Re: [websec] Certificate Pinning via HSTS

2011-09-14 Thread Phillip Hallam-Baker
On Wed, Sep 14, 2011 at 1:38 PM, Daniel Kahn Gillmor wrote: > > I personally like this approach and i use multiple keys for different > hosts serving the same domain for at least one domain i administer > myself. i also note that it is diametrically opposed to your earlier > stated goal of avoidi

Re: [websec] Certificate Pinning via HSTS

2011-09-14 Thread Daniel Kahn Gillmor
On 09/14/2011 12:44 PM, Phillip Hallam-Baker wrote: > On Wed, Sep 14, 2011 at 11:13 AM, Daniel Kahn Gillmor > wrote: > I really hate having private keys move off a host. > > If people are going to be doing that pattern of hosting I would prefer to > have keys tied to the virtual hosts such that t

Re: [websec] Certificate Pinning via HSTS

2011-09-14 Thread Phillip Hallam-Baker
They claimed 600 CAs on the Internet. Their claim was disproved, the intermediate roots are not under direct control of the customers. They did not retract or clarify That is not how reputable academics do their work. They were making a political statement using Fox News type tactics. On Wed,

Re: [websec] Certificate Pinning via HSTS

2011-09-14 Thread Phillip Hallam-Baker
On Wed, Sep 14, 2011 at 11:13 AM, Daniel Kahn Gillmor wrote: > On 09/14/2011 09:46 AM, Phillip Hallam-Baker wrote: > > It gives you scaling and administrative convenience. > > > > If you have 10,000 hosts in your enterprise network you really do not > want > > to have to be managing trust on a pe

Re: [websec] Certificate Pinning via HSTS

2011-09-14 Thread Daniel Kahn Gillmor
On 09/14/2011 11:13 AM, Daniel Kahn Gillmor wrote: >> This is why the bogus EFF study came up >> with the absurd number of 600 CAs. What they have never come clean on is the >> fact that 150 of those 'CAs' are in fact merely intermediate roots tied to a >> single customer that are managed in the sa

Re: [websec] Certificate Pinning via HSTS

2011-09-14 Thread Daniel Kahn Gillmor
On 09/14/2011 09:46 AM, Phillip Hallam-Baker wrote: > It gives you scaling and administrative convenience. > > If you have 10,000 hosts in your enterprise network you really do not want > to have to be managing trust on a per host level. You're not "managing trust on a per host level" -- you're m

Re: [websec] Certificate Pinning via HSTS

2011-09-14 Thread Phillip Hallam-Baker
One technical point, have you considered the ODI mechanism that we developed for CAA up to the -01 version when the client enforcement bit got kiboshed? The name is confuising, but lets say we call it the DIGEST URI type and the digest data consists of DIGEST: < Base64 ( + + ) The idea was tha

Re: [websec] Certificate Pinning via HSTS

2011-09-14 Thread Phillip Hallam-Baker
On Wed, Sep 14, 2011 at 9:15 AM, Daniel Kahn Gillmor wrote: > On 09/13/2011 05:55 PM, Chris Palmer wrote: > > On Tue, Sep 13, 2011 at 5:45 AM, Daniel Kahn Gillmor > > wrote: > > > >> From my perspective, i see no advantage to pinning any of the CAs -- if > >> your EE is compromised, you're sunk.

Re: [websec] Certificate Pinning via HSTS

2011-09-14 Thread Phillip Hallam-Baker
Or maybe DANE should consider migrating to the WEBSEC approach. I was pushing for DANE to consider the pinning and 'must be SSL' approach from the start. The consensus of the group has been that they don't want to consider those use cases at all. Furthermore the response I have got from the key co

Re: [websec] Certificate Pinning via HSTS

2011-09-14 Thread Daniel Kahn Gillmor
On 09/13/2011 05:55 PM, Chris Palmer wrote: > On Tue, Sep 13, 2011 at 5:45 AM, Daniel Kahn Gillmor > wrote: > >> From my perspective, i see no advantage to pinning any of the CAs -- if >> your EE is compromised, you're sunk. And since the mechanism provides a >> mechanism (and nice instructions,

Re: [websec] Certificate Pinning via HSTS (.txt version)

2011-09-14 Thread Phillip Hallam-Baker
I totally agree that this is a feasible attack. It has been seen on a very large scale, Russia did a BGP redirect at a country level in their dispute with Georgia. DNSSEC on A records alone is practically worthless. There is some value but not a great deal. Most DNS attacks have been persuading re

Re: [websec] Certificate Pinning via HSTS (.txt version)

