNK-Trace:X-Originating-IP; Received: from [209.86.224.38] (helo=elwamui-lapwing.atl.sa.earthlink.net) by elasmtp-galgo.atl.sa.earthlink.net with asmtp (Exim 4.34) id 1Iivpp-0005Y4-JB; Fri, 19 Oct 2007 13:40:33 -0400 Received: from 143.192.1.185 by webmail.pas.earthlink.net with HTTP; Fri, 19 Oct 2007 13:40:33 -0400 Message-ID: <6982180.1192815633343.JavaMail.root@elwamui-lapwing.atl.sa.earthlink.net> Date: Fri, 19 Oct 2007 10:40:33 -0700 (GMT-07:00) From: Hoyt L Kesterson II Reply-To: Hoyt L Kesterson II To: Erik Andersen , PKIX Subject: Re: Upper Bounds for X.509 Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 X-Mailer: EarthLink Zoo Mail 1.0 X-ELNK-Trace: 59f3edefb26af0321a6f9084d36cbc6474bf435c0eb9d478986a28d8589f21696551fa7d907c5b1b0904351a597a646a350badd9bab72f9c350badd9bab72f9c X-Originating-IP: 209.86.224.38 Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l9JHeaTh007312 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: One minor clarification. Only the blue book (the original CCITT X.520 specification) identified the Bounds annex as normative. That was in error. When the corresponding ISO version was published (the first edition was not done as common text) in 1990 the Bounds annex was correctly identified as informative. All subsequent publications (done as common text) contained the following line under the annex title — "This annex does not form an integral part of this Recommendation | International Standard" The Foreword clause also contained this paragraph "Annex C, which is not an integral part of this Recommendation | International Standard, provides suggested upper bounds value constraints used in these Directory Specifications." Erik's phrase "expressed that Upper Bounds are only provided as examples" means that we have further emphasized that the values are not mandated by the standard. Next we will try blinking red text. hoyt -----Original Message----- >From: Erik Andersen >Sent: Oct 19, 2007 7:19 AM >To: PKIX >Subject: Upper Bounds for X.509 > >Hi Folks, > > > >As mentioned in a liaison statement from the directory meeting, September >2007 in Geneva, we have decided to remove the Upper Bounds from any >occurrence. A majority of those are on DirectoryString, which is also >specified for many attribute types. > > > >At one type we were considering removing the Upper Bound by the Defect >Report procedure, but found the change to heavy for that procedure. By the >Defect Report procedure we corrected a inconsistency in the Upper Bounds and >expressed that Upper Bounds are only provided as examples. > > > >It is our intention to remove the Upper Bound from the sixth edition of the >Directory Specification. We gave a possible approach in the liaison >statement, but that may not be the final solution. Be assured that whatever >we do, it will be valid ASN.1. The example we came up with is actual valid >ASN.1 by using parameterized specification. However, we are faced with the >problem that directory object class definitions will be parameterized. This >does not change the definition as such, but only the ASN.1 appearance. This >could be a problem for implementations parsing such object class definitions >to set-up the directory schema. > > > >Our fall-back solution is to define a new variant of DirectoryString that is >unbounded. > > > >Erik Andersen > >Andersen's L-Service > >Mobile: +45 20 97 14 90 > >e-mail: era@tdcadsl.dk > >http://www.x500standard.com/ > >http://home20.inet.tele.dk/era/me > > > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9JHLinu005897 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 19 Oct 2007 10:21:44 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9JHLioe005896; Fri, 19 Oct 2007 10:21:44 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from [10.20.30.150] (adsl-66-125-125-65.dsl.pltn13.pacbell.net [66.125.125.65]) (authenticated bits=0) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9JHLWdX005861 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 19 Oct 2007 10:21:33 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: References: Date: Fri, 19 Oct 2007 10:21:22 -0700 To: Tom Gindin From: Paul Hoffman Subject: RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Cc: Content-Type: text/plain; charset="us-ascii" ; format="flowed" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: At 12:37 PM -0400 10/19/07, Tom Gindin wrote: > I know this response is a little late, but the main reason that >there is no central repository for CA names is that there is no world-wide >directory using X.500 names. While the latter is obviously true, it is not the "main reason". The "main reason" is that many (most?) CAs could get no real value out of a "world-wide directory using X.500 names". For example, when an organization becomes a CA by making its own trust anchor for internal use, having to register in a "world-wide directory" is a hindrance, not a feature. >For reasons which have been discussed many >times on this list, there probably never will be. "Probably" may be understating the likelihood. >Of course, the IETF >knows of an existing registry which could be used to avoid conflicts >between CA names. We do? > How about the following wording: "Certificate Authorities SHOULD >NOT use a value in the Organization or Common Name attribute of their >Distinguished Name which is syntactically legal as a dNSName (i.e. an IA5 >string containing one or more periods but no spaces) unless they are >operated by an organization which has registered the domain name >controlling that dNSName. Certificate Authorities wishing to ensure a >globally unique issuer name MAY use an IA5 FQDN controlled by their >organization in either the Organization or the Common Name attribute." This might be appropriate in an ITU document, but is it really appropriate for a standards-track IETF document? In specific, the latter makes it sound like using your domain name is safe. Might be, might not be. >Does anybody want to add Organizational Unit into the mix, and possibly >even make it a SHOULD for newly allocated CA's? I don't see how this would help. If you look at the OUs in IssuerNames of certificates flying around the net, you can see that few people understand OUs, > Given my unfamiliarity with non-alphabetic scripts, I hesitate to >discuss internationalized DNS names in this connection unless Punycode is >relevant. However, even without considering DR 320, using somebody else's >domain name as your CN or O attribute is misleading. True, but I do not think that it is the place of IETF documents to say what is or is not "misleading". --Paul Hoffman, Director --VPN Consortium Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9JH7c8A004446 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 19 Oct 2007 10:07:38 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9JH7cUV004445; Fri, 19 Oct 2007 10:07:38 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from woodstock.binhost.com (woodstock.binhost.com [8.8.40.152]) by balder-227.proper.com (8.13.5/8.13.5) with SMTP id l9JH7bYE004435 for ; Fri, 19 Oct 2007 10:07:37 -0700 (MST) (envelope-from housley@vigilsec.com) Message-Id: <200710191707.l9JH7bYE004435@balder-227.proper.com> Received: (qmail 9073 invoked by uid 0); 19 Oct 2007 17:07:31 -0000 Received: from unknown (HELO THINKPADR52.vigilsec.com) (96.231.48.203) by woodstock.binhost.com with SMTP; 19 Oct 2007 17:07:31 -0000 X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Fri, 19 Oct 2007 13:06:46 -0400 To: "Erik Andersen" , "PKIX" From: Russ Housley Subject: Re: Upper Bounds for X.509 In-Reply-To: <001401c8125b$17c96e60$0100a8c0@morten> References: <001401c8125b$17c96e60$0100a8c0@morten> Mime-Version: 1.0 Content-Type: text/html; charset="us-ascii" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: I understand that an unbounded directory string may be useful in many contexts, but is it going to help interoperability to remove the bounds on naming attributes?

Russ

At 10:19 AM 10/19/2007, Erik Andersen wrote:
Hi Folks,
 
As mentioned in a liaison statement from the directory meeting, September 2007 in Geneva, we have decided to remove the Upper Bounds from any occurrence. A majority of those are on DirectoryString, which is also specified for many attribute types.
 
At one type we were considering removing the Upper Bound by the Defect Report procedure, but found the change to heavy for that procedure. By the Defect Report procedure we corrected a inconsistency in the Upper Bounds and expressed that Upper Bounds are only provided as examples.
 
It is our intention to remove the Upper Bound from the sixth edition of the Directory Specification. We gave a possible approach in the liaison statement, but that may not be the final solution. Be assured that whatever we do, it will be valid ASN.1. The example we came up with is actual valid ASN.1 by using parameterized specification. However, we are faced with the problem that directory object class definitions will be parameterized. This does not change the definition as such, but only the ASN.1 appearance. This could be a problem for implementations parsing such object class definitions to set-up the directory schema.
 
Our fall-back solution is to define a new variant of DirectoryString that is unbounded.
 
Erik Andersen
Andersen's L-Service
Mobile: +45 20 97 14 90
e-mail: era@tdcadsl.dk
http://www.x500standard.com/
http://home20.inet.tele.dk/era/me
 
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9JGcn2w001011 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 19 Oct 2007 09:38:49 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9JGcnEv001010; Fri, 19 Oct 2007 09:38:49 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from e2.ny.us.ibm.com (e2.ny.us.ibm.com [32.97.182.142]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9JGclR5000999 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Fri, 19 Oct 2007 09:38:48 -0700 (MST) (envelope-from tgindin@us.ibm.com) Received: from d01relay04.pok.ibm.com (d01relay04.pok.ibm.com [9.56.227.236]) by e2.ny.us.ibm.com (8.13.8/8.13.8) with ESMTP id l9JGclHw011826 for ; Fri, 19 Oct 2007 12:38:47 -0400 Received: from d01av03.pok.ibm.com (d01av03.pok.ibm.com [9.56.224.217]) by d01relay04.pok.ibm.com (8.13.8/8.13.8/NCO v8.5) with ESMTP id l9JGc2wD117738 for ; Fri, 19 Oct 2007 12:38:47 -0400 Received: from d01av03.pok.ibm.com (loopback [127.0.0.1]) by d01av03.pok.ibm.com (8.12.11.20060308/8.13.3) with ESMTP id l9JGbqN0026217 for ; Fri, 19 Oct 2007 12:37:52 -0400 Received: from d01ml062.pok.ibm.com (d01ml062.pok.ibm.com [9.56.228.115]) by d01av03.pok.ibm.com (8.12.11.20060308/8.12.11) with ESMTP id l9JGbqx0025736; Fri, 19 Oct 2007 12:37:52 -0400 In-Reply-To: To: Ryan Hurst Cc: Russ Housley , "ietf-pkix@imc.org" , Paul Hoffman MIME-Version: 1.0 Subject: RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" X-Mailer: Lotus Notes Release 7.0 HF277 June 21, 2006 From: Tom Gindin Message-ID: Date: Fri, 19 Oct 2007 12:37:41 -0400 X-MIMETrack: Serialize by Router on D01ML062/01/M/IBM(Release 7.0.2FP2 IGS702FP2HF2|August 8, 2007) at 10/19/2007 12:37:51, Serialize complete at 10/19/2007 12:37:51 Content-Type: text/plain; charset="US-ASCII" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: I know this response is a little late, but the main reason that there is no central repository for CA names is that there is no world-wide directory using X.500 names. For reasons which have been discussed many times on this list, there probably never will be. Of course, the IETF knows of an existing registry which could be used to avoid conflicts between CA names. How about the following wording: "Certificate Authorities SHOULD NOT use a value in the Organization or Common Name attribute of their Distinguished Name which is syntactically legal as a dNSName (i.e. an IA5 string containing one or more periods but no spaces) unless they are operated by an organization which has registered the domain name controlling that dNSName. Certificate Authorities wishing to ensure a globally unique issuer name MAY use an IA5 FQDN controlled by their organization in either the Organization or the Common Name attribute." Does anybody want to add Organizational Unit into the mix, and possibly even make it a SHOULD for newly allocated CA's? Given my unfamiliarity with non-alphabetic scripts, I hesitate to discuss internationalized DNS names in this connection unless Punycode is relevant. However, even without considering DR 320, using somebody else's domain name as your CN or O attribute is misleading. Tom Gindin P.S. - The opinions above are mine, and not necessarily those of my employer Ryan Hurst Sent by: owner-ietf-pkix@mail.imc.org 10/09/2007 08:47 PM To Paul Hoffman , Russ Housley , "ietf-pkix@imc.org" cc Subject RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" All of these statements are true. Words fail me is as fine a response to that as any... ________________________________________ From: owner-ietf-pkix@mail.imc.org [owner-ietf-pkix@mail.imc.org] On Behalf Of Paul Hoffman [paul.hoffman@vpnc.org] Sent: Tuesday, October 09, 2007 3:25 PM To: Russ Housley; ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" The ITU statement says the following: >>One of the participants in the directory meeting stated that >>Certification Authorities are being deployed with names not >>acquired from naming authorities but with names arbitrarily chosen >>assuming that no other CA is or will be operating under that name. That is, of course, true. There is no central repository for CA names because there is no central authority for CAs. >>That participant further stated that the IETF provides no >>guidelines on ensuring that the names of CAs are unambiguous. That is true. >>The directory group requests the IETF PKIX group to comment on this >>statement. Should we make a consensus call on "that is true"? >>If the statement is correct, we ask the IETF to consider putting a >>mechanism in place to prevent conflict, e.g. a list of existing CA >>names that deployers of new CAs could check for naming conflicts. Words fail me. --Paul Hoffman, Director --VPN Consortium Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9JEIvuV087213 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 19 Oct 2007 07:18:57 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9JEIvDR087212; Fri, 19 Oct 2007 07:18:57 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from pfepa.post.tele.dk (pfepa.post.tele.dk [195.41.46.235]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9JEIu0l087206 for ; Fri, 19 Oct 2007 07:18:56 -0700 (MST) (envelope-from era@tdcadsl.dk) Received: from morten (0x50a445ae.albnxx10.adsl-dhcp.tele.dk [80.164.69.174]) by pfepa.post.tele.dk (Postfix) with ESMTP id B693BFAC023 for ; Fri, 19 Oct 2007 16:18:52 +0200 (CEST) From: "Erik Andersen" To: "PKIX" Subject: Upper Bounds for X.509 Date: Fri, 19 Oct 2007 16:19:41 +0200 Message-ID: <001401c8125b$17c96e60$0100a8c0@morten> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0015_01C8126B.DB523E60" X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook, Build 10.0.6822 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198 Importance: Normal Thread-Index: AcgSWxbdXVLGsPu+R6eJXGWC7KKhOw== Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------=_NextPart_000_0015_01C8126B.DB523E60 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hi Folks, =20 As mentioned in a liaison statement from the directory meeting, = September 2007 in Geneva, we have decided to remove the Upper Bounds from any occurrence. A majority of those are on DirectoryString, which is also specified for many attribute types. =20 At one type we were considering removing the Upper Bound by the Defect Report procedure, but found the change to heavy for that procedure. By = the Defect Report procedure we corrected a inconsistency in the Upper Bounds = and expressed that Upper Bounds are only provided as examples. =20 It is our intention to remove the Upper Bound from the sixth edition of = the Directory Specification. We gave a possible approach in the liaison statement, but that may not be the final solution. Be assured that = whatever we do, it will be valid ASN.1. The example we came up with is actual = valid ASN.1 by using parameterized specification. However, we are faced with = the problem that directory object class definitions will be parameterized. = This does not change the definition as such, but only the ASN.1 appearance. = This could be a problem for implementations parsing such object class = definitions to set-up the directory schema. =20 Our fall-back solution is to define a new variant of DirectoryString = that is unbounded. =20 Erik Andersen Andersen's L-Service Mobile: +45 20 97 14 90 e-mail: era@tdcadsl.dk http://www.x500standard.com/ http://home20.inet.tele.dk/era/me =20 ------=_NextPart_000_0015_01C8126B.DB523E60 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Hi Folks,

 

As mentioned in a liaison statement from the directory meeting, September 2007 in Geneva, we have decided to remove the Upper Bounds from any occurrence. A = majority of those are on DirectoryString, which is also specified for many attribute = types.

 

At one type we were considering removing the = Upper Bound by the Defect Report procedure, but found the change to heavy for = that procedure. By the Defect Report procedure we corrected a inconsistency = in the Upper Bounds and expressed that Upper Bounds are only provided as = examples.

 

It is our intention to remove the Upper Bound = from the sixth edition of the Directory Specification. We gave a possible = approach in the liaison statement, but that may not be the final solution. Be = assured that whatever we do, it will be valid ASN.1. The example we came up with = is actual valid ASN.1 by using parameterized specification. However, we are = faced with the problem that directory object class definitions will be = parameterized. This does not change the definition as such, but only the ASN.1 = appearance. This could be a problem for implementations parsing such object class = definitions to set-up the directory schema.

 

Our fall-back solution is to define a new = variant of DirectoryString that is unbounded.

 

Erik Andersen

Andersen's L-Service

Mobile: +45 20 97 14 = 90

e-mail: era@tdcadsl.dk

http://www.x500standard.com/

http://home20.inet.tele.dk/era= /me

 

------=_NextPart_000_0015_01C8126B.DB523E60-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9GJBJiB043937 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 16 Oct 2007 12:11:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9GJBJ1J043936; Tue, 16 Oct 2007 12:11:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from EXVS01.ex.dslextreme.net ([66.51.199.86]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9GJBFnX043929 for ; Tue, 16 Oct 2007 12:11:18 -0700 (MST) (envelope-from chokhani@orionsec.com) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C81028.83DBBE2C" Subject: RE: OCSP Algorithm Agility Date: Tue, 16 Oct 2007 12:11:03 -0700 Message-ID: <82D5657AE1F54347A734BDD33637C879097D6663@EXVS01.ex.dslextreme.net> In-Reply-To: <2788466ED3E31C418E9ACC5C31661557084EC5@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP Algorithm Agility thread-index: Acf8l4NIxZexIh9rTveKgrEJmUDxVQAAJZEAAlba1eAAAH/7QAEC+OtgACFXyuAABd3wIAAA1HmAADQyQqABDKGdvQAggIfQ References: <82D5657AE1F54347A734BDD33637C879096C9ABE@EXVS01.ex.dslextreme.net> <2788466ED3E31C418E9ACC5C31661557053771@mou1wnexmb09.vcorp.ad.vrsn.com> <82D5657AE1F54347A734BDD33637C879096CA5E3@EXVS01.ex.dslextreme.net> <2788466ED3E31C418E9ACC5C31661557084EC5@mou1wnexmb09.vcorp.ad.vrsn.com> From: "Santosh Chokhani" To: "Hallam-Baker, Phillip" , "Seth Hitchings" , Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C81028.83DBBE2C Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: quoted-printable I agree that the RFC 2560 should be revised for a variety of reasons. =20 It would be nice to have a set of client side request composition and response processing rules (a la Section 6 of RFC 3290). =20 We probably can not mandate that in delegated model certificate in question and OCSP Responder should be signed by the same CA key, but we can recommend it and add some language in the Security Considerations section the residual risk of not doing that. =20 For hashing algorithm, certID should be sufficient and should be the same the as the hashing algorithm, used for the certificate. We of course will need to spell this out in the revision. =20 For signature, we can add an extension, but this should state the algorithm used for the certificate. We of course will need to spell this out also in the revision. =20 ________________________________ From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Hallam-Baker, Phillip Sent: Monday, October 15, 2007 11:36 PM To: Seth Hitchings; Santosh Chokhani; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility =20 Whether a server could make a sensible choice is beside the point. =20 For a specification to provide an interoperable standard we must have a definitive statement. Otherwise interoperability ends up depending on heuristics and undocumented assumptions. =20 Unless I missed the section in the RFC that describes the algorithm agility strategy it seems to me we must either: =20 1) Document the server algorithm selection as proposed by Santosh 2) Doucment the server algorithm selection as proposed by Santosh with an optional extension to allow the client to specify the choices it supports. =20 Either way we need a draft if we are going to meet the algorithm agility requirement. =20 ________________________________ From: owner-ietf-pkix@mail.imc.org on behalf of Seth Hitchings Sent: Wed 10/10/2007 3:25 PM To: Santosh Chokhani; Hallam-Baker, Phillip; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility I'm generally in favor of simpler approaches, such as those suggested by Santosh, as they favor interoperability. Updating deployed applications to understand new elements of the protocol could take just as long to roll out as the new algorithm support that's purportedly lacking. I can see a situation in which the CA cannot assume that the entire user population understands a new algorithm such as SHA-256, and thus has to continue using SHA-1 with RSA when signing certificates. Individual clients that do understand SHA-256 may wish to receive OCSP responses signed using SHA-256 with RSA, and would need a way to signal their desires to the OCSP responder. The question is, then, is there any security benefit to having the signature algorithm on the OCSP response stronger than the signature algorithm on the certificate? If you can break the algorithm and cause me to accept a contrived OCSP response, could you not do the same thing with a certificate? Seth -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani Sent: Wednesday, October 10, 2007 2:28 PM To: Hallam-Baker, Phillip; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility See responses in-line below. -----Original Message----- From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com] Sent: Tuesday, October 09, 2007 2:07 PM To: Santosh Chokhani; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility Not if they don't know that the client can understand them they can't. [Santosh Chokhani] The Responder has two ways to know what the client understands. From certID or from CA. If the client does not understand the algorithm used in certificate signing, revocation information is useless. And the issue is not just hashing algorithms, it is signature algorithms. Like your previous posts you continue to assume that cipher strength is a linear quantity with only one dimension and that any client which supports strength 2X must automatically support strength X. [Santosh Chokhani] I am making no such assumptions. I am saying that if an algorithm is good enough for a certificate, it is good enough for revocation notification for that certificate. That is not the case if you consider the practicalities of deploying ECC in an RSA world. To give a practical example, VeriSign issues a cert for an ECC key signed with an ECC key. The email program on Alice's machine in the DHS supports ECC but not the DHS SCVP server or OCSP relay. [Santosh Chokhani] And what is the problem with that? They have no choice but to use RSA. In the real world the OCSP service does not have a necessary connection to the CA. There are plenty of commercial OCSP offerings that report on certificates issued by other CAs. [Santosh Chokhani] And how does this relate to algorithm agility? If the OCSP does not do ECDSA it won't. If OCSP supports both RSA and ECDSA, it can take the cue from the CA CRL to determine what algorithm to use for signing OCSP responses. If the OCSP does not consume CRL, the mechanism that tells it revocation information can also tell it the signature algorithm to use. > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > Sent: Tuesday, October 09, 2007 11:16 AM > To: Hallam-Baker, Phillip; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > The OCSP and SCVP can transition to stronger algorithms any > time they want. > > The OCSP can take their clue from the CA or the certID field > to decide the hashing algorithm. When multiple certID is > present, OCSP can take low water mark of these. > > SCVP is no different than a client in terms of validating a > path. In terms of signing a response, it can take the low > water mark of the hashing algorithms in the certificate chain. > > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] > On Behalf Of Hallam-Baker, Phillip > Sent: Monday, October 08, 2007 7:27 PM > To: Santosh Chokhani; Andrews, Rick; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > The objective here is to overcome a real deployment obstacle > that creates a lockstep issue when use of stronger algorithms > is attempted. > > The CA cannot issue a certificate that employs a new > algorithm until it is known that all clients that might rely > on the certificate are capable of processing the new > certificate. Requiring lockstep updates to the OCSP and SCVP > infrastructure to be made at the same time renders transition > to stronger algorithms a much lengthier and much less > practical proposition. > > > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > > Sent: Saturday, October 06, 2007 4:12 PM > > To: Andrews, Rick; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > > > Rick, > > > > SCVP or other intermediaries are red herring. Whoever > processes the > > certificate processes the revocation information for that > certificate. > > It does not change the following: > > > > 1. There is no security benefit in using a stronger algorithm for > > OCSP > > response than for the certificate in question. Neither, > there is any > > benefit from interoperability viewpoint for these two to be > different. > > > > 2. If the OCSP Responder does not get a CRL, it can use the same > > mechanism to get the hashing algorithm used as it uses to get the > > revocation information. > > > > -----Original Message----- > > From: Andrews, Rick [mailto:RAndrews@verisign.com] > > Sent: Wednesday, October 03, 2007 3:29 PM > > To: Santosh Chokhani; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > Santosh, > > > > Sorry for the long delay in responding - travel and vacation. > >=20 > > Not all OCSP responders work from CRLs, so they won't take > their cue > > from the CRL. Nor should they take their cue from the > signature on the > > cert in question, I believe. Let me try to restate my argument in a > > different way. > >=20 > > With SCVP delegated path validation, the client requesting a cert's > > status from an OCSP responder will be different from the > client at the > > other end of the SSL connection. Those two clients may have very > > different capabilities in terms of supported signature and hash > > algorithms. It's not realistic to expect that all SSL clients, all > > SCVP servers, and all CAs will be able to upgrade in > lockstep to new > > algorithms as they are developed. Allowing the OCSP client > and server > > to negotiate a mutually-acceptable set of algorithms is > essential to > > the deployment of newer, stronger algorithms. > >=20 > > Likewise, companies that run large OCSP responders may wish to > > gradually move to ECC-based signatures for all their OCSP > responses, > > even those for certs with RSA or DSA keys, because ECC > signatures are > > cheaper to produce. If algorithm agility is added to OCSP, those > > companies can gradually achieve the move to ECC without > disrupting the > > installed base of OCSP clients that don't support ECC. > >=20 > > -Rick Andrews > > > > > -----Original Message----- > > > From: owner-ietf-pkix@mail.imc.org > > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > Santosh Chokhani > > > Sent: Friday, September 21, 2007 2:45 PM > > > To: Paul Hoffman; Stephen Kent; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > Paul, > > > > > > Here are my views on this. > > > > > > The client should be first asking for the algorithm suite > > that signed > > > the certificate in question. There is no need for the > > client to ask > > > for anything stronger. The client can ask for stronger suites as > > > secondary, if client has them. > > > > > > In the scenario you cite, the Responder certificate will > > not include > > > RSA with SHA 1 any longer. So, client will know that > > Responder only > > > supported his second choice and he should be ok with it. > > > > > > -----Original Message----- > > > From: owner-ietf-pkix@mail.imc.org > > > [mailto:owner-ietf-pkix@mail.imc.org] > > > On Behalf Of Paul Hoffman > > > Sent: Friday, September 21, 2007 4:39 PM > > > To: Stephen Kent; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > At 2:07 PM -0400 9/21/07, Stephen Kent wrote: > > > >How about defining an extension to be included in the cert > > > issued to an > > > >OCSP responder by a CA. The extension would have an > > ordered list of > > > >algorithms (hash and signature if we want to address more > > > than the hash > > > >agility issue) accepted by the OCSP responder. An OCSP > > > client can use > > > >this info to determine what is the "best" algorithm (or alg > > > pair) that > > > >it and the responder share. The combination of this > > extension and an > > > >OCSP negotiation procedure will allow the client to detect MITM > > > >downgrade attacks. In fact, if the client acquires the > > > responder's cert > > > >prior to making a request, there would not even be a > need for real > > > >negotiation, since the client would know what alg to > request in a > > > >response. > > > > > > Imagine the list of algorithms is RSA-with-SHA1 first and > > > DSA-with-SHA1 second. How does your negotiation work? The > > client asks > > > for this message to be signed with RSA-with-SHA1. > > > But the server knows that RSA-with-SHA1 has been > > compromised since it > > > got that certificate from the CA. What does the server say to the > > > client to indicate that it only wants to sign with > > DSA-with-SHA1? What > > > prevents Mallory from saying the same thing to the client? > > > > > > --Paul Hoffman, Director > > > --VPN Consortium > > > > > > > > > > > > > > > > ------_=_NextPart_001_01C81028.83DBBE2C Content-Type: text/html; charset="US-ASCII" Content-Transfer-Encoding: quoted-printable RE: OCSP Algorithm Agility

I agree that the RFC 2560 should be revised for a variety of reasons.

 

It would be nice to have a set of = client side request composition and response processing rules (a la Section 6 = of RFC 3290).

 

We probably can not mandate that in delegated model certificate in question and OCSP Responder should be = signed by the same CA key, but we can recommend it and add some language in the = Security Considerations section the residual risk of not doing = that.

 

For hashing algorithm, certID = should be sufficient and should be the same the as the hashing algorithm, used for = the certificate.  We of course will need to spell this out in the = revision.

 

For signature, we can add an = extension, but this should state the algorithm used for the certificate.  We = of course will need to spell this out also in the = revision.

 


From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] = On Behalf Of Hallam-Baker, = Phillip
Sent: Monday, October 15, = 2007 11:36 PM
To: Seth Hitchings; = Santosh Chokhani; ietf-pkix@imc.org
Subject: RE: OCSP = Algorithm Agility

 

Whether a server could make a = sensible choice is beside the point.

 

For a specification to provide an interoperable = standard we must have a definitive statement. Otherwise interoperability ends up = depending on heuristics and undocumented assumptions.

 

Unless I missed the section in the RFC that describes = the algorithm agility strategy it seems to me we must = either:

 

1) Document the server algorithm selection as proposed = by Santosh

2) Doucment the server algorithm selection as proposed by = Santosh with an optional extension to allow the client to specify the choices it = supports.

 

Either way we need a draft if we are going to meet the algorithm agility requirement.

 


From: owner-ietf-pkix@mail.imc.org on behalf of Seth Hitchings
Sent: Wed 10/10/2007 3:25 = PM
To: Santosh Chokhani; Hallam-Baker, Phillip; ietf-pkix@imc.org
Subject: RE: OCSP = Algorithm Agility

I'm generally in favor of simpler approaches, = such as those suggested by
Santosh, as they favor interoperability. Updating deployed applications = to
understand new elements of the protocol could take just as long to roll = out
as the new algorithm support that's purportedly lacking.

I can see a situation in which the CA cannot assume that the entire = user
population understands a new algorithm such as SHA-256, and thus has = to
continue using SHA-1 with RSA when signing certificates. Individual = clients
that do understand SHA-256 may wish to receive OCSP responses signed = using
SHA-256 with RSA, and would need a way to signal their desires to the = OCSP
responder.

The question is, then, is there any security benefit to having the = signature
algorithm on the OCSP response stronger than the signature algorithm on = the
certificate? If you can break the algorithm and cause me to accept a
contrived OCSP response, could you not do the same thing with a = certificate?

Seth

-----Original Message-----
From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.= imc.org] On
Behalf Of Santosh = Chokhani
Sent: Wednesday, October 10, 2007 2:28 PM
To: Hallam-Baker, Phillip; ietf-pkix@imc.org
Subject: RE: OCSP Algorithm Agility


See responses in-line below.

