[caops-wg] Name Constraints - attempt at framing issues

Von Welch vwelch at ncsa.uiuc.edu
Fri Oct 14 11:21:56 CDT 2005


David,

I think part of the issue here is that trust is not binary. I trust a  
CA to do certain things. The reason why we are discussing Name  
Constraints is that they are a way to express the limitations of that  
trust.

Von



On Oct 14, 2005, at 9:15 AM, David Chadwick wrote:

>
>
> Cowles, Robert D. wrote:
>
>>
>>
>>> 1) What CAs do we wish to consider as potential issuers for our   
>>> community? Is it just "Grid CAs" (by that I mean CA we can  
>>> reasonably  except to adhere to best practices as specified by  
>>> GGF WGs) or do we  want to also consider CAs that we have no  
>>> reasonable expectation of  being able to impact their policies or  
>>> procedures (e.g. commercial  CAs) as potential issuers for our  
>>> community as well?
>>>
>> I think that if we are successful, all this will be used in ways
>> we can't now imagine or, in the future, control.  To me, the idea  
>> of depending on CA's to issue certificates for DNs that are globally
>> unique is just asking for trouble.
>>
>
> Trusted third parties that cannot be trusted!! Why are we bothering  
> with them? Building a whole trust infrastructure on untrusted TTPs  
> is a pointless exercise in futility.
>
> regards
>
> David
>
>
>  Administrative controls to
>
>> keep the namespaces separate are clearly not good enough. The signing
>> policy file is a technical control but it still seems pretty weak.
>> To me, the thing that is unique is (DN + CA) and the function of the
>> CA is to try it's best to not issue a cert with the same DN to  
>> different people. I would be happy if they can do just that and I
>> think it unreasonable to believe that the DN is unique in the  
>> universe (or even a small section thereof).  The signing policy
>> files basically allow us to say - given this DN, it should have been
>> issued by that CA - and as far as I can see, it's because the CA
>> is't stored in the gridmapfile (and maybe it's not there because
>> the DN was suppoed to be unique - but that was8-10 years ago, and
>> we know better now).
>>
>>> 2) Do we believe that during normal operation the CAs indicated  
>>> in  the response to the first question have policy that will  
>>> result in  their issuing globally unique names and will reliably  
>>> follow that  policy?
>>>
>> I think it's not true in "normal operation" and that any  
>> moderately talented attacker would be able to generate a condition  
>> outside
>> of "normal operations" and get *someone* to issue a certificate
>> with any DN they chose.
>>
>>> 3) If a CA is compromised, given currently implementations, this  
>>> will
>>>
>> (my comments here were in an earlier email).
>>
>
> -- 
>
> *****************************************************************
> David W. Chadwick, BSc PhD
> Professor of Information Systems Security
> The Computing Laboratory, University of Kent, Canterbury, CT2 7NF
> Tel: +44 1227 82 3221
> Fax +44 1227 762 811
> Mobile: +44 77 96 44 7184
> Email: D.W.Chadwick at kent.ac.uk
> Home Page: http://www.cs.kent.ac.uk/people/staff/dwc8/index.html
> Research Web site: http://sec.cs.kent.ac.uk
> Entrust key validation string: MLJ9-DU5T-HV8J
> PGP Key ID is 0xBC238DE5
>
> *****************************************************************
>
>





More information about the caops-wg mailing list