On Tue, Apr 30, 2024 at 4:30 PM Dennis Jackson <ietf=
40dennis-jackson...@dmarc.ietf.org> wrote:

> On 01/05/2024 00:07, Watson Ladd wrote:
>
> On Tue, Apr 30, 2024 at 3:26 PM Dennis 
> Jackson<ietf=40dennis-jackson...@dmarc.ietf.org> 
> <ietf=40dennis-jackson...@dmarc.ietf.org> wrote:
> <snip>
>
> Let's assuming for a moment we could a) get most of the world to use ACME (a 
> worthy but challenging goal) and b) get them to configure multiple CAs and 
> receive multiple certificates. We don't need trust expressions to be able to 
> do quick rotations - because we don't ever want to use the old CA. It's just 
> a case of swapping to the new one. There's no need for negotiation.
>
> We've already seen a serious problem with cross-signing happen, where
> Cloudflare is planning to stop using Lets Encrypt. That's because the
> cross-signed cert that let Lets Encrypt work with old Android devices
> expired, with no replacement. Having websites present one chain
> creates a lot of thorny tradeoffs. Either you present a cross-signed
> certificate, or a few, and take the bandwidth hit, or you don't and
> suffer a compatibility hit. This was manageable when signatures were
> small. When they get chonky it will be much less fun.
>
> There's a huge and unexplored design space here that does not require
> trust negotiation. I don't claim any of these ideas are optimal:
>
>    - Techniques like abridged certs + cross signs let you mitigate any
>    bandwidth impact for recent-ish clients. Given the older clients are going
>    to be missing a lot of performance improvements anyway, this doesn't seem
>    unacceptable.
>    - Root Programs could introduce specific root certs they operate for
>    the sole purpose of cross-signing new CAs to speed up their adoption.
>    - Clients could have a TLS flag 'My Root Store is very old' which is
>    set when X years without a root store update have passed. Alternatively,
>    they advertise an explicit age for their root store or the TLS Flag 'My
>    Root Store was updated in the past year'.
>
> Wouldn't we also get this last point as a sort of side effect of abridged
certs?

-Ekr


>    - I think there may also be some interesting ways to improve Merkle
>    Tree Certs to support these use cases without needing trust negotiation but
>    that'll have to wait for another thread.
>
> As far as I'm aware there is no need for cooperation in creating a
> cross-signed intermediate: it's a certificate with a public key and
> just a different signer. So Country X could force its sites to include
> that cross-signed intermediate in the grab bag handed to browsers, and
> everything would work as now. Browsers have to tolerate all sorts of
> slop there anyway. I think the sharper concern is that you could block
> traffic without the cert included.
>
> Sincerely,
> Watson Ladd
>
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to