On 03/23/2014 06:32 PM, Michael Richardson wrote:
Keith Moore <[email protected]> wrote:
     > Note that as far as I can tell, it will still be possible to implement a
     > client that supports only OE; it just doesn't bother verifying the cert /
     > DNSSEC + TLSA record / pinned key / whatever.    Whether that client will
     > conform to the recommendations that this group produces, is a different
     > question.   But offhand I don't know of a way to keep such clients from
     > working (though for new protocols, it might be nice if there were one).

Well, that's not really correct advice.

As Eliot Lear pointed out, it's not intended as advice; it's just a recognition of the inherent limitations of the situation that we face. However...

The correct advice is that:
    If the client is unable to verify the cert via (some set of methods,
    locally determined), that it treats the connection as if it was
    unencrypted, according the same level of (un)privileges.

The "correct" advice is highly dependent on the needs of each particular application, AND for existing applications, on the current expectations of users and the difficulty of changing those expectations.

This is the important part of OE (the spirit of 4322, if you like).
    It isn't that one doesn't verify, it's that one doesn't fail if
    one is unable to verify.

I strongly doubt that this is appropriate advice for all (or even most) applications or protocols. In particular, if there's some reason to believe that a server intended to provide a verifiable cert, if that cert is in fact not verifiable, this is an error condition that shouldn't (inherently) be masked by silently treating the connection as if it were cleartext.

The biggest reason that cleartext is still so widely used today in some protocols that support TLS, is that in practice for those protocols, cleartext is sufficient to get clients to work without complaint. If clients continue to work without complaint for sites that support TLS with self-signed certs, there will be no incentive for services to provide anything other than self-signed certificates.

Yes, it's more work and expense for a site to maintain valid CA-signed certs. But if clients complain when they're not there, providing CA-signed certs becomes "part of the cost of doing business", just like maintaining DNS records, keeping software up-to-date, and so forth. If clients don't complain when given invalid certs, providing CA-signed certs will widely be seen as an unnecessary nuisance.

We should of course realize that for some cases (perhaps ordinary web sites, or SMTP servers serving as mail exchangers) there is so much inertia around cleartext operation, and so little affinity between clients and servers, that it will be very difficult to do better than OE. Perhaps in those cases treating TLS with a self-signed cert as equivalent to cleartext will be the best we can ever do, though even in these cases I think we should carefully consider other options. But we should not lull ourselves into thinking that this is appropriate as a general rule, so that we fail to examine the potential alternatives for other situations or protocols.

Keith

_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to