> On Feb 5, 2017, at 6:49 PM, Jaime Hablutzel Egoavil <hablutz...@gmail.com> 
> wrote:
> 
> Here is one valid use case, the mail service operator
> doesn't manage or participate in the certificate issuance
> itself but he expects that his users get their certificates
> from a commercial CA, e.g. Symantec (which he trusts for
> validating emails and including them in subject DNs), but
> at the same time, this mail service operator doesn't want
> to allow authentication for all of the Symantec issued
> certificates but only some, e.g. the ones with a given
> domain in the "emailaddress" subject attribute. In this
> case the policy server would need the "emailaddress"
> attribute to decide.

That would be a fragile and risky policy.  You'd be placing
relay access control for your MSAs in the hands of an external
CA.  Your configuration would have to be carefully tuned to
exclude trust of all the other CAs.

How is an external CA better positioned to authenticate your
users than your own servers?

That said, the real obstacle the complexity of X.509v3 certs.
Giving users raw certificate chain to decode and validate is
a disservice.  Consider, for example:

        https://tools.ietf.org/html/draft-ietf-lamps-eai-addresses-06

users may be tempted to start processing "SmtpUtf8Name" SubjectAltName
elements in certificates, but their TLS toolkit might not know these
exist, and may not have applied name constraints.  The domain in the
user's email address may have to be converted from A-labels to U-labels
to comply with the specification, the verifier must not forget to ensure
that the chain is actually trusted...

I am not inclined to just dump raw sewage (X.509) on the user's lap
and ask them to deal with the mess.

It may make more sense to export the list of validated subjectAltName
values, that are known to have been understood (suitable constraints
applied) by the OpenSSL software, where the certificate chain has been
verified...  This is still risky, but a more reasonable UI for Postfix
administrators.

-- 
        Viktor.

Reply via email to