On 23/01/2012 16:12, Brian Trammell wrote:
Hi, Alexey,
Hi Brian,
I can take the CN-ID question to the MILE WG on this.
Sounds like a good idea.
In any case, is it clear enough from this language that CN-ID is a 
"compatibility-only" feature?
I think your text is clear enough.

Cheers,

Brian

On Jan 23, 2012, at 4:32 PM, Alexey Melnikov wrote:

On 23/01/2012 14:22, Brian Trammell wrote:
Hi, Alexey,
Hi Brian,
one more round (hopefully) :) ...

On Jan 23, 2012, at 2:19 PM, Alexey Melnikov wrote:

Okay; how about the following (including Alexey's comments from the previous 
review, and pointing more specifically to 6125)

     <t>RID systems MUST verify the identity of their peers against that stored
     in the certificate presented, as in section 6 of<xref target="rfc6125"/>.
     As RID systems are identified not by URI and RID does not use DNS SRV
     records, they are identified solely by their DNS Domain Names; see Section
     6.4 of<xref target="rfc6125"/>.
(I think you are saying that [using RFC 6125 terminology] DNS-IDs are 
supported, but SRV-IDs or URI-IDs aren't.)
I can say that directly then.
That would be good, thanks.

This is better, but I think you need to say a bit more. Are CN-IDs allowed? Are 
wildcards allowed?
Here, I'm a little unclear on the implications this has for implementation: is 
it reasonable to assume that all implementations that support TLS 1.1 should 
not require CN-IDs for backward compatibility?
There is no direct correlation. But you should keep away from CN-IDs in new 
protocols, if you can. RFC 6125 goes into details why CN-ID don't necessarily 
work.
In reality though, you might have to support CN-IDs if you are using existing 
Certificate Authorities, as opposed to creating your own ones.

Another example of the document that describes
http://tools.ietf.org/html/draft-melnikov-email-tls-certs-00
Thanks for the example. Here's what I've come up with for now...

     <t>RID systems MUST verify the identity of their peers against that stored
     in the certificate presented. All RID systems MUST be identified by a
     certificate containing a<xref target="RFC5280">DNS-ID identifier</xref>
     as in section 6.4 of<xref target="RFC6125"/>. Certificates identifying
     RID systems MAY additionally contain a CN-ID identifier, to allow backward
     compatibility with older PKI implementations. Wildcards MUST NOT appear in
     the DNS-ID or CN-ID of a certificate identifying a RID system. Additional
     general information on the use of PKI with RID systems is detailed in
     Section 9.3 of<xref target="I-D.ietf-mile-rfc6045-bis"/>.</t>

(The text about CN-IDs would be removed if the assumption that TLS 1.1 implies 
no need for CN-ID, as above)
This looks Ok (with or without CN-ID). I am a bit undecided about CN-ID.
Thanks,

Brian


_______________________________________________
Gen-art mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/gen-art

Reply via email to