Hi Eliot, all,

 

In our industry we solved this issue by requiring OCSP stapling if and only if 
the certificate being validated carries the OCSP URI in the certificate. 

 

This allows us to live in a mixed environment where support for OCSP might have 
been introduced later on and allows the CA to explicitly support OCSP for the 
certificate by including the URL in it.

 

If the “ecosystem” policy allows it – you might suggest that if OCSP responses 
are not not provided but the URL where to get OCSP responses is known to the 
device (or it is in the certificate), the device/entity can continue with the 
authentication but it should not enable any device/entity functionality before 
successfully executing (and validating) the OCSP protocol first (and disconnect 
if not reachable/invalid/revoked).

 

Just my 2 cents.

 

Cheers,
Max

 

From: Emu <emu-boun...@ietf.org> on behalf of Eliot Lear 
<lear=40cisco....@dmarc.ietf.org>
Date: Thursday, October 29, 2020 at 10:53 AM
To: Joseph Salowey <j...@salowey.net>
Cc: EMU WG <emu@ietf.org>
Subject: Re: [Emu] Consensus Call on OCSP usage in draft-ietf-emu-eap-tls13-11

 

Hi Joe,

 

My suggestion is that we add some discussion about what to do in the case of no 
connectivity to the CA.  This will be a not-uncommon occurrence, IMHO, in 
industrial use cases.

 

Eliot



On 29 Oct 2020, at 17:23, Joseph Salowey <j...@salowey.net> wrote:

 

An issue was raised in a review of  draft-ietf-emu-eap-tls13-11 on the 
mandatory requirement for OCSP stapling [1].  The document makes the use of 
OCSP mandatory in section 5.4 [2]. Several folks have pointed out that this may 
not be feasible in all deployments.  This is a quick consensus call for this 
issue.   Please indicate which option below you support and why.  Please 
respond by November 5, 2020. 

1. Keep the text as is with OCSP mandatory for all implementations

2. Require Servers to Implement and Recommended to Use OCSP with text similar 
to the following:

“EAP-TLS servers supporting TLS 1.3 MUST implement Certificate Status Requests 
(OCSP stapling) as specified in Section 4.4.2.1 of [RFC8446].  It is 
RECOMMENDED that EAP-TLS peers and servers use OCSP stapling for verifying the 
status of server certificates as specified in Section 4.4.2.1 of [RFC8446]. 
When an EAP-TLS peer uses OCSP to verify the certificate status of the EAP-TLS 
server, it MUST use Certificate Status Requests for the server's certificate 
chain and it MUST treat a CertificateEntry (except the trust anchor) without a 
valid CertificateStatus extension as invalid and abort the handshake with an 
appropriate alert.“

 

Thanks,

 

Joe

 

[1] https://mailarchive.ietf.org/arch/msg/emu/0DnfUWPqvKX0_Wo8s-ZypergMHI/
[2] https://tools.ietf.org/html/draft-ietf-emu-eap-tls13-11#section-5.4

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

 

_______________________________________________ Emu mailing list Emu@ietf.org 
https://www.ietf.org/mailman/listinfo/emu 

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to