On Wed, May 9, 2018 at 7:15 PM, Martin Thomson <martin.thom...@gmail.com>
wrote:

> I'm not that concerned about this, though I will concede that it's worth
> pointing out.
>
> Failing to validate a secondary certificate for a server shouldn't be cause
> for terminating an otherwise usable connection.


To be clear: it's not failing to validate the *certificate* it's that the
CertificateVerify
to validate. This should ordinarily never happen, so I definitely think we
should
call that out.

-Ekr

The same goes for clients
> that authenticate using this.  As long as users of exported authenticators
> are aware of this, then they can design for it.
>
> If those users wanted confirmation, then we could provide a
> confirmation-of-mechanism-viability in the application layer.  That could
> just be by including a value derived from the exporter in the negotiation..
>
> In h2, we could do as much as 4 octets of confirmation for cheap, and maybe
> we should.
> https://github.com/httpwg/http-extensions/issues/617
> On Wed, May 9, 2018 at 11:28 PM Eric Rescorla <e...@rtfm.com> wrote:
>
> > Regardless of where it goes in the document, I think there's a real
> deployment
> > consideration here: if you run this mechanism through a conventional MITM
> > proxy, what will happen will be that the secondary cert auth will appear
> to just
> > fail with a bogus signature. If clients respond to that by terminating
> the connection,
> > then we're going to be in pretty bad shape [0]. So I think we either
> need:
>
> > 1. To negotiate this with an extension
> > 2. To tell people not to treat signature failures as a hard failure.
> > 3. To have some way to indicate that there was a MITM on-path (e.g., have
> the
> >      application level mechanism include some separate value that's tied
> to
> >      the channel that lets the endpoints detect when its two separate
> channels).
>
> > -Ekr
>
>
> > [0] Note that this also applies to post-handshake authentication, but
> that's negotiated
> > with an extension, so S 9.3 applies.
>
>
> > On Wed, May 9, 2018 at 12:39 AM, Martin Thomson <
> martin.thom...@gmail.com>
> wrote:
>
> >> This isn't really a security consideration though, it's a truism.  A
> MitM
> >> can break things that depend on end-to-end integrity of the connection..
> >> On Wed, May 9, 2018 at 11:25 AM Roelof duToit <r@nerd.ninja> wrote:
>
> >> > If the use of the mechanism is not negotiated on the TLS level then I
> >> would appreciate it if the “Security Considerations” section of the
> draft
> >> could be amended to include a paragraph that warns potential
> implementors
> >> that protocol-agnostic middleboxes will break the mechanism without any
> >> clear failure indicators.
>
> >> > > On May 8, 2018, at 8:13 PM, Martin Thomson <
> martin.thom...@gmail.com>
> >> wrote:
> >> > >
> >> > > On Wed, May 9, 2018 at 2:20 AM Roelof duToit <r@nerd.ninja> wrote:
> >> > >
> >> > >> I understand that there is not really anything to negotiate per se,
> but
> >> > > would it not be prudent to add a TLS extension to negotiate support
> for
> >> > > exported-authenticator in the TLS layer prior to using it in the
> >> > > application layer?
> >> > >
> >> > > We don't signal the potential need for exporters.  I see no reason
> to
> >> > > signal this either.  Any signaling necessary really belongs at the
> >> higher
> >> > > layer.
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to