On 29/02/16 19:30, Stephen Kent wrote:
Rob,

I'm not sure what your proposed resolution for this issue means.

Phases like "a suitably name-constrained intermediate cert" and

This phrase is <xref>'d to the section currently numbered 4.3 (Using a Name-Constrained Intermediate CA).

Is that not sufficient?

"clients may need to used trial and error" are not really appropriate
for a standard. I'll await publication  of the next rev of 6962-bis to
see if there is an algorithmic description of how the matching is to be
performed.

I wrote "MAY need to use trial and error", because a TLS client might guess the correct certificate first time (i.e. without any "error").

Also, in the (many) cases where there are zero suitably name-constrained intermediates in the chain, the SCT or inclusion proof MUST be valid for the end-entity certificate. No trial and error is required when there is only 1 possible choice!

The important point is that a TLS client MUST NOT declare that an SCT or inclusion proof is _invalid_ until it has attempted to verify that SCT or inclusion proof against the end-entity cert _and_ against each of the zero or more suitably name-constrained intermediate cert in the certificate chain sent by the TLS server.
Do we need to state this point more explicitly in the document?

It doesn't matter if a TLS client chooses to attempt to validate against the end-entity cert first or against a suitably name-constrained intermediate first, so I don't think 6962-bis needs to mandate the checking order.

Steve
#23: How can TLS clients match an SCT to a certificate?

Changes (by [email protected]):

  * milestone:   => review


Comment:

  Fixed by https://github.com/google/certificate-transparency-
  rfcs/commit/d71d7707a3eeb5707cf5048c3849b068e477038c

  The !ItemExtension field is gone.  When there's a suitably name-
  constrained intermediate in the certificate chain, TLS clients may
need to
  use trial and error to determine which of the certificates in the
chain an
  SCT or inclusion proof corresponds to.


_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans


--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online
Office Tel: +44.(0)1274.730505
Office Fax: +44.(0)1274.730909
www.comodo.com

COMODO CA Limited, Registered in England No. 04058690
Registered Office:
  3rd Floor, 26 Office Village, Exchange Quay,
  Trafford Road, Salford, Manchester M5 3EQ

This e-mail and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the sender by replying to the e-mail containing this attachment. Replies to this email may be monitored by COMODO for operational or business reasons. Whilst every endeavour is taken to ensure that e-mails are free from viruses, no liability can be accepted and the recipient is requested to use their own virus checking software.

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to