- From: peter williams <home_pw@msn.com>
- Date: Mon, 21 Feb 2011 23:19:40 -0800
- To: "'Henry Story'" <henry.story@bblfish.net>
- CC: <public-xg-webid@w3.org>
- Message-ID: <SNT143-ds9DC4D341DB1146EF31E7C92D80@phx.gbl>
So we have two X, where one can consider these test cases, use case, or things to be denied: Should the webid be http (not https), we recognize that any interceptor can actively manipulate the stream to make it falsely appear that a cert is revoked Should the webid be https (not http), we recognize that a reverse proxy can be acting for the content server and maliciously manipulate the stream to make it falsely appear that a cert is revoked These are just consequences of relying on channels to data origin authenticate content - unlike signed XRDs say which are free from undetectable channel interference, unlike signed DNS RRs containing certs values that similarly do not rely on a channel security for integrity. If recommend we don't go too far down the road of saying: well, we assume a correct, logical, and adversary free world; and buyer beware if it's not; and thus security threats to the abstract protocol just don't need to be considered. Rather, the spec slowly starts to either characterize these unaddressed threats in a security section, or makes countermeasure claims to defeat the threat in the body of the text. We have to compete against signed XRDs over http, which can also contain an SEP (a service endpoint defn) with an embedded self-signed cert. If signed XRDs team up with keyassure for management of the XRD signature's own trust anchor key management, that's quite a integrity package. From: public-xg-webid-request@w3.org [mailto:public-xg-webid-request@w3.org] On Behalf Of Henry Story Sent: Monday, February 21, 2011 4:17 PM To: Peter Williams Cc: public-xg-webid@w3.org Subject: Re: [keyassure] dane-04 trust anchors On 21 Feb 2011, at 23:36, Peter Williams wrote: One has to be careful in webid, since the pickup of the profile document may be subkect to active attacks (including SSL proxies). if the profile document is protected by https then proxies are not an issue, because they can only arise if the user has allowed them to be used, and therefore he trusts them. This is the case for company SSL proxies. If they are illegal proxies - worms, viruses, or such then they are beyond the protocol. A door works if it stops the intruder from coming in through it. If you leave the backdoor open that is a different issue. An active attacker could remove the cert from the array to make it appear that the cert has been revoked, unless the pickup channel has integrity. We assume everything is functioning in the writing of the spec. That is why the language is using MUST and SHOULD, not IS. We are not describing the way the world actually works, with its broken browsers, OSes, viruses and so on... but how they should work for the protocol to function. Traditionally, there is a difference between having status = invalid (becuase I cannot affirm validity as a verifier), and having status = revoked (becuase an authority affirms revocation or suspension). yes. The way the protocol is set up the IDP has to find a profile that is valid and check what it says. If it makes no mention of the public key, then we say the IDP cannot finish the authentication step. That does not mean there may not be other ways to do that. This obviously get one into the usual story of: who is authoritative to make statements about a key/cert, for each type of statement? Obviously this induces a recursion: how does one authenticate the C authority, speaking about the authority of entity X? IN PKIX certs you can have multiple URIs to multiple OCSP responder, each of which can be making different statements about the cert. One, managed typically by the CA and signing its responses using cert that chain to the CA's trust anchor, can be affirming that its "not-revokes" or "not-suspended" (meeting the rules of a qualified cert and signing device, say, that MUST confirm status affirmatively). A second can be saying: I see this is the 14th request about this cert in the last minute, I recommend temp-suspension (based on velocity counts); liability coverage goes to $0 if you disregard this notice. Yes. There may be ways of building services such as this on top of WebID or orthogonally to it. > From: henry.story@bblfish.net > Date: Mon, 21 Feb 2011 23:01:31 +0100 > CC: keyassure@ietf.org; public-xg-webid@w3.org > To: i.grok@comcast.net > Subject: Re: [keyassure] dane-04 trust anchors > 2. In WebID if the public key is no longer listed at the WebID Profile then the client certificate is revoked. In Dane when the key is removed from DNSsec the same happens. Social Web Architect http://bblfish.net/
Received on Tuesday, 22 February 2011 07:34:52 UTC