On Sat, Oct 10, 2015 at 11:00:30PM -0400, Dave Garrett wrote:

> On Saturday, October 10, 2015 10:35:16 pm Viktor Dukhovni wrote:
> > This is not difficult, it just requires not forgetting that there's
> > more than one way to do (or not do) authentication, and that the
> > TLS protocol needs to remain largely agnostic of the authentication
> > model.  Just deliver the available credentials to the peer, and
> > let the peer decide what to do.
> 
> It's the "or not do" that's the issue, not the other ways to do
> authentication that I'm concerned about.

Concern is appropriate and healthy, and nevertheless the requirement
to not focus too narrowly remains.  For example a client doing
GSSAPI with channel-binding and ignoring TLS certificates is
essentially opportunistic viewed narrowly at the TLS layer, since
it may well accept (and ignore) whatever certificate chain is sent
its way.

> As I said, it looks like we can word this properly in a way that works
> for everyone. I just feel like the best way to cover the OE case fully is
> to address it in a separate section, explicitly, rather than (just) tweak
> wording to accommodate it.

Separate (and thus possibly conflicting) language only as a last
resort when a single specification is simply not possible.  Most
of TLS is trust model agnostic, so these differences should not
matter in most or perhaps the entire specification.

> Even TOFU is more straightforward than OE, because at least with that it
> always follows basically the same pattern.

Not when TOFU pins just the public key in the leaf cert.  Nothing
about the chain is then relevant, and the same SHA-1 questions are
out of scope.

> OE requires you take what would normally be a blatant catastrophic error,
> but wave a wand and say it's OK for this separate use case. That may be
> true, but that doesn't make it any less of a blatant catastrophic error
> when that's not the case.  I'm worried about having these not be completely
> distinct for the same reason you don't put a self-destruct button next to
> a light switch, no matter how well labeled.  ;)

TLS is silent on the trust model.  It makes Web PKI, DANE, TOFU
and OS/OE all equally possible.  The peer gets the TLS credentials,
the rest is up to the peer.

> Also, I want the spec to anticipate some peers being incredibly stupid
> and avoid making it easy to mess things up.

Web PKI authentication is specified in other IETF specifications
(RFC5280, RFC6125, ...).  TLS just sends the rockets up, and it is
not the job of TLS to care where they come down. :-)

-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to