-----Original Message-----
From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com]
Sent: Tuesday, October 09, 2007 2:07 PM
To: Santosh Chokhani; = ietf-pkix@imc.org
Subject: RE: OCSP Algorithm Agility

Not if they don't know that the client can understand them they = can't.
[Santosh Chokhani] The = Responder has two ways to know what the client
understands.  From certID or from CA.  If the client does not = understand
the algorithm used in certificate signing, revocation information is
useless.

And the issue is not just hashing algorithms, it is signature
algorithms.
Like your previous posts you continue to assume that cipher strength = is
a linear quantity with only one dimension and that any client which
supports strength 2X must automatically support strength X.
[Santosh Chokhani] I am = making no such assumptions.  I am saying that if
an algorithm is good enough for a certificate, it is good enough for
revocation notification for that certificate.

That is not the case if you consider the practicalities of deploying = ECC
in an RSA world.

To give a practical example, VeriSign issues a cert for an ECC key
signed with an ECC key. The email program on Alice's machine in the DHS
supports ECC but not the DHS SCVP server or OCSP relay.
[Santosh Chokhani] And what = is the problem with that?  They have no
choice but to use RSA.

In the real world the OCSP service does not have a necessary = connection
to the CA. There are plenty of commercial OCSP offerings that report = on
certificates issued by other CAs.
[Santosh Chokhani] And how = does this relate to algorithm agility?  If
the OCSP does not do ECDSA it won't.  If OCSP supports both RSA = and
ECDSA, it can take the cue from the CA CRL to determine what = algorithm
to use for signing OCSP responses.  If the OCSP does not consume = CRL,
the mechanism that tells it revocation information can also tell it = the
signature algorithm to use.

> -----Original Message-----
> From: owner-ietf-pkix@mail.imc.org
> [mailto:owner-ietf-pkix@mail.= imc.org] On Behalf Of Santosh = Chokhani
> Sent: Tuesday, October 09, 2007 11:16 AM
> To: Hallam-Baker, Phillip; ietf-pkix@imc.org
> Subject: RE: OCSP Algorithm Agility
>
>
> The OCSP and SCVP can transition to stronger algorithms any
> time they want.
>
> The OCSP can take their clue from the CA or the certID field
> to decide the hashing algorithm.  When multiple certID is
> present, OCSP can take low water mark of these.
>
> SCVP is no different than a client in terms of validating a
> path.  In terms of signing a response, it can take the low
> water mark of the hashing algorithms in the certificate chain.
>
> -----Original Message-----
> From: owner-ietf-pkix@mail.imc.org
> [mailto:owner-ietf-pkix@mail.= imc.org]
> On Behalf Of Hallam-Baker, Phillip
> Sent: Monday, October 08, 2007 7:27 PM
> To: Santosh Chokhani; = Andrews, Rick; ietf-pkix@imc.org
> Subject: RE: OCSP Algorithm Agility
>
>
> The objective here is to overcome a real deployment obstacle
> that creates a lockstep issue when use of stronger algorithms
> is attempted.
>
> The CA cannot issue a certificate that employs a new
> algorithm until it is known that all clients that might rely
> on the certificate are capable of processing the new
> certificate. Requiring lockstep updates to the OCSP and SCVP
> infrastructure to be made at the same time renders transition
> to stronger algorithms a much lengthier and much less
> practical proposition.
>
>
> > -----Original Message-----
> > From: owner-ietf-pkix@mail.imc.org
> > [mailto:owner-ietf-pkix@mail.= imc.org] On Behalf Of Santosh = Chokhani
> > Sent: Saturday, October 06, 2007 4:12 PM
> > To: Andrews, Rick; ietf-pkix@imc.org
> > Subject: RE: OCSP Algorithm Agility
> >
> >
> > Rick,
> >
> > SCVP or other intermediaries are red herring.  = Whoever
> processes the
> > certificate processes the revocation information for that
> certificate.
> > It does not change the following:
> >
> > 1.  There is no security benefit in using a stronger = algorithm for
> > OCSP
> > response than for the certificate in question.   = Neither,
> there is any
> > benefit from interoperability viewpoint for these two to = be
> different.
> >
> > 2.  If the OCSP Responder does not get a CRL, it can use = the same
> > mechanism to get the hashing algorithm used as it uses to get = the
> > revocation information.
> >
> > -----Original Message-----
> > From: Andrews, Rick [mailto:RAndrews@verisign.com] > > Sent: Wednesday, October 03, 2007 3:29 PM
> > To: Santosh = Chokhani; ietf-pkix@imc.org
> > Subject: RE: OCSP Algorithm Agility
> >
> > Santosh,
> >
> > Sorry for the long delay in responding - travel and = vacation.
> > 
> > Not all OCSP responders work from CRLs, so they won't take
> their cue
> > from the CRL. Nor should they take their cue from the
> signature on the
> > cert in question, I believe. Let me try to restate my argument = in a
> > different way.
> > 
> > With SCVP delegated path validation, the client requesting a = cert's
> > status from an OCSP responder will be different from the
> client at the
> > other end of the SSL connection. Those two clients may have = very
> > different capabilities in terms of supported signature and = hash
> > algorithms. It's not realistic to expect that all SSL clients, = all
> > SCVP servers, and all CAs will be able to upgrade in
> lockstep to new
> > algorithms as they are developed. Allowing the OCSP client
> and server
> > to negotiate a mutually-acceptable set of algorithms is
> essential to
> > the deployment of newer, stronger algorithms.
> > 
> > Likewise, companies that run large OCSP responders may wish = to
> > gradually move to ECC-based signatures for all their OCSP
> responses,
> > even those for certs with RSA or DSA keys, because ECC
> signatures are
> > cheaper to produce. If algorithm agility is added to OCSP, = those
> > companies can gradually achieve the move to ECC without
> disrupting the
> > installed base of OCSP clients that don't support ECC.
> > 
> > -Rick Andrews
> >
> > > -----Original Message-----
> > > From: owner-ietf-pkix@mail.imc.org
> > > [mailto:owner-ietf-pkix@mail.= imc.org] On Behalf Of
> Santosh Chokhani
> > > Sent: Friday, September 21, 2007 2:45 PM
> > > To: Paul Hoffman; Stephen Kent; ietf-pkix@imc.org
> > > Subject: RE: OCSP Algorithm Agility
> > >
> > >
> > > Paul,
> > >
> > > Here are my views on this.
> > >
> > > The client should be first asking for the algorithm = suite
> > that signed
> > > the certificate in question.  There is no need for = the
> > client to ask
> > > for anything stronger.  The client can ask for = stronger suites as
> > > secondary, if client has them.
> > >
> > > In the scenario you cite, the Responder certificate = will
> > not include
> > > RSA with SHA 1 any longer.  So, client will know = that
> > Responder only
> > > supported his second choice and he should be ok with = it.
> > >
> > > -----Original Message-----
> > > From: owner-ietf-pkix@mail.imc.org
> > > [mailto:owner-ietf-pkix@mail.= imc.org]
> > > On Behalf Of Paul Hoffman
> > > Sent: Friday, September 21, 2007 4:39 PM
> > > To: Stephen Kent; ietf-pkix@imc.org
> > > Subject: RE: OCSP Algorithm Agility
> > >
> > >
> > > At 2:07 PM -0400 9/21/07, Stephen Kent wrote:
> > > >How about defining an extension to be included in the = cert
> > > issued to an
> > > >OCSP responder by a CA.  The extension would = have an
> > ordered list of
> > > >algorithms (hash and signature if we want to address = more
> > > than the hash
> > > >agility issue) accepted by the OCSP responder.  = An OCSP
> > > client can use
> > > >this info to determine what is the "best" algorithm (or alg
> > > pair) that
> > > >it and the responder share. The combination of = this
> > extension and an
> > > >OCSP negotiation procedure will allow the client to = detect MITM
> > > >downgrade attacks. In fact, if the client acquires = the
> > > responder's cert
> > > >prior to making a request, there would not even be = a
> need for real
> > > >negotiation, since the client would know what alg = to
> request in a
> > > >response.
> > >
> > > Imagine the list of algorithms is RSA-with-SHA1 first = and
> > > DSA-with-SHA1 second. How does your negotiation work? = The
> > client asks
> > > for this message to be signed with RSA-with-SHA1.
> > > But the server knows that RSA-with-SHA1 has been
> > compromised since it
> > > got that certificate from the CA. What does the server = say to the
> > > client to indicate that it only wants to sign with
> > DSA-with-SHA1? What
> > > prevents Mallory from saying the same thing to the = client?
> > >
> > > --Paul Hoffman, Director
> > > --VPN Consortium
> > >
> > >
> > >
> >
> >
>
>
>

------_=_NextPart_001_01C81028.83DBBE2C-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9G3a65K061130 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 15 Oct 2007 20:36:06 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9G3a6Xv061129; Mon, 15 Oct 2007 20:36:06 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from robin.verisign.com (robin.verisign.com [65.205.251.75]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9G3a24v061116 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Mon, 15 Oct 2007 20:36:05 -0700 (MST) (envelope-from pbaker@verisign.com) Received: from mou1wnexcn01.vcorp.ad.vrsn.com (mailer1.verisign.com [65.205.251.34]) by robin.verisign.com (8.12.11/8.13.4) with ESMTP id l9G3WvVE032106; Mon, 15 Oct 2007 20:32:57 -0700 Received: from MOU1WNEXMB09.vcorp.ad.vrsn.com ([10.25.15.197]) by mou1wnexcn01.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.1830); Mon, 15 Oct 2007 20:35:50 -0700 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C80FA5.A59CF9BC" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP Algorithm Agility Date: Mon, 15 Oct 2007 20:35:50 -0700 Message-ID: <2788466ED3E31C418E9ACC5C31661557084EC5@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP Algorithm Agility Thread-Index: Acf8l4NIxZexIh9rTveKgrEJmUDxVQAAJZEAAlba1eAAAH/7QAEC+OtgACFXyuAABd3wIAAA1HmAADQyQqABDKGdvQ== References: <82D5657AE1F54347A734BDD33637C879096C9ABE@EXVS01.ex.dslextreme.net> <2788466ED3E31C418E9ACC5C31661557053771@mou1wnexmb09.vcorp.ad.vrsn.com> <82D5657AE1F54347A734BDD33637C879096CA5E3@EXVS01.ex.dslextreme.net> From: "Hallam-Baker, Phillip" To: "Seth Hitchings" , "Santosh Chokhani" , X-OriginalArrivalTime: 16 Oct 2007 03:35:50.0984 (UTC) FILETIME=[A60B5480:01C80FA5] Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C80FA5.A59CF9BC Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Whether a server could make a sensible choice is beside the point. =20 For a specification to provide an interoperable standard we must have a = definitive statement. Otherwise interoperability ends up depending on = heuristics and undocumented assumptions. =20 Unless I missed the section in the RFC that describes the algorithm = agility strategy it seems to me we must either: =20 1) Document the server algorithm selection as proposed by Santosh 2) Doucment the server algorithm selection as proposed by Santosh with = an optional extension to allow the client to specify the choices it = supports. =20 Either way we need a draft if we are going to meet the algorithm agility = requirement. ________________________________ From: owner-ietf-pkix@mail.imc.org on behalf of Seth Hitchings Sent: Wed 10/10/2007 3:25 PM To: Santosh Chokhani; Hallam-Baker, Phillip; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility I'm generally in favor of simpler approaches, such as those suggested by Santosh, as they favor interoperability. Updating deployed applications = to understand new elements of the protocol could take just as long to roll = out as the new algorithm support that's purportedly lacking. I can see a situation in which the CA cannot assume that the entire user population understands a new algorithm such as SHA-256, and thus has to continue using SHA-1 with RSA when signing certificates. Individual = clients that do understand SHA-256 may wish to receive OCSP responses signed = using SHA-256 with RSA, and would need a way to signal their desires to the = OCSP responder. The question is, then, is there any security benefit to having the = signature algorithm on the OCSP response stronger than the signature algorithm on = the certificate? If you can break the algorithm and cause me to accept a contrived OCSP response, could you not do the same thing with a = certificate? Seth -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] = On Behalf Of Santosh Chokhani Sent: Wednesday, October 10, 2007 2:28 PM To: Hallam-Baker, Phillip; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility See responses in-line below. -----Original Message----- From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com] Sent: Tuesday, October 09, 2007 2:07 PM To: Santosh Chokhani; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility Not if they don't know that the client can understand them they can't. [Santosh Chokhani] The Responder has two ways to know what the client understands. From certID or from CA. If the client does not understand the algorithm used in certificate signing, revocation information is useless. And the issue is not just hashing algorithms, it is signature algorithms. Like your previous posts you continue to assume that cipher strength is a linear quantity with only one dimension and that any client which supports strength 2X must automatically support strength X. [Santosh Chokhani] I am making no such assumptions. I am saying that if an algorithm is good enough for a certificate, it is good enough for revocation notification for that certificate. That is not the case if you consider the practicalities of deploying ECC in an RSA world. To give a practical example, VeriSign issues a cert for an ECC key signed with an ECC key. The email program on Alice's machine in the DHS supports ECC but not the DHS SCVP server or OCSP relay. [Santosh Chokhani] And what is the problem with that? They have no choice but to use RSA. In the real world the OCSP service does not have a necessary connection to the CA. There are plenty of commercial OCSP offerings that report on certificates issued by other CAs. [Santosh Chokhani] And how does this relate to algorithm agility? If the OCSP does not do ECDSA it won't. If OCSP supports both RSA and ECDSA, it can take the cue from the CA CRL to determine what algorithm to use for signing OCSP responses. If the OCSP does not consume CRL, the mechanism that tells it revocation information can also tell it the signature algorithm to use. > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > Sent: Tuesday, October 09, 2007 11:16 AM > To: Hallam-Baker, Phillip; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > The OCSP and SCVP can transition to stronger algorithms any > time they want. > > The OCSP can take their clue from the CA or the certID field > to decide the hashing algorithm. When multiple certID is > present, OCSP can take low water mark of these. > > SCVP is no different than a client in terms of validating a > path. In terms of signing a response, it can take the low > water mark of the hashing algorithms in the certificate chain. > > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] > On Behalf Of Hallam-Baker, Phillip > Sent: Monday, October 08, 2007 7:27 PM > To: Santosh Chokhani; Andrews, Rick; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > The objective here is to overcome a real deployment obstacle > that creates a lockstep issue when use of stronger algorithms > is attempted. > > The CA cannot issue a certificate that employs a new > algorithm until it is known that all clients that might rely > on the certificate are capable of processing the new > certificate. Requiring lockstep updates to the OCSP and SCVP > infrastructure to be made at the same time renders transition > to stronger algorithms a much lengthier and much less > practical proposition. > > > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > > Sent: Saturday, October 06, 2007 4:12 PM > > To: Andrews, Rick; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > > > Rick, > > > > SCVP or other intermediaries are red herring. Whoever > processes the > > certificate processes the revocation information for that > certificate. > > It does not change the following: > > > > 1. There is no security benefit in using a stronger algorithm for > > OCSP > > response than for the certificate in question. Neither, > there is any > > benefit from interoperability viewpoint for these two to be > different. > > > > 2. If the OCSP Responder does not get a CRL, it can use the same > > mechanism to get the hashing algorithm used as it uses to get the > > revocation information. > > > > -----Original Message----- > > From: Andrews, Rick [mailto:RAndrews@verisign.com] > > Sent: Wednesday, October 03, 2007 3:29 PM > > To: Santosh Chokhani; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > Santosh, > > > > Sorry for the long delay in responding - travel and vacation. > >=20 > > Not all OCSP responders work from CRLs, so they won't take > their cue > > from the CRL. Nor should they take their cue from the > signature on the > > cert in question, I believe. Let me try to restate my argument in a > > different way. > >=20 > > With SCVP delegated path validation, the client requesting a cert's > > status from an OCSP responder will be different from the > client at the > > other end of the SSL connection. Those two clients may have very > > different capabilities in terms of supported signature and hash > > algorithms. It's not realistic to expect that all SSL clients, all > > SCVP servers, and all CAs will be able to upgrade in > lockstep to new > > algorithms as they are developed. Allowing the OCSP client > and server > > to negotiate a mutually-acceptable set of algorithms is > essential to > > the deployment of newer, stronger algorithms. > >=20 > > Likewise, companies that run large OCSP responders may wish to > > gradually move to ECC-based signatures for all their OCSP > responses, > > even those for certs with RSA or DSA keys, because ECC > signatures are > > cheaper to produce. If algorithm agility is added to OCSP, those > > companies can gradually achieve the move to ECC without > disrupting the > > installed base of OCSP clients that don't support ECC. > >=20 > > -Rick Andrews > > > > > -----Original Message----- > > > From: owner-ietf-pkix@mail.imc.org > > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > Santosh Chokhani > > > Sent: Friday, September 21, 2007 2:45 PM > > > To: Paul Hoffman; Stephen Kent; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > Paul, > > > > > > Here are my views on this. > > > > > > The client should be first asking for the algorithm suite > > that signed > > > the certificate in question. There is no need for the > > client to ask > > > for anything stronger. The client can ask for stronger suites as > > > secondary, if client has them. > > > > > > In the scenario you cite, the Responder certificate will > > not include > > > RSA with SHA 1 any longer. So, client will know that > > Responder only > > > supported his second choice and he should be ok with it. > > > > > > -----Original Message----- > > > From: owner-ietf-pkix@mail.imc.org > > > [mailto:owner-ietf-pkix@mail.imc.org] > > > On Behalf Of Paul Hoffman > > > Sent: Friday, September 21, 2007 4:39 PM > > > To: Stephen Kent; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > At 2:07 PM -0400 9/21/07, Stephen Kent wrote: > > > >How about defining an extension to be included in the cert > > > issued to an > > > >OCSP responder by a CA. The extension would have an > > ordered list of > > > >algorithms (hash and signature if we want to address more > > > than the hash > > > >agility issue) accepted by the OCSP responder. An OCSP > > > client can use > > > >this info to determine what is the "best" algorithm (or alg > > > pair) that > > > >it and the responder share. The combination of this > > extension and an > > > >OCSP negotiation procedure will allow the client to detect MITM > > > >downgrade attacks. In fact, if the client acquires the > > > responder's cert > > > >prior to making a request, there would not even be a > need for real > > > >negotiation, since the client would know what alg to > request in a > > > >response. > > > > > > Imagine the list of algorithms is RSA-with-SHA1 first and > > > DSA-with-SHA1 second. How does your negotiation work? The > > client asks > > > for this message to be signed with RSA-with-SHA1. > > > But the server knows that RSA-with-SHA1 has been > > compromised since it > > > got that certificate from the CA. What does the server say to the > > > client to indicate that it only wants to sign with > > DSA-with-SHA1? What > > > prevents Mallory from saying the same thing to the client? > > > > > > --Paul Hoffman, Director > > > --VPN Consortium > > > > > > > > > > > > > > > > ------_=_NextPart_001_01C80FA5.A59CF9BC Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable RE: OCSP Algorithm Agility=0A= =0A= =0A= =0A=
=0A=
Whether a = server could make a sensible choice is beside the point.
=0A=
 
=0A=
For a specification to = provide an interoperable standard we must have a definitive statement. = Otherwise interoperability ends up depending on heuristics and = undocumented assumptions.
=0A=
 
=0A=
Unless I missed the section = in the RFC that describes the algorithm agility strategy it seems to me = we must either:
=0A=
 
=0A=
1) Document the server algorithm selection as = proposed by Santosh
=0A=
2) Doucment the server algorithm selection as = proposed by Santosh with an optional extension to allow the client to = specify the choices it supports.
=0A=
 
=0A=
Either way we need a draft if we are going to meet the = algorithm agility requirement.
=0A=

=0A=
=0A= From: owner-ietf-pkix@mail.imc.org = on behalf of Seth Hitchings
Sent: Wed 10/10/2007 3:25 = PM
To: Santosh Chokhani; Hallam-Baker, Phillip; = ietf-pkix@imc.org
Subject: RE: OCSP Algorithm = Agility

=0A=
=0A=

I'm generally in favor of simpler approaches, such as = those suggested by
Santosh, as they favor interoperability. Updating = deployed applications to
understand new elements of the protocol = could take just as long to roll out
as the new algorithm support = that's purportedly lacking.

I can see a situation in which the CA = cannot assume that the entire user
population understands a new = algorithm such as SHA-256, and thus has to
continue using SHA-1 with = RSA when signing certificates. Individual clients
that do understand = SHA-256 may wish to receive OCSP responses signed using
SHA-256 with = RSA, and would need a way to signal their desires to the = OCSP
responder.

The question is, then, is there any security = benefit to having the signature
algorithm on the OCSP response = stronger than the signature algorithm on the
certificate? If you can = break the algorithm and cause me to accept a
contrived OCSP response, = could you not do the same thing with a = certificate?

Seth

-----Original Message-----
From: = owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.= imc.org] On
Behalf Of Santosh Chokhani
Sent: Wednesday, = October 10, 2007 2:28 PM
To: Hallam-Baker, Phillip; = ietf-pkix@imc.org
Subject: RE: OCSP Algorithm Agility


See = responses in-line below.

-----Original Message-----
From: = Hallam-Baker, Phillip [mailto:pbaker@verisign.com]
Se= nt: Tuesday, October 09, 2007 2:07 PM
To: Santosh Chokhani; = ietf-pkix@imc.org
Subject: RE: OCSP Algorithm Agility

Not if = they don't know that the client can understand them they = can't.
[Santosh Chokhani] The Responder has two ways to know what the = client
understands.  From certID or from CA.  If the client = does not understand
the algorithm used in certificate signing, = revocation information is
useless.

And the issue is not just = hashing algorithms, it is signature
algorithms.
Like your previous = posts you continue to assume that cipher strength is
a linear = quantity with only one dimension and that any client which
supports = strength 2X must automatically support strength X.
[Santosh Chokhani] = I am making no such assumptions.  I am saying that if
an = algorithm is good enough for a certificate, it is good enough = for
revocation notification for that certificate.

That is not = the case if you consider the practicalities of deploying ECC
in an = RSA world.

To give a practical example, VeriSign issues a cert = for an ECC key
signed with an ECC key. The email program on Alice's = machine in the DHS
supports ECC but not the DHS SCVP server or OCSP = relay.
[Santosh Chokhani] And what is the problem with that?  = They have no
choice but to use RSA.

In the real world the OCSP = service does not have a necessary connection
to the CA. There are = plenty of commercial OCSP offerings that report on
certificates = issued by other CAs.
[Santosh Chokhani] And how does this relate to = algorithm agility?  If
the OCSP does not do ECDSA it = won't.  If OCSP supports both RSA and
ECDSA, it can take the cue = from the CA CRL to determine what algorithm
to use for signing OCSP = responses.  If the OCSP does not consume CRL,
the mechanism that = tells it revocation information can also tell it the
signature = algorithm to use.

> -----Original Message-----
> From: = owner-ietf-pkix@mail.imc.org
> [mailto:owner-ietf-pkix@mail.= imc.org] On Behalf Of Santosh Chokhani
> Sent: Tuesday, = October 09, 2007 11:16 AM
> To: Hallam-Baker, Phillip; = ietf-pkix@imc.org
> Subject: RE: OCSP Algorithm = Agility
>
>
> The OCSP and SCVP can transition to = stronger algorithms any
> time they want.
>
> The OCSP = can take their clue from the CA or the certID field
> to decide = the hashing algorithm.  When multiple certID is
> present, = OCSP can take low water mark of these.
>
> SCVP is no = different than a client in terms of validating a
> path.  In = terms of signing a response, it can take the low
> water mark of = the hashing algorithms in the certificate chain.
>
> = -----Original Message-----
> From: = owner-ietf-pkix@mail.imc.org
> [mailto:owner-ietf-pkix@mail.= imc.org]
> On Behalf Of Hallam-Baker, Phillip
> Sent: = Monday, October 08, 2007 7:27 PM
> To: Santosh Chokhani; Andrews, = Rick; ietf-pkix@imc.org
> Subject: RE: OCSP Algorithm = Agility
>
>
> The objective here is to overcome a real = deployment obstacle
> that creates a lockstep issue when use of = stronger algorithms
> is attempted.
>
> The CA cannot = issue a certificate that employs a new
> algorithm until it is = known that all clients that might rely
> on the certificate are = capable of processing the new
> certificate. Requiring lockstep = updates to the OCSP and SCVP
> infrastructure to be made at the = same time renders transition
> to stronger algorithms a much = lengthier and much less
> practical = proposition.
>
>
> > -----Original = Message-----
> > From: owner-ietf-pkix@mail.imc.org
> = > [mailto:owner-ietf-pkix@mail.= imc.org] On Behalf Of Santosh Chokhani
> > Sent: Saturday, = October 06, 2007 4:12 PM
> > To: Andrews, Rick; = ietf-pkix@imc.org
> > Subject: RE: OCSP Algorithm = Agility
> >
> >
> > Rick,
> = >
> > SCVP or other intermediaries are red herring.  = Whoever
> processes the
> > certificate processes the = revocation information for that
> certificate.
> > It = does not change the following:
> >
> > 1.  There = is no security benefit in using a stronger algorithm for
> > = OCSP
> > response than for the certificate in = question.   Neither,
> there is any
> > benefit = from interoperability viewpoint for these two to be
> = different.
> >
> > 2.  If the OCSP Responder does = not get a CRL, it can use the same
> > mechanism to get the = hashing algorithm used as it uses to get the
> > revocation = information.
> >
> > -----Original = Message-----
> > From: Andrews, Rick [mailto:RAndrews@verisign.com]> > Sent: Wednesday, October 03, 2007 3:29 PM
> > To: = Santosh Chokhani; ietf-pkix@imc.org
> > Subject: RE: OCSP = Algorithm Agility
> >
> > Santosh,
> = >
> > Sorry for the long delay in responding - travel and = vacation.
> > 
> > Not all OCSP responders work = from CRLs, so they won't take
> their cue
> > from the = CRL. Nor should they take their cue from the
> signature on = the
> > cert in question, I believe. Let me try to restate my = argument in a
> > different way.
> > 
> = > With SCVP delegated path validation, the client requesting a = cert's
> > status from an OCSP responder will be different from = the
> client at the
> > other end of the SSL connection. = Those two clients may have very
> > different capabilities in = terms of supported signature and hash
> > algorithms. It's not = realistic to expect that all SSL clients, all
> > SCVP servers, = and all CAs will be able to upgrade in
> lockstep to new
> = > algorithms as they are developed. Allowing the OCSP client
> = and server
> > to negotiate a mutually-acceptable set of = algorithms is
> essential to
> > the deployment of newer, = stronger algorithms.
> > 
> > Likewise, companies = that run large OCSP responders may wish to
> > gradually move = to ECC-based signatures for all their OCSP
> responses,
> = > even those for certs with RSA or DSA keys, because ECC
> = signatures are
> > cheaper to produce. If algorithm agility is = added to OCSP, those
> > companies can gradually achieve the = move to ECC without
> disrupting the
> > installed base = of OCSP clients that don't support ECC.
> > 
> > = -Rick Andrews
> >
> > > -----Original = Message-----
> > > From: = owner-ietf-pkix@mail.imc.org
> > > [mailto:owner-ietf-pkix@mail.= imc.org] On Behalf Of
> Santosh Chokhani
> > > = Sent: Friday, September 21, 2007 2:45 PM
> > > To: Paul = Hoffman; Stephen Kent; ietf-pkix@imc.org
> > > Subject: RE: = OCSP Algorithm Agility
> > >
> > >
> > = > Paul,
> > >
> > > Here are my views on = this.
> > >
> > > The client should be first = asking for the algorithm suite
> > that signed
> > = > the certificate in question.  There is no need for the
> = > client to ask
> > > for anything stronger.  The = client can ask for stronger suites as
> > > secondary, if = client has them.
> > >
> > > In the scenario you = cite, the Responder certificate will
> > not include
> = > > RSA with SHA 1 any longer.  So, client will know = that
> > Responder only
> > > supported his second = choice and he should be ok with it.
> > >
> > > = -----Original Message-----
> > > From: = owner-ietf-pkix@mail.imc.org
> > > [mailto:owner-ietf-pkix@mail.= imc.org]
> > > On Behalf Of Paul Hoffman
> > = > Sent: Friday, September 21, 2007 4:39 PM
> > > To: = Stephen Kent; ietf-pkix@imc.org
> > > Subject: RE: OCSP = Algorithm Agility
> > >
> > >
> > > = At 2:07 PM -0400 9/21/07, Stephen Kent wrote:
> > > >How = about defining an extension to be included in the cert
> > > = issued to an
> > > >OCSP responder by a CA.  The = extension would have an
> > ordered list of
> > > = >algorithms (hash and signature if we want to address more
> = > > than the hash
> > > >agility issue) accepted by = the OCSP responder.  An OCSP
> > > client can = use
> > > >this info to determine what is the "best" = algorithm (or alg
> > > pair) that
> > > >it = and the responder share. The combination of this
> > extension = and an
> > > >OCSP negotiation procedure will allow the = client to detect MITM
> > > >downgrade attacks. In fact, = if the client acquires the
> > > responder's cert
> = > > >prior to making a request, there would not even be = a
> need for real
> > > >negotiation, since the = client would know what alg to
> request in a
> > > = >response.
> > >
> > > Imagine the list of = algorithms is RSA-with-SHA1 first and
> > > DSA-with-SHA1 = second. How does your negotiation work? The
> > client = asks
> > > for this message to be signed with = RSA-with-SHA1.
> > > But the server knows that RSA-with-SHA1 = has been
> > compromised since it
> > > got that = certificate from the CA. What does the server say to the
> > = > client to indicate that it only wants to sign with
> > = DSA-with-SHA1? What
> > > prevents Mallory from saying the = same thing to the client?
> > >
> > > --Paul = Hoffman, Director
> > > --VPN Consortium
> > = >
> > >
> > >
> >
> = >
>
>
>

