Bug#514807: Regression in libgnutls security update

Benoit Branciard Benoit.Branciard at univ-paris1.fr
Wed Feb 18 18:50:42 UTC 2009


I don't know if there is any hope you may reconsider your decision of 
not fixing this bug (from my point of view it make sense since it breaks 
20% of the certification authorities and introduces a significative 
change in application behaviour), but in case you do, here are my 
suggestions:

- maintain the ability to refuse v3 certs as AC if they do not have the 
"AC=TRUE" attribute, as the current fix does;

- but tolerate v1 certs as root ACs (which the current fix doesn't);

- refuse v1 certs as intermediate AC chains elements, since this appears 
to be the most dangerous threat: if an attacker gains access to an 
AC-validated v1 server cert, he could generate any AC-validated forged 
certs he wants using the robbed cert as an AC intermediate, and dupe 
many clients...

- put somewhere in the doc (maybe a debconf popup ?) that trusting (and 
using) v1 server certs is dangerous because they could be hijacked for 
use as ACs.

And let the API and clients change go for a further Debian release.


Regards,
Benoit Branciard

-- 
Ce message a ete verifie par MailScanner
pour des virus ou des polluriels et rien de
suspect n'a ete trouve.






More information about the Pkg-gnutls-maint mailing list