[Mono-dev] Request for comments: mozroots, msroots, X509Chain (Mono-devel-list Digest, Vol 117, Issue 10)

Jo Shields directhex at apebox.org
Thu Jan 8 23:16:46 UTC 2015


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



On 08/01/15 02:37, Edward Ned Harvey (mono) wrote:
> Is Sebastien on this list?  I'm just guessing he'll have an 
> opinion, or at least a passing interest.  I guess Miguel, too.
> 
> When a client application makes a SSL/TLS connection to a server, 
> the application must validate the server cert, validate any chain 
> of intermediate signing certs, and conclude by validating a trusted
> CA root cert that terminates the chain, or else the connection is
> considered untrusted/insecure.  No matter what, the server cert
> (leaf cert) is provided by the server.  No matter what, the root
> cert must exist in a predefined list of roots trusted by the
> client.  This leaves a little bit of ambiguity around the process
> of building the chain of intermediates - The server may send the
> chain to the client, or the client may construct a chain any way it
> can, but if it fails to build a valid chain, the connection is
> considered untrusted/insecure.
> 
> It is well known that mono ships with no trusted CA roots.  If a 
> user wants to use a mono-based application to connect to any type 
> of SSL/TLS server (including https), they are typically required to
> use the "mozroots" command (part of mono) to populate the root 
> list.  There are several things wrong with this -
> 
> #1, it's not user friendly to require users to manually run a 
> command on the terminal before they can use standard internet 
> resources.
> 
> #2, application developers are very likely to automate the mozroots
> process into their applications (I know I do).  This is cumbersome
> to developers, particularly because mozroots is a console
> application, not a class that can be called programatically.
> 
> #3, Although people generally know about the empty mono root CA 
> list, most people don't know there is a separate list of 
> intermediates (also empty).  Both lists are empty by default, but 
> mozroots populates the root list by downloading from mozilla.  The
>  intermediate list remains empty.  There is nothing strictly
> *wrong* with populating the root list and leaving the intermediate
> list empty, but it means the mono client is fragile.  If the SSL
> server fails to send the chain to the client for any reason, then
> the client has no other recourse, and will fail to construct a
> chain. The client could be more robust, if the intermediate list
> were populated too.  Then, the client could usually build a valid
> chain, even if the server fails to send the chain.
> 
> To validate this concept, I'd like to point out that Microsoft 
> ships Windows with a list of roots *and* a list of intermediates 
> populated by default.
> 
> <side note> There is a bug in mono that prevents a mono server from
> sending the chain to the client.  This bug is being worked on 
> independently of this email.  Since a mono client has no 
> intermediates, it means a mono client is doomed whenever it tries 
> to connect to a mono server signed by an intermediate, which is 
> unfortunately the real world norm.  Interestingly, if you run a 
> .Net client and mono server, then the connection succeeds because 
> the client is able to construct the chain from the MS list of 
> intermediates.  Also, if you run a .Net server and mono client, the
> connection succeeds because the .Net server successfully sends the
> chain to the client.  The incompatibility problem occurs strictly
> when a mono client connects to a mono server signed by 
> intermediate.  This lends even more validity to the concept of 
> populating a list of intermediates on the client, to make the 
> client more robust. </side note>
> 
> As a final piece of background information here, I need to point 
> out that mono X509Chain currently does not attempt to use the 
> intermediate store to build a chain.  So even if the intermediate 
> list were populated, the mono client would still fail to build the
>  chain.
> 
> So finally, I get to the meat of this email:
> 
> 1- I would like to introduce a new way of populating the root list.
> I would like to create a new MSRoots class, and corresponding
> "msroots" wrapper console application, that can be used instead of,
> or in addition to mozroots.  Users can run msroots from the
> terminal, just as they are accustomed to do with mozroots. But
> application developers can also use the MSRoots class to perform
> the same job programatically - very easy.
> 
> MSRoots will follow the Microsoft practice of populating roots and
>  intermediates, instead of following the mozilla practice of 
> populating roots without intermediates.  Also, MSRoots will follow
>  the MS selection of roots (currently 43 roots) and will not follow
>  the mozilla list (currently over 140 roots).
> 
> Copyright and license terms are a sticky subject when distributing
>  CA certs.  To avoid any difficulty, I support the current approach
>  of *not* distributing certs, but instead, automating the download.
>  It is absolutely legal (fair use) to distribute URL's that refer
> to potentially copyrighted material; since the URL is only a 
> reference, the URL is legal to distribute under fair use.  I hereby
> volunteer to maintain a list of references, and to automate the
> process of updating that list, so any random schmo or monkey could
> trivially take over the job at any time.  I can establish some way
> of automating a periodic comparison on a fully updated windows
> system, versus the published list, and generating an alert whenever
> Microsoft's list deviates.  Upon alert, an unskilled human or
> monkey such as myself would then manually apply a change to the URL
> list, so literally no information (and hence no copyrighted 
> information) gets copied from either Microsoft or the CA, and yet 
> the list will ada pt over time to follow Microsoft's practices of 
> root & intermediate selections.
> 
> I think it's ok for the list of URL's to be hard-coded into mono, 
> or distributed from a particular URL, or even a completely separate
> open source project.  If it's hard-coded into mono, it will have
> the advantage of always working, but users would only get updates
> when they update mono.  If you think about it, that's actually a
> pretty reasonable constraint, because updates to that list *are*
> security updates, and users *should* be updating mono regularly for
> bugfixes and security updates.  Also, there are well established
> precedents - for example in Windows, you only get updates to your
> root list if you run Windows Updates.  And in linux, you only get
> updates to your root list if you run yum or apt updates, etc.  In
> OSX, you only get updates if you run Software Updates.  So it seems
> reasonable that users would only get updates to the mono MSRoots
> cert lists when they run system updates on mono.  I endorse the
> idea of distributing the URL's hard-coded into mono MSRoots class,
> but ulti mately, this is a question for somebody of authority in
> mono.  (Miguel?  Sebastien?  Someone else?)
> 
> 2- I would like to put effort into X509Chain.Build(), to make it 
> smarter.  Obviously, since it currently doesn't even think about 
> using the intermediate store, that's some obvious room for 
> improvement.  All of the above talk about MSRoots is for naught 
> until X509Chain.Build utilizes the intermediates store.  I am 
> pretty sure, but I'd like to discuss in a separate email, that 
> there are some other flaws in how X509Chain.Build() chooses to 
> build the chain.  I wouldn't be able to specifically say right now
>  - I'll need to look close and scrutinize first.

Extremely related: Mono 3.12 will ship with a new tool, cert-sync,
which populates the root CA store from a static concatenated file.
This will be executed on package install on Linux (on our
mono-project.com packages, Debian/Ubuntu derivatives once 3.12 enters
them, and hopefully other community distros), using the distro cert
store as input. That's /etc/ssl/certs/ca-certificates.crt on Debian
derivatives, and /usr/share/pki/ca-trust-source/ca-bundle.trust.crt on
Red Hat derivatives

tl;dr: Anyone installing or upgrading mono 3.12 from our packages will
get a populated CA cert store by default. No intermediates, since
that's not how these facilities are provided.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBAgAGBQJUrw/dAAoJEMkPnLkOH60Mj7gIAKR11WWSvZHp9c9xuJlYjH8e
7xpqdBNVgY/nWiuAxrj5HI+/LzJGsEy/YOsYEjUb63CbwKQ/SOmBokr43n2FYkf0
OWb+DBOiGJ3Oi0o3hBTf8QgmVeHX/I7xpy+p2/8CcB1nDB7pMC7T9FWzrDQPOvzL
JRvr3p2SJV94zbKHvJGmE2B+tcUr9kNBTbf8ZbQcSA2/v3BkVmzDJ0fRrEMx+RKk
bXNo4DfTC44p/LAEnP8hYQ2loE4um1cdOAsvwLrZvrFp+DcY/TN5sr0WeJ5kpgX0
Jondm3+xhAENO8dIRaMCOGieldqhDE31SQ8tUqjXY178774AP56k8941aSE8twQ=
=UpHs
-----END PGP SIGNATURE-----


More information about the Mono-devel-list mailing list