2011-09-13 Thread Yoav Nir
On Sep 14, 2011, at 2:06 AM, SM wrote: > Hi Yoav, > At 11:41 13-09-2011, Yoav Nir wrote: >> Six months ago we would not have thought that Comodo or DigiNotar >> were easy to hack. In the latter case, the customers of DigiNotar >> were left out in the cold. Without > > "The DigiNotar partners

Re: [websec] Certificate Pinning via HSTS (.txt version)

2011-09-13 Thread Chris Palmer
Hi all, Unfortunately I didn't finish the new, XMLified rev of the document today — you raised too many difficult questions. :) It's coming along though. I might be able to get it to the list tomorrow, but I might end up dedicating tomorrow to a different (but related) code-writing effort, hence w

Re: [websec] Certificate Pinning via HSTS (.txt version)

2011-09-13 Thread SM
Hi Yoav, At 11:41 13-09-2011, Yoav Nir wrote: Six months ago we would not have thought that Comodo or DigiNotar were easy to hack. In the latter case, the customers of DigiNotar were left out in the cold. Without "The DigiNotar partnership has laid down its security policy in action protoco

Re: [websec] Certificate Pinning via HSTS (.txt version)

2011-09-13 Thread davidillsley
On 13 Sep 2011, at 23:30, Marsh Ray wrote: > > Wouldn't they have to acquire a valid cert first? Not saying that's out of > the realm of possibility, but... Yeah, but in the case that you've gained control of a domains DNS, which is what happened, how hard would it be to get a valid DV cert?__

Re: [websec] Certificate Pinning via HSTS (.txt version)

2011-09-13 Thread Phillip Hallam-Baker
I think that all this pinning stuff works a lot better if there is a mechanism that allows a return to ground truth. Since we are developing an Internet protocol, the mechanism for ground truth should be DNS in my opinion. It may be impractical to require DNSSEC secured responses in every case.

Re: [websec] Certificate Pinning via HSTS (.txt version)

2011-09-13 Thread Marsh Ray
On 09/13/2011 04:24 PM, davidills...@gmail.com wrote: On 13 Sep 2011, at 21:35, Chris Palmer wrote: sites; small sites may have to choose no pinning or potentially bricking their site (up to the maxAge window). This is not worse than the status quo.""" What about sites which don't currently

Re: [websec] Certificate Pinning via HSTS

2011-09-13 Thread Chris Palmer
On Tue, Sep 13, 2011 at 7:04 AM, Philip Gladstone wrote: [ snip questions about revocation — I'm trying to think about and clarify that stuff next ] > Does this proposal also support self-signed certificates? I.e. if you > connect to a site, accept the self-signed certificate, can that site then

Re: [websec] Certificate Pinning via HSTS

2011-09-13 Thread Chris Palmer
On Tue, Sep 13, 2011 at 5:45 AM, Daniel Kahn Gillmor wrote: > From my perspective, i see no advantage to pinning any of the CAs -- if > your EE is compromised, you're sunk.  And since the mechanism provides a > mechanism (and nice instructions, thanks) for transition to an emergency > offline bac

Re: [websec] Certificate Pinning via HSTS

2011-09-13 Thread Phillip Hallam-Baker
I think we have a potential convergence here between four sets of security policy data and four delivery mechanisms: A) Revocation information for certs/roots B) Security protocol policy 'MUST USE TLS' C) Security Trust Policy 'use only this CA' D) Reporting 1) Data baked into the browser 2) Data

Re: [websec] Certificate Pinning via HSTS (.txt version)

2011-09-13 Thread davidillsley
On 13 Sep 2011, at 21:35, Chris Palmer wrote: > > sites; small sites may have to choose no pinning or potentially > bricking their site (up to the maxAge window). This is not worse than > the status quo.""" What about sites which don't currently use https at all? The DNS records for theregister

Re: [websec] Certificate Pinning via HSTS (.txt version)

2011-09-13 Thread Phillip Hallam-Baker
That is a good point. But in the Diginotar case the CA root was revoked so that could be dealt with by saying that a client should unpin a cert when it has been revoked (or part of the chain has been revoked). Another tool that we could use here is to push out an 'unpin' statement in whatever mec

Re: [websec] Certificate Pinning via HSTS (.txt version)

2011-09-13 Thread Chris Palmer
On Tue, Sep 13, 2011 at 1:06 PM, Marsh Ray wrote: > Q: What kind of pinning would we recommend to our friend or family member > who runs his business on the web? > Right now he has his domain registration and cert from GoDaddy. They could also buy a cert from StartSSL, and keep it on a USB token

Re: [websec] Certificate Pinning via HSTS (.txt version)

2011-09-13 Thread Marsh Ray
On 09/13/2011 03:38 PM, Gervase Markham wrote: On 13/09/11 13:06, Marsh Ray wrote: Or not, like the Dutch government, have the pull to convince Mozilla to hesitate for a few days to revoke your pwned CA. That is rather unfair. You make it sound like they asked, and we complied. In truth, we re

