Re: [Uta] Adoption of draft-rsalz-use-san

2021-03-14 Thread Brian Smith
I have read the draft and I support most of the ideas. However, is publishing this as a separate RFC that updates RFC 6125 by patching it the best way forward? I think it would be much better to rewrite RFC 6125 with all the patches applied, and then have that new document obsolete RFC 6125 instead

Re: [Uta] Adoption of draft-rsalz-use-san

2021-03-17 Thread Brian Smith
Leif Johansson wrote: > Salz, Rich wrote: > > *>* I think it would be much better to rewrite RFC 6125 with all the > patches applied, and then have that new document obsolete RFC 6125 instead > of updating it. > > > > I took another look at 6125 and I am happy to put up a draft if the WG > prefer

Re: [Uta] How should we change draft-ietf-use-san?

2021-04-19 Thread Brian Smith
Eliot Lear wrote: > >- CAs MUST populate a SAN. >- Verifiers MUST use a SAN if present. >- Verifiers MUST reject certificates without a SAN by default. >- Verifiers MAY be configured to accept certificates without SANs when >very long lived certificates are expected to be enco

Re: [Uta] How should we change draft-ietf-use-san?

2021-04-20 Thread Brian Smith
Eliot Lear wrote: > The issue for me is library support. If libraries take the doc too > seriously, it screws the apps that really need to do the right thing for > their use cases. > > What you're trying to prevent is the entire purpose of this, as I had originally proposed it. The goal is to ha

Re: [Uta] How should we change draft-ietf-use-san?

2021-04-21 Thread Brian Smith
Eliot Lear wrote: > [+iotops] > > Brian, > > On 21 Apr 2021, at 00:22, Brian Smith wrote: > > Eliot Lear wrote: > >> The issue for me is library support. If libraries take the doc too >> seriously, it screws the apps that really need to do the right thing

Re: [Uta] How should we change draft-ietf-use-san?

2021-04-21 Thread Brian Smith
Eliot Lear wrote: > If this is scoped to dnsNames then I’m fine with it going forward as is. > Other names would be problematic. > Could you be more specific as to what other names would be problematic and list them explicitly? Here are the choices in a GeneralName: otherName

Re: [Uta] How should we change draft-ietf-use-san?

2021-04-21 Thread Brian Smith
Eliot Lear wrote: > On 21 Apr 2021, at 20:25, Brian Smith wrote: > > otherName [0] OtherName, > rfc822Name [1] IA5String, > dNSName [2] IA5String, > x400Address

Re: [Uta] How should we change draft-ietf-use-san?

2021-04-22 Thread Brian Smith
Eliot Lear wrote: > Actually, according to 802.1AR-2009, the subject MUST contain requires a > DN with serial number, and it may contain a SAN (e.g., don’t count on it). > That’s the major concern. To me, the rest is really negotiable. > OK, great. I don't think what Rich or what I'm proposing

Re: [Uta] High level comments on draft-ietf-uta-use-san

2021-06-01 Thread Brian Smith
Salz, Rich wrote: > > >- Some sections mention "server" while other sections does not state >anything, therefor applying to both client and server. I think the draft >needs to be very clear on this point. > > > >- I saw that there was a discussion on client certs and that some >

Re: [Uta] Wildcards

2021-07-12 Thread Brian Smith
Jim Fenton wrote: > Rich replied: > > > Clients must be free to ignore wildcards, because of things like *. > air-traffic-control.aero and others that are on the public suffix list. > > Does that then mean that there is an obligation on the part of certificate > checkers to make sure that public

Re: [Uta] Wildcards

2021-07-12 Thread Brian Smith
Ryan Sleevi wrote: > On Mon, Jul 12, 2021 at 4:20 PM Brian Smith wrote: > > If we get to the part of validation where RFC 6125 is relevant then we > already know the wildcard dNSName subjectAltName entry is valid. Given > that, RFC 6125 just needs to specify how to match, s

Re: [Uta] Opportunistic TLS and draft-ietf-uta-tls-bcp-04

2014-10-08 Thread Brian Smith
On Sun, Oct 5, 2014 at 12:26 PM, Yaron Sheffer wrote: > 1. Say explicitly that opportunistic TLS is out of scope. > 2. Or say explicitly that it is in scope, and with the same requirements as > "regular" TLS. > 3. Or come up with a different set of requirements for opportunistic TLS. I think you

Re: [Uta] Brief summary of the UTA WG meeting @IETF 91, Honolulu

2014-11-11 Thread Brian Smith
On Tue, Nov 11, 2014 at 6:01 PM, Orit Levin (LCA) wrote: > https://datatracker.ietf.org/doc/draft-ietf-uta-tls-bcp/ > o Implementations SHOULD NOT negotiate TLS version 1.0 [RFC2246]. > > Rationale: TLS 1.0 (published in 1999) does not support many > modern, strong cipher suites. I thi

Re: [Uta] (extra) WGLC for draft-ietf-uta-tls-bcp-07.txt

2014-11-12 Thread Brian Smith
Stephen Farrell wrote: > 3) Wrt Brian's point about DHE 1024, I think that was already discussed > on the list earlier and while the mozilla figures are interesting they > don't change my mind - I think the benefit of PFS and the fact that > s/w updates can fix this silently after one has configur