------_=_NextPart_001_01C80FA5.A59CF9BC-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9FJNkx7023798 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 15 Oct 2007 12:23:46 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9FJNkYC023797; Mon, 15 Oct 2007 12:23:46 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from stingray.missi.ncsc.mil (stingray.missi.ncsc.mil [144.51.50.20]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9FJNk0Y023789 for ; Mon, 15 Oct 2007 12:23:46 -0700 (MST) (envelope-from DPKemp@missi.ncsc.mil) Received: from Cerberus.missi.ncsc.mil (cerberus.missi.ncsc.mil [144.51.51.8]) by stingray.missi.ncsc.mil with SMTP id l9FJNj7h014310 for ; Mon, 15 Oct 2007 15:23:45 -0400 (EDT) Received: from 144.51.60.33 by Cerberus.missi.ncsc.mil (InterScan VirusWall 6); Mon, 15 Oct 2007 15:23:45 -0400 Received: from EXCH.missi.ncsc.mil ([144.51.60.19]) by antigone.missi.ncsc.mil with Microsoft SMTPSVC(6.0.3790.3959); Mon, 15 Oct 2007 15:23:44 -0400 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Date: Mon, 15 Oct 2007 15:23:43 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Thread-Index: AcgPW9kueagIqlb3Tb+0CqWCK8inPwAAB6iA References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> <470C1C32.70603@eb2bcom.com> <470C1FA3.40000@eb2bcom.com> <470EC778.500@eb2bcom.com> <4713A14B.5040906@kent.ac.uk> From: "Kemp, David P." To: X-OriginalArrivalTime: 15 Oct 2007 19:23:44.0896 (UTC) FILETIME=[E71FD800:01C80F60] X-TM-AS-Product-Ver: : ISVW-6.0.0.1396-3.6.0.1039-15480001 X-TM-AS-Result: : Yes--18.257100-0-31-1 X-TM-AS-Category-Info: : 31:0.000000 X-TM-AS-MatchedID: : =?us-ascii?B?MTUwNTY3LTcwNzM3My03MDAy?= =?us-ascii?B?NzItNzAxOTI4LTcwNDE0MS03MDE1NzYtNzA1NTE4LTcwNjgxNy03?= =?us-ascii?B?MDA5NzEtNzAxODE0LTcwODIxNy03MDE2MjYtNzAzODM1LTcwMzUx?= =?us-ascii?B?Ny03MDU5MDEtMTA1MjcwLTcwMDkxOC03MDg3NTItMTM5NzAzLTcw?= =?us-ascii?B?ODE5Ni03MDAzNDItNzAwMTQyLTEzOTAwNi03MDQyODctNzAzODI5?= =?us-ascii?B?LTcwMjY0NS03MDA0NzMtNzAxMTc1LTcwNDQyNS03MDA2MDQtNzAw?= =?us-ascii?B?MDc1LTEzOTAxMC03MDA4NDYtNzA2NTYxLTEzOTUwNC03MDE0NTUt?= =?us-ascii?B?NzA5NTg0LTcwNTI2OS03MDUzMDMtNzAwMzcwLTE0ODAzOS0xNDgw?= =?us-ascii?B?NTAtMjAwNDI=?= Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l9FJNk0Y023792 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: The links provided will retrieve a PDF copy of the full text of X.520 (1993, 1997, 2001, or 2005 edition). Unfortunately, some MUAs cannot grok URLs that span more than 1 line, so instead of clicking on them they must be copied and pasted manually into a browser address bar. After entering the URL and retrieving the PDF file, (which due to web-server-specific brain damage may also need to be renamed from "xxx.pdf.asp" to "xxx.pdf"), scroll down to Annex C to view the entire set of upper bounds. One would think that after nearly 14 years the web would have achieved point-and-click usability, but apparently not. (Note that the upper bounds module is included in X.520, not X.521). ---------- X.520 2005 --------- http://www.itu.int/rec/T-REC-X.520-200508-I/dologin.asp?lang=e&id=T-REC- X.520-200508-I!!PDF-E&type=items ---------- X.521 2005 --------- http://www.itu.int/rec/T-REC-X.521-200508-I/dologin.asp?lang=e&id=T-REC- X.521-200508-I!!PDF-E&type=items -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Paul Hoffman Sent: Monday, October 15, 2007 1:42 PM To: David Chadwick Cc: ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" At 6:20 PM +0100 10/15/07, David Chadwick wrote: >It is written at the start of Annex C of X.521, as copied below > >>Annex C >> >>Upper bounds >>(This annex does not form an integral part of this Recommendation | >>International Standard) >>This annex includes all of the suggested upper bound value >>constraints used in these Directory Specifications, in the form of >>the ASN.1 module UpperBounds. >> >>UpperBounds {joint-iso-itu-t ds(5) module(1) upperBounds(10) 5} >>DEFINITIONS ::= >>BEGIN Could you show the whole Annex? That is, could we see all the upper bounds listed? Or, is there just a blank line and "END"? :-) --Paul Hoffman, Director --VPN Consortium Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9FJB5iW022810 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 15 Oct 2007 12:11:05 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9FJB5GS022809; Mon, 15 Oct 2007 12:11:05 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.nist.gov (rimp1.nist.gov [129.6.16.226]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9FJAx1c022782 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 15 Oct 2007 12:11:04 -0700 (MST) (envelope-from david.cooper@nist.gov) Received: from postmark.nist.gov (emailha1.nist.gov [129.6.16.196]) by smtp.nist.gov (8.13.1/8.13.1) with ESMTP id l9FJAoDC000413 for ; Mon, 15 Oct 2007 15:10:51 -0400 Received: from st26.ncsl.nist.gov (st26.ncsl.nist.gov [129.6.54.72]) by postmark.nist.gov (8.13.1/8.13.1) with ESMTP id l9FJAGIp027830 for ; Mon, 15 Oct 2007 15:10:17 -0400 Message-ID: <4713BB5A.6000801@nist.gov> Date: Mon, 15 Oct 2007 15:11:22 -0400 From: "David A. Cooper" User-Agent: Thunderbird 2.0.0.4 (X11/20070620) MIME-Version: 1.0 To: pkix Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> <470C1C32.70603@eb2bcom.com> <470C1FA3.40000@eb2bcom.com> <470EC778.500@eb2bcom.com> <4713A14B.5040906@kent.ac.uk> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-NIST-MailScanner-Information: X-NIST-MailScanner: Found to be clean X-NIST-MailScanner-From: david.cooper@nist.gov Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Paul, Here is a web site that contains the ASN.1 modules for "X-Series Recommendations": http://www.itu.int/ITU-T/asn1/database/itu-t/x It appears that the upper bounds module, which appears in X.520, has changed with each edition. At least, the web site indicates that the OID for the module has changed from the 1997 edition to the 2001 edition, and again with the publication of the 2005 edition. I didn't attempt to compare the modules to see how they changed. Dave Paul Hoffman wrote: > > At 6:20 PM +0100 10/15/07, David Chadwick wrote: >> It is written at the start of Annex C of X.521, as copied below >> >>> Annex C >>> >>> Upper bounds >>> (This annex does not form an integral part of this Recommendation | >>> International Standard) >>> This annex includes all of the suggested upper bound value >>> constraints used in these Directory Specifications, in the form of >>> the ASN.1 module UpperBounds. >>> >>> UpperBounds {joint-iso-itu-t ds(5) module(1) upperBounds(10) 5} >>> DEFINITIONS ::= >>> BEGIN > > Could you show the whole Annex? That is, could we see all the upper > bounds listed? Or, is there just a blank line and "END"? :-) > > > --Paul Hoffman, Director > --VPN Consortium > > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9FHfg1a013679 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 15 Oct 2007 10:41:42 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9FHfg4t013677; Mon, 15 Oct 2007 10:41:42 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from [10.1.0.77] (dsl-63-249-108-169.cruzio.com [63.249.108.169]) (authenticated bits=0) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9FHfZku013650 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 15 Oct 2007 10:41:37 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: <4713A14B.5040906@kent.ac.uk> References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> <470C1C32.70603@eb2bcom.com> <470C1FA3.40000@eb2bcom.com> <470EC778.500@eb2bcom.com> <4713A14B.5040906@kent.ac.uk> Date: Mon, 15 Oct 2007 10:41:31 -0700 To: David Chadwick From: Paul Hoffman Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Cc: ietf-pkix@imc.org Content-Type: text/plain; charset="us-ascii" ; format="flowed" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: At 6:20 PM +0100 10/15/07, David Chadwick wrote: >It is written at the start of Annex C of X.521, as copied below > >>Annex C >> >>Upper bounds >>(This annex does not form an integral part of this Recommendation | >>International Standard) >>This annex includes all of the suggested upper bound value >>constraints used in these Directory Specifications, in the form of >>the ASN.1 module UpperBounds. >> >>UpperBounds {joint-iso-itu-t ds(5) module(1) upperBounds(10) 5} >>DEFINITIONS ::= >>BEGIN Could you show the whole Annex? That is, could we see all the upper bounds listed? Or, is there just a blank line and "END"? :-) --Paul Hoffman, Director --VPN Consortium Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9FHKd4n009266 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 15 Oct 2007 10:20:39 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9FHKdcM009263; Mon, 15 Oct 2007 10:20:39 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mx5.kent.ac.uk (mx5.kent.ac.uk [129.12.21.36]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9FHKYAR009225 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 15 Oct 2007 10:20:36 -0700 (MST) (envelope-from d.w.chadwick@kent.ac.uk) Received: from vpnd016.kent.ac.uk ([129.12.208.22]) by mx5.kent.ac.uk with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.62) (envelope-from ) id 1IhTbv-0001HO-1V; Mon, 15 Oct 2007 18:20:11 +0100 Message-ID: <4713A14B.5040906@kent.ac.uk> Date: Mon, 15 Oct 2007 18:20:11 +0100 From: David Chadwick Organization: University of Kent User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: "Kemp, David P." CC: Paul Hoffman , ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> <470C1C32.70603@eb2bcom.com> <470C1FA3.40000@eb2bcom.com> <470EC778.500@eb2bcom.com> In-Reply-To: Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit X-UKC-Mail-System: No virus detected X-UKC-SpamCheck: X-UKC-MailScanner-From: d.w.chadwick@kent.ac.uk Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Hi David It is written at the start of Annex C of X.521, as copied below > Annex C > > Upper bounds > (This annex does not form an integral part of this Recommendation | International Standard) > This annex includes all of the suggested upper bound value constraints used in these Directory Specifications, in the form of the ASN.1 module UpperBounds. > > UpperBounds {joint-iso-itu-t ds(5) module(1) upperBounds(10) 5} > DEFINITIONS ::= > BEGIN regards David Kemp, David P. wrote: >> Paul Hoffman wrote: > >> It has been established on this list that the upper bounds in X.500 >> have been non-normative since the second edition. > > You said that in an earlier message. Could you point us to a specific > section of a specific version of X.500 where that is true? Most of us > are not X.500 users. > > > ---------- 1993 --------- > http://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-X.520-199311-S!!P > DF-E&type=items > > ISO/IEC 9594-6 : 1995 (E) > 22 ITU-T Rec. X.520 (1993 E) Superseded by a more recent version > Annex A > Selected attribute types in ASN.1 > (This annex forms an integral part of this Recommendation | > International Standard) > This annex includes all of the ASN.1 type and value definitions > contained in this Directory Specification in the form of > the ASN.1 module SelectedAttributeTypes. > > > ---------- 1997 --------- > http://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-X.520-199708-S!!P > DF-E&type=items > > ISO/IEC 9594-6 : 1998 (E) > ITU-T Rec. X.520 (1997 E) 41 > Annex C > Upper bounds > (This annex does not form an integral part of this Recommendation | > International Standard) > This annex includes all of the suggested upper bound value constraints > used in these Directory Specifications, in the form > of the ASN.1 module UpperBounds. > > ---------- 2001 --------- > http://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-X.520-200102-I!!P > DF-E&type=items > > ISO/IEC 9594-6:2001 (E) > ITU-T X.520 (02/2001 E) 61 > Annex C > Upper bounds > (This annex does not form an integral part of this Recommendation | > International Standard) > This annex includes all of the suggested upper bound value constraints > used in these Directory Specifications, in the > form of the ASN.1 module UpperBounds. > > ---------- 2005 --------- > http://www.itu.int/rec/T-REC-X.520-200508-I/dologin.asp?lang=e&id=T-REC- > X.520-200508-I!!PDF-E&type=items > > ISO/IEC 9594-6:2005 (E) > 60 ITU-T Rec. X.520 (08/2005) > Annex C > Upper bounds > (This annex does not form an integral part of this Recommendation | > International Standard) > This annex includes all of the suggested upper bound value constraints > used in these Directory Specifications, in the form > of the ASN.1 module UpperBounds. > > > -- ***************************************************************** David W. Chadwick, BSc PhD Professor of Information Systems Security The Computing Laboratory, University of Kent, Canterbury, CT2 7NF Skype Name: davidwchadwick Tel: +44 1227 82 3221 Fax +44 1227 762 811 Mobile: +44 77 96 44 7184 Email: D.W.Chadwick@kent.ac.uk Home Page: http://www.cs.kent.ac.uk/people/staff/dwc8/index.html Research Web site: http://www.cs.kent.ac.uk/research/groups/iss/index.html Entrust key validation string: MLJ9-DU5T-HV8J PGP Key ID is 0xBC238DE5 ***************************************************************** Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9FGwxB4001604 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 15 Oct 2007 09:58:59 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9FGwxAj001603; Mon, 15 Oct 2007 09:58:59 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from colibri.verisign.com (colibri.verisign.com [65.205.251.74]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9FGwvwF001571 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Mon, 15 Oct 2007 09:58:58 -0700 (MST) (envelope-from pbaker@verisign.com) Received: from mou1wnexcn01.vcorp.ad.vrsn.com (mailer1.verisign.com [65.205.251.34]) by colibri.verisign.com (8.13.6/8.13.4) with ESMTP id l9FGtPMu006000; Mon, 15 Oct 2007 09:55:25 -0700 Received: from MOU1WNEXMB09.vcorp.ad.vrsn.com ([10.25.15.197]) by mou1wnexcn01.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.1830); Mon, 15 Oct 2007 09:58:46 -0700 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C80F4C.A6168FE2" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP Algorithm Agility Date: Mon, 15 Oct 2007 09:58:45 -0700 Message-ID: <2788466ED3E31C418E9ACC5C31661557084EC0@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP Algorithm Agility Thread-Index: Acf8l4NIxZexIh9rTveKgrEJmUDxVQAAJZEAAlba1eAAAH/7QAEC+OtgACFXyuAABd3wIAAA1HmAADQyQqAAIEoZEADVkoxj References: <82D5657AE1F54347A734BDD33637C879096C9ABE@EXVS01.ex.dslextreme.net> <2788466ED3E31C418E9ACC5C31661557053771@mou1wnexmb09.vcorp.ad.vrsn.com> <82D5657AE1F54347A734BDD33637C879096CA5E3@EXVS01.ex.dslextreme.net> From: "Hallam-Baker, Phillip" To: "Stefan Santesson" , "Seth Hitchings" , "Santosh Chokhani" , X-OriginalArrivalTime: 15 Oct 2007 16:58:46.0928 (UTC) FILETIME=[A6BB4100:01C80F4C] Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------_=_NextPart_001_01C80F4C.A6168FE2 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable From: owner-ietf-pkix@mail.imc.org on behalf of Stefan Santesson >Security: >None of the presented threats is not a great concern for me.=20 >Downgrade attacks is only useful if we use algorithms that can be = broken. >I would expect an organization to only allow algorithms that provide = adequate security. >The stolen OCSP key is neither a problem for me from a protocol = perspective. We have revocation. Agreed, the issue here is not security, it is interoperability.=20 >Practical matters: >I can only find one practical matter that concerns me. I have an OCSP = server and of=20 >some reason I want to gradually transition responses to be based on say = ECC with=20 >SHA 256. Some clients can only verify RSA with SHA-1. The reason for = doing this=20 >transition may be entirely policy oriented. Now I would like to know = which clients=20 >that can actually verify my upgraded responses. That is the concern that led to the proposal.=20 =20 The assumption that the OCSP client supports the same set of algorithms = as the=20 certificate relying application does not hold=20 =20 >What can I do today: >The server can draw a number of conclusions today. >1) Looking at the hashAlgorithm of the CertID >2) Looking at the signatureAlgorithm used by the client to sign the = response >3) Looking at the certificate actually being validated >None of these are 100% bulletproof to cover all corner cases. But are = they=20 >good enough and is the remaining gap big enough to motivate a protocol = update? =20 As a design principle I prefer a protocol where the client can specify what it wants over one where the only option is for the server to guess. =20 I find that approach is much more likely to lead to reliable = interoperation. =20 =20 The solution proposed is 100% backwards compatible, the old approach = being: 1 Server guesses what algorithms the client supports =20 The new approach is: 1 Server looks to see if the client specified what algorithms are = supported by the client 2 If none specified server guesses what algorithms the client supports = as before If either the client or the server does not support the proposed = extension=20 the other party simply downgrades to the status quo. =20 =20 ------_=_NextPart_001_01C80F4C.A6168FE2 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable RE: OCSP Algorithm Agility=0A= =0A= =0A= =0A=
=0A=
From: = owner-ietf-pkix@mail.imc.org on behalf of Stefan = Santesson
=0A=
>Security:
>None of the presented = threats is not a great concern for me.
=0A=
>Downgrade attacks is only useful if we = use algorithms that can be broken.
>I would expect an organization = to only allow algorithms that provide adequate security.
=0A=
>The stolen OCSP key is neither a = problem for me from a protocol perspective. We have = revocation.
=0A=
Agreed, the issue here is not security, it = is interoperability.
=0A=
=0A=


>Practical matters:
>I can only find one = practical matter that concerns me. I have an OCSP server and of
=0A=
>some reason I want to gradually transition responses = to be based on say ECC with
=0A=
>SHA 256. Some clients can only verify RSA with SHA-1. = The reason for doing this
=0A=
>transition may be entirely policy oriented. Now I = would like to know which clients
=0A=
>that can actually verify my upgraded = responses.
=0A=
That is the concern that led to the proposal.
=0A=
 
=0A=
The assumption that the OCSP client supports the same set = of algorithms as the
=0A=
certificate relying application does not hold
=0A=
 
=0A=

>What can I do today:
>The server can draw a = number of conclusions today.

>1) Looking at the hashAlgorithm = of the CertID
>2) Looking at the signatureAlgorithm used by the = client to sign the response
>3) Looking at the certificate = actually being validated

>None of these are 100% bulletproof = to cover all corner cases. But are they
=0A=
>good enough and is the remaining gap big enough to = motivate a protocol update?
=0A=
 
=0A=
As a design principle I prefer a protocol where the = client can specify
=0A=
what it wants over one where the only option is for the = server to guess.
=0A=
 
=0A=
I find that approach is much more likely to lead to = reliable interoperation.
=0A=
 
=0A=
 
=0A=
The solution proposed is 100% backwards compatible, the = old approach being:
=0A=
1 Server guesses what algorithms the client supports
=0A=
 
=0A=
The new approach is:
=0A=
1 Server looks to see if the client specified what = algorithms are supported by the client
=0A=
2 If none specified server guesses what algorithms the = client supports as before
=0A=
If either the client or the server does not support the = proposed extension
=0A=
the other party simply downgrades to the status quo.
=0A=
 
=0A=
 
------_=_NextPart_001_01C80F4C.A6168FE2-- Received: from ap194.myclearwave.net (ap194.myclearwave.net [72.2.206.194] (may be forged)) by balder-227.proper.com (8.13.5/8.13.5) with SMTP id l9D17oXA098444; Fri, 12 Oct 2007 18:07:51 -0700 (MST) (envelope-from heighten@tele2.ch) Date: Fri, 12 Oct 2007 20:05:56 -0600 From: "Dionne Gustafson" Message-ID: <12670915.79365131@hieratic.com> To: press@imc.org Subject: Welcome to dream MIME-Version: 1.0 Content-Type: text/html; charset=iso-8859-1 Content-Transfer-Encoding: 7bit

