I'm not sure what I think about adoption, but maybe it rounds to yes.

At the interim I think I said (although I can't remember if I said or
typed it snarkily in a backchannel) that just because problems are
worth solving doesn't mean we can solve them. I'm afraid this is one
of them.

For the specific case of devices with long lifetimes and short
updates, sending the CA in the already existing channel ought to work.
The problem with trust anchors is it requires some far reaching
changes impacting all server software, TLS implementations, client
software, server operations, ACME clients, and maybe DNS as well. That
ain't happening to a first approximation.

Perversely, the implementors best suited to do this are the ones that
we need to adopt this the least.

At the same time I think that we have a very real "just works in
Chrome" problem that negotiation would enable. We've already seen CAs
pay more attention to Google and Apple than Mozilla in dealing with
incidents. Older proposals where it would have just been an anchor the
server needs to know how to deal with would have had all the fun of
User Agent capability negotiation. I'm glad to see this proposal at
least on a first glance avoids much of that.

I do think there are some changes that can fix some of the ubiquity
issues, in approximate reverse order of my confidence in them:

- Use a hash of the root certificate as an identifier. Do something
really clever/stupid depending on perspective to shrink it. This way
servers have a fighting chance of figuring out what it is without
additional configuration.
- Use DNS as an initial hint, not a mandatory field (maybe in
draft-beck, not sure)
- HRR for when client hello's don't have a right one, so servers can
fix busted DNS.
- wildcard by client, for cases where DNS doesn't have any info to
learn the server config
- Some guidance on how to cache this.

I do think I need to think more, and I'm definitely not sure we'll
eventually solve this, although I'm optimistic enough we can start
here. However, if the benefit requires near universal adoption with
some really far reaching systemic impacts, I don't think publication
would be warranted.

Sincerely,
Watson

On Wed, Jan 15, 2025 at 8:00 AM Joseph Salowey <j...@salowey.net> wrote:
>
> At the trust tussle Interim in October we had consensus that the working 
> group was interested in working on the following problem:
>
>
> “Avoid client trust conflicts by enabling servers to reliably and efficiently 
> support clients with diverse trust anchor lists, particularly in larger PKIs 
> where the existing certificate_authorities extension is not viable”
>
>
> After IETF 121, we asked for submissions for possible working group adoption 
> as a starting point for this work. We received two submissions:
>
>
> [1] Trust Anchor Identifiers, draft-beck-tls-trust-anchor-ids-03
>
> [2] Trust is non-negotiable, draft-jackson-tls-trust-is-nonnegotiable-00
>
>
> [1] defines a new protocol mechanism, while [2] provides an explanation of 
> why the mechanism in [1] may not be needed and may be problematic. Since the 
> second draft does not define a protocol mechanism we are not considering it 
> for adoption, but we request that working group members review both documents 
> and use [2] as input into determining whether we should adopt [1] as a 
> working group item.  Adoption as a working group item means the working group 
> has change control over and can modify it as necessary; an adopted document 
> is only a starting point.  Please respond to this thread if you think the 
> document should be adopted as a working group item. If you think the document 
> is not appropriate for adoption please indicate why.  This adoption call will 
> close on February 7, 2025.  Also please remember to maintain professional 
> behavior and keep the discussion focused on technical issues.
>
>
> Thanks,
>
>
> Sean, Deirdre and Joe
>
>
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org



-- 
Astra mortemque praestare gradatim

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to