On Mon 2018-12-10 02:24:29 +0000, Salz, Rich wrote:
>>     * the status_request TLS extension doesn't provide a mechanism for
>        stapling OCSP for intermediate certs.
>   
> Nobody does this.  There's a handful of reasons, but the end result is: 
> nobody does this.

I'd be interested in hearing the reasons enumerated.  It seems to me
like being able to promptly revoke an intermediate certificate is a
useful bit of mechanism.  is it just because we hope the major browsers
are clever and responsive enough that they'll push out a CRLset (or
equivalent) when they hear of an intermediate that is found to be
violating the BRs?

>>    So i think this is a big swirling mishmash of not-quite-compatible and
>     not-quite-complete specs, especially as we think about TLS clients and
>     servers that want to be interoperable with both TLS 1.2 and TLS 1.3.
>   
> Yes, there are many things that could be cleared out with a BCP doc.
> I would be interested in helping with that.

I agree that a BCP would be pretty helpful in clarifiying the state of
play, since it's currently scattered across a few docs over several
years.

But I think i'm proposing something that is not quite just a "BCP",
since it might involve changing the semantics and extensibility of
status_request (limiting it to OCSP responses (from the authorities
found in the AIA?))  so that "TLS Feature" can actually provide
meaningful guarantees of OCSP stapling for X.509v3 certificates.

Because right now, with all the extra (currently unused) flexibility in
status_request, it's hard to see how a client or server can meaningfully
rely on "TLS Feature" as a "must-staple" extension.

           --dkg

Attachment: signature.asc
Description: PGP signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to