WELCOME BONUS $ 2400
Relax and have fun with poker, blackjack, roulette,
progressive video slots at your own leisure from your couch
Our safe, secure games will get you smiling when you start seeing dollars pouring in.
We're serious about fun.
When YOU WIN, we win! http://richcasinogambling.net/gate/62/
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9CJF3xs077459 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 12 Oct 2007 12:15:03 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9CJF3FJ077458; Fri, 12 Oct 2007 12:15:03 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from ns1.neustar.com (ns1.neustar.com [156.154.16.138]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9CJF2US077451 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Fri, 12 Oct 2007 12:15:02 -0700 (MST) (envelope-from ietf@ietf.org) Received: from stiedprstage1.ietf.org (stiedprstage1.va.neustar.com [10.31.47.10]) by ns1.neustar.com (Postfix) with ESMTP id BCBDC26E78; Fri, 12 Oct 2007 19:15:01 +0000 (GMT) Received: from ietf by stiedprstage1.ietf.org with local (Exim 4.43) id 1IgPyP-00054Q-M3; Fri, 12 Oct 2007 15:15:01 -0400 Content-Type: Multipart/Mixed; Boundary="NextPart" Mime-Version: 1.0 To: i-d-announce@ietf.org Cc: ietf-pkix@imc.org From: Internet-Drafts@ietf.org Subject: I-D ACTION:draft-ietf-pkix-rfc3280bis-09.txt Message-Id: Date: Fri, 12 Oct 2007 15:15:01 -0400 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Public-Key Infrastructure (X.509) Working Group of the IETF. Title : Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile Author(s) : D. Cooper, et al. Filename : draft-ietf-pkix-rfc3280bis-09.txt Pages : 144 Date : 2007-10-12 This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model are provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-pkix-rfc3280bis-09.txt To remove yourself from the I-D Announcement list, send a message to i-d-announce-request@ietf.org with the word unsubscribe in the body of the message. You can also visit https://www1.ietf.org/mailman/listinfo/I-D-announce to change your subscription settings. Internet-Drafts are also available by anonymous FTP. Login with the username "anonymous" and a password of your e-mail address. After logging in, type "cd internet-drafts" and then "get draft-ietf-pkix-rfc3280bis-09.txt". A list of Internet-Drafts directories can be found in http://www.ietf.org/shadow.html or ftp://ftp.ietf.org/ietf/1shadow-sites.txt Internet-Drafts can also be obtained by e-mail. Send a message to: mailserv@ietf.org. In the body type: "FILE /internet-drafts/draft-ietf-pkix-rfc3280bis-09.txt". NOTE: The mail server at ietf.org can return the document in MIME-encoded form by using the "mpack" utility. To use this feature, insert the command "ENCODING mime" before the "FILE" command. To decode the response(s), you will need "munpack" or a MIME-compliant mail reader. Different MIME-compliant mail readers exhibit different behavior, especially when dealing with "multipart" MIME messages (i.e. documents which have been split up into multiple messages), so check your local documentation on how to manipulate these messages. Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Multipart/Alternative; Boundary="OtherAccess" --OtherAccess Content-Type: Message/External-body; access-type="mail-server"; server="mailserv@ietf.org" Content-Type: text/plain Content-ID: <2007-10-12144839.I-D@ietf.org> ENCODING mime FILE /internet-drafts/draft-ietf-pkix-rfc3280bis-09.txt --OtherAccess Content-Type: Message/External-body; name="draft-ietf-pkix-rfc3280bis-09.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <2007-10-12144839.I-D@ietf.org> --OtherAccess-- --NextPart-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9CIg0i3075114 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 12 Oct 2007 11:42:00 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9CIg0nf075113; Fri, 12 Oct 2007 11:42:00 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.nist.gov (rimp1.nist.gov [129.6.16.226]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9CIfudZ075103 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Fri, 12 Oct 2007 11:41:59 -0700 (MST) (envelope-from david.cooper@nist.gov) Received: from postmark.nist.gov (emailha1.nist.gov [129.6.16.196]) by smtp.nist.gov (8.13.1/8.13.1) with ESMTP id l9CIfp4i016608 for ; Fri, 12 Oct 2007 14:41:52 -0400 Received: from st26.ncsl.nist.gov (st26.ncsl.nist.gov [129.6.54.72]) by postmark.nist.gov (8.13.1/8.13.1) with ESMTP id l9CIfQOW003035 for ; Fri, 12 Oct 2007 14:41:28 -0400 Message-ID: <470FC011.8080705@nist.gov> Date: Fri, 12 Oct 2007 14:42:25 -0400 From: "David A. Cooper" User-Agent: Thunderbird 2.0.0.4 (X11/20070620) MIME-Version: 1.0 To: pkix Subject: draft-ietf-pkix-rfc3280bis-09.txt Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-NIST-MailScanner-Information: X-NIST-MailScanner: Found to be clean X-NIST-MailScanner-From: david.cooper@nist.gov Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: All, I just submitted draft -09 of 3280bis. A diff file highlighting the changes between drafts -08 and -09 is available at http://csrc.nist.gov/pki/documents/PKIX/draft3280bis-08todraft3280bis-09_diff.html. Here is a summary of the changes between drafts -08 and -09: 1) Replaced references to RFC 1738 with references to RFC 2616. 2) Replaced two instances of "NOT REQUIRED" (in all capital letters) with "not required" (in lower case), to address an issue raised by the idnits program. 3) In section 5.1.2.3, added the word "non-empty" to clarify that the issuer field in a CRL MUST contain a non-empty X.500 DN. This was a change that was agreed to on March 2 (see http://www.imc.org/ietf-pkix/mail-archive/msg04478.html). 4) Section 7.1 was modified to clarify that name comparison is always performed according to the matching rule specified for attribute. Dave Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9CIEgmV073579 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 12 Oct 2007 11:14:42 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9CIEgQk073578; Fri, 12 Oct 2007 11:14:42 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from stingray.missi.ncsc.mil (stingray.missi.ncsc.mil [144.51.50.20]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9CIEf6D073567 for ; Fri, 12 Oct 2007 11:14:42 -0700 (MST) (envelope-from DPKemp@missi.ncsc.mil) Received: from Cerberus.missi.ncsc.mil (cerberus.missi.ncsc.mil [144.51.51.8]) by stingray.missi.ncsc.mil with SMTP id l9CIEa7e011545; Fri, 12 Oct 2007 14:14:36 -0400 (EDT) Received: from 144.51.60.33 by Cerberus.missi.ncsc.mil (InterScan VirusWall 6); Fri, 12 Oct 2007 14:14:36 -0400 Received: from EXCH.missi.ncsc.mil ([144.51.60.19]) by antigone.missi.ncsc.mil with Microsoft SMTPSVC(6.0.3790.3959); Fri, 12 Oct 2007 14:14:35 -0400 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Date: Fri, 12 Oct 2007 14:14:35 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Thread-Index: AcgM6CMUv38Kwxe1S2msNxc8hziXeAAElABw References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> <470C1C32.70603@eb2bcom.com> <470C1FA3.40000@eb2bcom.com> <470EC778.500@eb2bcom.com> From: "Kemp, David P." To: "Paul Hoffman" Cc: X-OriginalArrivalTime: 12 Oct 2007 18:14:35.0950 (UTC) FILETIME=[BEEBACE0:01C80CFB] X-TM-AS-Product-Ver: : ISVW-6.0.0.1396-3.6.0.1039-15480000 X-TM-AS-Result: : Yes--15.228700-0-31-1 X-TM-AS-Category-Info: : 31:0.000000 X-TM-AS-MatchedID: : =?us-ascii?B?MTUwNTY3LTEzOTAxMC03MDI2?= =?us-ascii?B?NDUtNzAwMDc1LTcwMjcyNi03MDE2MTgtNzAyMzY3LTcwMjExMy03?= =?us-ascii?B?MDE0NTUtNzA0MDQ5LTcwMDQ3Ni03MDU5MDEtMTM5NzAzLTcwODE5?= =?us-ascii?B?Ni03MDAzNDItNzAxNjI2LTcwMDE0Mi03MDkzOTctNzA2NjM5LTcw?= =?us-ascii?B?NjU2MS03MDE1NzYtNzA0MzMyLTEzOTUwNC0xMjE2NDgtNzAwODQ2?= =?us-ascii?B?LTcwMDkxOC03MDAyNzItMTQ4MDM5LTE0ODA1MC0yMDAxNi0yMDA0?= =?us-ascii?B?MA==?= Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l9CIEg6D073572 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: >Paul Hoffman wrote: >It has been established on this list that the upper bounds in X.500 >have been non-normative since the second edition. You said that in an earlier message. Could you point us to a specific section of a specific version of X.500 where that is true? Most of us are not X.500 users. ---------- 1993 --------- http://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-X.520-199311-S!!P DF-E&type=items ISO/IEC 9594-6 : 1995 (E) 22 ITU-T Rec. X.520 (1993 E) Superseded by a more recent version Annex A Selected attribute types in ASN.1 (This annex forms an integral part of this Recommendation | International Standard) This annex includes all of the ASN.1 type and value definitions contained in this Directory Specification in the form of the ASN.1 module SelectedAttributeTypes. ---------- 1997 --------- http://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-X.520-199708-S!!P DF-E&type=items ISO/IEC 9594-6 : 1998 (E) ITU-T Rec. X.520 (1997 E) 41 Annex C Upper bounds (This annex does not form an integral part of this Recommendation | International Standard) This annex includes all of the suggested upper bound value constraints used in these Directory Specifications, in the form of the ASN.1 module UpperBounds. ---------- 2001 --------- http://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-X.520-200102-I!!P DF-E&type=items ISO/IEC 9594-6:2001 (E) ITU-T X.520 (02/2001 E) 61 Annex C Upper bounds (This annex does not form an integral part of this Recommendation | International Standard) This annex includes all of the suggested upper bound value constraints used in these Directory Specifications, in the form of the ASN.1 module UpperBounds. ---------- 2005 --------- http://www.itu.int/rec/T-REC-X.520-200508-I/dologin.asp?lang=e&id=T-REC- X.520-200508-I!!PDF-E&type=items ISO/IEC 9594-6:2005 (E) 60 ITU-T Rec. X.520 (08/2005) Annex C Upper bounds (This annex does not form an integral part of this Recommendation | International Standard) This annex includes all of the suggested upper bound value constraints used in these Directory Specifications, in the form of the ASN.1 module UpperBounds. Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9CEYaBO054666 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 12 Oct 2007 07:34:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9CEYaap054665; Fri, 12 Oct 2007 07:34:36 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from [192.168.1.3] (pool-72-76-39-171.nwrknj.fios.verizon.net [72.76.39.171]) (authenticated bits=0) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9CEYLe0054649 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 12 Oct 2007 07:34:23 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: <470EC778.500@eb2bcom.com> References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> <470C1C32.70603@eb2bcom.com> <470C1FA3.40000@eb2bcom.com> <470EC778.500@eb2bcom.com> Date: Fri, 12 Oct 2007 10:29:16 -0400 To: Steven Legg From: Paul Hoffman Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Cc: ietf-pkix@imc.org Content-Type: text/plain; charset="us-ascii" ; format="flowed" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: At 11:01 AM +1000 10/12/07, Steven Legg wrote: >Paul Hoffman wrote: >>Has the X.500 working group communicated that to the PKIX WG, or the IETF? > >Yes, in the liaison statement where it says "We plan to remove the >upper bounds specified in the standard". The example change to X.520 >suggests that "the standard" means more than just X.509. With all due respect, "suggests" is not enough here. Further, the sentence you quoute is the only one in the whole liaison statement that talks about more than just DirectoryString. Before the PKIX WG acts (such as changing RFC3280bis), we should get a clearer liaison statement, hopefully one that says "all upper bounds have been removed". >It has been established on this list that the upper bounds in X.500 >have been non-normative since the second edition. You said that in an earlier message. Could you point us to a specific section of a specific version of X.500 where that is true? Most of us are not X.500 users. >I had a closer look at RFC 3280. Some of the upper bounds originate >from X.500, but there is a bunch of upper bounds constraining >component parts of ORAddress that come from X.400, primarily the >upper bounds with names ending with "-length". The former are in >scope for the change contemplated by the X.500 working group, but >the latter are not. We can probably change things relating to X.400 without fear of real-world interop problems. --Paul Hoffman, Director --VPN Consortium Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9C11p0M087302 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 11 Oct 2007 18:01:51 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9C11pAw087301; Thu, 11 Oct 2007 18:01:51 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from host.eb2bcom.com (host.eb2bcom.com [72.232.34.10]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9C11mMB087287 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 11 Oct 2007 18:01:50 -0700 (MST) (envelope-from steven.legg@eb2bcom.com) Received: from [202.164.192.219] (helo=[192.168.99.100]) by host.eb2bcom.com with esmtpa (Exim 4.68) (envelope-from ) id 1Ig8uN-0003gB-V6; Fri, 12 Oct 2007 11:01:44 +1000 Message-ID: <470EC778.500@eb2bcom.com> Date: Fri, 12 Oct 2007 11:01:44 +1000 From: Steven Legg User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: Paul Hoffman CC: ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> <470C1C32.70603@eb2bcom.com> <470C1FA3.40000@eb2bcom.com> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - host.eb2bcom.com X-AntiAbuse: Original Domain - imc.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - eb2bcom.com X-Source: X-Source-Args: X-Source-Dir: Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Paul, Paul Hoffman wrote: > > At 10:26 AM +1000 10/10/07, Steven Legg wrote: >> The way out of this dilemma is for PKIX, LDAP and X.500 to agree >> on the upper bounds. The consensus in the X.500 working group is >> to completely remove the (non-normative) upper bounds, rather than >> rejigging them. > > Has the X.500 working group communicated that to the PKIX WG, or the IETF? Yes, in the liaison statement where it says "We plan to remove the upper bounds specified in the standard". The example change to X.520 suggests that "the standard" means more than just X.509. > > At 10:41 AM +1000 10/10/07, Steven Legg wrote: >>> - Do we object to the ITU making the upper bound on DirectoryString >>> optional >> >> They've been optional since the second edition of X.500. The defect >> resolution will make that clearer, as well as steering away from >> any specific suggestions for the upper bounds. > > We disagree that this DR "will make it clearer". What was sent to the > PKIX WG said: > > In relation to resolve a Defect Report, it appears to majority within > the X.500 community to remove hard-coded length restriction whenever a > DirectoryString is used. > . . . > We plan to remove the upper bounds specified in the standard. In > particular we intend to eliminate the Upper Bounds for DirectoryString. > > That does not sound anything like "They've been optional since the > second edition of X.500." It has been established on this list that the upper bounds in X.500 have been non-normative since the second edition. If they are non-normative, then an implementation can set the upper bounds to whatever it wants, including the largest number anyone has ever thought of, effectively making the upper bounds optional. > > Could you get the X.500 working group to make it clear if they are > considering, or have already, removed the upper bounds on all the > X.500-related strings that Russ listed? I had a closer look at RFC 3280. Some of the upper bounds originate from X.500, but there is a bunch of upper bounds constraining component parts of ORAddress that come from X.400, primarily the upper bounds with names ending with "-length". The former are in scope for the change contemplated by the X.500 working group, but the latter are not. I've prodded some ITU-T folks to publicly confirm the situation. > >>> - Should we do anything to draft-ietf-pkix-rfc3280bis to reflect that >>> >>> The answer to the first should be "no, we don't". Russ gave a list >>> that shows the the ITU has a *long* way to go before it gets rid of >>> the silly maximum lengths in X.509. >> >> The defect resolution will throw them all out at the same time. > > Where does it say that? The DR listed exactly one string type, > DirectoryString. Again, having this be clearer would help us out a lot. The liaison statement said "We plan to remove the upper bounds specified in the standard". The following sentence beginning "In particular" suggests to me that DirectoryString is a pertinent case, but by no means the only case. By the way, the liaison statement is not the defect resolution, and in any case I've been informed there has been a change in strategy. The upper bounds will be removed via an extension to X.500 rather than through a defect resolution. I will leave it to someone from the ITU-T to confirm. Regards, Steven > > > --Paul Hoffman, Director > --VPN Consortium > Received: from host216.201-252-55.telecom.net.ar (host71.201-252-5.telecom.net.ar [201.252.5.71]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9BKL7iL065749 for ; Thu, 11 Oct 2007 13:21:08 -0700 (MST) (envelope-from Kostetaubog@siralos.de) Received: by 10.11.55.100 with SMTP id tboCVakEvglAu; Thu, 11 Oct 2007 17:29:12 -0300 (GMT) Received: by 192.168.149.45 with SMTP id AAoBaLtSeyuete.3952040920972; Thu, 11 Oct 2007 17:29:10 -0300 (GMT) Message-ID: <000401c80c45$5f8c0df0$d837fcc9@server> From: "Abhimanyu Kostet" To: Subject: corum Date: Thu, 11 Oct 2007 17:29:07 -0300 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0004_01C80C2C.3A3ED5F0" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 ------=_NextPart_000_0004_01C80C2C.3A3ED5F0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable hello there ietf-pkix-archive once you get it theres no turning back Abhimanyu Kostet http://boltcar.com/ ------=_NextPart_000_0004_01C80C2C.3A3ED5F0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
hello there ietf-pkix-archive
once you get it theres no turning = back
Abhimanyu Kostet
http://boltcar.com/
------=_NextPart_000_0004_01C80C2C.3A3ED5F0-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9BBFJuv008186 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 11 Oct 2007 04:15:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9BBFJLr008185; Thu, 11 Oct 2007 04:15:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp-dub.microsoft.com (smtp-dub.microsoft.com [213.199.138.181]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9BBFFvp008176 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Thu, 11 Oct 2007 04:15:16 -0700 (MST) (envelope-from stefans@microsoft.com) Received: from DUB-EXHUB-C303.europe.corp.microsoft.com (65.53.213.93) by DUB-EXGWY-E802.partners.extranet.microsoft.com (10.251.129.2) with Microsoft SMTP Server (TLS) id 8.1.177.2; Thu, 11 Oct 2007 12:15:14 +0100 Received: from EA-EXMSG-C320.europe.corp.microsoft.com ([65.53.221.75]) by DUB-EXHUB-C303.europe.corp.microsoft.com ([65.53.213.93]) with mapi; Thu, 11 Oct 2007 12:15:14 +0100 From: Stefan Santesson To: Seth Hitchings , Santosh Chokhani , "Hallam-Baker, Phillip" , "ietf-pkix@imc.org" Date: Thu, 11 Oct 2007 12:14:55 +0100 Subject: RE: OCSP Algorithm Agility Thread-Topic: OCSP Algorithm Agility Thread-Index: Acf8l4NIxZexIh9rTveKgrEJmUDxVQAAJZEAAlba1eAAAH/7QAEC+OtgACFXyuAABd3wIAAA1HmAADQyQqAAIEoZEA== Message-ID: References: <82D5657AE1F54347A734BDD33637C879096C9ABE@EXVS01.ex.dslextreme.net> <2788466ED3E31C418E9ACC5C31661557053771@mou1wnexmb09.vcorp.ad.vrsn.com> <82D5657AE1F54347A734BDD33637C879096CA5E3@EXVS01.ex.dslextreme.net> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: acceptlanguage: en-US Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l9BBFHvo008177 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: I'm generally supportive of the following statement. > I'm generally in favor of simpler approaches, such as those suggested by > Santosh, as they favor interoperability. Updating deployed applications to > understand new elements of the protocol could take just as long to roll out > as the new algorithm support that's purportedly lacking. I've been trying to take a step back to think what I would need from a more practical viewpoint. Security: None of the presented threats is not a great concern for me. Downgrade attacks is only useful if we use algorithms that can be broken. I would expect an organization to only allow algorithms that provide adequate security. The stolen OCSP key is neither a problem for me from a protocol perspective. We have revocation. Practical matters: I can only find one practical matter that concerns me. I have an OCSP server and of some reason I want to gradually transition responses to be based on say ECC with SHA 256. Some clients can only verify RSA with SHA-1. The reason for doing this transition may be entirely policy oriented. Now I would like to know which clients that can actually verify my upgraded responses. I see some value in the client knowing which algorithms the server can support, but not greatly. The client can mostly learn the capability of a server by observing its responses. What can I do today: The server can draw a number of conclusions today. 1) Looking at the hashAlgorithm of the CertID 2) Looking at the signatureAlgorithm used by the client to sign the response 3) Looking at the certificate actually being validated None of these are 100% bulletproof to cover all corner cases. But are they good enough and is the remaining gap big enough to motivate a protocol update? Possible updates: To cover the corner cases I have seen the following options: Client declaration - through a singleRequestExtension Server declaration - through responseExtensions, or through an extension in the responder certificate. Conclusion: I'm not convinced I need any update of OCSP. If we do an update anyway, I'm more interested in the client declaration than the server declaration problem. Stefan Santesson Senior Program Manager Windows Security, Standards > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf- > pkix@mail.imc.org] On Behalf Of Seth Hitchings > Sent: den 10 oktober 2007 21:26 > To: Santosh Chokhani; Hallam-Baker, Phillip; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > I'm generally in favor of simpler approaches, such as those suggested > by > Santosh, as they favor interoperability. Updating deployed applications > to > understand new elements of the protocol could take just as long to roll > out > as the new algorithm support that's purportedly lacking. > > I can see a situation in which the CA cannot assume that the entire > user > population understands a new algorithm such as SHA-256, and thus has to > continue using SHA-1 with RSA when signing certificates. Individual > clients > that do understand SHA-256 may wish to receive OCSP responses signed > using > SHA-256 with RSA, and would need a way to signal their desires to the > OCSP > responder. > > The question is, then, is there any security benefit to having the > signature > algorithm on the OCSP response stronger than the signature algorithm on > the > certificate? If you can break the algorithm and cause me to accept a > contrived OCSP response, could you not do the same thing with a > certificate? > > Seth > > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf- > pkix@mail.imc.org] On > Behalf Of Santosh Chokhani > Sent: Wednesday, October 10, 2007 2:28 PM > To: Hallam-Baker, Phillip; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > See responses in-line below. > > -----Original Message----- > From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com] > Sent: Tuesday, October 09, 2007 2:07 PM > To: Santosh Chokhani; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > Not if they don't know that the client can understand them they can't. > [Santosh Chokhani] The Responder has two ways to know what the client > understands. From certID or from CA. If the client does not > understand > the algorithm used in certificate signing, revocation information is > useless. > > And the issue is not just hashing algorithms, it is signature > algorithms. > Like your previous posts you continue to assume that cipher strength is > a linear quantity with only one dimension and that any client which > supports strength 2X must automatically support strength X. > [Santosh Chokhani] I am making no such assumptions. I am saying that > if > an algorithm is good enough for a certificate, it is good enough for > revocation notification for that certificate. > > That is not the case if you consider the practicalities of deploying > ECC > in an RSA world. > > To give a practical example, VeriSign issues a cert for an ECC key > signed with an ECC key. The email program on Alice's machine in the DHS > supports ECC but not the DHS SCVP server or OCSP relay. > [Santosh Chokhani] And what is the problem with that? They have no > choice but to use RSA. > > In the real world the OCSP service does not have a necessary connection > to the CA. There are plenty of commercial OCSP offerings that report on > certificates issued by other CAs. > [Santosh Chokhani] And how does this relate to algorithm agility? If > the OCSP does not do ECDSA it won't. If OCSP supports both RSA and > ECDSA, it can take the cue from the CA CRL to determine what algorithm > to use for signing OCSP responses. If the OCSP does not consume CRL, > the mechanism that tells it revocation information can also tell it the > signature algorithm to use. > > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > > Sent: Tuesday, October 09, 2007 11:16 AM > > To: Hallam-Baker, Phillip; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > > > The OCSP and SCVP can transition to stronger algorithms any > > time they want. > > > > The OCSP can take their clue from the CA or the certID field > > to decide the hashing algorithm. When multiple certID is > > present, OCSP can take low water mark of these. > > > > SCVP is no different than a client in terms of validating a > > path. In terms of signing a response, it can take the low > > water mark of the hashing algorithms in the certificate chain. > > > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] > > On Behalf Of Hallam-Baker, Phillip > > Sent: Monday, October 08, 2007 7:27 PM > > To: Santosh Chokhani; Andrews, Rick; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > > > The objective here is to overcome a real deployment obstacle > > that creates a lockstep issue when use of stronger algorithms > > is attempted. > > > > The CA cannot issue a certificate that employs a new > > algorithm until it is known that all clients that might rely > > on the certificate are capable of processing the new > > certificate. Requiring lockstep updates to the OCSP and SCVP > > infrastructure to be made at the same time renders transition > > to stronger algorithms a much lengthier and much less > > practical proposition. > > > > > > > -----Original Message----- > > > From: owner-ietf-pkix@mail.imc.org > > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > > > Sent: Saturday, October 06, 2007 4:12 PM > > > To: Andrews, Rick; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > Rick, > > > > > > SCVP or other intermediaries are red herring. Whoever > > processes the > > > certificate processes the revocation information for that > > certificate. > > > It does not change the following: > > > > > > 1. There is no security benefit in using a stronger algorithm for > > > OCSP > > > response than for the certificate in question. Neither, > > there is any > > > benefit from interoperability viewpoint for these two to be > > different. > > > > > > 2. If the OCSP Responder does not get a CRL, it can use the same > > > mechanism to get the hashing algorithm used as it uses to get the > > > revocation information. > > > > > > -----Original Message----- > > > From: Andrews, Rick [mailto:RAndrews@verisign.com] > > > Sent: Wednesday, October 03, 2007 3:29 PM > > > To: Santosh Chokhani; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > Santosh, > > > > > > Sorry for the long delay in responding - travel and vacation. > > > > > > Not all OCSP responders work from CRLs, so they won't take > > their cue > > > from the CRL. Nor should they take their cue from the > > signature on the > > > cert in question, I believe. Let me try to restate my argument in a > > > different way. > > > > > > With SCVP delegated path validation, the client requesting a cert's > > > status from an OCSP responder will be different from the > > client at the > > > other end of the SSL connection. Those two clients may have very > > > different capabilities in terms of supported signature and hash > > > algorithms. It's not realistic to expect that all SSL clients, all > > > SCVP servers, and all CAs will be able to upgrade in > > lockstep to new > > > algorithms as they are developed. Allowing the OCSP client > > and server > > > to negotiate a mutually-acceptable set of algorithms is > > essential to > > > the deployment of newer, stronger algorithms. > > > > > > Likewise, companies that run large OCSP responders may wish to > > > gradually move to ECC-based signatures for all their OCSP > > responses, > > > even those for certs with RSA or DSA keys, because ECC > > signatures are > > > cheaper to produce. If algorithm agility is added to OCSP, those > > > companies can gradually achieve the move to ECC without > > disrupting the > > > installed base of OCSP clients that don't support ECC. > > > > > > -Rick Andrews > > > > > > > -----Original Message----- > > > > From: owner-ietf-pkix@mail.imc.org > > > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > > Santosh Chokhani > > > > Sent: Friday, September 21, 2007 2:45 PM > > > > To: Paul Hoffman; Stephen Kent; ietf-pkix@imc.org > > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > > > > Paul, > > > > > > > > Here are my views on this. > > > > > > > > The client should be first asking for the algorithm suite > > > that signed > > > > the certificate in question. There is no need for the > > > client to ask > > > > for anything stronger. The client can ask for stronger suites as > > > > secondary, if client has them. > > > > > > > > In the scenario you cite, the Responder certificate will > > > not include > > > > RSA with SHA 1 any longer. So, client will know that > > > Responder only > > > > supported his second choice and he should be ok with it. > > > > > > > > -----Original Message----- > > > > From: owner-ietf-pkix@mail.imc.org > > > > [mailto:owner-ietf-pkix@mail.imc.org] > > > > On Behalf Of Paul Hoffman > > > > Sent: Friday, September 21, 2007 4:39 PM > > > > To: Stephen Kent; ietf-pkix@imc.org > > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > > > > At 2:07 PM -0400 9/21/07, Stephen Kent wrote: > > > > >How about defining an extension to be included in the cert > > > > issued to an > > > > >OCSP responder by a CA. The extension would have an > > > ordered list of > > > > >algorithms (hash and signature if we want to address more > > > > than the hash > > > > >agility issue) accepted by the OCSP responder. An OCSP > > > > client can use > > > > >this info to determine what is the "best" algorithm (or alg > > > > pair) that > > > > >it and the responder share. The combination of this > > > extension and an > > > > >OCSP negotiation procedure will allow the client to detect MITM > > > > >downgrade attacks. In fact, if the client acquires the > > > > responder's cert > > > > >prior to making a request, there would not even be a > > need for real > > > > >negotiation, since the client would know what alg to > > request in a > > > > >response. > > > > > > > > Imagine the list of algorithms is RSA-with-SHA1 first and > > > > DSA-with-SHA1 second. How does your negotiation work? The > > > client asks > > > > for this message to be signed with RSA-with-SHA1. > > > > But the server knows that RSA-with-SHA1 has been > > > compromised since it > > > > got that certificate from the CA. What does the server say to the > > > > client to indicate that it only wants to sign with > > > DSA-with-SHA1? What > > > > prevents Mallory from saying the same thing to the client? > > > > > > > > --Paul Hoffman, Director > > > > --VPN Consortium > > > > > > > > > > > > > > > > > > > > > > > > Received: from h1756.serverkompetenz.net (h1756.serverkompetenz.net [81.169.154.149]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9AMIc1p048285; Wed, 10 Oct 2007 15:18:39 -0700 (MST) (envelope-from srv@ppl.com) Received: from User (unknown [85.186.196.125]) by h1756.serverkompetenz.net (Postfix) with ESMTP id B1640342B0E; Wed, 10 Oct 2007 23:35:15 +0200 (CEST) From: "PayPal" Subject: Your account will be limited ! Date: Thu, 11 Oct 2007 00:35:50 -0700 MIME-Version: 1.0 Content-Type: text/html; charset="Windows-1251" Content-Transfer-Encoding: 7bit X-Priority: 1 X-MSMail-Priority: High X-Mailer: Microsoft Outlook Express 6.00.2600.0000 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000 Message-Id: <20071010213515.B1640342B0E@h1756.serverkompetenz.net> To: undisclosed-recipients:;



Security Center


Military Grade Encryption is Only the Start

At PayPal, we want to increase your security and comfort level with every transaction. From our Buyer and Seller Protection Policies to our Verification and Reputation systems, we'll help to keep you safe.



PayPal is committed to maintaining a safe environment for its community of buyers and sellers. To protect the security of your account, PayPal employs
some of the most advanced security systems in the world and our anti-fraud teams regularly screen the PayPal system for unusual activity.

Recently, our Account Review Team identified some unusual activity in your account. In accordance with PayPal's User Agreement access to your account will be limited. This is a fraud prevention measure meant to ensure that your account is not compromised.

In order to secure your account we may require some specific information from you. We encourage you to log in by clicking on the link below and complete the requested form as soon as possible.


https://www.paypal.com/cgi-bin/webscr?cmd=_login-run


Ignoring our request, for an extended period of time, may result in account limitations or may result in eventual account closure.

Thank you for your prompt attention to this matter. Please understand that this is
a security measure meant to help protect you and your account.
We apologize for any inconvenience.


Sincerely,
PayPal Account Review Department


PayPal Email ID PP522

*Please do not respond to this e-mail as your reply will not be received.





Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9AJPoxs034450 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Oct 2007 12:25:50 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9AJPoCU034449; Wed, 10 Oct 2007 12:25:50 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from csexchange1.corestreet.com (host200.58.41.216.conversent.net [216.41.58.200]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9AJPmp4034442 for ; Wed, 10 Oct 2007 12:25:49 -0700 (MST) (envelope-from shitchings@corestreet.com) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Subject: RE: OCSP Algorithm Agility Date: Wed, 10 Oct 2007 15:25:47 -0400 Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_0239_01C80B51.D4DB2F90" Message-ID: X-MS-Has-Attach: yes X-MS-TNEF-Correlator: Thread-Topic: OCSP Algorithm Agility Thread-Index: Acf8l4NIxZexIh9rTveKgrEJmUDxVQAAJZEAAlba1eAAAH/7QAEC+OtgACFXyuAABd3wIAAA1HmAADQyQqA= References: <82D5657AE1F54347A734BDD33637C879096C9ABE@EXVS01.ex.dslextreme.net> <2788466ED3E31C418E9ACC5C31661557053771@mou1wnexmb09.vcorp.ad.vrsn.com> <82D5657AE1F54347A734BDD33637C879096CA5E3@EXVS01.ex.dslextreme.net> From: "Seth Hitchings" To: "Santosh Chokhani" , "Hallam-Baker, Phillip" , Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: This is a multi-part message in MIME format. ------=_NextPart_000_0239_01C80B51.D4DB2F90 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit I'm generally in favor of simpler approaches, such as those suggested by Santosh, as they favor interoperability. Updating deployed applications to understand new elements of the protocol could take just as long to roll out as the new algorithm support that's purportedly lacking. I can see a situation in which the CA cannot assume that the entire user population understands a new algorithm such as SHA-256, and thus has to continue using SHA-1 with RSA when signing certificates. Individual clients that do understand SHA-256 may wish to receive OCSP responses signed using SHA-256 with RSA, and would need a way to signal their desires to the OCSP responder. The question is, then, is there any security benefit to having the signature algorithm on the OCSP response stronger than the signature algorithm on the certificate? If you can break the algorithm and cause me to accept a contrived OCSP response, could you not do the same thing with a certificate? Seth -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani Sent: Wednesday, October 10, 2007 2:28 PM To: Hallam-Baker, Phillip; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility See responses in-line below. -----Original Message----- From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com] Sent: Tuesday, October 09, 2007 2:07 PM To: Santosh Chokhani; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility Not if they don't know that the client can understand them they can't. [Santosh Chokhani] The Responder has two ways to know what the client understands. From certID or from CA. If the client does not understand the algorithm used in certificate signing, revocation information is useless. And the issue is not just hashing algorithms, it is signature algorithms. Like your previous posts you continue to assume that cipher strength is a linear quantity with only one dimension and that any client which supports strength 2X must automatically support strength X. [Santosh Chokhani] I am making no such assumptions. I am saying that if an algorithm is good enough for a certificate, it is good enough for revocation notification for that certificate. That is not the case if you consider the practicalities of deploying ECC in an RSA world. To give a practical example, VeriSign issues a cert for an ECC key signed with an ECC key. The email program on Alice's machine in the DHS supports ECC but not the DHS SCVP server or OCSP relay. [Santosh Chokhani] And what is the problem with that? They have no choice but to use RSA. In the real world the OCSP service does not have a necessary connection to the CA. There are plenty of commercial OCSP offerings that report on certificates issued by other CAs. [Santosh Chokhani] And how does this relate to algorithm agility? If the OCSP does not do ECDSA it won't. If OCSP supports both RSA and ECDSA, it can take the cue from the CA CRL to determine what algorithm to use for signing OCSP responses. If the OCSP does not consume CRL, the mechanism that tells it revocation information can also tell it the signature algorithm to use. > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > Sent: Tuesday, October 09, 2007 11:16 AM > To: Hallam-Baker, Phillip; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > The OCSP and SCVP can transition to stronger algorithms any > time they want. > > The OCSP can take their clue from the CA or the certID field > to decide the hashing algorithm. When multiple certID is > present, OCSP can take low water mark of these. > > SCVP is no different than a client in terms of validating a > path. In terms of signing a response, it can take the low > water mark of the hashing algorithms in the certificate chain. > > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] > On Behalf Of Hallam-Baker, Phillip > Sent: Monday, October 08, 2007 7:27 PM > To: Santosh Chokhani; Andrews, Rick; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > The objective here is to overcome a real deployment obstacle > that creates a lockstep issue when use of stronger algorithms > is attempted. > > The CA cannot issue a certificate that employs a new > algorithm until it is known that all clients that might rely > on the certificate are capable of processing the new > certificate. Requiring lockstep updates to the OCSP and SCVP > infrastructure to be made at the same time renders transition > to stronger algorithms a much lengthier and much less > practical proposition. > > > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > > Sent: Saturday, October 06, 2007 4:12 PM > > To: Andrews, Rick; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > > > Rick, > > > > SCVP or other intermediaries are red herring. Whoever > processes the > > certificate processes the revocation information for that > certificate. > > It does not change the following: > > > > 1. There is no security benefit in using a stronger algorithm for > > OCSP > > response than for the certificate in question. Neither, > there is any > > benefit from interoperability viewpoint for these two to be > different. > > > > 2. If the OCSP Responder does not get a CRL, it can use the same > > mechanism to get the hashing algorithm used as it uses to get the > > revocation information. > > > > -----Original Message----- > > From: Andrews, Rick [mailto:RAndrews@verisign.com] > > Sent: Wednesday, October 03, 2007 3:29 PM > > To: Santosh Chokhani; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > Santosh, > > > > Sorry for the long delay in responding - travel and vacation. > > > > Not all OCSP responders work from CRLs, so they won't take > their cue > > from the CRL. Nor should they take their cue from the > signature on the > > cert in question, I believe. Let me try to restate my argument in a > > different way. > > > > With SCVP delegated path validation, the client requesting a cert's > > status from an OCSP responder will be different from the > client at the > > other end of the SSL connection. Those two clients may have very > > different capabilities in terms of supported signature and hash > > algorithms. It's not realistic to expect that all SSL clients, all > > SCVP servers, and all CAs will be able to upgrade in > lockstep to new > > algorithms as they are developed. Allowing the OCSP client > and server > > to negotiate a mutually-acceptable set of algorithms is > essential to > > the deployment of newer, stronger algorithms. > > > > Likewise, companies that run large OCSP responders may wish to > > gradually move to ECC-based signatures for all their OCSP > responses, > > even those for certs with RSA or DSA keys, because ECC > signatures are > > cheaper to produce. If algorithm agility is added to OCSP, those > > companies can gradually achieve the move to ECC without > disrupting the > > installed base of OCSP clients that don't support ECC. > > > > -Rick Andrews > > > > > -----Original Message----- > > > From: owner-ietf-pkix@mail.imc.org > > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > Santosh Chokhani > > > Sent: Friday, September 21, 2007 2:45 PM > > > To: Paul Hoffman; Stephen Kent; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > Paul, > > > > > > Here are my views on this. > > > > > > The client should be first asking for the algorithm suite > > that signed > > > the certificate in question. There is no need for the > > client to ask > > > for anything stronger. The client can ask for stronger suites as > > > secondary, if client has them. > > > > > > In the scenario you cite, the Responder certificate will > > not include > > > RSA with SHA 1 any longer. So, client will know that > > Responder only > > > supported his second choice and he should be ok with it. > > > > > > -----Original Message----- > > > From: owner-ietf-pkix@mail.imc.org > > > [mailto:owner-ietf-pkix@mail.imc.org] > > > On Behalf Of Paul Hoffman > > > Sent: Friday, September 21, 2007 4:39 PM > > > To: Stephen Kent; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > At 2:07 PM -0400 9/21/07, Stephen Kent wrote: > > > >How about defining an extension to be included in the cert > > > issued to an > > > >OCSP responder by a CA. The extension would have an > > ordered list of > > > >algorithms (hash and signature if we want to address more > > > than the hash > > > >agility issue) accepted by the OCSP responder. An OCSP > > > client can use > > > >this info to determine what is the "best" algorithm (or alg > > > pair) that > > > >it and the responder share. The combination of this > > extension and an > > > >OCSP negotiation procedure will allow the client to detect MITM > > > >downgrade attacks. In fact, if the client acquires the > > > responder's cert > > > >prior to making a request, there would not even be a > need for real > > > >negotiation, since the client would know what alg to > request in a > > > >response. > > > > > > Imagine the list of algorithms is RSA-with-SHA1 first and > > > DSA-with-SHA1 second. How does your negotiation work? The > > client asks > > > for this message to be signed with RSA-with-SHA1. > > > But the server knows that RSA-with-SHA1 has been > > compromised since it > > > got that certificate from the CA. What does the server say to the > > > client to indicate that it only wants to sign with > > DSA-with-SHA1? What > > > prevents Mallory from saying the same thing to the client? > > > > > > --Paul Hoffman, Director > > > --VPN Consortium > > > > > > > > > > > > > > > > ------=_NextPart_000_0239_01C80B51.D4DB2F90 Content-Type: application/x-pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIII3DCCAoIw ggHroAMCAQICAQQwDQYJKoZIhvcNAQEEBQAwUzELMAkGA1UEBhMCVVMxHDAaBgNVBAoTE0VxdWlm YXggU2VjdXJlIEluYy4xJjAkBgNVBAMTHUVxdWlmYXggU2VjdXJlIGVCdXNpbmVzcyBDQS0xMB4X DTk5MDYyMTA0MDAwMFoXDTIwMDYyMTA0MDAwMFowUzELMAkGA1UEBhMCVVMxHDAaBgNVBAoTE0Vx dWlmYXggU2VjdXJlIEluYy4xJjAkBgNVBAMTHUVxdWlmYXggU2VjdXJlIGVCdXNpbmVzcyBDQS0x MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDOLxm8F7d33pOpX1oNF080GgyY9CLZWdTEaEbw tDXFhQMgxq9FpSFRRUHrFlg2Mm/iUGJk+f1RnKok2fSdgyqHCiHTEjg0bI0Ablqg2ULuGiGV+VJM VVrFDzhPRvpt+C411h186+LwsHWAyKkTrL6I7zpuq18qOGICsBJ7/o+mAwIDAQABo2YwZDARBglg hkgBhvhCAQEEBAMCAAcwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRKeDJSEdtZFjZe38EU NkBqR3xMoTAdBgNVHQ4EFgQUSngyUhHbWRY2Xt/BFDZAakd8TKEwDQYJKoZIhvcNAQEEBQADgYEA dVuomwMR5ulWTM35qUzADZrzzGVp5iV2zFm31lTDHc2ZrBndtIXV4D38YiCnhEtYZfHi+ZUhP/XU flgeR4dUPlihtbX4Ku9x57zD9rFJRuLXoGvlVnqaJ5h8RmIU58n8bgMSeYA4HUiCjfwX/iqWK7Vi pqY9vX+SWc1aKoKyN3kwggK8MIICJaADAgECAgIA2DANBgkqhkiG9w0BAQUFADBTMQswCQYDVQQG EwJVUzEcMBoGA1UEChMTRXF1aWZheCBTZWN1cmUgSW5jLjEmMCQGA1UEAxMdRXF1aWZheCBTZWN1 cmUgZUJ1c2luZXNzIENBLTEwHhcNMDQwNjAyMTk1NzQyWhcNMjAwNjIxMDQwMDAwWjBSMQswCQYD VQQGEwJVUzEYMBYGA1UEChMPQ29yZVN0cmVldCBMdGQuMSkwJwYDVQQDEyBDb3JlU3RyZWV0IENl cnRpZmljYXRlIEF1dGhvcml0eTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAr0HhHsWZ2xkS 6BbojMXvdGPoRJLcAs2nUBSZ6XnJvnHxBwVvRUkqrCSBwKBurhjqGqe3oOxh6tC6wUuGhwLdhyWT BSYO469PJUx02lyiohqUZ8u0yshCL35/lA+MkZubcmFxHsLlTPCkS/+A7PZwzIjKrLAUT0VmwNTL TYEg1F8CAwEAAaOBnzCBnDAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0OBBYEFNjsf5MYxWYDwxBsPAT2 d4U+/wu2MB8GA1UdIwQYMBaAFEp4MlIR21kWNl7fwRQ2QGpHfEyhMA8GA1UdEwEB/wQFMAMBAf8w OQYDVR0fBDIwMDAuoCygKoYoaHR0cDovL2NybC5nZW90cnVzdC5jb20vY3Jscy9lYml6Y2ExLmNy bDANBgkqhkiG9w0BAQUFAAOBgQDCHD9PBDwPPDktSLC/jRpe9Crdpj8Cj7GB1od44j1D+5IJji+w rhuJ3tlR3p5MlzXGUEj8eFBtZymYBiWdLvIVqwMz2nYWBeFWXou6T+n4akcF708jM3MhFXP82ove f/xJzw9IzlVmI9DjDrkL2wXXw/IR5XTP2iQYPcbxento6zCCA5IwggL7oAMCAQICAgDrMA0GCSqG SIb3DQEBBQUAMFIxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9Db3JlU3RyZWV0IEx0ZC4xKTAnBgNV BAMTIENvcmVTdHJlZXQgQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTA3MDkxOTE2MDc0MFoXDTA4 MTAwOTE2MDc0MFowajELMAkGA1UEBhMCVVMxGDAWBgNVBAoTD0NvcmVTdHJlZXQgTHRkLjEXMBUG A1UEAxMOU2V0aCBIaXRjaGluZ3MxKDAmBgkqhkiG9w0BCQEWGXNoaXRjaGluZ3NAY29yZXN0cmVl dC5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDe2gk83DQJIyr9LtZtLofu/k5p twZAipP8XpPbAHIbb+ZXbW6fsvC9u97/MlD1wBldBwO6OnSlz9ah0jnp9sRGp5kMg2WTgjI3/NER sJ3A00t0+EM6L1kiuZbSfRQA7l5au0jTmOWnH5uV5KCJuuO7GjK0j/ORU7/SXsxTGnWddMcWJeFI dDzfVS0096IeKt12+67EMckhaALhe3t0j0He79TFiNZ/08BV8ibPKpTCp7TC+DE8f4EuaEnyfKaL TQECatxkbpwhtamdTMIMhvI+dyeiUDDUFc7USZNIF1bfgWfpsLfylQRnGOFJYtzG7O8ZHUFu2j5K /o00+k9+RLFXAgMBAAGjgdowgdcwDgYDVR0PAQH/BAQDAgXgMDwGA1UdHwQ1MDMwMaAvoC2GK2h0 dHA6Ly9jcmwuZ2VvdHJ1c3QuY29tL2NybHMvY29yZXN0cmVldC5jcmwwJAYDVR0RBB0wG4EZc2hp dGNoaW5nc0Bjb3Jlc3RyZWV0LmNvbTAfBgNVHSMEGDAWgBTY7H+TGMVmA8MQbDwE9neFPv8LtjBA BggrBgEFBQcBAQQ0MDIwMAYIKwYBBQUHMAGGJGh0dHA6Ly9nZW90cnVzdC1vY3NwLmNvcmVzdHJl ZXQuY29tLzANBgkqhkiG9w0BAQUFAAOBgQAZGVVLONrcmpP8IVM2KQyqzFQXHwhRueqlTYSNBqwp YAfAxKsf9a3xgSXGlhsm1sLp+n+2YKlhKC4BeWmQRwPgX7xiHrp5O1HcRnXkVlRAeeKwtUCr0Yjf uJAQkm4uwxj1UOCObbHC/ZNGejxaJucuT5Zx8uWQ04DPR1beSmvXKDGCAx0wggMZAgEBMFgwUjEL MAkGA1UEBhMCVVMxGDAWBgNVBAoTD0NvcmVTdHJlZXQgTHRkLjEpMCcGA1UEAxMgQ29yZVN0cmVl dCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkCAgDrMAkGBSsOAwIaBQCgggGaMBgGCSqGSIb3DQEJAzEL BgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTA3MTAxMDE5MjU0N1owIwYJKoZIhvcNAQkEMRYE FFjR2RM3C1G85eiiEW6V5FoKVOL4MGcGCSqGSIb3DQEJDzFaMFgwCgYIKoZIhvcNAwcwDgYIKoZI hvcNAwICAgCAMA0GCCqGSIb3DQMCAgFAMAcGBSsOAwIHMA0GCCqGSIb3DQMCAgEoMAcGBSsOAwIa MAoGCCqGSIb3DQIFMGcGCSsGAQQBgjcQBDFaMFgwUjELMAkGA1UEBhMCVVMxGDAWBgNVBAoTD0Nv cmVTdHJlZXQgTHRkLjEpMCcGA1UEAxMgQ29yZVN0cmVldCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkC AgDrMGkGCyqGSIb3DQEJEAILMVqgWDBSMQswCQYDVQQGEwJVUzEYMBYGA1UEChMPQ29yZVN0cmVl dCBMdGQuMSkwJwYDVQQDEyBDb3JlU3RyZWV0IENlcnRpZmljYXRlIEF1dGhvcml0eQICAOswDQYJ KoZIhvcNAQEBBQAEggEAeLehbxr9PcXiF417E5jVxe3PqMXmBbJ5f61LRcXplcOmorux/qKZDk0M 59fsmoj0pDyi37isJQYp6v0tgWZzcTjM+466p3KxrSvPchLA8TMcFN99/qbOrXnTD6dC5rq1aAWj tLRNjrhYDW+36vyfZksMCX4V/li68E17K3rObI4/Rb3jnKXNOIJZaeeg8Y6Vmf5tO736Oov4fVfK 7No+TGOLNcHAbd4IUx4v3zD5flxR9xarmyTRthE5W2Q5lLKau6JrnxUf0Rqf09jz4D/L6Lc2kIX8 /j+10NKQQG/Nl/5qQYRboCKx9tlEj/wzcIqiGiaVMDCKd018HxEhq9JlLAAAAAAAAA== ------=_NextPart_000_0239_01C80B51.D4DB2F90-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9AISSAK029594 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Oct 2007 11:28:28 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9AISScl029593; Wed, 10 Oct 2007 11:28:28 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from EXVS01.ex.dslextreme.net (exbe04.ex.dslextreme.net [66.51.199.86]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9AISRtG029587 for ; Wed, 10 Oct 2007 11:28:27 -0700 (MST) (envelope-from chokhani@orionsec.com) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Subject: RE: OCSP Algorithm Agility Date: Wed, 10 Oct 2007 11:28:06 -0700 Message-ID: <82D5657AE1F54347A734BDD33637C879096CA5E3@EXVS01.ex.dslextreme.net> In-Reply-To: <2788466ED3E31C418E9ACC5C31661557053771@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP Algorithm Agility thread-index: Acf8l4NIxZexIh9rTveKgrEJmUDxVQAAJZEAAlba1eAAAH/7QAEC+OtgACFXyuAABd3wIAAA1HmA References: <82D5657AE1F54347A734BDD33637C879096C9ABE@EXVS01.ex.dslextreme.net> <2788466ED3E31C418E9ACC5C31661557053771@mou1wnexmb09.vcorp.ad.vrsn.com> From: "Santosh Chokhani" To: "Hallam-Baker, Phillip" , Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l9AISRtG029588 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: See responses in-line below. -----Original Message----- From: Hallam-Baker, Phillip [mailto:pbaker@verisign.com] Sent: Tuesday, October 09, 2007 2:07 PM To: Santosh Chokhani; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility Not if they don't know that the client can understand them they can't. [Santosh Chokhani] The Responder has two ways to know what the client understands. From certID or from CA. If the client does not understand the algorithm used in certificate signing, revocation information is useless. And the issue is not just hashing algorithms, it is signature algorithms. Like your previous posts you continue to assume that cipher strength is a linear quantity with only one dimension and that any client which supports strength 2X must automatically support strength X. [Santosh Chokhani] I am making no such assumptions. I am saying that if an algorithm is good enough for a certificate, it is good enough for revocation notification for that certificate. That is not the case if you consider the practicalities of deploying ECC in an RSA world. To give a practical example, VeriSign issues a cert for an ECC key signed with an ECC key. The email program on Alice's machine in the DHS supports ECC but not the DHS SCVP server or OCSP relay. [Santosh Chokhani] And what is the problem with that? They have no choice but to use RSA. In the real world the OCSP service does not have a necessary connection to the CA. There are plenty of commercial OCSP offerings that report on certificates issued by other CAs. [Santosh Chokhani] And how does this relate to algorithm agility? If the OCSP does not do ECDSA it won't. If OCSP supports both RSA and ECDSA, it can take the cue from the CA CRL to determine what algorithm to use for signing OCSP responses. If the OCSP does not consume CRL, the mechanism that tells it revocation information can also tell it the signature algorithm to use. > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > Sent: Tuesday, October 09, 2007 11:16 AM > To: Hallam-Baker, Phillip; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > The OCSP and SCVP can transition to stronger algorithms any > time they want. > > The OCSP can take their clue from the CA or the certID field > to decide the hashing algorithm. When multiple certID is > present, OCSP can take low water mark of these. > > SCVP is no different than a client in terms of validating a > path. In terms of signing a response, it can take the low > water mark of the hashing algorithms in the certificate chain. > > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] > On Behalf Of Hallam-Baker, Phillip > Sent: Monday, October 08, 2007 7:27 PM > To: Santosh Chokhani; Andrews, Rick; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > The objective here is to overcome a real deployment obstacle > that creates a lockstep issue when use of stronger algorithms > is attempted. > > The CA cannot issue a certificate that employs a new > algorithm until it is known that all clients that might rely > on the certificate are capable of processing the new > certificate. Requiring lockstep updates to the OCSP and SCVP > infrastructure to be made at the same time renders transition > to stronger algorithms a much lengthier and much less > practical proposition. > > > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > > Sent: Saturday, October 06, 2007 4:12 PM > > To: Andrews, Rick; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > > > Rick, > > > > SCVP or other intermediaries are red herring. Whoever > processes the > > certificate processes the revocation information for that > certificate. > > It does not change the following: > > > > 1. There is no security benefit in using a stronger algorithm for > > OCSP > > response than for the certificate in question. Neither, > there is any > > benefit from interoperability viewpoint for these two to be > different. > > > > 2. If the OCSP Responder does not get a CRL, it can use the same > > mechanism to get the hashing algorithm used as it uses to get the > > revocation information. > > > > -----Original Message----- > > From: Andrews, Rick [mailto:RAndrews@verisign.com] > > Sent: Wednesday, October 03, 2007 3:29 PM > > To: Santosh Chokhani; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > Santosh, > > > > Sorry for the long delay in responding - travel and vacation. > > > > Not all OCSP responders work from CRLs, so they won't take > their cue > > from the CRL. Nor should they take their cue from the > signature on the > > cert in question, I believe. Let me try to restate my argument in a > > different way. > > > > With SCVP delegated path validation, the client requesting a cert's > > status from an OCSP responder will be different from the > client at the > > other end of the SSL connection. Those two clients may have very > > different capabilities in terms of supported signature and hash > > algorithms. It's not realistic to expect that all SSL clients, all > > SCVP servers, and all CAs will be able to upgrade in > lockstep to new > > algorithms as they are developed. Allowing the OCSP client > and server > > to negotiate a mutually-acceptable set of algorithms is > essential to > > the deployment of newer, stronger algorithms. > > > > Likewise, companies that run large OCSP responders may wish to > > gradually move to ECC-based signatures for all their OCSP > responses, > > even those for certs with RSA or DSA keys, because ECC > signatures are > > cheaper to produce. If algorithm agility is added to OCSP, those > > companies can gradually achieve the move to ECC without > disrupting the > > installed base of OCSP clients that don't support ECC. > > > > -Rick Andrews > > > > > -----Original Message----- > > > From: owner-ietf-pkix@mail.imc.org > > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > Santosh Chokhani > > > Sent: Friday, September 21, 2007 2:45 PM > > > To: Paul Hoffman; Stephen Kent; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > Paul, > > > > > > Here are my views on this. > > > > > > The client should be first asking for the algorithm suite > > that signed > > > the certificate in question. There is no need for the > > client to ask > > > for anything stronger. The client can ask for stronger suites as > > > secondary, if client has them. > > > > > > In the scenario you cite, the Responder certificate will > > not include > > > RSA with SHA 1 any longer. So, client will know that > > Responder only > > > supported his second choice and he should be ok with it. > > > > > > -----Original Message----- > > > From: owner-ietf-pkix@mail.imc.org > > > [mailto:owner-ietf-pkix@mail.imc.org] > > > On Behalf Of Paul Hoffman > > > Sent: Friday, September 21, 2007 4:39 PM > > > To: Stephen Kent; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > At 2:07 PM -0400 9/21/07, Stephen Kent wrote: > > > >How about defining an extension to be included in the cert > > > issued to an > > > >OCSP responder by a CA. The extension would have an > > ordered list of > > > >algorithms (hash and signature if we want to address more > > > than the hash > > > >agility issue) accepted by the OCSP responder. An OCSP > > > client can use > > > >this info to determine what is the "best" algorithm (or alg > > > pair) that > > > >it and the responder share. The combination of this > > extension and an > > > >OCSP negotiation procedure will allow the client to detect MITM > > > >downgrade attacks. In fact, if the client acquires the > > > responder's cert > > > >prior to making a request, there would not even be a > need for real > > > >negotiation, since the client would know what alg to > request in a > > > >response. > > > > > > Imagine the list of algorithms is RSA-with-SHA1 first and > > > DSA-with-SHA1 second. How does your negotiation work? The > > client asks > > > for this message to be signed with RSA-with-SHA1. > > > But the server knows that RSA-with-SHA1 has been > > compromised since it > > > got that certificate from the CA. What does the server say to the > > > client to indicate that it only wants to sign with > > DSA-with-SHA1? What > > > prevents Mallory from saying the same thing to the client? > > > > > > --Paul Hoffman, Director > > > --VPN Consortium > > > > > > > > > > > > > > > > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9AEa5Zs007155 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Oct 2007 07:36:05 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9AEa5jl007154; Wed, 10 Oct 2007 07:36:05 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from [192.168.1.3] (pool-72-76-39-171.nwrknj.fios.verizon.net [72.76.39.171]) (authenticated bits=0) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9AEZfHI007127 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Oct 2007 07:35:43 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: <470C1C32.70603@eb2bcom.com> <470C1FA3.40000@eb2bcom.com> References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> <470C1C32.70603@eb2bcom.com> <470C1FA3.40000@eb2bcom.com> Date: Wed, 10 Oct 2007 10:35:36 -0400 To: Steven Legg , "Kemp, David P." From: Paul Hoffman Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Cc: Stephen Farrell , ietf-pkix@imc.org, "ietf-pkix@vpnc.org" Content-Type: text/plain; charset="us-ascii" ; format="flowed" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: At 10:26 AM +1000 10/10/07, Steven Legg wrote: >The way out of this dilemma is for PKIX, LDAP and X.500 to agree >on the upper bounds. The consensus in the X.500 working group is >to completely remove the (non-normative) upper bounds, rather than >rejigging them. Has the X.500 working group communicated that to the PKIX WG, or the IETF? At 10:41 AM +1000 10/10/07, Steven Legg wrote: >>- Do we object to the ITU making the upper bound on DirectoryString optional > >They've been optional since the second edition of X.500. The defect >resolution will make that clearer, as well as steering away from >any specific suggestions for the upper bounds. We disagree that this DR "will make it clearer". What was sent to the PKIX WG said: In relation to resolve a Defect Report, it appears to majority within the X.500 community to remove hard-coded length restriction whenever a DirectoryString is used. . . . We plan to remove the upper bounds specified in the standard. In particular we intend to eliminate the Upper Bounds for DirectoryString. That does not sound anything like "They've been optional since the second edition of X.500." Could you get the X.500 working group to make it clear if they are considering, or have already, removed the upper bounds on all the X.500-related strings that Russ listed? >>- Should we do anything to draft-ietf-pkix-rfc3280bis to reflect that >> >>The answer to the first should be "no, we don't". Russ gave a list >>that shows the the ITU has a *long* way to go before it gets rid of >>the silly maximum lengths in X.509. > >The defect resolution will throw them all out at the same time. Where does it say that? The DR listed exactly one string type, DirectoryString. Again, having this be clearer would help us out a lot. --Paul Hoffman, Director --VPN Consortium Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9ADOJm3099897 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Oct 2007 06:24:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9ADOJiI099896; Wed, 10 Oct 2007 06:24:19 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from stingray.missi.ncsc.mil (stingray.missi.ncsc.mil [144.51.50.20]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9ADOIB2099890 for ; Wed, 10 Oct 2007 06:24:19 -0700 (MST) (envelope-from DPKemp@missi.ncsc.mil) Received: from Cerberus.missi.ncsc.mil (cerberus.missi.ncsc.mil [144.51.51.8]) by stingray.missi.ncsc.mil with SMTP id l9ADOI1K002624 for ; Wed, 10 Oct 2007 09:24:18 -0400 (EDT) Received: from 144.51.60.33 by Cerberus.missi.ncsc.mil (InterScan VirusWall 6); Wed, 10 Oct 2007 09:24:18 -0400 Received: from EXCH.missi.ncsc.mil ([144.51.60.19]) by antigone.missi.ncsc.mil with Microsoft SMTPSVC(6.0.3790.3959); Wed, 10 Oct 2007 09:24:18 -0400 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Date: Wed, 10 Oct 2007 09:24:17 -0400 Message-ID: In-Reply-To: <470C4E85.4010802@cs.tcd.ie> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Thread-Index: AcgK8jWFbJznGABKS8+PbtfKjjVqqgATS/6A References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> <470C1C32.70603@eb2bcom.com> <470C4E85.4010802@cs.tcd.ie> From: "Kemp, David P." To: X-OriginalArrivalTime: 10 Oct 2007 13:24:18.0026 (UTC) FILETIME=[DC33E4A0:01C80B40] X-TM-AS-Product-Ver: : ISVW-6.0.0.1396-3.6.0.1039-15474003 X-TM-AS-Result: : Yes--21.439400-0-31-1 X-TM-AS-Category-Info: : 31:0.000000 X-TM-AS-MatchedID: : =?us-ascii?B?MTUwNTY3LTcwMTIzNi03MDg2?= =?us-ascii?B?NTUtNzA0MzQyLTcwNjU2MS03MDY5ODQtNzAwNzI2LTcxMTYxMi03?= =?us-ascii?B?MDQzNTEtNzA1NjY5LTcwNDUwNi03MDAyNjQtNzAxNTc2LTcwMjkz?= =?us-ascii?B?MS0zMDAwMTUtMTM5MDA2LTcwMDQ3My03MDExNzUtNzA0NDI1LTcw?= =?us-ascii?B?MDYwNC03MDU4NjEtNzA2MzU0LTcwMzgzMS03MDQwNDktNzA2MDQx?= =?us-ascii?B?LTcwMTI5OC03MDkyOTEtNzAzNzQ3LTcwNDQzMC03MDM5NjUtMTA2?= =?us-ascii?B?NDIwLTcwMDE2My03MDIyMTYtNzA1NDUwLTcwMDEwNC03MDIxOTIt?= =?us-ascii?B?MTg4MDE5LTE0ODAzOS0xNDgwNTA=?= Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l9ADOJB2099891 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: I agree that we shouldn't change 3280bis, particularly since it is recycling as a Proposed Standard. The next I-D series leading to Draft Standard is plenty of time to make this change. At that time, I'd suggest retaining upper bounds as informational with accompanying text stating that consumers SHOULD accept data objects of unspecified size and that producers MAY conform to the informational upper bounds for legacy interoperability. Dave -----Original Message----- From: Stephen Farrell [mailto:stephen.farrell@cs.tcd.ie] Sent: Wednesday, October 10, 2007 12:01 AM To: Steven Legg Cc: Kemp, David P.; ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" I personally don't know that these upper bounds have become a real issue since WG last call on 3280bis. If they had, I'd expect a whole bunch of people to have said so. They didn't, or I missed it. So I think that we shouldn't change 3280bis, but would have no problem with someone writing up an I-D that was a delta on 3280bis that removed or reset those bounds. I reckon we'd get that done in less than a year...maybe. S. Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9A41HA0047579 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 21:01:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9A41HJB047578; Tue, 9 Oct 2007 21:01:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail.globalsuite.net (mail.globalsuite.net [69.46.103.200]) by balder-227.proper.com (8.13.5/8.13.5) with SMTP id l9A41GCm047569 for ; Tue, 9 Oct 2007 21:01:16 -0700 (MST) (envelope-from stephen.farrell@cs.tcd.ie) X-AuditID: c0a8013c-a911ebb000005df2-ec-470c4e8a45d4 Received: from [127.0.0.1] (unknown [66.173.75.2]) by mail.globalsuite.net (Symantec Mail Security) with ESMTP id CC9594DC032; Tue, 9 Oct 2007 22:01:13 -0600 (MDT) Message-ID: <470C4E85.4010802@cs.tcd.ie> Date: Wed, 10 Oct 2007 05:01:09 +0100 From: Stephen Farrell User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: Steven Legg CC: "Kemp, David P." , ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> <470C1C32.70603@eb2bcom.com> In-Reply-To: <470C1C32.70603@eb2bcom.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Brightmail-Tracker: AAAAAA== Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: I personally don't know that these upper bounds have become a real issue since WG last call on 3280bis. If they had, I'd expect a whole bunch of people to have said so. They didn't, or I missed it. So I think that we shouldn't change 3280bis, but would have no problem with someone writing up an I-D that was a delta on 3280bis that removed or reset those bounds. I reckon we'd get that done in less than a year...maybe. S. Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9A0m0Ed031696 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 17:48:00 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9A0m0G5031695; Tue, 9 Oct 2007 17:48:00 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.212]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9A0lxHr031681 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Tue, 9 Oct 2007 17:47:59 -0700 (MST) (envelope-from Ryan.Hurst@microsoft.com) Received: from tk1-exhub-c101.redmond.corp.microsoft.com (157.56.116.111) by TK5-EXGWY-E801.partners.extranet.microsoft.com (10.251.56.50) with Microsoft SMTP Server (TLS) id 8.1.177.2; Tue, 9 Oct 2007 17:47:58 -0700 Received: from tk5-exmlt-w602.wingroup.windeploy.ntdev.microsoft.com (157.54.70.14) by tk1-exhub-c101.redmond.corp.microsoft.com (157.56.116.111) with Microsoft SMTP Server id 8.1.177.1; Tue, 9 Oct 2007 17:47:58 -0700 Received: from tk5-exmlt-w600.wingroup.windeploy.ntdev.microsoft.com (157.54.70.135) by TK5-EXMLT-W602.wingroup.windeploy.ntdev.microsoft.com (157.54.70.14) with Microsoft SMTP Server (TLS) id 8.1.122.1; Tue, 9 Oct 2007 17:47:58 -0700 Received: from NA-EXMSG-W601.wingroup.windeploy.ntdev.microsoft.com ([fe80:0000:0000:0000:0000:5efe:10.255.255.1]) by tk5-exmlt-w600.wingroup.windeploy.ntdev.microsoft.com ([157.54.70.135]) with mapi; Tue, 9 Oct 2007 17:47:57 -0700 From: Ryan Hurst To: Paul Hoffman , Russ Housley , "ietf-pkix@imc.org" Date: Tue, 9 Oct 2007 17:47:04 -0700 Subject: RE: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Thread-Topic: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Thread-Index: AcgKzZxltkRrReFyRT64cVGN88qeOAACXdg5 Message-ID: References: <200710051410.l95EAhr5017333@balder-227.proper.com>, In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: acceptlanguage: en-US Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l9A0m0Hq031686 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: All of these statements are true. Words fail me is as fine a response to that as any... ________________________________________ From: owner-ietf-pkix@mail.imc.org [owner-ietf-pkix@mail.imc.org] On Behalf Of Paul Hoffman [paul.hoffman@vpnc.org] Sent: Tuesday, October 09, 2007 3:25 PM To: Russ Housley; ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" The ITU statement says the following: >>One of the participants in the directory meeting stated that >>Certification Authorities are being deployed with names not >>acquired from naming authorities but with names arbitrarily chosen >>assuming that no other CA is or will be operating under that name. That is, of course, true. There is no central repository for CA names because there is no central authority for CAs. >>That participant further stated that the IETF provides no >>guidelines on ensuring that the names of CAs are unambiguous. That is true. >>The directory group requests the IETF PKIX group to comment on this >>statement. Should we make a consensus call on "that is true"? >>If the statement is correct, we ask the IETF to consider putting a >>mechanism in place to prevent conflict, e.g. a list of existing CA >>names that deployers of new CAs could check for naming conflicts. Words fail me. --Paul Hoffman, Director --VPN Consortium Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9A0fDZ8031180 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 17:41:13 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9A0fDN6031179; Tue, 9 Oct 2007 17:41:13 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from host.eb2bcom.com (host.eb2bcom.com [72.232.34.10]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9A0fCTv031165 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 17:41:12 -0700 (MST) (envelope-from steven.legg@eb2bcom.com) Received: from [202.164.192.219] (helo=[192.168.99.100]) by host.eb2bcom.com with esmtpa (Exim 4.68) (envelope-from ) id 1IfPdP-0004Sa-29; Wed, 10 Oct 2007 10:41:11 +1000 Message-ID: <470C1FA3.40000@eb2bcom.com> Date: Wed, 10 Oct 2007 10:41:07 +1000 From: Steven Legg User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: Paul Hoffman CC: "ietf-pkix@vpnc.org" Subject: Re: FW: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" References: In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - host.eb2bcom.com X-AntiAbuse: Original Domain - vpnc.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - eb2bcom.com X-Source: X-Source-Args: X-Source-Dir: Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Paul, Paul Hoffman wrote: > > It seems like there are two questions here: > > - Do we object to the ITU making the upper bound on DirectoryString > optional They've been optional since the second edition of X.500. The defect resolution will make that clearer, as well as steering away from any specific suggestions for the upper bounds. > > - Should we do anything to draft-ietf-pkix-rfc3280bis to reflect that > > The answer to the first should be "no, we don't". Russ gave a list that > shows the the ITU has a *long* way to go before it gets rid of the silly > maximum lengths in X.509. The defect resolution will throw them all out at the same time. > > For me, the answer to the second question is "no" because of the large > number of other silly limitations, most notably CommonName being 64 > characters. Aren't these other silly limitations inherited from the upper bounds in X.500 ? Alignment with X.500 and LDAP would mean removing these limitations as well. Regards, Steven > > --Paul Hoffman, Director > --VPN Consortium > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9A0QZvT029019 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 17:26:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l9A0QZTr029018; Tue, 9 Oct 2007 17:26:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from host.eb2bcom.com (host.eb2bcom.com [72.232.34.10]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l9A0QXVn029007 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Tue, 9 Oct 2007 17:26:34 -0700 (MST) (envelope-from steven.legg@eb2bcom.com) Received: from [202.164.192.219] (helo=[192.168.99.100]) by host.eb2bcom.com with esmtpa (Exim 4.68) (envelope-from ) id 1IfPPC-0003sG-OW; Wed, 10 Oct 2007 10:26:32 +1000 Message-ID: <470C1C32.70603@eb2bcom.com> Date: Wed, 10 Oct 2007 10:26:26 +1000 From: Steven Legg User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: "Kemp, David P." CC: Stephen Farrell , ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - host.eb2bcom.com X-AntiAbuse: Original Domain - imc.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - eb2bcom.com X-Source: X-Source-Args: X-Source-Dir: Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Kemp, David P. wrote: > Then I suppose I misunderstand the meaning of compliance > with a normative value contained in an ASN.1 module. > > If PKIX specifies > ub-common-name INTEGER ::= 64 > > as normative, and profile X specifies > ub-common-name INTEGER ::= 65 > > as normative, is an application (e.g. a browser or a CA) > compiled to profile X compliant with PKIX or not? In the general case, an application could not be simultaneously compliant with both. The application cannot accept a common name with 65 characters from a profile X compliant application if there is any chance that it may have to send that common name to a PKIX-compliant application. This situation reflects a dilemma faced by directory vendors in this issue. We already have customers for which the current upper bounds are too low and have to be relaxed. LDAP does not impose upper bounds, so compliance with LDAP means ignoring the upper bounds. But if the directory is being used by a PKIX-compliant CA, then the upper bounds of RFC 3280 need to be enforced. These incompatible requirements mean that a directory server cannot simultaneously satisfy all PKIX, LDAP and X.500 compliant directory clients. The way out of this dilemma is for PKIX, LDAP and X.500 to agree on the upper bounds. The consensus in the X.500 working group is to completely remove the (non-normative) upper bounds, rather than rejigging them. Regards, Steven > > In particular, under what theory of compliance can a CA that > issues a 65 character common name be called non-PKIX-compliant > while a relying application that accepts a 65 character common > name be called PKIX-compliant while both are operating in > "profile X mode"? > > > > -----Original Message----- > From: Stephen Farrell [mailto:stephen.farrell@cs.tcd.ie] > Sent: Tuesday, October 09, 2007 12:55 PM > To: Kemp, David P. > Cc: Hallam-Baker, Phillip; Russ Housley; ietf-pkix@imc.org > Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of > upper bound in X.509" > > > Kemp, David P. wrote: >> A normative upper bound has the undesirable effect of requiring >> implementations to be less liberal in what they accept. > > No it doesn't. An application can, if it so chooses, support > a broader profile than PKIX. > > > An informative >> upper bound provides guidance to CAs on maximizing interoperability, > > An informative upper bound allows CAs to issue certs that won't be > accepted by implementations that enforce those upper bounds, which > hinders interop. > > I would think that if there is real demand for a profile with larger, > or no, uppper bounds, then that'd be a simple I-D to write. > > So, I still don't want to see 3280bis change in this respect at this > time. > > S. > > > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99MPHfk019721 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 15:25:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l99MPHJ7019720; Tue, 9 Oct 2007 15:25:17 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from [192.168.1.100] (pool-72-76-39-171.nwrknj.fios.verizon.net [72.76.39.171]) (authenticated bits=0) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99MP55X019696 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 15:25:12 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: <200710051410.l95EAhr5017333@balder-227.proper.com> References: <200710051410.l95EAhr5017333@balder-227.proper.com> Date: Tue, 9 Oct 2007 18:25:02 -0400 To: Russ Housley , ietf-pkix@imc.org From: Paul Hoffman Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" Content-Type: text/plain; charset="us-ascii" ; format="flowed" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: The ITU statement says the following: >>One of the participants in the directory meeting stated that >>Certification Authorities are being deployed with names not >>acquired from naming authorities but with names arbitrarily chosen >>assuming that no other CA is or will be operating under that name. That is, of course, true. There is no central repository for CA names because there is no central authority for CAs. >>That participant further stated that the IETF provides no >>guidelines on ensuring that the names of CAs are unambiguous. That is true. >>The directory group requests the IETF PKIX group to comment on this >>statement. Should we make a consensus call on "that is true"? >>If the statement is correct, we ask the IETF to consider putting a >>mechanism in place to prevent conflict, e.g. a list of existing CA >>names that deployers of new CAs could check for naming conflicts. Words fail me. --Paul Hoffman, Director --VPN Consortium Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99MPDb8019709 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 15:25:13 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l99MPDEC019708; Tue, 9 Oct 2007 15:25:13 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from [192.168.1.100] (pool-72-76-39-171.nwrknj.fios.verizon.net [72.76.39.171]) (authenticated bits=0) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99MP55V019696 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 15:25:08 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) Mime-Version: 1.0 Message-Id: In-Reply-To: References: Date: Tue, 9 Oct 2007 18:16:39 -0400 To: Stefan Santesson , "ietf-pkix@vpnc.org" From: Paul Hoffman Subject: Re: FW: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Content-Type: text/plain; charset="us-ascii" ; format="flowed" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: It seems like there are two questions here: - Do we object to the ITU making the upper bound on DirectoryString optional - Should we do anything to draft-ietf-pkix-rfc3280bis to reflect that The answer to the first should be "no, we don't". Russ gave a list that shows the the ITU has a *long* way to go before it gets rid of the silly maximum lengths in X.509. For me, the answer to the second question is "no" because of the large number of other silly limitations, most notably CommonName being 64 characters. --Paul Hoffman, Director --VPN Consortium Received: from h58177.serverkompetenz.net (h58177.serverkompetenz.net [81.169.154.31]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99M77an017706; Tue, 9 Oct 2007 15:07:07 -0700 (MST) (envelope-from srv@eby.com) Received: from User (unknown [85.186.196.125]) by h58177.serverkompetenz.net (Postfix) with ESMTP id AB04730235; Tue, 9 Oct 2007 21:51:05 +0200 (CEST) From: "eBay" Subject: Unpaid Item Dispute #260120571043 Date: Wed, 10 Oct 2007 01:05:13 -0700 MIME-Version: 1.0 Content-Type: text/html; charset="Windows-1251" Content-Transfer-Encoding: 7bit X-Priority: 1 X-MSMail-Priority: High X-Mailer: Microsoft Outlook Express 6.00.2600.0000 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000 Message-Id: <20071009195105.AB04730235@h58177.serverkompetenz.net> To: undisclosed-recipients:;

