Anders Rundgren wrote, On 2009-03-23 08:19:
> In theory TLS path-building could be addressed by server-admins.

Yes, they could do that in their roles as Subject parties and as Relying
parties.  I'd definitely recommend the former.  The latter may be a good
alternative to AIA because it would avoid the vulnerability.

> Unfortunately practice shows that users (RPs) of third-party PKIs do not 
> get informed by CAs when it is time to install a new immediate CA 
> certificate because the brand (root) have expanded their 
> issuing-customer base or when a single CA adds a new immediate CA for 
> performance/migration reasons.

It's sufficient for the CA to send the complete cert chain to the Subject
party when it issues a new cert to that party.

> Due to that some issuers have reverted to putting the entire path 
> (possibly minus the root) into their cards to not get problems with 
> non-MSIE users.   

Smart!

> This method is outside of FIPS201 and the Federal 
> Certificate profile which says AIA is a MUST (in the certs).

Yes, it says the AIA must be there.  I have no problem with that.
If a Subject party (the party who is sending out the cert that identifies
itself) discovers that it has, and is sending out, an incomplete cert
chain, the AIA provides a convenient way for it to know where to go to
get the missing intermediate CA certs.  It's no risk for the relying
party to rely on the AIA in his own cert which he received directly from
the CA.

Perhaps PSM should have a feature, used at cert import time, that discovers
that the chain is incomplete and offers, at that time, to go and fetch the
missing certs in the chain via AIA.

> There are commercial trust networks that would need 30+ certificates to 
> be output.

Yeah, but TLS can handle that.

> IMO, AIA is required in both ends because there is nothing in the TLS 
> spec that requires you to provide the complete path in any end.  

LOL.  SO, the lack of a simply-stated requirement in the TLS RFCs that a
complete chain must be sent means there's no requirement to do that, but
the lack of ANY requirement to implement cert fetching in those same RFCs
means there IS a requirement to do so?  LOL.

> Using AIA Ca Issuers, only roots and EE certs are exchanged on the wire.

Sure.  They can do that, with the attendant risks I previously described
in detail.  (Poor Alice!)

> Anders

/Nelson
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to