Hi Michael, Hi draft authors, > I was surprised to get to the end of the document without any suggestions > about sending certificates by reference rather than value.
Having seen this statement from Michael I have reviewed the document. Two generic observations about the draft: 1) Many statements are made about deployments and no references are provided. To improve quality of the write-up I would strongly suggest to add such references, as you would have to do with an academic publication as well. 2) A few techniques are missing (Certificate URLs and cTLS) and TLS Cached Info was wrongly interpreted. They actually relate to the remark from Michael. > TLS certificates are often relatively large, and the certificate > chains are often long. I think this statement is in general incorrect. You could say that in deployment X certificates have size X and the chain is Y long. > Also, > from deployment experience, EAP peers typically have longer > certificate chains than servers. I would like a reference to be included here. Theoretically, it makes no sense to have a certificate chain for an EAP peer to have a longer certificate chain than a server given a EAP peer talks to one EAP server. In network access authentication it is not only about authentication but the most important part is authorization. Hence, you pretty much always have a one-to-one relationship between the EAP peer and the EAP server. There are no good reasons to have complex CA hierarchies here. > This is because EAP peers often > follow organizational hierarchies and tend to have many intermediate > certificates. Thus, EAP-TLS authentication usually involve > significantly more octets than when TLS is used as part of HTTPS. I think it would make sense to explain this organizational hierarchy aspect in a bit more detail. > The EAP fragment size > in typical deployments is just 1020 - 1500 octets. Reference for the 1500 octets. > For example, many EAP authenticator (access point) > implementations will drop an EAP session if it has not finished after > 40 - 50 round-trips. Is there a reference that could be included? > However, deployment > experience has shown that these jumbo frames are not always > implemented correctly. Add a reference here. > RADIUS can generally transport only about 4000 > octets of EAP in a single message. How was this number constructed? > A certificate chain (called a certification path in [RFC5280]) can > have 2 - 6 intermediate certificates between the end-entity > certificate and the trust anchor [RFC5280]. The PKIX reference here is misleading. I think you included it to refer to the terms but it sounds like the statement that the chain can have 2-6 intermediate CA certificates. I would add the terms to the terminology section and remove the PKIX reference here. I am also wondering what you are trying to say here with this sentence. Are you saying that you have seen deployments for network access authentication that have up to 6 intermediate CA certificates in the chain? > 3. Experience with Deployments > Most common access point implementations drop EAP sessions that do > not complete within 50 round-trips. This sentence is a repetition. > This means that if the chain is > larger than ~ 60 kB, EAP-TLS authentication cannot complete > successfully in most deployments. Regarding the 60 kB certificate chain: Should this be an indication to someone deploying the technology for access network authentication that something has gone wrong? Is this someone you have observed or is this just a theoretical statement? I hope it is the latter. 4.2.1. Pre-distributing and Omitting CA Certificates > When using TLS 1.3, all certificates that > specify a trust anchor known by the other endpoint may be omitted > (see Section 4.4.2 of [RFC8446]). When using TLS 1.2 or earlier, > only the self-signed certificate that specifies the root certificate > authority may be omitted (see Section 7.4.2 of [RFC5246] These sentences sound strange. In TLS (and probably other protocols) it makes no sense to distribute the trust anchors in the protocol itself (because then they wouldn't serve as an anchor for trust). It is my understanding that the TLS 1.3 spec does not require you to send intermediate CA certificates if they have been provisioned to the peer out-of-band already. The text in the TLS 1.2 spec is a bit fuzzy and calls out that the self-signed root certificate MAY be omitted but it does not say anything about omitting the other certs. >4.2.2. Caching Certificates There seems to be the misconception that TLS Cached Info requires a full exchange to work. It is the other way around: If you pre-distribute certificates upfront then there is no need to exchange the certs again. You could just send the fingerprints right away. A spec, however, has to also cover the bootstrapping problem. > 4.2.5. Using Fewer Intermediate Certificates > The EAP peer certificate chain does not have to mirror the > organizational hierarchy. For successful EAP-TLS authentication, > certificate chains should not contain more than 2-4 intermediate > certificates. I would make a stronger statement here. There is absolutely no reason for the certificate chain to mirror the organizational structure. I also don't understand why you would need a hierarchy of 4 intermediate CAs. Finally, at the end: Why did you omit - Client Certificate URLs - RFC 6066), which is also referenced in RFC 7925 and - cTLS (which also has a certificate compression scheme included). Theoretically, you could even list the ability to use alternative certificate format here. Then, you could list raw public keys or the CWT extension. Ciao Hannes PS: It is good to see John's name on a document that talks about TLS. IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you. _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu