Re: certutil -D corrupting NSS database...

2011-02-12 Thread Nelson B Bolyard
On 2011-01-25 13:07 PDT, Michael H. Warfield wrote:

> [...] Instead of having a cert in the
> database with the name I specified in creating the .p12 file, I ended up
> with a cert in the database with the name of the E-Mail address in the
> cert.  Not sure where that problem is (openssl or the pk12util import).
> But, I went to delete that certificate and that's when the fun begun.
> "certutil -D -n postmas...@wittsend.com" ran without error but the cert
> was still there.  Run it again and you get this error:
> 
> [root@romulus ipsec.d]# certutil -D -n postmas...@wittsend.com -d . 
> certutil: could not find certificate named "postmas...@wittsend.com":
> security library: bad database.
> 
> That's also when I noticed I was missing at least one other cert.  

I was unable to reproduce any of this with the cert DB you sent me.
Before I deleted the cert with that command above, the cert DB was OK,
not corrupted, and after I deleted it, it was also OK.  The cert I had
specified, and its nickname record AND its email record were all deleted
from the DB, leaving it in a consistent state.  A second delete attempt
produced the same error message you saw, but didn't modify the DB at all.
I tried with both certutil and libs from NSS 3.11.latest and 3.12.latest
and got the same results both ways.

I have these thoughts about the different behaviors that you and I
experienced.

1) Maybe you had another program that was also holding the DB files open
at the same time you did the certutil -D command.

2) IINM, You had the private key for some certs in your key3.db by virtue
of having used pk12util to import one or more, and I didn't.  That might
have made a difference.

3) It's possible that the original cert DB you had was in some state of
corruption, and the cert DB you reconstructed for my testing was not
corrupted.

Unless and until I can reproduce the behavior you saw, I won't be of much
help in resolving it.  Sorry. :-/

-- 
/Nelson Bolyard
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: TLS server keys in DNS: client policy proposal

2011-02-12 Thread Steve Schultze

Zack,

I think having some kind of statement from the Moz community could be 
helpful, and a good excuse for Moz folks to get up to speed on the spec.


With respect to the Section 3 text, it may be best simply to voice your 
thoughts directly on the DANE list.  I don't think the current text is 
considered settled by the group.  For instance, you can see my recent 
message suggesting changes consistent with Matt's suggested text:


http://www.ietf.org/mail-archive/web/keyassure/current/msg00923.html

I think your suggestions below track similarly to Matt's suggestion, but 
I need to take a closer look.  I'd suggest we do this on the DANE list. 
 If DANE seems to settle on something, and Moz folks don't like it, 
maybe we can coordinate on a counter-proposal.


Does that seem reasonable?

Cheers,
Steve

On 2/1/11 12:52 AM, Zack Weinberg wrote:

[Some of you may have seen an earlier draft of this proposal before.
I originally sent it to secur...@mozilla.org and was asked to bring it
here.]

I've been following the mailing list for the IETF's "keyassure"
working group, which plans to standardize a mechanism for putting
application-layer server keys (or their hashes) in DNS, certified by
DNSSEC. TLS/SSL is the first target, and of course also the most
interesting for the Web.

While the current proposal seems sound technically, the WG has been
avoiding client policy -- there is a bit of policy in the current
draft, but it's worded vaguely enough to be (IMO) useless. I've
drafted a policy spec which I'd like to propose to the WG. However,
before doing so, I thought I would run it by y'all. If you like it,
perhaps we could present this as the Mozilla consensus position rather
than just one guy's opinion; if you don't like it I am eager to hear
why.