Re: [websec] Certificate Pinning via HSTS (.txt version)

2011-09-13 Thread Steingruebl, Andy
> -Original Message- > From: websec-boun...@ietf.org [mailto:websec-boun...@ietf.org] On > Behalf Of Marsh Ray > > What if they maliciously pinned you to a floundering CA? What is they compromised your DNS server and sent out bogus A records with a crazy long TTL? I think trying to ma

Re: [websec] Certificate Pinning via HSTS (.txt version)

2011-09-13 Thread Gervase Markham
On 13/09/11 13:06, Marsh Ray wrote: > Or not, like the Dutch government, have the pull to convince Mozilla to > hesitate for a few days to revoke your pwned CA. That is rather unfair. You make it sound like they asked, and we complied. In truth, we relied on an assessment of the situation from Gov

Re: [websec] Certificate Pinning via HSTS (.txt version)

2011-09-13 Thread Chris Palmer
On Tue, Sep 13, 2011 at 12:37 PM, Daniel Kahn Gillmor wrote: > So certificate pinning isn't bad in this case -- CA Certificate pinning > is bad. Not even that, really. Pinning your CA and not having a backup pin that chains up to a different CA is the bad thing. _

Re: [websec] Certificate Pinning via HSTS (.txt version)

2011-09-13 Thread Chris Palmer
On Tue, Sep 13, 2011 at 11:41 AM, Yoav Nir wrote: > Six months ago we would not have thought that Comodo > or DigiNotar were easy to hack. In the latter case, the > customers of DigiNotar were left out in the cold. Without > certificate pinning, they just need to spend money on a > new certificat

Re: [websec] Certificate Pinning via HSTS (.txt version)

2011-09-13 Thread Marsh Ray
Just thinking out loud here. On 09/13/2011 01:41 PM, Yoav Nir wrote: Locking yourself into a CA like that seems like a bad idea. Unlike the Dutch government and Mozilla, most customers do not have the pull to force CAs to submit to audits. Or not, like the Dutch government, have the pull to

Re: [websec] Certificate Pinning via HSTS (.txt version)

2011-09-13 Thread Daniel Kahn Gillmor
On 09/13/2011 02:41 PM, Yoav Nir wrote: > the customers of DigiNotar were left > out in the cold. Without certificate pinning, they just need to spend > money on a new certificate and their site is working again. With it, > they are in trouble. With *CA* pinning, DigiNotar customers are defini

Re: [websec] Certificate Pinning via HSTS (.txt version)

2011-09-13 Thread Yoav Nir
On Sep 13, 2011, at 9:15 PM, Peter Saint-Andre wrote: > On 9/12/11 5:53 PM, =JeffH wrote: >> >> This is great, thanks for posting this here. >> >> I have various comments on it I'll try to get to in the next day or so. >> >> During HSTS's gestation, various parties have discussed potential >>

Re: [websec] Certificate Pinning via HSTS (.txt version)

2011-09-13 Thread =JeffH
StPeter said.. > > On 9/12/11 5:53 PM, =JeffH wrote: >>> Chris Evans and I work at Google on the Chrome security team. We have >>> devised this specification for a new extension to Strict Transport >>> Security to allow site operators to "pin" certificates: UAs will >>> require that TLS connection

Re: [websec] Certificate Pinning via HSTS (.txt version)

2011-09-13 Thread Peter Saint-Andre
On 9/12/11 5:53 PM, =JeffH wrote: >> Chris Evans and I work at Google on the Chrome security team. We have >> devised this specification for a new extension to Strict Transport >> Security to allow site operators to "pin" certificates: UAs will >> require that TLS connections be validated with at l

Re: [websec] Certificate Pinning via HSTS

2011-09-13 Thread Chris Palmer
Hi everybody, Thanks for your comments and questions — good ones! I'll try to address them in the XMLified draft that I'm working on now, and which I'll send out today. ___ websec mailing list websec@ietf.org https://www.ietf.org/mailman/listinfo/websec

Re: [websec] Certificate Pinning via HSTS (.txt version)

2011-09-13 Thread Chris Palmer
On Mon, Sep 12, 2011 at 4:53 PM, =JeffH wrote: > I've taken the liberty of re-formatting the document in plain text > (attached), which will better facilitate discussion hereabouts. A next step > will be to re-format it as an Internet-Draft and get it submitted (I > volunteer to help you out with

Re: [websec] Certificate Pinning via HSTS

2011-09-13 Thread Philip Gladstone
On 9/13/2011 8:10 AM, Tom Ritter wrote: I find the Revocation section very confusingly written. > "In the event of a mismatch, clients must check whatever revocation mechanism is available and attempt to discover whether the certificate with the mismatching fingerprint has been revoked." Wha

