Regardless of where it goes in the document, I think there's a real
deployment
consideration here: if you run this mechanism through a conventional MITM
proxy, what will happen will be that the secondary cert auth will appear to
just
fail with a bogus signature. If clients respond to that by terminating the
connection,
then we're going to be in pretty bad shape [0]. So I think we either need:

1. To negotiate this with an extension
2. To tell people not to treat signature failures as a hard failure.
3. To have some way to indicate that there was a MITM on-path (e.g., have
the
    application level mechanism include some separate value that's tied to
    the channel that lets the endpoints detect when its two separate
channels).

-Ekr


[0] Note that this also applies to post-handshake authentication, but
that's negotiated
with an extension, so S 9.3 applies.


On Wed, May 9, 2018 at 12:39 AM, Martin Thomson <martin.thom...@gmail.com>
wrote:

> This isn't really a security consideration though, it's a truism.  A MitM
> can break things that depend on end-to-end integrity of the connection.
> On Wed, May 9, 2018 at 11:25 AM Roelof duToit <r@nerd.ninja> wrote:
>
> > If the use of the mechanism is not negotiated on the TLS level then I
> would appreciate it if the “Security Considerations” section of the draft
> could be amended to include a paragraph that warns potential implementors
> that protocol-agnostic middleboxes will break the mechanism without any
> clear failure indicators.
>
> > > On May 8, 2018, at 8:13 PM, Martin Thomson <martin.thom...@gmail.com>
> wrote:
> > >
> > > On Wed, May 9, 2018 at 2:20 AM Roelof duToit <r@nerd.ninja> wrote:
> > >
> > >> I understand that there is not really anything to negotiate per se,
> but
> > > would it not be prudent to add a TLS extension to negotiate support for
> > > exported-authenticator in the TLS layer prior to using it in the
> > > application layer?
> > >
> > > We don't signal the potential need for exporters.  I see no reason to
> > > signal this either.  Any signaling necessary really belongs at the
> higher
> > > layer.
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to