Some more comments after reading the draft in detail.

- The abstract and introduction only talks about the ClientHello use case. 
Should shortly mention the CertificateRequest use case as well.

- I notice that the draft does not have any requirement on how the client gets 
access to the intermediary certificates. I think this is the right approach.

The problem discussed in EMU is that that many access points drops EAP 
connections after 40 - 50 packets and that EAP-TLS connections with large 
certificate chains may therefore be unable to complete.

One approach discussed in EMU is that the client could take intermediate 
certificates from an earlier EAP-TLS connection that was dropped by the access 
point. This drafts currently allows that. I think that is correct. I cannot see 
that the distribution of intermediary certificates need any security 
requirements as the client can verify them with the help of one of its trust 
anchors.

Cheers,
John

-----Original Message-----
From: John Mattsson <john.matts...@ericsson.com>
Date: Friday, 29 March 2019 at 10:29
To: "TLS@ietf.org" <TLS@ietf.org>
Subject: Comment on draft-thomson-tls-sic-00

    Hi,
    
    I am strongly supporting of solving the problem this draft is trying to 
solve. This is a problem that the EMU WG has identified and discussed in the 
past.
    
    https://tools.ietf.org/html/draft-ms-emu-eaptlscert-02
    
    I will add text discussing draft-thomson-tls-sic-00 to 
draft-ms-emu-eaptlscert-03 and ask for agenda time in EMU at IETF 105 to 
discuss if draft-thomson-tls-sic-00 solves the problems of the EMU WG.
    
    The EMU WG actually shortly discussed this Monday if the WG thought there 
was any updates to TLS that needed to be driven in the TLS WG.
    
    Cheers,
    John
    
    

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to