Re: [websec] Certificate Pinning via HSTS

2011-09-13 Thread Daniel Kahn Gillmor
Thanks for publishing this spec, Chrises! On 09/12/2011 05:56 PM, Chris Palmer wrote: > (Sites can pin to one or more public keys in end entity, subordinate > CA, and/or root CA certificates, for flexibility and disaster > recovery.) I think more discussion about the relative consequences of pi

Re: [websec] Certificate Pinning via HSTS

2011-09-13 Thread Tom Ritter
I echo Marsh's question. Does a x509 Key Fingerprint include basicConstraints? I couldn't imagine a scenario where an attacker could get his own cert signed by a leaf cert of a website - but I also couldn't imagine New York getting hit by an earthquake ;) Other observations: I find the Revocati

Re: [websec] Certificate Pinning via HSTS

2011-09-13 Thread Tobias Gondrom
Hi Chris and Chris, I like the idea, too. And would very much second the thought of putting this down in the form of an Internet-Draft. Especially with the CA problems we have seen in the last few months, this is important and could be a great addition to HSTS in the websec WG. If you cons

Re: [websec] Certificate Pinning via HSTS

2011-09-13 Thread Adam Langley
On Tue, Sep 13, 2011 at 6:41 AM, James Nicoll wrote: > I was under the impression that this wasn't a good idea, as periodic > replacement of the keys was done incase of an undetected compromise? One typically pins, at least, to a CA which allows a site to rotate its keys without issue so long as

Re: [websec] Certificate Pinning via HSTS

2011-09-13 Thread James Nicoll
I was under the impression that this wasn't a good idea, as periodic replacement of the keys was done incase of an undetected compromise? Ross On 13/09/2011 06:53, "Yoav Nir" wrote: >1. Sometimes certificates are renewed periodically with the same public >key. This is very common for sub-CAs a

Re: [websec] Certificate Pinning via HSTS

2011-09-13 Thread Adam Langley
On Tue, Sep 13, 2011 at 1:53 AM, Yoav Nir wrote: > I can think of two reasons. You're basically right. Quoting from my http://www.imperialviolet.org/2011/05/04/pinning.html "In general, hashing certificates is the obvious solution, but the wrong one. The problem is that CA certificates are often

Re: [websec] Certificate Pinning via HSTS

2011-09-12 Thread Yoav Nir
On Sep 13, 2011, at 3:54 AM, Richard L. Barnes wrote: > Hey Chris & Chris, > > This seems like a useful near-term approach, but also probably something that > might want to migrate to DANE over time. > > Is there any particular reason you're using key fingerprints instead of cert > fingerprin

Re: [websec] Certificate Pinning via HSTS

2011-09-12 Thread Marsh Ray
On 09/12/2011 04:56 PM, Chris Palmer wrote: Hi all, Chris Evans and I work at Google on the Chrome security team. We have devised this specification for a new extension to Strict Transport Security to allow site operators to "pin" certificates: UAs will require that TLS connections be validated

Re: [websec] Certificate Pinning via HSTS

2011-09-12 Thread Richard L. Barnes
> > Is there any particular reason you're using key fingerprints instead of cert > > fingerprints? It seems like the latter might be slightly easier to > > implement, since you don't have to parse the cert. > > I assume it's because the certificates public keys are embedded within, in > practice

Re: [websec] Certificate Pinning via HSTS

2011-09-12 Thread =JeffH
rbar...@bbn.com said: > > This seems like a useful near-term approach, but also probably something that > might want to migrate to DANE over time. sure, tho it's going to take a while (eg before browsers hard-fail on assurances sourced via Secure DNS). See.. [dane] A browser's myopic view http

Re: [websec] Certificate Pinning via HSTS

2011-09-12 Thread SM
Hi Chris, At 14:56 12-09-2011, Chris Palmer wrote: Chris Evans and I work at Google on the Chrome security team. We have devised this specification for a new extension to Strict Transport [snip] We eagerly anticipate your comments, questions, concerns, et c. As you Would it be possible for

Re: [websec] Certificate Pinning via HSTS

2011-09-12 Thread Richard L. Barnes
Hey Chris & Chris, This seems like a useful near-term approach, but also probably something that might want to migrate to DANE over time. Is there any particular reason you're using key fingerprints instead of cert fingerprints? It seems like the latter might be slightly easier to implement,

Re: [websec] Certificate Pinning via HSTS (.txt version)

2011-09-12 Thread =JeffH
> Chris Evans and I work at Google on the Chrome security team. We have > devised this specification for a new extension to Strict Transport > Security to allow site operators to "pin" certificates: UAs will > require that TLS connections be validated with at least one of the > public keys identif