Skip to Content.
Sympa Menu

per-entity - RE: [Per-Entity] deploying TLS on the MDQ server

Subject: Per-Entity Metadata Working Group

List archive

RE: [Per-Entity] deploying TLS on the MDQ server


Chronological Thread 
  • From: "Cantor, Scott" <>
  • To: Tom Mitchell <>, Per-Entity Metadata Working Group <>
  • Subject: RE: [Per-Entity] deploying TLS on the MDQ server
  • Date: Fri, 9 Sep 2016 02:16:10 +0000
  • Accept-language: en-US
  • Authentication-results: spf=pass (sender IP is 164.107.81.216) smtp.mailfrom=osu.edu; bbn.com; dkim=none (message not signed) header.d=none;bbn.com; dmarc=bestguesspass action=none header.from=osu.edu;
  • Ironport-phdr: 9a23:a00DfRz4+7k0N6DXCy+O+j09IxM/srCxBDY+r6Qd0e8TIJqq85mqBkHD//Il1AaPBtqLra8fwLOL+4nbGkU+or+5+EgYd5JNUxJXwe43pCcHRPC/NEvgMfTxZDY7FskRHHVs/nW8LFQHUJ2mPw6aijSI4DUTAhTyMxZubqSwQ9aKzpf/6+fnx5rWKyBJmDG9bLd2ZEGqqATNvckbhaNoIKB3wRzM9D8AQ+lMgE5uOVOPjl7Z69u58Jd/+mxvvOgi9shPGYrgeLkgBehAAS5jPmYp5dH6nRjFRgyK43waFGIMnUwbLRLC6USwdZ73rizg8qJG0y6GIYe+Gbs9Xyil9eExYBjzlWEKOyNvozKfsdB5kK8O+EHpnBd42YOBJdjNbPc=
  • Spamdiagnosticmetadata: NSPM
  • Spamdiagnosticoutput: 1:99

> 1) Any CA in the generally trusted set, with “InCommon RSA Server CA” being
> a likely candidate
> 2) 3 years like the TLS certificate at https://www.internet2.edu is fine,
> whatever is normal for the chosen CA
> 3) Revocation is handled by the CA just as it handles revocation of any
> other
> TLS certificate

Revocation checking is a client issue, not a server one. It is a major issue
*if* you care about the certificate deeply, and it is true that browsers
check CRLs or use OCSP more than they used to.

But server side code is much less likely to do those checks and in many cases
there's no revocation checking at all when you use TLS for data origin
authentication. I think ADFS will do the checking if the certfiicate has CRL
extensions in it, but that's just me guessing.

Using a self-signed certificate has the advantage of clarity: you know
there's no checking done and that a key compromise requires touching every
server relying on it, and it's just a black swan event.

IJ's points are valid: there are definitely exposures with TLS as the basis
of the security that are not exposures with offline signing. But equally
there are attacks possible with signing that aren't possible with TLS if you
trust the server cert. I certainly lean toward believing the advantages of
signing outweigh those attacks, but I think the longer the validUntil window
there, the more some use of TLS becomes attractive.

-- Scott




Archive powered by MHonArc 2.6.19.

Top of Page