Hi Folks,

The DISCUSSes and COMMENTs are here:
   https://datatracker.ietf.org/idtracker/ballot/2334/

Joe, Pasi and Chris Newman have been having a discussion to come up with 
modifications to address them.  We want to bring these things to the WG to 
make sure that implementors are comfortable with these changes.  If you 
have comments, please send them in.  If you read these and agree with the 
changes, please comment to the WG list as well so we know that we're 
getting an adequate review.

=== 1 ===
We have a proposed change to Section 5.2, Subject Name Authorization, 
which are the first three paragraphs of Chris Newman's DISCUSS.

    Implementations MUST support specifying the authorized peers using
    locally configured host names, MUST support certification path
    validation [RFC5280] and matching the name with the certificate as
    follows:

    Implementations MUST support matching the locally configured name
    against a SubjectAltName field with a type of dNSName and SHOULD
    support checking the name against the Common Name portion of the
    Subject Distinguished Name.  If more than one identity is present
    in the certificate, a match in any one of the set is considered
    acceptable.

    If the locally configured name is an internationalized domain name,
    conforming implementations MUST convert it to the ASCII Compatible
    Encoding (ACE) format as specified in Section 7 of RFC 5280.

    The '*' (ASCII 42) wildcard character is allowed in subjectAltName
    values of type dNSName (and in Common Name, if used), and then only
    as the left-most (least significant) DNS label in that value.  This
    wildcard matches any left-most DNS label in the server name.  That
    is, the subject *.example.com matches the server names a.example.com
    and b.example.com, but does not match example.com or a.b.example.com.

    Implementations also MAY support wildcards in locally configured
    names to match a range of values.  Using wildcards makes it
    possible to deploy trust-root-based authorization where all
    credentials issued by a particular CA trust root are authorized.

    Implementations MAY support matching a locally configured
    IP address against a SubjectAltName of type ipAddress.  In this
    case, the locally configured IP address is converted to an octet
    string as specified in RFC 5280, Section 4.2.1.6.  A match occurs
    if this octet string is equal to the value of subjectAltName of
    type iPAddress.

==== 2 ===

Joe also wrote for the fourth paragraph of Chris Newman's DISCUSS:
I think the last outstanding issue in the Discuss with using an IANA 
registry for hash function names.  I think we could use the registry for 
RFC 4572.  The allocation is tied to PKIX documents, which is probably OK. 
The one question is whether someone would adopt a hash function that 
become common convention for naming, but was not adopted by PKIX.  I think 
the risk is very low here. It would change the label in the draft from 
"SHA1" to "sha-1".

    The mechanism to generate a fingerprint is to take the hash of
    the DER-encoded certificate using a cryptographically strong
    algorithm and convert the result into colon separated,
    hexadecimal bytes, each represented by 2 uppercase ASCII
    characters.  When a fingerprint value is displayed or configured
    the fingerprint is prepended with an ASCII label identifying the
    hash function followed by a colon.  The ASCII label is take from
    the IANA registry for Hash Function Textual
    Names. Implementations MUST support SHA-1 as the hash algorithm
    and use the ASCII label "sha-1" from the registry to identify the
    SHA-1 algorithm.  The length of a SHA-1 hash is 20 bytes and the
    length of the corresponding fingerprint string is 64 characters.
    An example certificate fingerprint is:

   sha-1:E1:2D:53:2B:7C:6B:8A:29:A2:76:C8:64:36:0B:08:4B:7A:F1:9E:9D

=== 3 ===

We have already cleared Lars' DISCUSS on the system port.

=== 4 ===

I'd like to get a "me too" for Tim's COMMENT:
s/(as described in Sections 5.2 and 5.3)/(as described in Sections 5.3 and 
5.4)/

=========


Please comment on these proposed changes.

Actually, please comment _NOW_ as these are the last things holding up the 
three core IDs.  :-)

Thanks,
Chris
_______________________________________________
Syslog mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/syslog

Reply via email to