Re: how do we agree?

2009-02-20 Thread David E. Ross
On 2/13/2009 11:52 AM, Eddy Nigg wrote: > On 02/13/2009 09:36 PM, Ben Bucksch: >> FWIW, this is irrelevant. *We* require the ETSI. We can also require >> additional requirements, like that the CPS is published. >> >>> or you have to add a new policy or practices point which says that >>> regardless

Re: Hongkong Post Root Inclusion Request

2009-02-20 Thread Frank Hecker
Nelson B Bolyard wrote: Here is some info that should help with understanding all this. Thanks, this is very useful. So to sum up my understanding: If NSS had support for CRL DP, but no support for CIDP, then what would happen with Hongkong Post (assuming no changes to its current practices,

Re: Hongkong Post Root Inclusion Request

2009-02-20 Thread Nelson B Bolyard
Frank Hecker wrote, On 2009-02-20 11:15: > Frank Hecker wrote: >> Option 4: Hongkong Post makes no changes to either its CRLs or its end >> entity certs, and NSS ignores partitioned CRLs encountered in CRL DP >> processing. In this option Hongkong Post would make no changes >> whatsoever to its

Re: Hongkong Post Root Inclusion Request

2009-02-20 Thread Frank Hecker
Frank Hecker wrote: Option 4: Hongkong Post makes no changes to either its CRLs or its end entity certs, and NSS ignores partitioned CRLs encountered in CRL DP processing. In this option Hongkong Post would make no changes whatsoever to its current practices. NSS would fetch the partitioned CRL

Re: Hongkong Post Root Inclusion Request

2009-02-20 Thread Frank Hecker
Nelson B Bolyard wrote: I understand your question to be relating the way FF works today, and NOT to the way it will/might work when CrlDP extension processing causes automatic CRL fetches. Yes, that's correct. My question was with respect to the current situation, i.e., if we were to approve

Re: Return of i18n attacks with the help of wildcard certificates

2009-02-20 Thread Nelson B Bolyard
Benjamin Smedberg wrote, On 2009-02-20 10:28: > On 2/20/09 12:11 PM, Nelson B Bolyard wrote: >> Benjamin Smedberg wrote, On 2009-02-19 07:39: >> >>> It sounds to me that we could and should fix this bug simply by disabling >>> punycode for the wildcard portion. >> I'm not sure what you're proposing

Re: Return of i18n attacks with the help of wildcard certificates

2009-02-20 Thread Eddy Nigg
On 02/20/2009 08:28 PM, Benjamin Smedberg: I don't see how the attack could have been done without wildcards. CA guidelines say that certificates should not be issued with homographic characters that might cause confusion, and as far as we know these guidelines are being followed. The attack here

Re: Return of i18n attacks with the help of wildcard certificates

2009-02-20 Thread Benjamin Smedberg
On 2/20/09 12:11 PM, Nelson B Bolyard wrote: > Benjamin Smedberg wrote, On 2009-02-19 07:39: > >> It sounds to me that we could and should fix this bug simply by disabling >> punycode for the wildcard portion. > > I'm not sure what you're proposing here, Ben, or what effect you think > it would h

Re: Hongkong Post Root Inclusion Request

2009-02-20 Thread Frank Hecker
Jean-Marc Desperrier wrote: Frank Hecker wrote: [...] Am I right that someone who wished to check revocation status on EE certs in Firefox could just download the full CRL and use that? [...] The right word is indeed *could*. The address of that CRL *does not* appear inside the certificate, a

Re: Return of i18n attacks with the help of wildcard certificates

2009-02-20 Thread Nelson B Bolyard
Benjamin Smedberg wrote, On 2009-02-19 07:39: > It sounds to me that we could and should fix this bug simply by disabling > punycode for the wildcard portion. I'm not sure what you're proposing here, Ben, or what effect you think it would have. Homomorphic characters aren't a problem for wildcar

Re: Hongkong Post Root Inclusion Request

2009-02-20 Thread Nelson B Bolyard
Frank Hecker wrote, On 2009-02-19 06:26: > Jean-Marc Desperrier wrote: >> The content of the IssuingDistributionPoint is in fact perfectly >> correct, pointing to >> http://crl1.hongkongpost.gov.hk/crl/eCertCA1CRL2.crl just like does the >> cRLDistributionPoints in the cert itself. > > Thank yo

Re: Return of i18n attacks with the help of wildcard certificates

2009-02-20 Thread Jean-Marc Desperrier
Eddy Nigg wrote: On 02/19/2009 03:30 PM, Jean-Marc Desperrier: Moxie Marlinspike in Black Hat has just demonstrated a very serious i18n attack using a *.ijjk.cn certificate. http://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf .cn is authorized

Re: Hongkong Post Root Inclusion Request

2009-02-20 Thread Ian G
On 18/2/09 23:05, Frank Hecker wrote: Paul Hoffman wrote: A Mozilla policy that says "we allow trust anchors for which we cannot do revocation checking" seems wrong. Well, yes, but as Eddy pointed out for the past 10+ years we've had a policy that basically amounted to the same thing, at lea

Re: Hongkong Post Root Inclusion Request

2009-02-20 Thread Jean-Marc Desperrier
Frank Hecker wrote: [...] Am I right that someone who wished to check revocation status on EE certs in Firefox could just download the full CRL and use that? [...] The right word is indeed *could*. The address of that CRL *does not* appear inside the certificate, and the adresse of the the CR