gnutls-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: supporting out-of-process certificate validation


From: Simon Josefsson
Subject: Re: supporting out-of-process certificate validation
Date: Wed, 12 Nov 2008 10:13:02 +0100
User-agent: Gnus/5.110011 (No Gnus v0.11) Emacs/23.0.60 (gnu/linux)

Werner Koch <address@hidden> writes:

> On Wed, 12 Nov 2008 09:27, address@hidden said:
>
>> I think we can share many ideas and even code from GnuPG 2.x, so it
>> would be useful if people familiar with that code helped us here.  (Hi
>
> For a test you may use 
>
>   $ dirmngr-client --validate y.crt
>   dirmngr-client: certificate is valid
>
>   $ dirmngr-client --validate x.crt
>   dirmngr-client: validation of certificate failed: Certificate expired
>
> This is a very simple tool which connects to the dirmngr and asks it to
> validate a certificate by using dirmngr's own validation code.  It is
> actually a debugging fature for the validation code.  Using the dirmngr
> daemon has the advantage that it will cache certificates and validation
> results and try to get missing certificates from other places.

Great.  However, you mentioned that it wasn't designed to protect
against DoS scenarios?  I think a GnuTLS validation backend needs that.

I'm not sure exactly what the DoS attacks are here.  The obvious one is
when the attacker sends a long X.509 chain with large RSA keys that
takes a long time to verify the signatures for.  The solution to that
problem is to verify signatures from your trusted certificates and down,
not the other way around.  You can still build the chain path starting
with the end entity certificate though, if you don't want to alter the
chain building algorithm.  Are there other DoS considerations?

Still, I think using the GnuPG 2.x tools for this will save us much code
duplication and better overall system harmony in the end.

/Simon




reply via email to

[Prev in Thread] Current Thread [Next in Thread]