Excuse me, but why would anyone wish to use a nontusted CA and open themselves 
to MITM attacks when there are even recognized CAs which offer certificates for 
free? (StartSSL comes to mind first...)

Running any service with a selfsigned certificate (and xmpp or email are even 
moreso sensitive due to the confidential nature of the data being sent over the 
wire) just tells that you are ignorant and careless with the privacy and data 
security of your users.

I personally never connect to any page or service which offers me a self signed 
certificate because i have no reassurance that the line is indeed "secure". My 
postfix also rejects all connection that do not offer valid and signed 
certificates. Call me paranoid, but i bet i am not alone thinking this.

Just my thoughts...

Claudiu

Sent from my Windows Phone

-----Original Message-----
From: Peter Viskup
Sent: 16/12/2012 21:51
To: XMPP Operators Group; ejabb...@jabber.ru
Subject: [Operators] SSL certificates / private CAs / CACert issue

The original message was sent to quite a lot of recipient's lists and 
therefore was rejected.
The only list which accepted this email was an mailinglist of CAcert - 
interesting discussion started there [1].

[1] https://lists.cacert.org/wws/arc/cacert/2012-12/msg00002.html

==== Original message ====

Hi all (sorry for such wide conference, but I am sure it will be 
valuable), hope that there are many experienced admins/developers on 
these lists and many of you probably running certificates signed by your 
own CA on your Jabber servers too.
After some experiences during last months I feel it would be great to 
discuss the use of certificates signed by 'non-public' CA on the public 
services.
We already had some 'excessive' discussion about it with Peter 
Saint-Andre this year and didn't 'solve' it. The only outcome of it was 
that the Jabber.sk service is still not listed in the list of public 
services and the only reason is that it's using certificate signed by 
our internal CA. I did accept that and gave Peter more time to think 
about it as it doesn't harm our service at all.
Nevertheless I just discovered that Google started to reject retrieval 
of emails from the POP3s and IMAPs servers which use the certificates 
from non-public CAs [1]. Unfortunately they didn't provide the list of 
CAs they accept (just mentioned Mozilla foundation's list) and still 
allow to retrieve these emails by not-secured POP3/IMAP channels and 
propose it as an workaround. It is probably planned and has to do 
something with the new rules of Google Apps, which are not for free 
anymore. But this has nothing with XMPP.
The second issue I was fighting with (and not only once) is that 
OpenFire jabber server doesn't accept message retrieval over s2s 
connection with the jabber server using the certificate signed by 
'non-public' CA by default. Hopefully there is a chance to change this 
behavior.
Now let me fall into the situation with SSL certificates in the XMPP 
world in more details.
Just some months before (and it looks like that also these times) the 
CACert wasn't recognised as an publicly trusted CA by Mozilla foundation 
[2] (Opera and many more too) because they didn't pass their auditing. 
But at those times almost all of the jabber servers and clients already 
accepted certificates signed by them as 'secure'. Looks like that XMPP 
foundation proposal to use CACert as one of the possible CAs was the 
only argument for acceptance. The developers of jabber software usually 
do not take care about any security requirements which the CA has to 
pass before it will be added to the list of 'secure' public CAs they do 
recognise. I just checked more support requests for Gajim [3,4] and 
other jabber clients with requests to add CACert or other CA into the 
list of accepted CAs and nobody of the developers asked or checked the 
state of the CA and the issue the CA has with this process in other 
projects or at least didn't mentioned that in the support requests.
I think that this restriction of use only publicly acceptable CAs for 
SSL/TLS communication is not correct in general and should not be 
enforced by Google, XMPP foundation or OpenFire or anybody else. The 
possible solution for this situation in XMPP world could be to provide 
the list of acceptable and secure CAs by XMPP foundation directly. It 
could maintain and provide this list for all XMPP developers. As a part 
of this solution there should be defined the process with clear 
requirements to CA willing to be added to this list.
I will accept that the jabber.sk is not added to the list of public 
services just after this will be addressed and there will be some clear 
statement made by XMPP foundation and/or the public XMPP service list 
maintainers.
As another argument for advocating of the private CAs to be accepted on 
XMPP servers I would remind you that XMPP network is presented as free 
and open and we should take care of not stealing it's openness and freedom.
I would like to give a chance to run any XMPP server with certificates 
signed by their private CA without any message rejection. Of course 
there is nothing what doesn't allow me to request the sign of my 
certificate by CACert or other CA and probably pay some price for it. 
This is just my choice and I am asking if XMPP 'world' is ready and able 
to accept that as I do not see any advantage of publicly accepted CAs in 
XMPP network at this time.
There is also other possibility to limit such issues with not accepted 
connections due to certificate rejections - ask developers of all 
mainstream XMPP software (server and client) to add CA into their lists. 
But I do not find it as an appropriate and correct solution and would 
like to open wide discussion about it instead.

Appreciate all meaningful posts in advance. (sorry for my English)

[1] 
http://support.google.com/mail/bin/answer.py?hl=en&hlrm=en&ctx=gmail&answer=21291#strictSSL
[2] https://bugzilla.mozilla.org/show_bug.cgi?id=215243#c158
[3] https://trac.gajim.org/ticket/3329
[4] https://trac.gajim.org/ticket/5569

Best regards,
--
Peter Viskup
admin of one small public jabber.sk

Reply via email to