Re: Issue 378: `getRemoteCertificates()` is ill-defined

On Sun, Nov 8, 2015 at 9:45 PM, Martin Thomson <martin.thomson@gmail.com>
wrote:

> On 8 November 2015 at 15:42, Eric Rescorla <ekr@rtfm.com> wrote:
> >> The most typically suggested use of this method is to retrieve one or
> more
> >> certificates so as to be able to display information to the user.
> However,
> >> since it is up to the application what to do with the certificate(s),
> any
> >> information displayed to the user is potentially untrustworthy.   For
> >> example, chain validation is a browser, not an application
> responsibility.
> >
> >
> > Actually, I'm not sure it is a browser responsibility, since there are
> lots
> > (most) cases where the peer certificate is unverifiable. At minimum you
> > would need a "verified" bit.
>
> I would have thought that we would error out if the certificate didn't
> match the a=fingerprint line.


Yes.



> And we're certainly not building a
> chain of any sort.
>

Yes, that was my point. However, as Cullen pointed out separately,
it's not impossible that the peer (typically a server) would have a valid
chain and that one might do something with that, e.g., display it as
an identity. See:
https://tools.ietf.org/html/draft-ietf-rtcweb-security-arch-11#section-5.5

"  If the far endpoint was directly verified, either via a third-party
verifiable X.509 certificate or via a Web IdP mechanism (see Section 5.6
<https://tools.ietf.org/html/draft-ietf-rtcweb-security-arch-11#section-5.6>)
the "security characteristics" MUST include  the verified information.
X.509 identities and Web IdP   identities have similar semantics and should
be displayed in a         similar way."

-Ekr

Received on Monday, 9 November 2015 11:08:30 UTC