Re: [Uta] (extra) WGLC for draft-ietf-uta-tls-bcp-07.txt

2014-11-13 Thread Brian Smith
On Thu, Nov 13, 2014 at 6:15 PM, Peter Saint-Andre - &yet wrote: > The authors have given this further consideration and we have a question: in > practice will it be OK to send *both* status_request and status_request_v2 > in the same handshake? If the client supports both, then it will include b

[Uta] Please adjust the citation for the browser cipher suite proposal

2014-11-19 Thread Brian Smith
Draft 7 says 'Thanks to Brian Smith, whose "browser cipher suites" page is a great resource.' I very much appreciate the thank-you. Could you please adjust the reference to the proposal: s/"browser cipher suites"/"Proposal to Change the Default TLS Ciphersui

Re: [Uta] AES-128 vs. AES-256

2014-11-19 Thread Brian Smith
Stephen Kent wrote: > These numbers suggest a 35%-40% performance penalty for 256-bit vs. 128-bit > AES. > So, on a percentage basis, that's non-trivial. But, in terms or raw > performance, > it may not be an issue for many platforms. Not clear how this plays out > for smart phones. I hope someone

Re: [Uta] Comments on draft-ietf-uta-tls-bcp-07

2014-12-01 Thread Brian Smith
Peter Saint-Andre - &yet wrote: > OLD >o There are no protocol mechanisms to negotiate the DH groups or > parameter lengths supported by client and server. > >o Many servers choose DH parameters of 1024 bits or fewer. > >o There are widely deployed client implementations th

Re: [Uta] Brief summary of the UTA WG meeting @IETF 91, Honolulu

2014-12-02 Thread Brian Smith
Peter Saint-Andre - &yet wrote: > On 11/11/14, 9:10 PM, Brian Smith wrote: >>>o TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 >>> >>>o TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 >>> >>>o TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 >>> >

Re: [Uta] (extra) WGLC for draft-ietf-uta-tls-bcp-07.txt

2014-12-02 Thread Brian Smith
Peter Saint-Andre - &yet wrote: > On 12/1/14, 9:43 PM, Massimiliano Pala wrote: >> >> Hi Peter, all, >> >> It looks ok.. although I would have preferred to maintain some kind of >> reference to partitioned and delta CRL with reference to X.509 (PKIX) - >> since we are talking about TLS, x.509 is t

Re: [Uta] Brief summary of the UTA WG meeting @IETF 91, Honolulu

2014-12-02 Thread Brian Smith
On Tue, Dec 2, 2014 at 11:34 PM, Stephen Farrell wrote: > > Hi Brian, > > I'm not seeing what part of your email is new and not > something already discussed by the WG. Can you clarify? I answered the question that was asked of me. Cheers, Brian ___ U

Re: [Uta] Richard Barnes' Discuss on draft-ietf-uta-tls-bcp-09: (with DISCUSS and COMMENT)

2015-02-18 Thread Brian Smith
Richard Barnes wrote: > Pete Resnick wrote: >> Until we are able to get better community consensus on this topic and how >> to explain it in documents, I think (and I believe the WG agrees) that the >> right thing to say is, "This document isn't talking about OS" and leave it >> at that, which is

Re: [Uta] Richard Barnes' Discuss on draft-ietf-uta-tls-bcp-09: (with DISCUSS and COMMENT)

2015-02-18 Thread Brian Smith
Richard Barnes wrote: > On Thu, Feb 19, 2015 at 1:26 AM, Brian Smith wrote: >> IMO, unauthenticated TLS is so different from secure use of TLS that >> it deserves its own document once we've learned what the *best* >> *current* practices for unauthenticated TLS are, wh

Re: [Uta] WGLC draft-ietf-uta-email-tls-certs

2015-04-10 Thread Brian Smith
On Fri, Apr 10, 2015 at 9:34 AM, Leif Johansson wrote: > This starts a 2 week WGLC on draft-ietf-uta-email-tls-certs. Please > provide your comments on the UTA list before EOB (any TZ) Friday April > 24 2015. What is the reason for making SRV-ID support required for email client software implemen

Re: [Uta] WGLC draft-ietf-uta-email-tls-certs

2015-04-11 Thread Brian Smith
Viktor Dukhovni wrote: > Brian Smith wrote: >> That said, maybe I'm not understanding the importance of SRV-ID. >> Clarification of why supporting SRV-ID is important would be useful. > > My understanding is that clients should support SRV-ID when they > locate the s

Re: [Uta] WGLC draft-ietf-uta-email-tls-certs

2015-04-13 Thread Brian Smith
Alexey Melnikov wrote: > On 12/04/2015 00:08, Brian Smith wrote: >> Even if the client uses SRV records, it will still operate just fine >> using DNS-IDs and without supporting SRV-ID, right? > > In general case this is not true. This will only work correctly if DNS SRV >

Re: [Uta] WGLC draft-ietf-uta-email-tls-certs

2015-04-14 Thread Brian Smith
Viktor Dukhovni wrote: > Brian Smith wrote: > >> When the MUA connects to imap.gmail.com, how would the server know >> which certificate to give the MUA? Would the MUA put >> "_imap.example.com" in the SNI extension of the TLS ClientHello when >> connecti