Hi,

because of recent events with policies of public CAs and associated "fallout" 
that removed the ability to get publicly trusted certificates with clientAuth 
for dNSName and ipAddress I've written this early draft of a now standard I'd 
like to propose. As this breaks any and all mutual TLS authentication between 
systems relying upon public trusted certificates (like XMPP, AD FS, or SMTP 
with mutual authentication, like e.g. the Microsoft Exchange Hybrid deployment 
uses) some solution is required.

Within this draft I basically sharpen the definition of "id-pk-clientAuth" and 
"id-pk-serverAuth". "id-pk-clientAuth" should no longer be used for dNSName and 
ipAddress (aka device) certificates and instead a TLS-server should be allowed 
to accept a "id-pk-serverAuth" certificate. As long as it expects 
device-to-device authenticated sessions. This should also address the obscure 
and unspecified "security concerns" the Google Chrome team stated as reason for 
the policy change that caused any and all CAs to drop issuing clientAuth 
certificates. Even the ones that still issue certificates with the clientAuth 
flag set do NOT do so for devices and only for endusers and organizations (EV 
and OV).

Besides that as also Lets Encrypt stopped including the clientAuth flag the 
only free and publicly trusted certificates available are of type 
id-pk-serverAuth". Therefore to keep systems relying upon the mutual 
authentication of TLS between servers operational it is necessary to allow 
servers to use id-pk-serverAuth certificates for TLS-Client Authentication. In 
addition I also tried to outline how a server should validate the received TLS 
certificates.

The validation of the client certificate may currently be a bit too verbose and 
complex. The main goal is to do forward-confirmed reverse DNS lookup, allow for 
DANE/TLSA provided certificates, as well as services behind SVCB and SRV 
records (this part may be unnecessary and maybe can be scratched from the 
draft, I'm not entirely sure). I also provided steps for verifying the source 
port which may also be unnecessary.

I would have hoped that we've more time on this matter, but as the first CAs 
already stopped issuing such certificate and the commonly used lets Encrypt 
certificates are not valid that long either this topic is kinda urgend. I'm 
open to alternative solutions though. It would be great to find some people to 
push this forward to at least have a standard to move over to. Instead of being 
left with a bunch of broken services.

Sincerely,
Klaus Frank


Further links for the background of the above referenced policy change:
* https://googlechrome.github.io/chromerootprogram/
* https://community.letsencrypt.org/t/do-not-remove-tls-client-auth-eku/237427
* https://github.com/processone/ejabberd/issues/4392
* https://github.com/cabforum/servercert/issues/599


A new version of Internet-Draft
draft-frank-mtls-via-serverauth-extension-00.txt has been successfully
submitted by Klaus Frank and posted to the
IETF repository.

Name:     draft-frank-mtls-via-serverauth-extension
Revision: 00
Title:    Allow using serverAuth certificates for mutual TLS (mTLS) 
authentication in server-to-server usages.
Date:     2025-06-16
Group:    Individual Submission
Pages:    10
URL:      
https://www.ietf.org/archive/id/draft-frank-mtls-via-serverauth-extension-00.txt
Status:   
https://datatracker.ietf.org/doc/draft-frank-mtls-via-serverauth-extension/
HTML:     
https://www.ietf.org/archive/id/draft-frank-mtls-via-serverauth-extension-00.html
HTMLized: 
https://datatracker.ietf.org/doc/html/draft-frank-mtls-via-serverauth-extension


Abstract:

   This document aims to standardize the validation of mutual TLS
   authentication between servers (server-to-server).  It outlines
   recommended validation flows as well as provides practical design
   recommendations.  Basically the EKU id-kp-clientAuth and id-kp-
   serverAuth get more precisely defined to represent their common
   understanding by issuing CAs and browsers.  id-kp-clientAuth aka.
   "TLS WWW client authentication" SHOULD mean authentication of a
   natural or legal entity.  id-kp-serverAuth aka.  "TLS WWW server
   authetnication" SHOULD mean authentication of a device.  When two id-
   kp-clientAuth certificates are used this means E2E authentication
   between two users.  Where as two id-kp-serverAuth certificates being
   used means server-to-server authentication.  And one user and one
   server certificate within one TLS connection means client-to-server
   (or technically also server-to-client).  The term "TLS-Client" SHOULD
   no longer be used and mean the party sending the initial package
   while establishing a TLS connection.  This helps to avoid design
   issues moving forward as currently some people thought TLS-Client
   auth was only ever used in "client-to-server" and never within
   "server-to-server" context.  Which sparked the demand for this
   document to begin with to keep server-to-server auth with public
   trusted certificates working.



_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to