On Fri, May 24, 2024 at 2:05 PM Christian Huitema <huit...@huitema.net>
wrote:

>
>
> On 5/23/2024 9:41 AM, David Benjamin wrote:
> > At the end of the day, the TLS components of trust expressions are
> > simply a more size-efficient form of the certificate_authorities field.
> > The rest is working through the deployment implications to reduce server
> > operator burden. However, the way we achieve this size efficiency is by
> > *not* saying the CAs names. Instead, the CA sets are indirected through
> > named and versioned "trust stores". However, the price one inherently
> > needs to pay here is that servers need to know how to map from those
> > trust stores back to the certificates. We solve this with the
> > TrustStoreInclusionList metadata from the CA.
> >
> > That TrustStoreInclusionList structure is necessarily a point-in-time
> > snapshot of the state of the world. If a root program has not included a
> > CA yet, the CA cannot claim it in the metadata or connections will fail.
> > If the CA is included in zero root programs, the only viable (i.e.
> > correct and does not cause interop issues) TrustStoreInclusionList is
> > the empty list, in which case the certificate will never be presented.
>
> I think this is making the assumptions that the only choice for clients
> is to adopt one "well known" trust store, probably from a short list. I
> am concerned that such mechanisms reinforce ongoing centralization of
> the web.
>
>
I think this is a worthwhile concern, and while noting that I am an author
of this draft, I will attempt to wear a slightly different hat temporarily.

 In another life I help maintain an OS trust store for non-mainstream
clients to access the web. My "choices" today are basically to follow
Firefox or Chrome and include most of what they support. (we have basically
followed Firefox for many years). We can decide to not include certain CA's
that we don't feel have merit, but only if they have very little use. We do
not have an effective way to add anything separate or distinct for our
clients, as such servers can not also be used with the public web in
general.  So I think as far as the situation is today, trust store choice
is already very centralized if you want your client to "usually work" on
the public web. We have basically two choices. both of which are very very
similar in their content.

 I am not certain that trust expressions would change that situation for a
non-mainstream client like this, but I don't think that it makes my choices
worse. I still have the same choice - follow one of the well known trust
stores. I can do this either by continuing as always and not having the
client send a trust expression, or, by fetching the trust anchors from a
"well known" big trust store and modifying the client to support the
necessary things and to send the appropriate trust expression.

 Were a "new" trustworthy root program to show up with CA partnerships that
were useful and made use of trust expressions, a non-mainstream client
could potentially start to make use of that as another choice, *If* they
trusted the operators of such a program to do a good job of evaluating the
trustworthiness of the CA's they were including.

-Bob


> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to