For reference, this is the current draft proposal:

http://tools.ietf.org/html/draft-ietf-dane-protocol-03

and the mailing list archives may be found here:

http://www.ietf.org/mail-archive/web/keyassure/current/threads.html

-- cover letter to WG begins --

I [We, Mozilla] would like to see the DANE specification's section 3
("Use of TLS certificate associations") expanded considerably. The
present text is a great improvement on having no policy at all (as in
earlier drafts) but is still vague enough that all client software
might not behave in the same way in response to a TLSA record set;
similarly, a server administrator might misunderstand the consequences
of adding a TLSA record to their zone. Without a clear, unambiguous
specification of client policy, I do not think DANE will offer any
security benefits. Therefore I have drafted a policy which is
suitable for the needs of Web security. It seems to me that it should
also suit other protocols secured with TLS, but I could be wrong, and
would welcome corrections.

We see four primary benefits from DANE to the Web, and our proposal is
written with them in mind:

* It could provide additional security in the presence of
untrustworthy "middleboxes", such as home routers vulnerable to
remote exploitation and conversion to MITM attackers.

* It could provide a mechanism for preventing the "suborned CA"
attacks described in .

* It could provide an alternative to DV certification for sites that
currently opt to use self-signed certs.

* It could eliminate inconveniences and security-degrading workarounds
in the use of CDNs for TLS-secured content, such as very long
subjectAltName lists.

The proposal below is a complete replacement for section 3 of DANE.
Small wording changes would also be required in some other sections;
I am prepared to write those changes if the WG adopts this proposal.

-- proposal begins --

# Client application behavior when TLSA records are present

Clients that wish to make use of TLSA records in securing a connection
MUST be security-aware in the sense of RFC 4033. (In subsequent text,
it is assumed that the clients under discussion wish to make use of
TLSA records if possible.)

Clients MUST ignore TLSA records whose DNSSEC validation state is
"insecure" or "indeterminate". Clients MUST also ignore TLSA records
they do not understand (for instance, records with a cert type or hash
type they do not implement).

Clients that receive *any* "bogus" records for a server that they wish
to connect to (whether or not this affects a TLSA record) MUST NOT
proceed with the connection.

Clients that receive a "secure" TLSA record for a server MUST treat
this as an assertion by the zone administrator that *only* end-entity
certificates that can be associated with the domain name, according to
the procedure in section 2.1, are legitimate. Therefore, if a client
receives a secure TLSA record, and subsequently receives an in-band
certificate chain that does *not* match the record, it MUST reject the
certificate and abort the connection. This rule applies even if the
in-band chain would have been trusted in the absence of TLSA
information.

Clients SHOULD NOT al

Re: TLS server keys in DNS: client policy proposal

2011-02-12 Thread Stephen Schultze

On 2/12/11 7:03 AM, Eddy Nigg wrote:

If anybody else on this list would like to present a more compelling
argument than you have


as if your arguments are more convincing and the only ones that
count :-)


Not at all.  I was inviting others to voice their support of your 
position as well, but so far it's just you.


I am just a messenger on the DANE stuff, but I do think I've represented 
it accurately.  As you may recall, this whole thread started when Zack 
proposed a statement of support of DANE (with some helpful edits to the 
draft spec).  There are people far more qualified than me who can go 
into greater detail on the DANE WG list:


https://www.ietf.org/mailman/listinfo/keyassure
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: TLS server keys in DNS: client policy proposal

2011-02-12 Thread Eddy Nigg

On 02/12/2011 05:44 AM, From Steve Schultze:
Not that many phishing attacks rely on HTTPS.  That report also 
details phishing attacks *on people seeking to purchase SSL 
certificates* in which the phishing happens over plaintext.  If 
there's any community that would require an HTTPS connection in order 
to be successfully phished, it would be that one.


Right, financial institutions and CAs really should use something else 
than user name and password pairs. I know some that use client 
certificates instead (hint, hint).


If anybody else on this list would like to present a more compelling 
argument than you have


as if your arguments are more convincing and the only ones that count :-)

but I don't think that the two of us will make any progress with more 
back-and-forth.




Full agreement this time between us.

--
Regards

Signer:  Eddy Nigg, StartCom Ltd.
XMPP:start...@startcom.org
Blog:http://blog.startcom.org/
Twitter: http://twitter.com/eddy_nigg

--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto