+1 to Sean here, it would be easier to evaluate this with a document in
hand.  And in particular, a list of ways that people find mTLS is failing
in practice.

I am generally skeptical of this idea, at least as a TLS WG item.  In pure
TLS terms, there is no such thing as "one-way TLS" or "mutually
authenticated TLS" -- every TLS handshake supports both modes, and every
TLS handshake could be mutually-authenticated until the server declines to
send a CertificateRequest or the client declines to provide a Certificate
in response.

In other words, I disagree with Olle's and John's assertion that there's no
definition for mTLS.  There is: "TLS where the server sends a
CertificateRequest and the client sends a Certificate"  Any TLS handshake
where that happens is mutually authenticated.

An RFC defining "mTLS" that adds a bunch of extra requirements on top of
the above will just deepen the confusion.  "In this scheme, we use mTLS
between these two machines" ... "Oho, but you don't color the bits yellow
and configure the PKI like RFC XXXX says you need to do for True mTLS".

If there's anything to be done here, it's recommendations for configuring
TLS stacks to be compatible, probably largely focused on PKI
considerations.  Informational, not Proposed Standard; UTA, not TLS.  And
even then, we need a lot more precision on the problems to be solved.

--Richard

On Tue, Sep 10, 2024 at 11:21 AM Sean Turner <s...@sn3rd.com> wrote:

> Mark,
>
> Hi! I’d suggest writing the I-D [1] and then we (the royal we here) can
> figure out where it goes; could be ALLDISPATCH then TLS or UTA depending on
> ALLDISPATCH outcome.  Additionally, discussing at the ALLDISPATCH session
> would get much a wider audience, which I think would help in general.
>
> spt
>
> [1] Submission deadline for IETF 121 is 21 October.
>
> > On Sep 9, 2024, at 14:42, Mark Robinson <m...@markrobinson.io> wrote:
> >
> > I've been doing a lot of work lately to support organizations that do
> mTLS between each other. The problem I've found is that there is a huge
> amount of ignorance on TLS in general and mTLS in particular.
> >
> > Would it be appropriate to write an RFC on how to make
> cross-organization mTLS work reliably and at scale? Would this
> group/mailing list be the right people to work with to make that happen?
> >
> > Mark
> > _______________________________________________
> > TLS mailing list -- tls@ietf.org
> > To unsubscribe send an email to tls-le...@ietf.org
>
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to