> On Apr 12, 2018, at 7:47 PM, Eric Rescorla <e...@rtfm.com> wrote:
> 
> In the current document, there is no expectation that clients will pin the
> server's use of TLSA and therefore the server can safely stop using
> TLSA (or run a mixed server farm). However, because this text implies
> that the client *could* pin, in order to ensure interoperability the server
> would have to provide authenticated denial at the risk of connection
> failure with such clients. However the text also does not require that
> the server do so. Thus, a conformant client and a conformant server
> can fail if the server just stops using TLSA.

Section 8 already says that some clients may require the extension.
Providing denial of existence improves interoperability when all
that the client requires is the extension, and given denial of
existence might accept something else.

Servers that support the extension really ought to provide denial
of existence, if that's all they can do.  Rather than suppress the
extension, if the client demands the extension and the server can't
provide it, interoperability is lost either way.

If your concern is that the new text is "license" for the clients
to arbitrarily require the extension in applications where servers
have no reason to expect such behaviour, I have no objection to
text that says that "the foregoing does not constitute a license
for clients to require the extension where this is not expected
application behaviour" or some such.

The idea is however to encourage servers to provide the denial
of existence, because it may be useful, and is not less interoperable
than eliding the extension.  Giving license to clients to then
expect this from servers is not the intent here.  I'm trying to
sneak in underhanded pinning.  That's not the goal.

I'd like to see explicit pinning (or not) hints from the server,
so we don't need to play guessing games.  Servers that consistently
return a TTL of zero would then be at liberty to drop the extension
rather than deliver DoE (denial of existence) at any time.

In your shoes I'd strongly advocate for the pin TTL, and make sure
that it is set to zero by any servers that be sure to avoid the
concerns that you're expressing.  That way we don't have to play
guessing games about client behaviour.

-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to