Hi Martin,

I'm not sure about your erratum, when taken in context. The very next paragraph says:

It is noted that the requirements regarding host name validation (and, in general, binding between the TLS layer and the protocol that runs above it) vary between different protocols. For HTTPS, these requirements are defined by Section 3 of [RFC2818].

This is very much in line with your explanation.

Thanks,
        Yaron

On 05/08/2015 09:47 PM, RFC Errata System wrote:
The following errata report has been submitted for RFC7525,
"Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram 
Transport Layer Security (DTLS)".

--------------------------------------
You may review the report below and at:
http://www.rfc-editor.org/errata_search.php?rfc=7525&eid=4360

--------------------------------------
Type: Technical
Reported by: Martin Rex <[email protected]>

Section: 6.1

Original Text
-------------
6.1. Host Name Validation

    Application authors should take note that some TLS implementations do
    not validate host names.  If the TLS implementation they are using
    does not validate host names, authors might need to write their own
    validation code or consider using a different TLS implementation.

Corrected Text
--------------
6.1. Host Name Validation

    Application authors should take note that the TLS protocol explicitly
    defers checking of names and attributes of end-entity certificates
    to applications, see last sentence of RFC5246 , Section 1 (TLSv1.2).

    Some TLS implementations may offer a convenience function to perform
    a server endpoint identification according to RFC 2818, Section 3
    (HTTP over TLS).  For TLS implementations without such a convenience
    function, and for applications with different server identification
    schemes, application implementors may have to write the necessary
    code themselves.



Notes
-----
TLSv1.0 (rfc2246), TLSv1.1 (rfc4346) and TLSv1.2 (rfc5246) are quite
clear in that the original text is misleading on the actual properties
provided by a TLS implementation itself:

https://tools.ietf.org/html/rfc5246#page-5

                         how to interpret the authentication certificates
    exchanged are left to the judgment of the designers and implementors
    of protocols that run on top of TLS.

Instructions:
-------------
This erratum is currently posted as "Reported". If necessary, please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party (IESG)
can log in to change the status and edit the report, if necessary.

--------------------------------------
RFC7525 (draft-ietf-uta-tls-bcp-11)
--------------------------------------
Title               : Recommendations for Secure Use of Transport Layer 
Security (TLS) and Datagram Transport Layer Security (DTLS)
Publication Date    : May 2015
Author(s)           : Y. Sheffer, R. Holz, P. Saint-Andre
Category            : BEST CURRENT PRACTICE
Source              : Using TLS in Applications
Area                : Applications
Stream              : IETF
Verifying Party     : IESG


_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to