On Sat, Jan 28, 2023 at 03:03:54PM +0200, Ilari Liusvaara wrote:

> On Sat, Jan 28, 2023 at 08:35:40AM +0000, John Mattsson wrote:
> > Thanks Ilari for that very fast and detailed answer. I a made a PR to
> > RFC8446bis to suggest adding “A node MAY use the same certificate as
> > both server and client certificate.”, I don’t know if there should be
> > more restrictions. The real practical problems seem to be cross-
> > protocol attacks on the application layer where TLS is used for
> > several application layer protocols.
> 
> I had idea (but I never got to writing I-D) of PKIX certificate
> extension that constrained the certificate to specific set of
> explicit TLS Application Layer Protocols.
> 
> E.g., constrain to {"http/1.1","h2","h3"} for HTTP certificate,
> or something like {"imap","submission"} (might need to register
> extra ALPNs) for user mailserver.

I don't think such an extension would gain much traction.  To be useful,
the extension would need to be "critical", but since it would be thinly
supported, its use case would be in narrow walled-garden environments.

DANE addresses lack of specificity in certificate names by binding the
validity to a single layer 4 end-point:

  $ dig +noall +ans +nosplit +multi +nottl -t tlsa 
_25._tcp.dnssec-stats.ant.isi.edu
  _25._tcp.dnssec-stats.ant.isi.edu. IN TLSA 3 1 1 (
      B1E7FAAF6E482E2AFBC653C8E3B6BEF0E3352424AEBD24D2B480092951BC6097 )

And then, it often becomes possible to entirely dispense with the certificate:

    $ posttls-finger -c -Lsummary,certmatch dnssec-stats.ant.isi.edu
    posttls-finger: dnssec-stats.ant.isi.edu[128.9.29.254]:25:
        raw public key fingerprint=...
    posttls-finger: dnssec-stats.ant.isi.edu[128.9.29.254]:25:
        Matched DANE raw public key:
            3 1 1 
B1E7FAAF6E482E2AFBC653C8E3B6BEF0E3352424AEBD24D2B480092951BC6097
    posttls-finger: Verified TLS connection established to to
        dnssec-stats.ant.isi.edu[128.9.29.254]:25:
        TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
        key-exchange X25519
        server-signature RSA-PSS (2048 bit raw public key)
        server-digest SHA256

-- 
    Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to