This looks good. Joe
> -----Original Message----- > From: Bernard Aboba [mailto:[EMAIL PROTECTED] > Sent: Wednesday, June 20, 2007 10:26 AM > To: Ryan Hurst; Joseph Salowey (jsalowey); gabriel > montenegro; [email protected] > Cc: Bernard Aboba > Subject: RE: [Emu] Multiple Peer-IDs and Server-IDs > > Here is the modified text. I also made it clear that these > requirements only apply to implementations exporting the > Peer-Id or Server-Id. > > "It is possible for more than one subjectAltName field to be > present in a peer or server certificate in addition to an > empty or non-empty subject distinguished name. > > EAP-TLS implementations supporting export of the Peer-Id and > Server-Id SHOULD export all the subjectAltName fields within > Peer-Ids or Server-Ids, and SHOULD also export a non-empty > subject distinguished name field within the Peer-Ids or Server-Ids. > All of the exported Peer-Ids and Server-Ids are considered valid. > > EAP-TLS implementations supporting export of the Peer-Id and > Server-Id SHOULD export Peer-Ids and Server-Ids in the same > order in which they appear within the certificate. > Such canonical ordering would aid in comparison operations > and would enable using those IDs for key derivation if that > is deemed useful. However, the ordering of fields within the > certificate SHOULD NOT be used for access control." > > > > > > ________________________________ > > Subject: RE: [Emu] Multiple Peer-IDs and Server-IDs > Date: Tue, 19 Jun 2007 14:07:28 -0700 > From: [EMAIL PROTECTED] > To: [EMAIL PROTECTED]; [EMAIL PROTECTED]; > [EMAIL PROTECTED]; [email protected] > CC: [EMAIL PROTECTED] > > > I think these changes are good. > > ________________________________ > > From: Joseph Salowey (jsalowey) [mailto:[EMAIL PROTECTED] > Sent: Tue 6/19/2007 1:20 PM > To: Bernard Aboba; gabriel montenegro; [email protected] > Cc: Bernard Aboba > Subject: RE: [Emu] Multiple Peer-IDs and Server-IDs > > > > > > -----Original Message----- > > From: Bernard Aboba [mailto:[EMAIL PROTECTED] > > Sent: Tuesday, June 19, 2007 12:02 PM > > To: Joseph Salowey (jsalowey); gabriel montenegro; > [email protected] > > Cc: Bernard Aboba > > Subject: RE: [Emu] Multiple Peer-IDs and Server-IDs > > > > I'm not sure about defining the location of the subject name > > field, beyond what is covered in RFC 3280. I agree about the > > caution on utilizing ordering for access control. How about: > > > [Joe] OK, but in the text below the ordering seems to > apply to the subjectAltNames and is ambiguous as to whether > it applies to SubjectAltName. Maybe the bit about the order > should be at the end of the paragraph: > > "Peer and Server IDs SHOULD be exported in the same > order in which they appear in the certificate." > > > "It is possible for more than one subjectAltName field to be > > present in a peer or server certificate in addition to an > > empty or non-empty subject distinguished name. EAP-TLS > > implementations SHOULD export all the subjectAltName fields > > within Peer-Ids or Server-Ids in the same order in which they > > appear within the certificate. If the Subject distinguished > > name is non-empty then it SHOULD be exported within the > > Peer-Ids or Server-Ids. All of the exported Peer-Ids and > > Server-Ids are considered valid. > > > > Such canonical ordering would aid in comparison operations > > and would enable using those IDs for key derivation if that > > is deemed useful later on. However, the ordering of fields > > within the certificate SHOULD NOT be used for access control." > > > [Joe] sounds good. > > > > > > > > > > Subject: RE: [Emu] Multiple Peer-IDs and Server-IDs > > > Date: Tue, 19 Jun 2007 11:33:08 -0700 > > > From: [EMAIL PROTECTED] > > > To: [EMAIL PROTECTED]; [email protected] > > > CC: [EMAIL PROTECTED] > > > > > > I'm not so sure that it is a good idea to rely upon the > > order of attributes in a cert. The default behavior is that > > all names are valid. If you are looking for different > > behavior then you need more information than ordering to > > account for cases where an expected name is missing or the CA > > does not impose a particular order. > > > > > > I agree that order may be useful if you are using this > > information in key derivation. > > > > > > If we include this text we should explicitly define where > > the subject name goes in the list (at the end?) and caution > > against depending on order for access control. > > > > > > Cheers, > > > > > > Joe > > > > > > > -----Original Message----- > > > > From: gabriel montenegro [mailto:[EMAIL PROTECTED] > > > > Sent: Friday, June 15, 2007 12:18 AM > > > > To: [email protected] > > > > Cc: Bernard Aboba > > > > Subject: [Emu] Multiple Peer-IDs and Server-IDs > > > > > > > > Looking at > > > > > http://www.drizzle.com/~aboba/EMU/draft-simon-emu-rfc2716bis-1 > > > > 0.txt > > > > > <http://www.drizzle.com/%7Eaboba/EMU/draft-simon-emu-rfc2716bi > > > > s-10.txt> > > > > I have some comments. > > > > > > > > I think that the whole discussion about multiple Peer and > > > > Server-IDs could be reflected better in section 5.2 (last > > paragraph): > > > > > > > > OLD: > > > > It is possible for more than one subjectAltName field to > > be present > > > > in a peer or server certificate in addition to an empty or > > > > non-empty > > > > subject distinguished name. EAP-TLS > implementations SHOULD export > > > > all the subjectAltName fields within Peer-Ids or > > > > Server-Ids. If the > > > > Subject distinguished name is non-empty then it > SHOULD be exported > > > > within the Peer-Ids or Server-Ids. All of the exported > > > > Peer-Ids and > > > > Server-Ids are considered valid. > > > > > > > > It’s good that all available the IDs are being > exported, but > > > > perhaps we should impose a canonical ordering of those > > > > multiple identities. For example by adding "...in the same > > > > order in which they appear within the certificate": > > > > > > > > NEW: > > > > It is possible for more than one subjectAltName field to > > be present > > > > in a peer or server certificate in addition to an empty or > > > > non-empty > > > > subject distinguished name. EAP-TLS > implementations SHOULD export > > > > all the subjectAltName fields within Peer-Ids or > > > > Server-Ids in the same > > > > order in which they appear within the certificate. If the > > > > Subject distinguished name is non-empty then it > SHOULD be exported > > > > within the Peer-Ids or Server-Ids. All of the exported > > > > Peer-Ids and > > > > Server-Ids are considered valid. > > > > > > > > Such canonical ordering would aid in comparison operations > > > > and would enable using those IDs for key > derivation if that > > > > is deemed useful later on. > > > > > > > > -gabriel > > > > > > > > > > > > > > _______________________________________________ > > > Emu mailing list > > > [email protected] > > > https://www1.ietf.org/mailman/listinfo/emu > > > > > > > > _______________________________________________ > Emu mailing list > [email protected] > https://www1.ietf.org/mailman/listinfo/emu > > > > _______________________________________________ Emu mailing list [email protected] https://www1.ietf.org/mailman/listinfo/emu
