Re: Certificate with space in CommonName found on deutschepost.de

2015-04-12 Thread Peter Gutmann
Erwann Abalea eaba...@gmail.com writes:

That's really an OID, in the Microsoft arc. I don't know what triggered the
Error: OID contains random garbage message, 

Uhh, the fact that it contains random garbage encoded as an OID?

This OID is correctly encoded, the fact that it contains somewhat random
looking integers isn't an error

Taking Microsoft's own words (from
https://msdn.microsoft.com/en-us/library/windows/desktop/bb540791%28v=vs.85%29.aspx):

  The individual elements in the string, separated by periods, represent the
  arcs and leaves in a registration authority tree that uniquely identifies
  the object and the organization that registered it.

could you perhaps explain to the class which arcs and leaves in a registration
authority tree [...] 3675690 6234259 10436751 12227305 62135 141 959321
10252252 represent?

This is required by the CABF BR.

If this gibberish is required by the BR then there's an awful lot of
noncompliant certs out there.  Pretty much all of them, I'd say.

That could fall under CABF BR Appendix B (4) (a) rule.

Even if I hold the BR doc sideways and squint at it, I still can't see where
in B (4) it says the CA has to include an S/MIME extension for 1970s and 1980s
crypto algorithms in a TLS server cert.  In particular the wording:

  The CA SHALL NOT issue a Certificate that contains [...] unless the CA is
  aware of a reason for including the data in the Certificate.

  CAs SHALL NOT issue a Certificate with [...] unless the Applicant can
  otherwise demonstrate the right to assert the data in a public context;

basically says CAs SHALL NOT do X except that they can if they want.

That could fall under CABF BR Appendix B (4) (a) rule.
No upper limit is imposed by the standards.

There's also no law specifically saying that you're not allowed to stagger
around in public complaining that the sun is too loud and warning people about
the ice weasels, but that doesn't mean that it's not a sign that something's
gone seriously wrong somewhere.

Peter.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Certificate with space in CommonName found on deutschepost.de

2015-04-12 Thread Erwann Abalea
Bonjour Peter,

Le dimanche 12 avril 2015 09:32:40 UTC+2, Peter Gutmann a écrit :
 Erwann Abalea eaba...@gmail.com writes:
 
 That's really an OID, in the Microsoft arc. I don't know what triggered the
 Error: OID contains random garbage message, 
 
 Uhh, the fact that it contains random garbage encoded as an OID?

Well, since a set of numbers that has no clearly identifiable meaning for an 
outside user can reasonably be considered as random, the OID contains random 
garbage part of the message is right. But that doesn't mean it's an error.

 This OID is correctly encoded, the fact that it contains somewhat random
 looking integers isn't an error
 
 Taking Microsoft's own words (from
 https://msdn.microsoft.com/en-us/library/windows/desktop/bb540791%28v=vs.85%29.aspx):
 
   The individual elements in the string, separated by periods, represent the
   arcs and leaves in a registration authority tree that uniquely identifies
   the object and the organization that registered it.
 
 could you perhaps explain to the class which arcs and leaves in a registration
 authority tree [...] 3675690 6234259 10436751 12227305 62135 141 959321
 10252252 represent?

Sure. The 1.3.6.1.4.1.311 is Microsoft's OID arc. 1...311.21 is declared as 
Microsoft CertSrv Infrastructure, and 1...311.21.8 as The root oid for all 
enterprise specific oids.

The rest may be known only by the Registration Authority, the publication of 
the complete arc isn't mandatory. Not knowing the exact meaning of this suite 
of integers doesn't mean this meaning doesn't exist. Microsoft may really 
maintain a complicated OID tree for that purpose, who knows? And even if those 
number are randomly allocated, they still can have a meaning, and the OID can 
still identify something.

[2 SEQUENCE full of zeros]
 This is required by the CABF BR.
 
 If this gibberish is required by the BR then there's an awful lot of
 noncompliant certs out there.  Pretty much all of them, I'd say.

This is required for technically constrained CAs not allowed to issue 
certificates with an iPAddress. See CABF BR section 9.7.
The fact that this encoding is full of zeroes isn't a Mozilla/CABF/GlobalSign 
issue.

A technically constrained CA allowed to issue certificates with an iPAddress 
won't have this part. And of course a non technically constrained CA won't have 
this entire extension.

[S/MIME capabilities extension]
 That could fall under CABF BR Appendix B (4) (a) rule.
 
 Even if I hold the BR doc sideways and squint at it, I still can't see where
 in B (4) it says the CA has to include an S/MIME extension for 1970s and 1980s
 crypto algorithms in a TLS server cert.  In particular the wording:
 
   The CA SHALL NOT issue a Certificate that contains [...] unless the CA is
   aware of a reason for including the data in the Certificate.
 
   CAs SHALL NOT issue a Certificate with [...] unless the Applicant can
   otherwise demonstrate the right to assert the data in a public context;
 
 basically says CAs SHALL NOT do X except that they can if they want.

I wasn't saying that the CA has to, or could include such an extension. Quite 
the contrary, in fact.
Declaring S/MIME capabilities for a TLS server cert is inconsistent.

 No upper limit is imposed by the standards.
 
 There's also no law specifically saying that you're not allowed to stagger
 around in public complaining that the sun is too loud and warning people about
 the ice weasels, but that doesn't mean that it's not a sign that something's
 gone seriously wrong somewhere.
(That may change in Florida, where officials are not allowed to use the terms 
global warming, or climate change)

Ok. Why should the CABF put a limit (on the number of domains) above which the 
CA MUST either:
 - have several CA certificates, or
 - pass a yearly audit
(by why, I'm questioning the security benefit of such a restriction on the 
constraint)

Where should the CABF set the limit to?
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy