Bug#514807: Regression in libgnutls security update

2009-02-25 Thread Andreas Metzler
On 2009-02-24 Florian Weimer f...@deneb.enyo.de wrote: * Simon Josefsson: Florian Weimer f...@deneb.enyo.de writes: Simon, could we make the harmless variant (X.509v1 certificate set as trusted is accepted as a root CA, but intermediate X.509v1 certificates aren't accepted) the default in

Bug#514807: Regression in libgnutls security update

2009-02-25 Thread Florian Weimer
* Andreas Metzler: I have been watching this play out since other people participating in this thread are more knowledgable than me. From what I have read I also think this might the right thing to do. Do you intend to push this through security or proposed updates? I've uploaded changed

Bug#514807: Regression in libgnutls security update

2009-02-24 Thread Florian Weimer
* Simon Josefsson: Florian Weimer f...@deneb.enyo.de writes: Simon, could we make the harmless variant (X.509v1 certificate set as trusted is accepted as a root CA, but intermediate X.509v1 certificates aren't accepted) the default in etch? It may be that the practical problems are more

Bug#514807: Regression in libgnutls security update

2009-02-24 Thread Simon Josefsson
Florian Weimer f...@deneb.enyo.de writes: * Simon Josefsson: Florian Weimer f...@deneb.enyo.de writes: Simon, could we make the harmless variant (X.509v1 certificate set as trusted is accepted as a root CA, but intermediate X.509v1 certificates aren't accepted) the default in etch? It

Bug#514807: Regression in libgnutls security update

2009-02-18 Thread Benoit Branciard
I don't know if there is any hope you may reconsider your decision of not fixing this bug (from my point of view it make sense since it breaks 20% of the certification authorities and introduces a significative change in application behaviour), but in case you do, here are my suggestions: -

Bug#514807: Regression in libgnutls security update

2009-02-18 Thread Daniel Kahn Gillmor
On 02/18/2009 01:50 PM, Benoit Branciard wrote: - maintain the ability to refuse v3 certs as AC if they do not have the AC=TRUE attribute, as the current fix does; I'm assuming you mean CA where you have AC here, right? This is an abbreviation for Certificate Authority - but tolerate v1

Bug#514807: Regression in libgnutls security update

2009-02-17 Thread Edward Allcutt
Simon Josefsson wrote: Florian Weimer f...@deneb.enyo.de writes: There doesn't seem to be industry consensus that X.509v1 root certificates are a bad idea. This means that users have little leverage against CAs and server operators when confronted with problematic certificates. Doesn't the

Bug#514807: Regression in libgnutls security update

2009-02-16 Thread Simon Josefsson
Florian Weimer f...@deneb.enyo.de writes: * Simon Josefsson: What are the possible channels to communicate to etch users that they will get (intentional) errors from gnutls if they have 1) a V1 certificate in their certificate chains, or 2) have a RSA-MD2/MD5 signature in non-trusted

Bug#514807: Regression in libgnutls security update

2009-02-16 Thread Benoit Branciard
GTE CyberTrust Global Root, which we happen to use widely in our institution, also is a version *1* x509 certificate. So the libgnutls13 update broke several of our apps. A quick search among the files in ca-certificates package shows up to 20 version-1 certificates over a total of 102.

Bug#514807: Regression in libgnutls security update

2009-02-14 Thread Florian Weimer
* Simon Josefsson: What are the possible channels to communicate to etch users that they will get (intentional) errors from gnutls if they have 1) a V1 certificate in their certificate chains, or 2) have a RSA-MD2/MD5 signature in non-trusted certificates in their chain? Perhaps a wiki page

Bug#514807: Regression in libgnutls security update

2009-02-12 Thread Simon Josefsson
Florian Weimer f...@deneb.enyo.de writes: * Simon Josefsson: What can be done here is to produce better documentation, perhaps in release notes. People must be aware that trusting X.509 certificate chains containing RSA-MD5 signatures or V1 CAs is insecure. I think it is somewhat

Bug#514807: Regression in libgnutls security update

2009-02-12 Thread Simon Josefsson
Daniel Kahn Gillmor d...@fifthhorseman.net writes: One option, of course, is to change the interface of GnuTLS to cleanly separate out trusted peer certificates from trusted CA certificates in the API. This would permit users to specify how they intend to use a given V1 cert. Of course,

Bug#514807: Regression in libgnutls security update

2009-02-12 Thread Simon Josefsson
Edward Allcutt emall...@gleim.com writes: What can be done here is to produce better documentation, perhaps in release notes. People must be aware that trusting X.509 certificate chains containing RSA-MD5 signatures or V1 CAs is insecure. I don't disagree, but breaking working

Bug#514807: Regression in libgnutls security update

2009-02-12 Thread Simon Josefsson
Florian Weimer f...@deneb.enyo.de writes: Simon, could we make the harmless variant (X.509v1 certificate set as trusted is accepted as a root CA, but intermediate X.509v1 certificates aren't accepted) the default in etch? It is possible to allow V1 certs to be used as roots when validating

Bug#514807: Regression in libgnutls security update

2009-02-12 Thread Florian Weimer
* Simon Josefsson: and the DN doesn't really matter, either. The SubjectDN of the CA needs to match the IssuerDN of the next cert in the chain. I meant it in the sense that no root certificates are revoked after the DN has become invalid because the denoted legal entity has ceased to exist,

Bug#514807: Regression in libgnutls security update

2009-02-12 Thread Edward Allcutt
Florian Weimer wrote: * Edward Allcutt: I believe this is a significant regression in stable because at least one widely used CA (godaddy) still issues certificates with a chain ending in a v1 root (ValiCert Class 2). Are we talking about this certificate? Subject: L=ValiCert

Bug#514807: Regression in libgnutls security update

2009-02-11 Thread Edward Allcutt
Dear team, The recent updates for libgnutls fixed CVE-2008-4989. Unfortunately (at least in my opinion) this also subtly changed the semantics of trusted certificate lists. Version 1 X509 certificates in the list are no longer trusted as CAs unless an extra flag is set. Several users of

Bug#514807: Regression in libgnutls security update

2009-02-11 Thread Simon Josefsson
Edward Allcutt emall...@gleim.com writes: Dear team, The recent updates for libgnutls fixed CVE-2008-4989. Unfortunately (at least in my opinion) this also subtly changed the semantics of trusted certificate lists. Version 1 X509 certificates in the list are no longer trusted as CAs

Bug#514807: Regression in libgnutls security update

2009-02-11 Thread Edward Allcutt
Simon Josefsson wrote: The CVE-2008-4989 problem was that parts of the chain validation algorithm was not executed properly. Rejecting V1 CA's is one of those parts, so I believe this is the intended consequence of the CVE-2008-4989 fix. I understood the primary problem to be that if the last

Bug#514807: Regression in libgnutls security update

2009-02-11 Thread Florian Weimer
* Edward Allcutt: I believe this is a significant regression in stable because at least one widely used CA (godaddy) still issues certificates with a chain ending in a v1 root (ValiCert Class 2). Are we talking about this certificate? Certificate: Data: Version: 1 (0x0)

Bug#514807: Regression in libgnutls security update

2009-02-11 Thread Florian Weimer
* Simon Josefsson: What can be done here is to produce better documentation, perhaps in release notes. People must be aware that trusting X.509 certificate chains containing RSA-MD5 signatures or V1 CAs is insecure. I think it is somewhat debatable if this also applies to the root CA

Bug#514807: Regression in libgnutls security update

2009-02-11 Thread Daniel Kahn Gillmor
On 02/11/2009 06:05 PM, Florian Weimer wrote: I think it is somewhat debatable if this also applies to the root CA container, where the X.509 structure is just use as a transport for key material. The RSA-MD5 signature does not hurt there, and the DN doesn't really matter, either. The risk I