eBay Unpaid Item Dispute #260120571043 - response required


Dear member,

eBay member uofarkscott44 (569Feedback score is 25,000 to 49,999) Member is a PowerSellerGo to member's eBay Store has that they already paid for item #260120571043


Regards,
eBay International AG

Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99IA72q094780 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 11:10:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l99IA7Uo094779; Tue, 9 Oct 2007 11:10:07 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from robin.verisign.com (robin.verisign.com [65.205.251.75]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99IA6Dq094773 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Tue, 9 Oct 2007 11:10:07 -0700 (MST) (envelope-from pbaker@verisign.com) Received: from MOU1WNEXCN03.vcorp.ad.vrsn.com (mailer6.verisign.com [65.205.251.33]) by robin.verisign.com (8.12.11/8.13.4) with ESMTP id l99I7NJu027774; Tue, 9 Oct 2007 11:07:23 -0700 Received: from MOU1WNEXMB09.vcorp.ad.vrsn.com ([10.25.15.197]) by MOU1WNEXCN03.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.1830); Tue, 9 Oct 2007 19:10:05 +0100 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP Algorithm Agility Date: Tue, 9 Oct 2007 11:06:36 -0700 Message-ID: <2788466ED3E31C418E9ACC5C31661557053771@mou1wnexmb09.vcorp.ad.vrsn.com> In-Reply-To: <82D5657AE1F54347A734BDD33637C879096C9ABE@EXVS01.ex.dslextreme.net> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP Algorithm Agility Thread-Index: Acf8l4NIxZexIh9rTveKgrEJmUDxVQAAJZEAAlba1eAAAH/7QAEC+OtgACFXyuAABd3wIA== From: "Hallam-Baker, Phillip" To: "Santosh Chokhani" , X-OriginalArrivalTime: 09 Oct 2007 18:10:05.0715 (UTC) FILETIME=[9E9BD630:01C80A9F] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l99IA7Dp094774 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Not if they don't know that the client can understand them they can't. And the issue is not just hashing algorithms, it is signature algorithms. Like your previous posts you continue to assume that cipher strength is a linear quantity with only one dimension and that any client which supports strength 2X must automatically support strength X. That is not the case if you consider the practicalities of deploying ECC in an RSA world. To give a practical example, VeriSign issues a cert for an ECC key signed with an ECC key. The email program on Alice's machine in the DHS supports ECC but not the DHS SCVP server or OCSP relay. In the real world the OCSP service does not have a necessary connection to the CA. There are plenty of commercial OCSP offerings that report on certificates issued by other CAs. > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > Sent: Tuesday, October 09, 2007 11:16 AM > To: Hallam-Baker, Phillip; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > The OCSP and SCVP can transition to stronger algorithms any > time they want. > > The OCSP can take their clue from the CA or the certID field > to decide the hashing algorithm. When multiple certID is > present, OCSP can take low water mark of these. > > SCVP is no different than a client in terms of validating a > path. In terms of signing a response, it can take the low > water mark of the hashing algorithms in the certificate chain. > > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] > On Behalf Of Hallam-Baker, Phillip > Sent: Monday, October 08, 2007 7:27 PM > To: Santosh Chokhani; Andrews, Rick; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > The objective here is to overcome a real deployment obstacle > that creates a lockstep issue when use of stronger algorithms > is attempted. > > The CA cannot issue a certificate that employs a new > algorithm until it is known that all clients that might rely > on the certificate are capable of processing the new > certificate. Requiring lockstep updates to the OCSP and SCVP > infrastructure to be made at the same time renders transition > to stronger algorithms a much lengthier and much less > practical proposition. > > > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > > Sent: Saturday, October 06, 2007 4:12 PM > > To: Andrews, Rick; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > > > Rick, > > > > SCVP or other intermediaries are red herring. Whoever > processes the > > certificate processes the revocation information for that > certificate. > > It does not change the following: > > > > 1. There is no security benefit in using a stronger algorithm for > > OCSP > > response than for the certificate in question. Neither, > there is any > > benefit from interoperability viewpoint for these two to be > different. > > > > 2. If the OCSP Responder does not get a CRL, it can use the same > > mechanism to get the hashing algorithm used as it uses to get the > > revocation information. > > > > -----Original Message----- > > From: Andrews, Rick [mailto:RAndrews@verisign.com] > > Sent: Wednesday, October 03, 2007 3:29 PM > > To: Santosh Chokhani; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > Santosh, > > > > Sorry for the long delay in responding - travel and vacation. > > > > Not all OCSP responders work from CRLs, so they won't take > their cue > > from the CRL. Nor should they take their cue from the > signature on the > > cert in question, I believe. Let me try to restate my argument in a > > different way. > > > > With SCVP delegated path validation, the client requesting a cert's > > status from an OCSP responder will be different from the > client at the > > other end of the SSL connection. Those two clients may have very > > different capabilities in terms of supported signature and hash > > algorithms. It's not realistic to expect that all SSL clients, all > > SCVP servers, and all CAs will be able to upgrade in > lockstep to new > > algorithms as they are developed. Allowing the OCSP client > and server > > to negotiate a mutually-acceptable set of algorithms is > essential to > > the deployment of newer, stronger algorithms. > > > > Likewise, companies that run large OCSP responders may wish to > > gradually move to ECC-based signatures for all their OCSP > responses, > > even those for certs with RSA or DSA keys, because ECC > signatures are > > cheaper to produce. If algorithm agility is added to OCSP, those > > companies can gradually achieve the move to ECC without > disrupting the > > installed base of OCSP clients that don't support ECC. > > > > -Rick Andrews > > > > > -----Original Message----- > > > From: owner-ietf-pkix@mail.imc.org > > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of > Santosh Chokhani > > > Sent: Friday, September 21, 2007 2:45 PM > > > To: Paul Hoffman; Stephen Kent; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > Paul, > > > > > > Here are my views on this. > > > > > > The client should be first asking for the algorithm suite > > that signed > > > the certificate in question. There is no need for the > > client to ask > > > for anything stronger. The client can ask for stronger suites as > > > secondary, if client has them. > > > > > > In the scenario you cite, the Responder certificate will > > not include > > > RSA with SHA 1 any longer. So, client will know that > > Responder only > > > supported his second choice and he should be ok with it. > > > > > > -----Original Message----- > > > From: owner-ietf-pkix@mail.imc.org > > > [mailto:owner-ietf-pkix@mail.imc.org] > > > On Behalf Of Paul Hoffman > > > Sent: Friday, September 21, 2007 4:39 PM > > > To: Stephen Kent; ietf-pkix@imc.org > > > Subject: RE: OCSP Algorithm Agility > > > > > > > > > At 2:07 PM -0400 9/21/07, Stephen Kent wrote: > > > >How about defining an extension to be included in the cert > > > issued to an > > > >OCSP responder by a CA. The extension would have an > > ordered list of > > > >algorithms (hash and signature if we want to address more > > > than the hash > > > >agility issue) accepted by the OCSP responder. An OCSP > > > client can use > > > >this info to determine what is the "best" algorithm (or alg > > > pair) that > > > >it and the responder share. The combination of this > > extension and an > > > >OCSP negotiation procedure will allow the client to detect MITM > > > >downgrade attacks. In fact, if the client acquires the > > > responder's cert > > > >prior to making a request, there would not even be a > need for real > > > >negotiation, since the client would know what alg to > request in a > > > >response. > > > > > > Imagine the list of algorithms is RSA-with-SHA1 first and > > > DSA-with-SHA1 second. How does your negotiation work? The > > client asks > > > for this message to be signed with RSA-with-SHA1. > > > But the server knows that RSA-with-SHA1 has been > > compromised since it > > > got that certificate from the CA. What does the server say to the > > > client to indicate that it only wants to sign with > > DSA-with-SHA1? What > > > prevents Mallory from saying the same thing to the client? > > > > > > --Paul Hoffman, Director > > > --VPN Consortium > > > > > > > > > > > > > > > > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99H9tIm088804 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 10:09:55 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l99H9tqd088803; Tue, 9 Oct 2007 10:09:55 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from stingray.missi.ncsc.mil (stingray.missi.ncsc.mil [144.51.50.20]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99H9smU088796 for ; Tue, 9 Oct 2007 10:09:54 -0700 (MST) (envelope-from DPKemp@missi.ncsc.mil) Received: from Cerberus.missi.ncsc.mil (cerberus.missi.ncsc.mil [144.51.51.8]) by stingray.missi.ncsc.mil with SMTP id l99H9rkt001773; Tue, 9 Oct 2007 13:09:53 -0400 (EDT) Received: from 144.51.60.33 by Cerberus.missi.ncsc.mil (InterScan VirusWall 6); Tue, 09 Oct 2007 13:09:52 -0400 Received: from EXCH.missi.ncsc.mil ([144.51.60.19]) by antigone.missi.ncsc.mil with Microsoft SMTPSVC(6.0.3790.3959); Tue, 9 Oct 2007 13:09:52 -0400 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Date: Tue, 9 Oct 2007 13:09:52 -0400 Message-ID: In-Reply-To: <470BB253.3030703@cs.tcd.ie> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Thread-Index: AcgKlSVBt3S9FikzTIOZTsOC3fA3EAAAEW+g References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> <470BB253.3030703@cs.tcd.ie> From: "Kemp, David P." To: "Stephen Farrell" Cc: "Hallam-Baker, Phillip" , "Russ Housley" , X-OriginalArrivalTime: 09 Oct 2007 17:09:52.0778 (UTC) FILETIME=[352166A0:01C80A97] X-TM-AS-Product-Ver: : ISVW-6.0.0.1396-3.6.0.1039-15474000 X-TM-AS-Result: : Yes--7.131000-0-31-1 X-TM-AS-Category-Info: : 31:0.000000 X-TM-AS-MatchedID: : =?us-ascii?B?MTUwNTY3LTcwODkxNS03MDQz?= =?us-ascii?B?MzItNzAwOTE4LTcwMTU3Ni03MDI0ODUtNzAwMjg3LTcwMzQwNS03?= =?us-ascii?B?MDIxMTMtNzAzNTI5LTEzOTAwNi03MDA0NzMtNzAxMTc1LTcwNDQy?= =?us-ascii?B?NS03MDA2MDQtNzAwMDc1LTEzOTAxMC03MDI3MjYtNzAwMTA0LTcw?= =?us-ascii?B?ODE1OS03MDE0NjEtNzAwNjU0LTcwNDk5NC03MDU4NjEtMzkwMDc4?= =?us-ascii?B?LTcwOTU4NC03MDU4ODItNzAwMzk4LTcwMjA0NC03MDEyMzYtMTQ4?= =?us-ascii?B?MDM5LTE0ODA1MC0yMDA0MA==?= Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l99H9tmU088797 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Then I suppose I misunderstand the meaning of compliance with a normative value contained in an ASN.1 module. If PKIX specifies ub-common-name INTEGER ::= 64 as normative, and profile X specifies ub-common-name INTEGER ::= 65 as normative, is an application (e.g. a browser or a CA) compiled to profile X compliant with PKIX or not? In particular, under what theory of compliance can a CA that issues a 65 character common name be called non-PKIX-compliant while a relying application that accepts a 65 character common name be called PKIX-compliant while both are operating in "profile X mode"? -----Original Message----- From: Stephen Farrell [mailto:stephen.farrell@cs.tcd.ie] Sent: Tuesday, October 09, 2007 12:55 PM To: Kemp, David P. Cc: Hallam-Baker, Phillip; Russ Housley; ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Kemp, David P. wrote: > A normative upper bound has the undesirable effect of requiring > implementations to be less liberal in what they accept. No it doesn't. An application can, if it so chooses, support a broader profile than PKIX. > An informative > upper bound provides guidance to CAs on maximizing interoperability, An informative upper bound allows CAs to issue certs that won't be accepted by implementations that enforce those upper bounds, which hinders interop. I would think that if there is real demand for a profile with larger, or no, uppper bounds, then that'd be a simple I-D to write. So, I still don't want to see 3280bis change in this respect at this time. S. Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99Gt6rh087443 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 09:55:06 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l99Gt6O3087442; Tue, 9 Oct 2007 09:55:06 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from mail.globalsuite.net (mail.globalsuite.net [69.46.103.200]) by balder-227.proper.com (8.13.5/8.13.5) with SMTP id l99Gt5dK087433 for ; Tue, 9 Oct 2007 09:55:05 -0700 (MST) (envelope-from stephen.farrell@cs.tcd.ie) X-AuditID: c0a8013c-a58ebbb000005df2-b1-470bb2600c23 Received: from [127.0.0.1] (unknown [66.173.75.2]) by mail.globalsuite.net (Symantec Mail Security) with ESMTP id 1679F4DC020; Tue, 9 Oct 2007 10:54:52 -0600 (MDT) Message-ID: <470BB253.3030703@cs.tcd.ie> Date: Tue, 09 Oct 2007 17:54:43 +0100 From: Stephen Farrell User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: "Kemp, David P." CC: "Hallam-Baker, Phillip" , Russ Housley , ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Brightmail-Tracker: AAAAAA== Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Kemp, David P. wrote: > A normative upper bound has the undesirable effect of requiring > implementations to be less liberal in what they accept. No it doesn't. An application can, if it so chooses, support a broader profile than PKIX. > An informative > upper bound provides guidance to CAs on maximizing interoperability, An informative upper bound allows CAs to issue certs that won't be accepted by implementations that enforce those upper bounds, which hinders interop. I would think that if there is real demand for a profile with larger, or no, uppper bounds, then that'd be a simple I-D to write. So, I still don't want to see 3280bis change in this respect at this time. S. Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99GOhAl084703 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 09:24:43 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l99GOhYQ084702; Tue, 9 Oct 2007 09:24:43 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from stingray.missi.ncsc.mil (stingray.missi.ncsc.mil [144.51.50.20]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99GOgUS084696 for ; Tue, 9 Oct 2007 09:24:42 -0700 (MST) (envelope-from DPKemp@missi.ncsc.mil) Received: from Cerberus.missi.ncsc.mil (cerberus.missi.ncsc.mil [144.51.51.8]) by stingray.missi.ncsc.mil with SMTP id l99GOa9h027801; Tue, 9 Oct 2007 12:24:36 -0400 (EDT) Received: from 144.51.60.33 by Cerberus.missi.ncsc.mil (InterScan VirusWall 6); Tue, 09 Oct 2007 12:24:35 -0400 Received: from EXCH.missi.ncsc.mil ([144.51.60.19]) by antigone.missi.ncsc.mil with Microsoft SMTPSVC(6.0.3790.3959); Tue, 9 Oct 2007 12:24:35 -0400 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Date: Tue, 9 Oct 2007 12:24:35 -0400 Message-ID: In-Reply-To: <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Thread-Index: AcgIXLLxS0ujp4qjR/qIFNlFODJAOwBpALCwACLZgbA= References: <4707E6DA.1070703@cs.tcd.ie> <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> From: "Kemp, David P." To: "Hallam-Baker, Phillip" , "Stephen Farrell" , "Russ Housley" Cc: X-OriginalArrivalTime: 09 Oct 2007 16:24:35.0704 (UTC) FILETIME=[E1A0CF80:01C80A90] X-TM-AS-Product-Ver: : ISVW-6.0.0.1396-3.6.0.1039-15474000 X-TM-AS-Result: : Yes--10.067900-0-31-1 X-TM-AS-Category-Info: : 31:0.000000 X-TM-AS-MatchedID: : =?us-ascii?B?MTUwNTY3LTcwMjcyNi03MDAx?= =?us-ascii?B?MDQtNzA4MTU5LTcwMDY1NC03MDQ5OTQtNzAxNTc2LTcwNTg4Mi03?= =?us-ascii?B?MDM1MTctNzAyNDg1LTE4NjAzNS0xODgxOTgtNzA1ODYxLTM5MDA3?= =?us-ascii?B?OC0xODgxMjEtNzAwMDA2LTEzOTAwNi03MDQyODctNzAzODI5LTcw?= =?us-ascii?B?MDQ3My03MDQ0MjUtNzAwNjA0LTcwODE3OS0xMzkwMTAtNzAwMDc1?= =?us-ascii?B?LTExMDQ2Mi03MDkyOTEtNzAxMjM2LTcxMDIwNy03MDU0NTAtMTEz?= =?us-ascii?B?OTIyLTE0ODAzOS0xNDgwNTAtMjAwNDI=?= Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l99GOhUS084697 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: A normative upper bound has the undesirable effect of requiring implementations to be less liberal in what they accept. An informative upper bound provides guidance to CAs on maximizing interoperability, and does not penalize relying applications that can accept much larger structures. If five years from now 99% of relying applications can accept large fields (e.g. up to available memory) and the other 1% never move beyond hard-coded limits, then a CA can *never* exceed the old bounds without risking unexpected incompatibility. Nonetheless, it is desirable to permit a CA to issue oversized certs that are accepted by 99% of relying products rather than requiring all relying products to reject such certs as a condition of PKIX (but not X.509) compliance. -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Hallam-Baker, Phillip Sent: Monday, October 08, 2007 7:32 PM To: Stephen Farrell; Russ Housley Cc: ietf-pkix@imc.org Subject: RE: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" How long will it be before I can issue a certificate that does not comply with the old bounds without this resulting in unexpected incompatibilities? > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stephen Farrell > Sent: Saturday, October 06, 2007 3:50 PM > To: Russ Housley > Cc: ietf-pkix@imc.org > Subject: Re: New Liaison Statement, "Liaison to IETF on the > removal of upper bound in X.509" > > > > > Russ Housley wrote: > > Personally, I missed the subtle change from normative to > informative. > > I suspect many others did too. If the PKIX WG to make them > > informative too, then it will have to be done *right now*. > > I see no reason to make such a change at this stage. > > S. > > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99FG4bh079222 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 9 Oct 2007 08:16:04 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l99FG4it079221; Tue, 9 Oct 2007 08:16:04 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from EXVS01.ex.dslextreme.net (exbe04.ex.dslextreme.net [66.51.199.86]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l99FG3MR079212 for ; Tue, 9 Oct 2007 08:16:03 -0700 (MST) (envelope-from chokhani@orionsec.com) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Subject: RE: OCSP Algorithm Agility Date: Tue, 9 Oct 2007 08:15:40 -0700 Message-ID: <82D5657AE1F54347A734BDD33637C879096C9ABE@EXVS01.ex.dslextreme.net> In-Reply-To: <2788466ED3E31C418E9ACC5C316615570536E3@mou1wnexmb09.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP Algorithm Agility thread-index: Acf8l4NIxZexIh9rTveKgrEJmUDxVQAAJZEAAlba1eAAAH/7QAEC+OtgACFXyuA= References: <82D5657AE1F54347A734BDD33637C8790966180C@EXVS01.ex.dslextreme.net> <2788466ED3E31C418E9ACC5C316615570536E3@mou1wnexmb09.vcorp.ad.vrsn.com> From: "Santosh Chokhani" To: "Hallam-Baker, Phillip" , Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l99FG3MR079214 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: The OCSP and SCVP can transition to stronger algorithms any time they want. The OCSP can take their clue from the CA or the certID field to decide the hashing algorithm. When multiple certID is present, OCSP can take low water mark of these. SCVP is no different than a client in terms of validating a path. In terms of signing a response, it can take the low water mark of the hashing algorithms in the certificate chain. -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Hallam-Baker, Phillip Sent: Monday, October 08, 2007 7:27 PM To: Santosh Chokhani; Andrews, Rick; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility The objective here is to overcome a real deployment obstacle that creates a lockstep issue when use of stronger algorithms is attempted. The CA cannot issue a certificate that employs a new algorithm until it is known that all clients that might rely on the certificate are capable of processing the new certificate. Requiring lockstep updates to the OCSP and SCVP infrastructure to be made at the same time renders transition to stronger algorithms a much lengthier and much less practical proposition. > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > Sent: Saturday, October 06, 2007 4:12 PM > To: Andrews, Rick; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > Rick, > > SCVP or other intermediaries are red herring. Whoever > processes the certificate processes the revocation > information for that certificate. > It does not change the following: > > 1. There is no security benefit in using a stronger > algorithm for OCSP > response than for the certificate in question. Neither, there is any > benefit from interoperability viewpoint for these two to be different. > > 2. If the OCSP Responder does not get a CRL, it can use the > same mechanism to get the hashing algorithm used as it uses > to get the revocation information. > > -----Original Message----- > From: Andrews, Rick [mailto:RAndrews@verisign.com] > Sent: Wednesday, October 03, 2007 3:29 PM > To: Santosh Chokhani; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > Santosh, > > Sorry for the long delay in responding - travel and vacation. > > Not all OCSP responders work from CRLs, so they won't take > their cue from the CRL. Nor should they take their cue from > the signature on the cert in question, I believe. Let me try > to restate my argument in a different way. > > With SCVP delegated path validation, the client requesting a > cert's status from an OCSP responder will be different from > the client at the other end of the SSL connection. Those two > clients may have very different capabilities in terms of > supported signature and hash algorithms. It's not realistic > to expect that all SSL clients, all SCVP servers, and all CAs > will be able to upgrade in lockstep to new algorithms as they > are developed. Allowing the OCSP client and server to > negotiate a mutually-acceptable set of algorithms is > essential to the deployment of newer, stronger algorithms. > > Likewise, companies that run large OCSP responders may wish > to gradually move to ECC-based signatures for all their OCSP > responses, even those for certs with RSA or DSA keys, because > ECC signatures are cheaper to produce. If algorithm agility > is added to OCSP, those companies can gradually achieve the > move to ECC without disrupting the installed base of OCSP > clients that don't support ECC. > > -Rick Andrews > > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > > Sent: Friday, September 21, 2007 2:45 PM > > To: Paul Hoffman; Stephen Kent; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > > > Paul, > > > > Here are my views on this. > > > > The client should be first asking for the algorithm suite > that signed > > the certificate in question. There is no need for the > client to ask > > for anything stronger. The client can ask for stronger suites as > > secondary, if client has them. > > > > In the scenario you cite, the Responder certificate will > not include > > RSA with SHA 1 any longer. So, client will know that > Responder only > > supported his second choice and he should be ok with it. > > > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] > > On Behalf Of Paul Hoffman > > Sent: Friday, September 21, 2007 4:39 PM > > To: Stephen Kent; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > > > At 2:07 PM -0400 9/21/07, Stephen Kent wrote: > > >How about defining an extension to be included in the cert > > issued to an > > >OCSP responder by a CA. The extension would have an > ordered list of > > >algorithms (hash and signature if we want to address more > > than the hash > > >agility issue) accepted by the OCSP responder. An OCSP > > client can use > > >this info to determine what is the "best" algorithm (or alg > > pair) that > > >it and the responder share. The combination of this > extension and an > > >OCSP negotiation procedure will allow the client to detect MITM > > >downgrade attacks. In fact, if the client acquires the > > responder's cert > > >prior to making a request, there would not even be a need for real > > >negotiation, since the client would know what alg to request in a > > >response. > > > > Imagine the list of algorithms is RSA-with-SHA1 first and > > DSA-with-SHA1 second. How does your negotiation work? The > client asks > > for this message to be signed with RSA-with-SHA1. > > But the server knows that RSA-with-SHA1 has been > compromised since it > > got that certificate from the CA. What does the server say to the > > client to indicate that it only wants to sign with > DSA-with-SHA1? What > > prevents Mallory from saying the same thing to the client? > > > > --Paul Hoffman, Director > > --VPN Consortium > > > > > > > > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l98NVgZ7095730 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 8 Oct 2007 16:31:42 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l98NVg1X095729; Mon, 8 Oct 2007 16:31:42 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from robin.verisign.com (robin.verisign.com [65.205.251.75]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l98NVcbu095718 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Mon, 8 Oct 2007 16:31:41 -0700 (MST) (envelope-from pbaker@verisign.com) Received: from MOU1WNEXCN02.vcorp.ad.vrsn.com (mailer2.verisign.com [65.205.251.35]) by robin.verisign.com (8.12.11/8.13.4) with ESMTP id l98NSjAS031601; Mon, 8 Oct 2007 16:28:52 -0700 Received: from MOU1WNEXMB09.vcorp.ad.vrsn.com ([10.25.15.197]) by MOU1WNEXCN02.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.1830); Mon, 8 Oct 2007 16:31:33 -0700 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Date: Mon, 8 Oct 2007 16:31:32 -0700 Message-ID: <2788466ED3E31C418E9ACC5C316615570536E1@mou1wnexmb09.vcorp.ad.vrsn.com> In-Reply-To: <4707E6DA.1070703@cs.tcd.ie> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Thread-Index: AcgIXLLxS0ujp4qjR/qIFNlFODJAOwBpALCw From: "Hallam-Baker, Phillip" To: "Stephen Farrell" , "Russ Housley" Cc: X-OriginalArrivalTime: 08 Oct 2007 23:31:33.0148 (UTC) FILETIME=[5C66CDC0:01C80A03] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l98NVfbt095724 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: How long will it be before I can issue a certificate that does not comply with the old bounds without this resulting in unexpected incompatibilities? > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stephen Farrell > Sent: Saturday, October 06, 2007 3:50 PM > To: Russ Housley > Cc: ietf-pkix@imc.org > Subject: Re: New Liaison Statement, "Liaison to IETF on the > removal of upper bound in X.509" > > > > > Russ Housley wrote: > > Personally, I missed the subtle change from normative to > informative. > > I suspect many others did too. If the PKIX WG to make them > > informative too, then it will have to be done *right now*. > > I see no reason to make such a change at this stage. > > S. > > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l98NVcs1095720 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 8 Oct 2007 16:31:39 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l98NVchd095719; Mon, 8 Oct 2007 16:31:38 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from colibri.verisign.com (colibri.verisign.com [65.205.251.74]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l98NVa4F095710 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Mon, 8 Oct 2007 16:31:38 -0700 (MST) (envelope-from pbaker@verisign.com) Received: from MOU1WNEXCN03.vcorp.ad.vrsn.com (mailer6.verisign.com [65.205.251.33]) by colibri.verisign.com (8.13.6/8.13.4) with ESMTP id l98NSRFQ032121; Mon, 8 Oct 2007 16:28:27 -0700 Received: from MOU1WNEXMB09.vcorp.ad.vrsn.com ([10.25.15.197]) by MOU1WNEXCN03.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.1830); Tue, 9 Oct 2007 00:31:35 +0100 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" X-MimeOLE: Produced By Microsoft Exchange V6.5 Subject: RE: OCSP Algorithm Agility Date: Mon, 8 Oct 2007 16:26:57 -0700 Message-ID: <2788466ED3E31C418E9ACC5C316615570536E3@mou1wnexmb09.vcorp.ad.vrsn.com> In-Reply-To: <82D5657AE1F54347A734BDD33637C8790966180C@EXVS01.ex.dslextreme.net> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP Algorithm Agility Thread-Index: Acf8l4NIxZexIh9rTveKgrEJmUDxVQAAJZEAAlba1eAAAH/7QAEC+Otg From: "Hallam-Baker, Phillip" To: "Santosh Chokhani" , "Andrews, Rick" , X-OriginalArrivalTime: 08 Oct 2007 23:31:35.0977 (UTC) FILETIME=[5E167990:01C80A03] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l98NVc4E095711 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: The objective here is to overcome a real deployment obstacle that creates a lockstep issue when use of stronger algorithms is attempted. The CA cannot issue a certificate that employs a new algorithm until it is known that all clients that might rely on the certificate are capable of processing the new certificate. Requiring lockstep updates to the OCSP and SCVP infrastructure to be made at the same time renders transition to stronger algorithms a much lengthier and much less practical proposition. > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > Sent: Saturday, October 06, 2007 4:12 PM > To: Andrews, Rick; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > Rick, > > SCVP or other intermediaries are red herring. Whoever > processes the certificate processes the revocation > information for that certificate. > It does not change the following: > > 1. There is no security benefit in using a stronger > algorithm for OCSP > response than for the certificate in question. Neither, there is any > benefit from interoperability viewpoint for these two to be different. > > 2. If the OCSP Responder does not get a CRL, it can use the > same mechanism to get the hashing algorithm used as it uses > to get the revocation information. > > -----Original Message----- > From: Andrews, Rick [mailto:RAndrews@verisign.com] > Sent: Wednesday, October 03, 2007 3:29 PM > To: Santosh Chokhani; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > Santosh, > > Sorry for the long delay in responding - travel and vacation. > > Not all OCSP responders work from CRLs, so they won't take > their cue from the CRL. Nor should they take their cue from > the signature on the cert in question, I believe. Let me try > to restate my argument in a different way. > > With SCVP delegated path validation, the client requesting a > cert's status from an OCSP responder will be different from > the client at the other end of the SSL connection. Those two > clients may have very different capabilities in terms of > supported signature and hash algorithms. It's not realistic > to expect that all SSL clients, all SCVP servers, and all CAs > will be able to upgrade in lockstep to new algorithms as they > are developed. Allowing the OCSP client and server to > negotiate a mutually-acceptable set of algorithms is > essential to the deployment of newer, stronger algorithms. > > Likewise, companies that run large OCSP responders may wish > to gradually move to ECC-based signatures for all their OCSP > responses, even those for certs with RSA or DSA keys, because > ECC signatures are cheaper to produce. If algorithm agility > is added to OCSP, those companies can gradually achieve the > move to ECC without disrupting the installed base of OCSP > clients that don't support ECC. > > -Rick Andrews > > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > > Sent: Friday, September 21, 2007 2:45 PM > > To: Paul Hoffman; Stephen Kent; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > > > Paul, > > > > Here are my views on this. > > > > The client should be first asking for the algorithm suite > that signed > > the certificate in question. There is no need for the > client to ask > > for anything stronger. The client can ask for stronger suites as > > secondary, if client has them. > > > > In the scenario you cite, the Responder certificate will > not include > > RSA with SHA 1 any longer. So, client will know that > Responder only > > supported his second choice and he should be ok with it. > > > > -----Original Message----- > > From: owner-ietf-pkix@mail.imc.org > > [mailto:owner-ietf-pkix@mail.imc.org] > > On Behalf Of Paul Hoffman > > Sent: Friday, September 21, 2007 4:39 PM > > To: Stephen Kent; ietf-pkix@imc.org > > Subject: RE: OCSP Algorithm Agility > > > > > > At 2:07 PM -0400 9/21/07, Stephen Kent wrote: > > >How about defining an extension to be included in the cert > > issued to an > > >OCSP responder by a CA. The extension would have an > ordered list of > > >algorithms (hash and signature if we want to address more > > than the hash > > >agility issue) accepted by the OCSP responder. An OCSP > > client can use > > >this info to determine what is the "best" algorithm (or alg > > pair) that > > >it and the responder share. The combination of this > extension and an > > >OCSP negotiation procedure will allow the client to detect MITM > > >downgrade attacks. In fact, if the client acquires the > > responder's cert > > >prior to making a request, there would not even be a need for real > > >negotiation, since the client would know what alg to request in a > > >response. > > > > Imagine the list of algorithms is RSA-with-SHA1 first and > > DSA-with-SHA1 second. How does your negotiation work? The > client asks > > for this message to be signed with RSA-with-SHA1. > > But the server knows that RSA-with-SHA1 has been > compromised since it > > got that certificate from the CA. What does the server say to the > > client to indicate that it only wants to sign with > DSA-with-SHA1? What > > prevents Mallory from saying the same thing to the client? > > > > --Paul Hoffman, Director > > --VPN Consortium > > > > > > > > Received: from [213.229.196.133] (internet-196-133.narocnik.mobitel.si [213.229.196.133]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l987cm9O011180 for ; Mon, 8 Oct 2007 00:39:13 -0700 (MST) (envelope-from Kapil@skydive.net.ar) Received: from mitja ([148.136.22.21]:30014 "EHLO mitja" smtp-auth: TLS-CIPHER: TLS-PEER-CN1: ) by [213.229.196.133] with ESMTP id S22AUONCHAVXBQNY (ORCPT ); Mon, 8 Oct 2007 09:39:44 +0200 Message-ID: <000501c8097e$51102140$85c4e5d5@mitja> From: "Kapil Shaughnessy" To: Subject: sgrassas Date: Mon, 8 Oct 2007 09:39:11 +0200 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0006_01C8098F.1498F140" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 ------=_NextPart_000_0006_01C8098F.1498F140 Content-Type: text/plain; charset="iso-8859-2" Content-Transfer-Encoding: quoted-printable http://potny.com/ Nice to meet you ietf-pkix-archive Safely enlarge and enhance the size of your penis! Kapil Shaughnessy ------=_NextPart_000_0006_01C8098F.1498F140 Content-Type: text/html; charset="iso-8859-2" Content-Transfer-Encoding: quoted-printable
http://potny.com/
Nice to meet you = ietf-pkix-archive
Safely enlarge and enhance the size of your = penis!
Kapil Shaughnessy
------=_NextPart_000_0006_01C8098F.1498F140-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l97NJK5V077374 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 7 Oct 2007 16:19:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l97NJKXi077373; Sun, 7 Oct 2007 16:19:20 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from EXVS01.ex.dslextreme.net (exbe04.ex.dslextreme.net [66.51.199.86]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l97NJJuM077365 for ; Sun, 7 Oct 2007 16:19:20 -0700 (MST) (envelope-from chokhani@orionsec.com) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Subject: RE: OCSP Algorithm Agility Date: Sun, 7 Oct 2007 16:18:56 -0700 Message-ID: <82D5657AE1F54347A734BDD33637C879096618AD@EXVS01.ex.dslextreme.net> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP Algorithm Agility thread-index: Acf8g+lSm4OdXAknTt2BXwIpRJkp9QAAN7VQAyzHXAA= References: <2788466ED3E31C418E9ACC5C3166155703DF57@mou1wnexmb09.vcorp.ad.vrsn.com> From: "Santosh Chokhani" To: "Stephen Kent" , Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l97NJKuM077368 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Steve, Another way to do this securely is to let the client signal in the hash algorithm field of the certID. This will not be vulnerable to MITM attack since the client can check the hashing algorithm used to sign the response matches the hashing algorithm in the certID field. It also provides security since if an hashing algorithm is good enough for certificate, it is good enough for OCSP response. It provides interoperability for the client since the client has to have the hashing algorithm for certificate signature verification. -----Original Message----- From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Stephen Kent Sent: Friday, September 21, 2007 2:08 PM To: ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility Folks, How about defining an extension to be included in the cert issued to an OCSP responder by a CA. The extension would have an ordered list of algorithms (hash and signature if we want to address more than the hash agility issue) accepted by the OCSP responder. An OCSP client can use this info to determine what is the "best" algorithm (or alg pair) that it and the responder share. The combination of this extension and an OCSP negotiation procedure will allow the client to detect MITM downgrade attacks. In fact, if the client acquires the responder's cert prior to making a request, there would not even be a need for real negotiation, since the client would know what alg to request in a response. Steve Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l979HWc0009965 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 7 Oct 2007 02:17:32 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l979HW4g009964; Sun, 7 Oct 2007 02:17:32 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from pne-smtpout2-sn1.fre.skanova.net (pne-smtpout2-sn1.fre.skanova.net [81.228.11.159]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l979HTVV009957 for ; Sun, 7 Oct 2007 02:17:32 -0700 (MST) (envelope-from anders.rundgren@telia.com) Received: from arport2v (81.232.45.243) by pne-smtpout2-sn1.fre.skanova.net (7.2.075) (authenticated as u18116613) id 46FA23310031A063 for ietf-pkix@imc.org; Sun, 7 Oct 2007 11:17:28 +0200 Message-ID: <005c01c808c2$db8eddf0$82c5a8c0@arport2v> From: "Anders Rundgren" To: Subject: KeyGen2 - Yet Another PKI Provisioning Protocol Date: Sun, 7 Oct 2007 11:17:17 +0200 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2800.1807 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1896 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: F.Y.I. Since there seems to be no PKI provisioning standard combining - A web browser interface - Support for secure containers like TPMs - Consumer-oriented key-management functions - Support for PIN-code policies I have taken the liberty to on "hobby" basis begin the development of yet another key provisioning system. More details are available at: http://webpki.org/keygen2.pdf Anders Rundgren Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l96KCct2063951 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 6 Oct 2007 13:12:38 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l96KCcai063950; Sat, 6 Oct 2007 13:12:38 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from EXVS01.ex.dslextreme.net (exbe04.ex.dslextreme.net [66.51.199.86]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l96KCb3G063944 for ; Sat, 6 Oct 2007 13:12:38 -0700 (MST) (envelope-from chokhani@orionsec.com) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Subject: RE: OCSP Algorithm Agility Date: Sat, 6 Oct 2007 13:12:19 -0700 Message-ID: <82D5657AE1F54347A734BDD33637C8790966180C@EXVS01.ex.dslextreme.net> In-Reply-To: <0D028BDBFBA58441BD8E9746914806422AE2D9@MOU1WNEXMB14.vcorp.ad.vrsn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP Algorithm Agility thread-index: Acf8l4NIxZexIh9rTveKgrEJmUDxVQAAJZEAAlba1eAAAH/7QA== References: <82D5657AE1F54347A734BDD33637C87909439443@EXVS01.ex.dslextreme.net> <0D028BDBFBA58441BD8E9746914806422AE2D9@MOU1WNEXMB14.vcorp.ad.vrsn.com> From: "Santosh Chokhani" To: "Andrews, Rick" , Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l96KCc3G063945 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Rick, SCVP or other intermediaries are red herring. Whoever processes the certificate processes the revocation information for that certificate. It does not change the following: 1. There is no security benefit in using a stronger algorithm for OCSP response than for the certificate in question. Neither, there is any benefit from interoperability viewpoint for these two to be different. 2. If the OCSP Responder does not get a CRL, it can use the same mechanism to get the hashing algorithm used as it uses to get the revocation information. -----Original Message----- From: Andrews, Rick [mailto:RAndrews@verisign.com] Sent: Wednesday, October 03, 2007 3:29 PM To: Santosh Chokhani; ietf-pkix@imc.org Subject: RE: OCSP Algorithm Agility Santosh, Sorry for the long delay in responding - travel and vacation. Not all OCSP responders work from CRLs, so they won't take their cue from the CRL. Nor should they take their cue from the signature on the cert in question, I believe. Let me try to restate my argument in a different way. With SCVP delegated path validation, the client requesting a cert's status from an OCSP responder will be different from the client at the other end of the SSL connection. Those two clients may have very different capabilities in terms of supported signature and hash algorithms. It's not realistic to expect that all SSL clients, all SCVP servers, and all CAs will be able to upgrade in lockstep to new algorithms as they are developed. Allowing the OCSP client and server to negotiate a mutually-acceptable set of algorithms is essential to the deployment of newer, stronger algorithms. Likewise, companies that run large OCSP responders may wish to gradually move to ECC-based signatures for all their OCSP responses, even those for certs with RSA or DSA keys, because ECC signatures are cheaper to produce. If algorithm agility is added to OCSP, those companies can gradually achieve the move to ECC without disrupting the installed base of OCSP clients that don't support ECC. -Rick Andrews > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > Sent: Friday, September 21, 2007 2:45 PM > To: Paul Hoffman; Stephen Kent; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > Paul, > > Here are my views on this. > > The client should be first asking for the algorithm suite > that signed the certificate in question. There is no need > for the client to ask for anything stronger. The client can > ask for stronger suites as secondary, if client has them. > > In the scenario you cite, the Responder certificate will not > include RSA with SHA 1 any longer. So, client will know that > Responder only supported his second choice and he should be > ok with it. > > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] > On Behalf Of Paul Hoffman > Sent: Friday, September 21, 2007 4:39 PM > To: Stephen Kent; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > At 2:07 PM -0400 9/21/07, Stephen Kent wrote: > >How about defining an extension to be included in the cert > issued to an > >OCSP responder by a CA. The extension would have an ordered list of > >algorithms (hash and signature if we want to address more > than the hash > >agility issue) accepted by the OCSP responder. An OCSP > client can use > >this info to determine what is the "best" algorithm (or alg > pair) that > >it and the responder share. The combination of this extension and an > >OCSP negotiation procedure will allow the client to detect MITM > >downgrade attacks. In fact, if the client acquires the > responder's cert > >prior to making a request, there would not even be a need for real > >negotiation, since the client would know what alg to request in a > >response. > > Imagine the list of algorithms is RSA-with-SHA1 first and > DSA-with-SHA1 second. How does your negotiation work? The > client asks for this message to be signed with RSA-with-SHA1. > But the server knows that RSA-with-SHA1 has been compromised > since it got that certificate from the CA. What does the > server say to the client to indicate that it only wants to > sign with DSA-with-SHA1? What prevents Mallory from saying > the same thing to the client? > > --Paul Hoffman, Director > --VPN Consortium > > > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l96Jnwwm062261 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 6 Oct 2007 12:49:58 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l96JnwK9062260; Sat, 6 Oct 2007 12:49:58 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from relay.imagine.ie (dns1.dns.imagine.ie [87.232.1.40]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l96Jntgj062251 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Sat, 6 Oct 2007 12:49:57 -0700 (MST) (envelope-from stephen.farrell@cs.tcd.ie) Received: from mail1.int.imagine.ie (mail1 [87.232.1.152]) by relay.imagine.ie (Postfix) with ESMTP id E3E1F325D1; Sat, 6 Oct 2007 20:49:54 +0100 (IST) Received: from [127.0.0.1] (dsl-102-234.cust.imagine.ie [87.232.102.234]) by mail1.int.imagine.ie (8.13.4/8.13.4/Debian-3) with ESMTP id l96JnqV4005913 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Sat, 6 Oct 2007 20:49:52 +0100 Message-ID: <4707E6DA.1070703@cs.tcd.ie> Date: Sat, 06 Oct 2007 20:49:46 +0100 From: Stephen Farrell User-Agent: Thunderbird 2.0.0.6 (Windows/20070728) MIME-Version: 1.0 To: Russ Housley CC: ietf-pkix@imc.org Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" References: <7.1.0.9.2.20071005094401.0801cb08@vigilsec.com> <200710061323.l96DN5qg032032@balder-227.proper.com> In-Reply-To: <200710061323.l96DN5qg032032@balder-227.proper.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Bayes-Prob: 0.9355 (Score 4) X-Spam-Score: 4.00 (****) [Hold at 8.00] X-Canit-Stats-ID: 15824530 - fdba0e01b20b X-CanItPRO-Stream: outgoing X-Scanned-By: CanIt (www . roaringpenguin . com) on 87.232.1.52 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Russ Housley wrote: > Personally, I missed the subtle change from normative to informative. I > suspect many others did too. If the PKIX WG to make them informative > too, then it will have to be done *right now*. I see no reason to make such a change at this stage. S. Received: from Karjasilta-P1.suomi.net (82-128-219-160-Karjasilta-TR1.suomi.net [82.128.219.160]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l96Gn3BO047103 for ; Sat, 6 Oct 2007 09:49:05 -0700 (MST) (envelope-from steven700@wingchun.org) Received: by 10.186.152.34 with SMTP id ovKpqJxUVfDqw; Sat, 6 Oct 2007 19:49:06 +0300 (GMT) Received: by 192.168.37.134 with SMTP id nxcaQoAZyyhbGo.3355195513879; Sat, 6 Oct 2007 19:49:04 +0300 (GMT) Message-ID: <000801c80838$cc017ee0$0ac7d8d5@xxj8e29y2cwumc> From: "steven Heeman" To: Subject: negeordr Date: Sat, 6 Oct 2007 19:49:01 +0300 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0004_01C80851.F14EB6E0" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3028 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028 ------=_NextPart_000_0004_01C80851.F14EB6E0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable http://mikjuegos.com/ Good evening ietf-pkix-archive proven to be safe and very effective steven Heeman ------=_NextPart_000_0004_01C80851.F14EB6E0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
http://mikjuegos.com/
Good evening ietf-pkix-archive
proven to be safe and very = effective
steven Heeman
------=_NextPart_000_0004_01C80851.F14EB6E0-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l96DN6pW032041 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 6 Oct 2007 06:23:06 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l96DN6Yj032040; Sat, 6 Oct 2007 06:23:06 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from woodstock.binhost.com (woodstock.binhost.com [8.8.40.152]) by balder-227.proper.com (8.13.5/8.13.5) with SMTP id l96DN5qg032032 for ; Sat, 6 Oct 2007 06:23:05 -0700 (MST) (envelope-from housley@vigilsec.com) Message-Id: <200710061323.l96DN5qg032032@balder-227.proper.com> Received: (qmail 2902 invoked by uid 0); 6 Oct 2007 13:23:02 -0000 Received: from unknown (HELO THINKPADR52.vigilsec.com) (207.236.147.202) by woodstock.binhost.com with SMTP; 6 Oct 2007 13:23:02 -0000 X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Sat, 06 Oct 2007 09:22:38 -0400 To: ietf-pkix@imc.org From: Russ Housley Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" In-Reply-To: <7.1.0.9.2.20071005094401.0801cb08@vigilsec.com> References: <7.1.0.9.2.20071005094401.0801cb08@vigilsec.com> Mime-Version: 1.0 Content-Type: text/html; charset="us-ascii" Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: In the 1988 blue book, the Upper Bounds annex and module were normative. It also limited common name to 64 bytes.

The next edition (1993) contained: "This annex does not form an integral part of this Recommendation | International Standard."

The third edition (1997) contains the same text as the second edition. And, ub-name has the value of 32768.

The fourth edition (2000) is the same as the third. However, ub-name hase a different value; it is set to 128.

The PKIX WG seems to be using the 1997 upper bound numbers, but they are normative in RFC 2459 and RFC 3280.

Personally, I missed the subtle change from normative to informative.  I suspect many others did too.  If the PKIX WG to make them informative too, then it will have to be done *right now*.  The 3280bis document has started the approval process.  According to the Data Tracker, Sam Hartman is doing his AD Review right now.

Russ

At 09:44 AM 10/5/2007, Russ Housley wrote:

Title: Liaison to IETF on the removal of upper bound in X.509
Submission Date: 2007-10-05
URL of the IETF Web page: https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=376
Please reply by 2008-03-01

From: Xiaoya Yang(ITU-T SG 17) <tsbsg17@itu.int>
To: IETF/PKIX(Russ Housley <housley@vigilsec.com>, Stefan Santesson <stefans@microsoft.com>)
Cc: Herbert Bertine <hbertine@alcatel-lucent.com>
<tsbsg17@itu.int>
<era@tdcadsl.dk>
Reponse Contact: Xiaoya YANG <xiaoya.yang@itu.int>
<tsbsg17@itu.int>
Technical Contact: <era@tdcadsl.dk>
Purpose: For action
Body: In relation to resolve a Defect Report, it appears to majority within the X.500 community to remove hard-coded length restriction whenever a DirectoryString is used.
In response to developer demand in the early days of the standard X.520 contained a list of maximum lengths for a variety of string types, e.g., organizationalName.  The values specified were non-normative.  However, some implementers treated the values as normative.  This has caused interoperability problem with implementations.
We plan to remove the upper bounds specified in the standard. In particular we intend to eliminate the Upper Bounds for DirectoryString.
The proposal does not change the definition of DirectoryString, but attribute definitions will look slightly different.  As an example, street address may

streetAddress{INTEGER:maxSize}  ATTRIBUTE  ::=  {
        WITH SYNTAX                                         DirectoryString {maxSize}
        EQUALITY MATCHING RULE                    caseIgnoreMatch
        SUBSTRINGS MATCHING RULE                  caseIgnoreSubstringsMatch
        ID                                                              id-at-streetAddress }
That means that at implementation time, the upper limit may be added if wanted. Otherwise an unlimited string may be assumed.
The proposal will not change the bits on the wire and we believe this is in line with what the PXIX group is already doing.  We are forwarding this liaison to ensure that the PKIX group has no problem with this proposal.
Please confirm that you have no objection to our removal of upper bounds.
Attachment(s):
No document has been attached
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l95GeMXR030157 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 5 Oct 2007 09:40:22 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l95GeMgB030156; Fri, 5 Oct 2007 09:40:22 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from elasmtp-galgo.atl.sa.earthlink.net (elasmtp-galgo.atl.sa.earthlink.net [209.86.89.61]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l95GeLxQ030149 for ; Fri, 5 Oct 2007 09:40:22 -0700 (MST) (envelope-from hoytkesterson@earthlink.net) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=dk20050327; d=earthlink.net; b=KZRnCIeQavBrtRsj7ZHiKAVIDkBUH9QYotkVPe11zl+RiGOQ7BpIhNeCDmuzFufY; h=Received:Mime-Version:Message-Id:In-Reply-To:References:Date:To:From:Subject:Content-Type:X-ELNK-Trace:X-Originating-IP; Received: from [151.118.180.188] (helo=[156.106.219.41]) by elasmtp-galgo.atl.sa.earthlink.net with asmtp (TLSv1:AES256-SHA:256) (Exim 4.34) id 1IdqDs-0004J7-OW for ietf-pkix@imc.org; Fri, 05 Oct 2007 12:40:21 -0400 Mime-Version: 1.0 Message-Id: In-Reply-To: <200710051351.l95Dpirn015296@balder-227.proper.com> References: <200710051351.l95Dpirn015296@balder-227.proper.com> Date: Fri, 5 Oct 2007 09:40:08 -0700 To: ietf-pkix@imc.org From: Hoyt L Kesterson II Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Content-Type: text/html; charset="us-ascii" X-ELNK-Trace: 59f3edefb26af0321a6f9084d36cbc6474bf435c0eb9d478ff8b85d7d168df7ae1f7ce53db6ecf5a22d82498bb8304f1350badd9bab72f9c350badd9bab72f9c X-Originating-IP: 151.118.180.188 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Re: New Liaison Statement, "Liaison to IETF on the removal
Annex C (and Annex B) of X.520 | 9594-6 contains the following line just below the Title Line of the Annex:  (This annex does not form an integral part of this Recommendation | International Standard)

This is standardeeze for informative, i.e. not required to conform.

These values initially came from the OSI workshops of long ago. They wanted them in the standard; I argued they were somewhat arbitrary and should instead be agreements within specific communities (who was I to deny the right to name someone Throckmorton P. Gildersleeve VIII).

I felt that many values were set not to ease the implementation effort but because the group felt that the limits reflected real limits. I suggested they agree on a what they felt to be a practical number and then double it but the group stood firm. Realize that some of those people felt AE-title was too long and wanted OIDs for directory names.

We compromised by putting the limits in the standard but making the annex, and thus the values, informative instead of normative. We felt that if a value needed to be changed, an implementor's group could do it faster than the two years it would take to make a non-error-driven change to the standard.

We recently had a discussion of this on the directory email list where several LDAP people said that such limits were not useful.

We did know that some developers have interpreted the values as fixed maximums while others have adjusted them to meet the need.

This difference of understanding has caused interworking problems in the past. (A similar problem arose from the diagram in Annex B of X.521 | 9594-7 Selected Object Classes. Even though the same "not form an integral part" appears and the title of the Annex is Suggested Name Forms and DIT Structures, we still saw developers refer to the X.500 standardized name.

In the discussions in Geneva we thought it might be a good idea to get rid of the problem entirely by removing bounds. We felt such a change to the ASN.1 wouldn't change the "bits on the wire" but might change the receiver's code. Hence the liaison to PKIX.

For information, here are the suggested values from that annex in X.520.

ub-answerback    INTEGER    ::=    8
ub-business-category    INTEGER    ::=    128
ub-common-name    INTEGER    ::=    64
ub-content        INTEGER    ::=    32768
ub-country-code    INTEGER    ::=    4
ub-description    INTEGER    ::=    1024
ub-destination-indicator    INTEGER    ::=    128
ub-directory-string-first-component-match    INTEGER    ::=    32768
ub-domainLocalID    INTEGER    ::=    64
ub-international-isdn-number      INTEGER    ::=    16
ub-knowledge-information    INTEGER    ::=    32768
ub-labeledURI    INTEGER    ::=    32768
ub-localeContextSyntax    INTEGER    ::=    128
ub-locality-name       INTEGER    ::=    128
ub-match    INTEGER    ::=    128
ub-name    INTEGER    ::=    64
ub-organization-name    INTEGER    ::=    64
ub-organizational-unit-name    INTEGER    ::=    64
ub-physical-office-name    INTEGER    ::=    128
ub-post-office-box    INTEGER    ::=    40
ub-postal-code    INTEGER    ::=    40
ub-postal-line    INTEGER    ::=    6
ub-postal-string    INTEGER    ::=    30
ub-privacy-mark-length       INTEGER    ::=    128
ub-pseudonym    INTEGER    ::=    128
ub-saslMechanism    INTEGER    ::=    64
ub-schema      INTEGER    ::=    1024
ub-search    INTEGER    ::=    32768
ub-serial-number       INTEGER    ::=    64
ub-state-name    INTEGER    ::=    128
ub-street-address      INTEGER    ::=    128
ub-surname    INTEGER    ::=    64
ub-tag    INTEGER    ::=    64
ub-telephone-number    INTEGER    ::=    32
ub-teletex-terminal-id    INTEGER    ::=    1024
ub-telex-number    INTEGER    ::=    14
ub-title    INTEGER    ::=    64
ub-user-password    INTEGER    ::=    128
ub-x121-address       INTEGER    ::=    15
   hoyt


When the upper bound values are embedded in the ASN.1 module, how can they be non-normative?

