Hi Kyle. Please review the TRANS charter [1]. The scope for 6962-bis is "a standards-track mechanism to apply verifiable logs to HTTP over TLS".

I'm guessing you're thinking of S/MIME certificates, Code Signing certificates, etc, which can be logged but which can only be checked via OCSP Fetching (not OCSP Stapling). These are in scope for discussion, possible future WG re-chartering and possible future WG work items.


[1] http://datatracker.ietf.org/wg/trans/charter/

On 01/09/14 01:57, Kyle Hamilton wrote:
The more you apply your own "best idea" decision tree, the more you
restrict perfectly valid options that would otherwise be legitimate by
the spec, in the name of "interoperability". This is why, for example,
Netscape's insistence on a "trustworthy" (which really devolves to
"known, without judgment of trustworthiness") certifier managed to
create a new and completely artificial cottage industry that suffered
artificial stunted growth patterns... because it insisted on
ITU-standard authentication before anyone knew what it was really good
for. It also basically destroyed one of the use-cases explicitly
permitted by the spec, that of the unauthenticated connection.

Don't insist on a client-protocol stapling. Not everything uses TLS --
and even though TLS is the intended use case, leaving low hanging fruit
for other protocols is probably better than binding it so tightly to TLS
that no one can conceive of a use aside from that binding.

-Kyle H

On August 31, 2014 11:44:10 AM PST, Brian Smith <[email protected]>
wrote:

    On Sat, Aug 30, 2014 at 9:05 PM, Fabrice <[email protected]> wrote:

        On Aug 30, 2014, at 15:43, Brian Smith <[email protected]> wrote:

            On Sat, Aug 30, 2014 at 3:22 PM, Fabrice
            <[email protected]> wrote:

                On Aug 30, 2014, at 14:16, Brian Smith
                <[email protected]> wrote:

                I understand the issue you describe and how stapling has
                less opportunities
                for failures and is a MUST for TLS clients, but my
                question was really about
                what should a TLS client do when it does not get an OCSP
                response through
                stapling (RFC6066) but get one directly from the OCSP
                responder or
                potentially other means.

                To me, it seems logical for the TLS clients to process
                SCTs found in those
                responses, no matter how it got them.


            When the client is enforcing CT, it should reject the
            certificate due
            to the missing SCT before it even attempts revocation checking.

            Thus, it would never fetch the OCSP response and so it would
            never
            learn the SCT from a fetched response.


        I don't see any language in the RFC or draft that suggest there
        is an
        ordering between revocation checking and CT validation, or any
        other parts
        of the certificate validation. The only related language I found
        is rather
        succinct:

        In addition to normal validation of the certificate and its
        chain, they
        should validate the SCT (...)


    I understand that your question is "If I fetched an OCSP response,
    should I recognize the SCTs
    in the fetched response?" I don't have any
    opinion on that.

    You are right that the spec. doesn't talk about the ordering of doing
    revocation checking and SCT processing during certificate chain
    validation. I believe that the best ordering is to process SCTs, and
    reject certificates without SCTs, before doing revocation checking or
    path building, especially revocation checking and path building that
    requires doing any networking (OCSP fetching and/or AIA chasing),
    because this reduces the risks that are inherent in doing that
    networking and with doing path building in general. The draft should
    be changed to say that.

    However, you agree that the current draft allows a client to reject a
    certificate due to a missing SCT before it attempts any AIA chasing
    and/or OCSP fetching, right? If so, then the server must provide the
    SCT in the handshake--in the TLS extension, in the certificate, or in
    a stapled
    OCSP response--to interoperate with clients that work that
    way, regardless of whether some clients process SCTs in fetched OCSP
    responses.

        If there are good reasons to ignore SCTs in non-stapled OCSP
        responses, I'd
        like to know about them, and it probably should be mentioned in
        the RFC.


    A browser needs a reliable mechanism for getting SCTs in order for the
    browser to be able to make SCTs mandatory. Browsers that make SCT
    mandatory would ultimately be what would make CT effective. OCSP
    fetching is not reliable, in theory or on practice, so a client cannot
    rely on getting SCTs via OCSP fetching. A browser that processed SCTs
    in fetched OCSP responses would be encouraging websites to avoid the
    reliable mechanisms of SCT delivery in favor of an unreliable
    mechanism, causing CT to be
    unreliable and thus ineffective.

    Cheers,
    Brian

    ------------------------------------------------------------------------

    Trans mailing list
    [email protected]
    https://www.ietf.org/mailman/listinfo/trans


--
Sent from my Android device with K-9 Mail. Please excuse my brevity.


_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans


--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online
Office Tel: +44.(0)1274.730505
Office Fax: +44.(0)1274.730909
www.comodo.com

COMODO CA Limited, Registered in England No. 04058690
Registered Office:
  3rd Floor, 26 Office Village, Exchange Quay,
  Trafford Road, Salford, Manchester M5 3EQ

This e-mail and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the sender by replying to the e-mail containing this attachment. Replies to this email may be monitored by COMODO for operational or business reasons. Whilst every endeavour is taken to ensure that e-mails are free from viruses, no liability can be accepted and the recipient is requested to use their own virus checking software.

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to