+1

From: Emu <emu-boun...@ietf.org>
Date: Thursday, October 29, 2020 at 14:10
To: Eliot Lear <lear=40cisco....@dmarc.ietf.org>
Cc: Max Pala <madw...@openca.org>, EMU WG <emu@ietf.org>
Subject: Re: [Emu] Consensus Call on OCSP usage in draft-ietf-emu-eap-tls13-11
  +1

> On Oct 29, 2020, at 1:37 PM, Eliot Lear <lear=40cisco....@dmarc.ietf.org> 
> wrote:
>
> Hi Max
>
>> On 29 Oct 2020, at 18:30, Max Pala <madw...@openca.org> wrote:
>>
>> Hi Eliot, all,
>>
>> In our industry we solved this issue by requiring OCSP stapling if and only 
>> if the certificate being validated carries the OCSP URI in the certificate.
>
> Perfectly reasonable.
>
>>
>> This allows us to live in a mixed environment where support for OCSP might 
>> have been introduced later on and allows the CA to explicitly support OCSP 
>> for the certificate by including the URL in it.
>
> Yep.
>
>>
>> If the “ecosystem” policy allows it – you might suggest that if OCSP 
>> responses are not not provided but the URL where to get OCSP responses is 
>> known to the device (or it is in the certificate), the device/entity can 
>> continue with the authentication but it should not enable any device/entity 
>> functionality before successfully executing (and validating) the OCSP 
>> protocol first (and disconnect if not reachable/invalid/revoked).
>>
>> Just my 2 cents.
>>
>
> Worth more.
>
> Eliot
>
>> Cheers,
>> Max
>>
>> From: Emu <emu-boun...@ietf.org> on behalf of Eliot Lear 
>> <lear=40cisco....@dmarc.ietf.org>
>> Date: Thursday, October 29, 2020 at 10:53 AM
>> To: Joseph Salowey <j...@salowey.net>
>> Cc: EMU WG <emu@ietf.org>
>> Subject: Re: [Emu] Consensus Call on OCSP usage in 
>> draft-ietf-emu-eap-tls13-11
>>
>> Hi Joe,
>>
>> My suggestion is that we add some discussion about what to do in the case of 
>> no connectivity to the CA.  This will be a not-uncommon occurrence, IMHO, in 
>> industrial use cases.
>>
>> Eliot
>>
>>
>>> On 29 Oct 2020, at 17:23, Joseph Salowey <j...@salowey.net> wrote:
>>>
>>> An issue was raised in a review of  draft-ietf-emu-eap-tls13-11 on the 
>>> mandatory requirement for OCSP stapling [1].  The document makes the use of 
>>> OCSP mandatory in section 5.4 [2]. Several folks have pointed out that this 
>>> may not be feasible in all deployments.  This is a quick consensus call for 
>>> this issue.   Please indicate which option below you support and why.  
>>> Please respond by November 5, 2020.
>>>
>>> 1. Keep the text as is with OCSP mandatory for all implementations
>>>
>>> 2. Require Servers to Implement and Recommended to Use OCSP with text 
>>> similar to the following:
>>>
>>> “EAP-TLS servers supporting TLS 1.3 MUST implement Certificate Status 
>>> Requests (OCSP stapling) as specified in Section 4.4.2.1 of [RFC8446].  It 
>>> is RECOMMENDED that EAP-TLS peers and servers use OCSP stapling for 
>>> verifying the status of server certificates as specified in Section 4.4.2.1 
>>> of [RFC8446]. When an EAP-TLS peer uses OCSP to verify the certificate 
>>> status of the EAP-TLS server, it MUST use Certificate Status Requests for 
>>> the server's certificate chain and it MUST treat a CertificateEntry (except 
>>> the trust anchor) without a valid CertificateStatus extension as invalid 
>>> and abort the handshake with an appropriate alert.“
>>>
>>> Thanks,
>>>
>>> Joe
>>>
>>> [1] 
>>> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmailarchive.ietf.org%2Farch%2Fmsg%2Femu%2F0DnfUWPqvKX0_Wo8s-ZypergMHI%2F&amp;data=04%7C01%7Ctim.cappalli%40microsoft.com%7C78d538dffbd7449646e508d87c35d391%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637395918459834859%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=KrJVJ6Un4%2BHpycHthG7MZPKDJUCHxrCPqib4bMrtRMQ%3D&amp;reserved=0
>>> [2] 
>>> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-ietf-emu-eap-tls13-11%23section-5.4&amp;data=04%7C01%7Ctim.cappalli%40microsoft.com%7C78d538dffbd7449646e508d87c35d391%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637395918459834859%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=xuERey5ZNv3DjwO10WKS0f2cK87ObmQ6H2WXTzqtBDA%3D&amp;reserved=0
>>> _______________________________________________
>>> Emu mailing list
>>> Emu@ietf.org
>>> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Femu&amp;data=04%7C01%7Ctim.cappalli%40microsoft.com%7C78d538dffbd7449646e508d87c35d391%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637395918459834859%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=sl%2B4jNsThcZ8381i7AxlQ7z38dBM%2Bqz1Stox7h7ThLw%3D&amp;reserved=0
>>
>> _______________________________________________ Emu mailing list 
>> Emu@ietf.orghttps://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Femu&amp;data=04%7C01%7Ctim.cappalli%40microsoft.com%7C78d538dffbd7449646e508d87c35d391%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637395918459834859%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=sl%2B4jNsThcZ8381i7AxlQ7z38dBM%2Bqz1Stox7h7ThLw%3D&amp;reserved=0
>
> _______________________________________________
> Emu mailing list
> Emu@ietf.org
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Femu&amp;data=04%7C01%7Ctim.cappalli%40microsoft.com%7C78d538dffbd7449646e508d87c35d391%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637395918459834859%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=sl%2B4jNsThcZ8381i7AxlQ7z38dBM%2Bqz1Stox7h7ThLw%3D&amp;reserved=0

_______________________________________________
Emu mailing list
Emu@ietf.org
https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Femu&amp;data=04%7C01%7Ctim.cappalli%40microsoft.com%7C78d538dffbd7449646e508d87c35d391%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637395918459844854%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=Erp6hV0dny9j3vyAbFhDmqHLxrn66Aet9XtjOwCKSLw%3D&amp;reserved=0
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to