On Mon, Feb 13, 2017 at 2:39 PM, Steve Medin <[email protected]>
wrote:

> With de facto use of AIA, there is no issuer installation on the server
> that could be improper. Proper is defined at the moment, either by cache or
> discovery hints.
>

I think this may be the crux of our disagreement. I believe that an ideal
configuration is one that is the most efficient for the most users.
Anything less - that is, things that slow connections or require all
clients to introduce additional logic - is an improper configuration. This
is similar to an HTTP server that always forced an extra redirect or which
failed to use modern cryptographic algorithms or which sent along an extra
40KB of non-gzip'd JS. It may be valid in the protocol, but it's an
improper configuration.

Some improper configurations - however valid - can cause breakage. Others
can be papered over. Any time it's papered over, that's a "hack", not a
desired end state.


> We all understand that microseconds are core to your business model. We’re
> talking about one hit every N years or N-thousand certificates. You’re
> going to earn back the time spent through smaller TLS payload no longer
> sending intermediates that are already cached.
>

In practice, we don't, given CAs' poor responsiveness for AIA fetches and
the poor configurations for cache lifetimes. In theory, yes. In practice,
no.


>
>
> We can deploy AIA CA Issuers support across user agents faster than we can
> deploy PKCS#7 support across servers.
>

This is false for most values, because "user agents" extend beyond the Big
Five browsers (Chrome, Edge/IE, Firefox, Safari, Opera). Consider software
such as curl, or clients such as Python or Perl. In those scenarios, your
deployment scenario is as-bad-or-worse than the server support, but
focusing on server support is a several orders of magnitude less work for
implementation or deployment. Also, to be clear, the deployment of
intermediates in no way requires PKCS#7 support.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to