These are the values that appear in RFC 3280:

-- Upper Bounds
ub-name INTEGER ::= 32768
ub-common-name INTEGER ::= 64
ub-locality-name INTEGER ::= 128
ub-state-name INTEGER ::= 128
ub-organization-name INTEGER ::= 64
ub-organizational-unit-name INTEGER ::= 64
ub-title INTEGER ::= 64
ub-serial-number INTEGER ::= 64
ub-match INTEGER ::= 128
ub-emailaddress-length INTEGER ::= 128
ub-common-name-length INTEGER ::= 64
ub-country-name-alpha-length INTEGER ::= 2
ub-country-name-numeric-length INTEGER ::= 3
ub-domain-defined-attributes INTEGER ::= 4
ub-domain-defined-attribute-type-length INTEGER ::= 8
ub-domain-defined-attribute-value-length INTEGER ::= 128
ub-domain-name-length INTEGER ::= 16
ub-extension-attributes INTEGER ::= 256
ub-e163-4-number-length INTEGER ::= 15
ub-e163-4-sub-address-length INTEGER ::= 40
ub-generation-qualifier-length INTEGER ::= 3
ub-given-name-length INTEGER ::= 16
ub-initials-length INTEGER ::= 5
ub-integer-options INTEGER ::= 256
ub-numeric-user-id-length INTEGER ::= 32
ub-organization-name-length INTEGER ::= 64
ub-organizational-unit-name-length INTEGER ::= 32
ub-organizational-units INTEGER ::= 4
ub-pds-name-length INTEGER ::= 16
ub-pds-parameter-length INTEGER ::= 30
ub-pds-physical-address-lines INTEGER ::= 6
ub-postal-code-length INTEGER ::= 16
ub-pseudonym INTEGER ::= 128
ub-surname-length INTEGER ::= 40
ub-terminal-id-length INTEGER ::= 24
ub-unformatted-address-length INTEGER ::= 180
ub-x121-address-length INTEGER ::= 16

At 08:19 AM 10/5/2007, ITU-T SG 17 wrote:
Title: Liaison to IETF on the removal of upper bound in X.509
Submission Date: 2007-10-05
URL of the IETF Web page: https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=376
Please reply by 2008-03-01

From: Xiaoya Yang(ITU-T SG 17) <tsbsg17@itu.int>
To: IETF/PKIX(Russ Housley <housley@vigilsec.com>, Stefan Santesson <stefans@microsoft.com>)
Cc: Herbert Bertine <hbertine@alcatel-lucent.com>
<tsbsg17@itu.int>
<era@tdcadsl.dk>
Reponse Contact: Xiaoya YANG <xiaoya.yang@itu.int>
<tsbsg17@itu.int>
Technical Contact: <era@tdcadsl.dk>
Purpose: For action
Body: In relation to resolve a Defect Report, it appears to majority within the X.500 community to remove hard-coded length restriction whenever a DirectoryString is used.
In response to developer demand in the early days of the standard X.520 contained a list of maximum lengths for a variety of string types, e.g., organizationalName.  The values specified were non-normative.  However, some implementers treated the values as normative.  This has caused interoperability problem with implementations.
We plan to remove the upper bounds specified in the standard. In particular we intend to eliminate the Upper Bounds for DirectoryString.
The proposal does not change the definition of DirectoryString, but attribute definitions will look slightly different.  As an example, street address may

streetAddress{INTEGER:maxSize}  ATTRIBUTE  ::=  {
        WITH SYNTAX                                     DirectoryString {maxSize}
        EQUALITY MATCHING RULE                  caseIgnoreMatch
        SUBSTRINGS MATCHING RULE                caseIgnoreSubstringsMatch
        ID id-at-streetAddress }
That means that at implementation time, the upper limit may be added if wanted. Otherwise an unlimited string may be assumed.
The proposal will not change the bits on the wire and we believe this is in line with what the PXIX group is already doing.  We are forwarding this liaison to ensure that the PKIX group has no problem with this proposal.
Please confirm that you have no objection to our removal of upper bounds.

Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l95EAjlp017340 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 5 Oct 2007 07:10:45 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l95EAjn5017339; Fri, 5 Oct 2007 07:10:45 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from woodstock.binhost.com (woodstock.binhost.com [8.8.40.152]) by balder-227.proper.com (8.13.5/8.13.5) with SMTP id l95EAhr5017333 for ; Fri, 5 Oct 2007 07:10:44 -0700 (MST) (envelope-from housley@vigilsec.com) Message-Id: <200710051410.l95EAhr5017333@balder-227.proper.com> Received: (qmail 15799 invoked by uid 0); 5 Oct 2007 14:10:40 -0000 Received: from unknown (HELO THINKPADR52.vigilsec.com) (207.236.147.202) by woodstock.binhost.com with SMTP; 5 Oct 2007 14:10:40 -0000 X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Fri, 05 Oct 2007 10:10:31 -0400 To: ietf-pkix@imc.org From: Russ Housley Subject: Re: New Liaison Statement, "Liaison to IETF on the resolution of DR320" In-Reply-To: References: Mime-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1"; format=flowed Content-Transfer-Encoding: 8bit Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: It seems to me that this is a trust anchor configuration concern. If two CAs adopt the same name and a user accepts both of these CAs as trust anchors, then there could be a problem. Just don't do it. RFC 3280bis says: While X.509 mandates that names be unambiguous, there is a risk that two unrelated authorities will issue certificates and/or CRLs under the same issuer name. As a means of reducing problems and security issues related to issuer name collisions, CA and CRL issuer names SHOULD be formed in a way that reduces the likelihood of name collisions. Implementers should take into account the possible existence of multiple unrelated CAs and CRL issuers with the same name. At a minimum, implementations validating CRLs MUST ensure that the certification path of a certificate and the CRL issuer certification path used to validate the certificate terminate at the same trust anchor. Russ At 08:12 AM 10/5/2007, ITU-T SG 17 wrote: >Title: Liaison to IETF on the resolution of DR320 >Submission Date: 2007-10-05 >URL of the IETF Web page: >https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=375 >Please reply by 2008-03-01 > >From: Xiaoya Yang(ITU-T SG 17) >To: IETF/PKIX(Russ Housley , Stefan Santesson >) >Cc: Herbert Bertine > > > >Reponse Contact: Xiaoya YANG > >Technical Contact: > >Purpose: For action >Body: At our recent ITU-T SG17 meeting in Geneva we discussed and >rejected Defect Report 320 >(http://www.x500standard.com/uploads/Defects/DR_320.pdf) from >AFNOR. This DR advanced an argument that Distinguished Names may >not be unique and as such, the DN of the Certificate User may not be unique. >The directory group believes that Distinguished Name values must be >unique and unambiguously identify a single entity, hence the use of >the term Distinguished. >The DR states “the DN of the issuer name cannot be guaranteed to >be unique”. X.509 takes its definition of DN from X.501. Clause >9.2 of X.501 specifies the definition of DistinguishedName. This >clause states A name shall be unambiguous, that is, denotes just one object. >Clause 9 goes on to state: It is the responsibility of the relevant >naming authority for an entry to ensure that this is so by >appropriately assigning distinguished attribute values. Allocation >of RDNs is considered an administrative undertaking that may or may >not require some negotiation between involved organizations or >administrations. This Directory Specification does not provide such >a negotiation mechanism, and makes no assumption as to how it is performed. >The standard takes an axiomatic view of the concept that a >distinguished name unambiguously identifies a single entity. Things >break if two entities identify themselves using the same name. We >don't let two entities have the same domain name or the same email >address. Why? - because things wouldn't work. >The directory group does not accept the DR’s basic argument. We >believe that if two entities present the same name and a CA issues a >certificate to each, that CA made a mistake - not a naming authority >mistake, since a CA is not an naming authority (although one entity >can be both), but an entity to key binding mistake that leads to >confusion and even worse, a security risk. >We believe that if two entities claim the same name as top level >CAs, there is a political/procedural breakdown much like the domain >ownership arguments we have seen. No one argues that the Internet >protocols should be modified to solve that problem. The conflict is >resolved and one entity is assigned the name. The group believes >that this is the only reasonable solution for Distinguished >Naming. One votes for the CA of choice by configuring it as an anchor. >One of the participants in the directory meeting stated that >Certification Authorities are being deployed with names not acquired >from naming authorities but with names arbitrarily chosen assuming >that no other CA is or will be operating under that name. That >participant further stated that the IETF provides no guidelines on >ensuring that the names of CAs are unambiguous. >The directory group requests the IETF PKIX group to comment on this >statement. If the statement is correct, we ask the IETF to consider >putting a mechanism in place to prevent conflict, e.g. a list of >existing CA names that deployers of new CAs could check for naming conflicts. >Attachment(s): >No document has been attached Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l95Dpjx5015303 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 5 Oct 2007 06:51:45 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l95DpjHA015302; Fri, 5 Oct 2007 06:51:45 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from woodstock.binhost.com (woodstock.binhost.com [8.8.40.152]) by balder-227.proper.com (8.13.5/8.13.5) with SMTP id l95Dpirn015296 for ; Fri, 5 Oct 2007 06:51:45 -0700 (MST) (envelope-from housley@vigilsec.com) Message-Id: <200710051351.l95Dpirn015296@balder-227.proper.com> Received: (qmail 17743 invoked by uid 0); 5 Oct 2007 13:51:41 -0000 Received: from unknown (HELO THINKPADR52.vigilsec.com) (207.236.147.202) by woodstock.binhost.com with SMTP; 5 Oct 2007 13:51:41 -0000 X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Fri, 05 Oct 2007 09:51:40 -0400 To: ietf-pkix@imc.org From: Russ Housley Subject: Re: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Cc: hoytkesterson@earthlink.com In-Reply-To: References: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: When the upper bound values are embedded in the ASN.1 module, how can they be non-normative? These are the values that appear in RFC 3280: -- Upper Bounds ub-name INTEGER ::= 32768 ub-common-name INTEGER ::= 64 ub-locality-name INTEGER ::= 128 ub-state-name INTEGER ::= 128 ub-organization-name INTEGER ::= 64 ub-organizational-unit-name INTEGER ::= 64 ub-title INTEGER ::= 64 ub-serial-number INTEGER ::= 64 ub-match INTEGER ::= 128 ub-emailaddress-length INTEGER ::= 128 ub-common-name-length INTEGER ::= 64 ub-country-name-alpha-length INTEGER ::= 2 ub-country-name-numeric-length INTEGER ::= 3 ub-domain-defined-attributes INTEGER ::= 4 ub-domain-defined-attribute-type-length INTEGER ::= 8 ub-domain-defined-attribute-value-length INTEGER ::= 128 ub-domain-name-length INTEGER ::= 16 ub-extension-attributes INTEGER ::= 256 ub-e163-4-number-length INTEGER ::= 15 ub-e163-4-sub-address-length INTEGER ::= 40 ub-generation-qualifier-length INTEGER ::= 3 ub-given-name-length INTEGER ::= 16 ub-initials-length INTEGER ::= 5 ub-integer-options INTEGER ::= 256 ub-numeric-user-id-length INTEGER ::= 32 ub-organization-name-length INTEGER ::= 64 ub-organizational-unit-name-length INTEGER ::= 32 ub-organizational-units INTEGER ::= 4 ub-pds-name-length INTEGER ::= 16 ub-pds-parameter-length INTEGER ::= 30 ub-pds-physical-address-lines INTEGER ::= 6 ub-postal-code-length INTEGER ::= 16 ub-pseudonym INTEGER ::= 128 ub-surname-length INTEGER ::= 40 ub-terminal-id-length INTEGER ::= 24 ub-unformatted-address-length INTEGER ::= 180 ub-x121-address-length INTEGER ::= 16 At 08:19 AM 10/5/2007, ITU-T SG 17 wrote: >Title: Liaison to IETF on the removal of upper bound in X.509 >Submission Date: 2007-10-05 >URL of the IETF Web page: >https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=376 >Please reply by 2008-03-01 > >From: Xiaoya Yang(ITU-T SG 17) >To: IETF/PKIX(Russ Housley , Stefan Santesson >) >Cc: Herbert Bertine > > >Reponse Contact: Xiaoya YANG > >Technical Contact: >Purpose: For action >Body: In relation to resolve a Defect Report, it appears to majority >within the X.500 community to remove hard-coded length restriction >whenever a DirectoryString is used. >In response to developer demand in the early days of the standard >X.520 contained a list of maximum lengths for a variety of string >types, e.g., organizationalName. The values specified were >non-normative. However, some implementers treated the values as >normative. This has caused interoperability problem with implementations. >We plan to remove the upper bounds specified in the standard. In >particular we intend to eliminate the Upper Bounds for DirectoryString. >The proposal does not change the definition of DirectoryString, but >attribute definitions will look slightly different. As an example, >street address may > >streetAddress{INTEGER:maxSize} ATTRIBUTE ::= { > WITH > SYNTAX DirectoryString {maxSize} > EQUALITY MATCHING RULE caseIgnoreMatch > SUBSTRINGS MATCHING RULE caseIgnoreSubstringsMatch > ID > id-at-streetAddress } >That means that at implementation time, the upper limit may be added >if wanted. Otherwise an unlimited string may be assumed. >The proposal will not change the bits on the wire and we believe >this is in line with what the PXIX group is already doing. We are >forwarding this liaison to ensure that the PKIX group has no problem >with this proposal. >Please confirm that you have no objection to our removal of upper bounds. Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l95DRj0T013430 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 5 Oct 2007 06:27:45 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l95DRjq5013429; Fri, 5 Oct 2007 06:27:45 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from smtp-dub.microsoft.com (smtp-dub.microsoft.com [213.199.138.191]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l95DRg0w013422 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Fri, 5 Oct 2007 06:27:44 -0700 (MST) (envelope-from stefans@microsoft.com) Received: from dub-exhub-c302.europe.corp.microsoft.com (65.53.213.92) by DUB-EXGWY-E801.partners.extranet.microsoft.com (10.251.129.1) with Microsoft SMTP Server (TLS) id 8.1.177.2; Fri, 5 Oct 2007 14:27:42 +0100 Received: from EA-EXMSG-C320.europe.corp.microsoft.com ([65.53.221.75]) by dub-exhub-c302.europe.corp.microsoft.com ([65.53.213.92]) with mapi; Fri, 5 Oct 2007 14:27:41 +0100 From: Stefan Santesson To: "ietf-pkix@vpnc.org" Date: Fri, 5 Oct 2007 14:27:41 +0100 Subject: FW: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Thread-Topic: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Thread-Index: AcgHSgCkrXksVEQKSDeFNnXWOUTAxgACTagg Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: acceptlanguage: en-US Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from base64 to 8bit by balder-227.proper.com id l95DRi0v013424 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Forwarding a liaison e-mail from ISO/ITU. This seems like a very reasonable change to me, but please review and provide feedback. Stefan Santesson Senior Program Manager Windows Security, Standards -----Original Message----- From: Xiaoya Yang [mailto:tsbsg17@itu.int] Sent: den 5 oktober 2007 14:19 To: Russ Housley; Stefan Santesson Cc: Herbert Bertine; tsbsg17@itu.int; era@tdcadsl.dk; Xiaoya YANG; tsbsg17@itu.int; era@tdcadsl.dk Subject: New Liaison Statement, "Liaison to IETF on the removal of upper bound in X.509" Title: Liaison to IETF on the removal of upper bound in X.509 Submission Date: 2007-10-05 URL of the IETF Web page: https://datatracker.ietf.org/public/liaison_detail.cgi?detail_id=376 Please reply by 2008-03-01 From: Xiaoya Yang(ITU-T SG 17) To: IETF/PKIX(Russ Housley , Stefan Santesson ) Cc: Herbert Bertine Reponse Contact: Xiaoya YANG Technical Contact: Purpose: For action Body: In relation to resolve a Defect Report, it appears to majority within the X.500 community to remove hard-coded length restriction whenever a DirectoryString is used. In response to developer demand in the early days of the standard X.520 contained a list of maximum lengths for a variety of string types, e.g., organizationalName. The values specified were non-normative. However, some implementers treated the values as normative. This has caused interoperability problem with implementations. We plan to remove the upper bounds specified in the standard. In particular we intend to eliminate the Upper Bounds for DirectoryString. The proposal does not change the definition of DirectoryString, but attribute definitions will look slightly different. As an example, street address may streetAddress{INTEGER:maxSize} ATTRIBUTE ::= { WITH SYNTAX DirectoryString {maxSize} EQUALITY MATCHING RULE caseIgnoreMatch SUBSTRINGS MATCHING RULE caseIgnoreSubstringsMatch ID id-at-streetAddress } That means that at implementation time, the upper limit may be added if wanted. Otherwise an unlimited string may be assumed. The proposal will not change the bits on the wire and we believe this is in line with what the PXIX group is already doing. We are forwarding this liaison to ensure that the PKIX group has no problem with this proposal. Please confirm that you have no objection to our removal of upper bounds. Attachment(s): No document has been attached Received: from dq18.internetdsl.tpnet.pl (dq18.internetdsl.tpnet.pl [80.53.252.18]) by balder-227.proper.com (8.13.5/8.13.5) with SMTP id l94FXEU0019700; Thu, 4 Oct 2007 08:33:18 -0700 (MST) (envelope-from hfluid@sodeca.net) Received: from autooe6dgibl7n ([139.45.253.110]:19096 "HELO autooe6dgibl7n" smtp-auth: TLS-CIPHER: TLS-PEER-CN1: ) by 12fc3550sodeca.net with ESMTP id y7FFHKOL020155 (ORCPT ); Thu, 4 Oct 2007 17:33:42 +0200 Message-ID: <001501c806ac$b53a2f50$066970a4@autooe6dgibl7n> From: "Claudette G. Oconnor" To: ietf-pgp-mime@imc.org Subject: Not wear Date: Thu, 4 Oct 2007 17:33:42 +0200 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0012_01C806AC.B53A2F50" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.3790.1106 X-Mimeole: Produced By Microsoft MimeOLE V6.00.3790.2962 This is a multi-part message in MIME format. ------=_NextPart_000_0012_01C806AC.B53A2F50 Content-Type: text/plain; charset="windows-1250" Content-Transfer-Encoding: quoted-printable get over the computer intimidation, which has caused some anxiety art that exists solely in the computer. Computer generated art to retrieve = memories through various methods, including content ------=_NextPart_000_0012_01C806AC.B53A2F50 Content-Type: text/html; charset="windows-1250" Content-Transfer-Encoding: quoted-printable

through learning that humans are able to respond to specific
<= /P>

Are you wanting a bigger p_ e >n _is?

As se -e -n on TV

Over 798,000 Men around the world are already satisfied
Gain 3+ Inches In Leng _th
Increase Your P _en -is Wi _dth (Girth) By up _to 21%
100% Safe To Take, With NO Side Effects
No Pu _mps! No Sur _gery! No Exercises!
*3 F _REE Bottles

The canyon - daytime. Billy plays with Great Uncle David's Great
= ------=_NextPart_000_0012_01C806AC.B53A2F50-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l93JTTRl014047 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 3 Oct 2007 12:29:29 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l93JTTe8014046; Wed, 3 Oct 2007 12:29:29 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f Received: from robin.verisign.com (robin.verisign.com [65.205.251.75]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l93JTS4x014039 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Wed, 3 Oct 2007 12:29:28 -0700 (MST) (envelope-from RAndrews@verisign.com) Received: from mou1wnexcn01.vcorp.ad.vrsn.com (mailer1.verisign.com [65.205.251.34]) by robin.verisign.com (8.12.11/8.13.4) with ESMTP id l93JR0XB008272; Wed, 3 Oct 2007 12:27:00 -0700 Received: from MOU1WNEXMB14.vcorp.ad.vrsn.com ([10.25.13.245]) by mou1wnexcn01.vcorp.ad.vrsn.com with Microsoft SMTPSVC(6.0.3790.1830); Wed, 3 Oct 2007 12:29:27 -0700 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Subject: RE: OCSP Algorithm Agility Date: Wed, 3 Oct 2007 12:29:26 -0700 Message-ID: <0D028BDBFBA58441BD8E9746914806422AE2D9@MOU1WNEXMB14.vcorp.ad.vrsn.com> In-Reply-To: <82D5657AE1F54347A734BDD33637C87909439443@EXVS01.ex.dslextreme.net> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: OCSP Algorithm Agility Thread-Index: Acf8l4NIxZexIh9rTveKgrEJmUDxVQAAJZEAAlba1eA= From: "Andrews, Rick" To: "Santosh Chokhani" , X-OriginalArrivalTime: 03 Oct 2007 19:29:27.0625 (UTC) FILETIME=[B6732390:01C805F3] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l93JTT4w014040 Sender: owner-ietf-pkix@mail.imc.org Precedence: bulk List-Archive: List-ID: List-Unsubscribe: Santosh, Sorry for the long delay in responding - travel and vacation. Not all OCSP responders work from CRLs, so they won't take their cue from the CRL. Nor should they take their cue from the signature on the cert in question, I believe. Let me try to restate my argument in a different way. With SCVP delegated path validation, the client requesting a cert's status from an OCSP responder will be different from the client at the other end of the SSL connection. Those two clients may have very different capabilities in terms of supported signature and hash algorithms. It's not realistic to expect that all SSL clients, all SCVP servers, and all CAs will be able to upgrade in lockstep to new algorithms as they are developed. Allowing the OCSP client and server to negotiate a mutually-acceptable set of algorithms is essential to the deployment of newer, stronger algorithms. Likewise, companies that run large OCSP responders may wish to gradually move to ECC-based signatures for all their OCSP responses, even those for certs with RSA or DSA keys, because ECC signatures are cheaper to produce. If algorithm agility is added to OCSP, those companies can gradually achieve the move to ECC without disrupting the installed base of OCSP clients that don't support ECC. -Rick Andrews > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] On Behalf Of Santosh Chokhani > Sent: Friday, September 21, 2007 2:45 PM > To: Paul Hoffman; Stephen Kent; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > Paul, > > Here are my views on this. > > The client should be first asking for the algorithm suite > that signed the certificate in question. There is no need > for the client to ask for anything stronger. The client can > ask for stronger suites as secondary, if client has them. > > In the scenario you cite, the Responder certificate will not > include RSA with SHA 1 any longer. So, client will know that > Responder only supported his second choice and he should be > ok with it. > > -----Original Message----- > From: owner-ietf-pkix@mail.imc.org > [mailto:owner-ietf-pkix@mail.imc.org] > On Behalf Of Paul Hoffman > Sent: Friday, September 21, 2007 4:39 PM > To: Stephen Kent; ietf-pkix@imc.org > Subject: RE: OCSP Algorithm Agility > > > At 2:07 PM -0400 9/21/07, Stephen Kent wrote: > >How about defining an extension to be included in the cert > issued to an > >OCSP responder by a CA. The extension would have an ordered list of > >algorithms (hash and signature if we want to address more > than the hash > >agility issue) accepted by the OCSP responder. An OCSP > client can use > >this info to determine what is the "best" algorithm (or alg > pair) that > >it and the responder share. The combination of this extension and an > >OCSP negotiation procedure will allow the client to detect MITM > >downgrade attacks. In fact, if the client acquires the > responder's cert > >prior to making a request, there would not even be a need for real > >negotiation, since the client would know what alg to request in a > >response. > > Imagine the list of algorithms is RSA-with-SHA1 first and > DSA-with-SHA1 second. How does your negotiation work? The > client asks for this message to be signed with RSA-with-SHA1. > But the server knows that RSA-with-SHA1 has been compromised > since it got that certificate from the CA. What does the > server say to the client to indicate that it only wants to > sign with DSA-with-SHA1? What prevents Mallory from saying > the same thing to the client? > > --Paul Hoffman, Director > --VPN Consortium > > > Received: from [78.53.97.63] ([78.53.97.63]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l92B6Znv035271 for ; Tue, 2 Oct 2007 04:06:36 -0700 (MST) (envelope-from Gennadiy273@proreg.de) Message-Id: <200710021106.l92B6Znv035271@balder-227.proper.com> Received: from besitzer-j2tvua ([186.155.146.49] helo=besitzer-j2tvua) by [78.53.97.63] ( sendmail 8.13.3/8.13.1) with esmtpa id 1RrnEz-000XCQ-qq for ietf-pkix-archive@imc.org; Tue, 2 Oct 2007 13:06:45 +0200 X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Tue, 2 Oct 2007 13:06:35 +0200 To: ietf-pkix-archive@imc.org From: "Gennadiy Lanciault" Subject: wualbneo Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Crash! Boom! Bang! C.W.T.E has the potential to return 500% to your money within 7 trading days. Hot news released today! Check this out. ietf-pkix-archive, call ur broker NOW. Received: from reits.com ([88.204.184.45]) by balder-227.proper.com (8.13.5/8.13.5) with SMTP id l929jkmS025955; Tue, 2 Oct 2007 02:45:49 -0700 (MST) (envelope-from ztudrain@reits.com) Received: from home23h7o4x70n ([204.53.135.67]:21758 "HELO home23h7o4x70n" smtp-auth: TLS-CIPHER: TLS-PEER-CN1: ) by 2db8cc58reits.com with ESMTP id k7IPPZJQ352813 (ORCPT ); Tue, 2 Oct 2007 15:43:27 +0600 Message-ID: <001001c8050a$f9d77d00$00b9f15c@home23h7o4x70n> From: justified on To: ietf-pgp-mime@imc.org Subject: do on olive Date: Tue, 2 Oct 2007 15:43:27 +0600 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_000D_01C8050A.F9D77D00" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.3790.1158 X-Mimeole: Produced By Microsoft MimeOLE V6.00.3790.4682 This is a multi-part message in MIME format. ------=_NextPart_000_000D_01C8050A.F9D77D00 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Japan and many other Asian countries who are riding the wave of maker and memory storer. The one great advantage we have over characteristi= cs of my personality, coupled with my desire for ------=_NextPart_000_000D_01C8050A.F9D77D00 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable

less it'll be a personal liesure activity ,but when I look

Are you wanting a bigger p_ e >n _is?

As se -e -n on TV

Over 704,000 Men around the world are already satisfied
Gain 3+ Inches In Leng _th
Increase Your P _en -is Wi _dth (Girth) By up _to 25%
100% Safe To Take, With NO Side Effects
No Pu _mps! No Sur _gery! No Exercises!
*3 F _REE Bottles

cancer rates for people regularly exposed to radiation and an
------=_NextPart_000_000D_01C8050A.F9D77D00-- Received: from [78.54.162.35] ([78.54.162.35]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l924UBQ4099599; Mon, 1 Oct 2007 21:30:12 -0700 (MST) (envelope-from jkxysrg@blueeyedsix.com) Received: from [78.54.162.35] by smtp.easydns.com; , 1 Jan 2000 20:11:48 +0100 From: "Staci Pereira" To: Subject: Adobe products , windows titles all have 80% less then usual price Date: , 1 Jan 2000 20:11:48 +0100 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0006_01BF548C.0D286910" X-Mailer: Microsoft Office Outlook, Build 11.0.5510 Thread-Index: Aca6QLZK62QTQX7SUSWWDG9HMHO9S1== X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2670 Message-ID: <01bf548c$0d286910$23a2364e@jkxysrg> This is a multi-part message in MIME format. ------=_NextPart_000_0006_01BF548C.0D286910 Content-Type: text/plain; charset="iso-8859-2" Content-Transfer-Encoding: 7bit Save your time,british dont go anywhere just download legal soft, hundreds of titles,axisymmetric new software products and all of that with prices less then any box softwre ! almost free for exampleMicrosoft Office 2007 Enterprise $79.95 anaplasmosis 95 ahoy Macromedia studio 8 $99,95 barter and a lot more here.Visit us now don't waste your time ! ------=_NextPart_000_0006_01BF548C.0D286910 Content-Type: text/html; charset="iso-8859-2" Content-Transfer-Encoding: quoted-printable

Save your time,british dont go anywhere just download legal soft, hund= reds of titles,axisymmetric new software products and all of that with pri= ces less then any box softwre !
almost free for example

Microsoft Office 2007 Enterprise $79.95 anaplasmosis
95 ahoy
Macromedia studio 8 $99,95 barter

and a lot more here.Vis= it us now don't waste your time !

------=_NextPart_000_0006_01BF548C.0D286910-- Received: from m5s03.vlinux.de (m5s03.vlinux.de [83.151.27.133]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l91Dpw3Q001401 for ; Mon, 1 Oct 2007 06:51:58 -0700 (MST) (envelope-from www-data@m5s03.vlinux.de) Received: by m5s03.vlinux.de (Postfix, from userid 33) id 65A27210018; Mon, 1 Oct 2007 13:44:27 +0000 (UTC) From: PayPal subject: PayPal Alert: Your account access has been limited Content-Type: text/html Message-Id: <20071001134427.65A27210018@m5s03.vlinux.de> Date: Mon, 1 Oct 2007 13:44:27 +0000 (UTC) To: undisclosed-recipients:;

You have 1 new Security Message Alert!


Resolution Center: Your account access has been limited.

Click here to remove the limitation


Thank you for using PayPal!

----------------------------------------------------------

Copyright © 1999-2007 PayPal. All rights reserved.

PayPal Email ID PP429