On Fri, Oct 1, 2021 at 10:07 AM Salz, Rich <rs...@akamai.com> wrote:

> I still would like comments on the last paragraph of the section:
>
>
>
>    - To accommodate the workaround that was needed before the development
>    of the SNI extension, this specification allows multiple DNS-IDs, SRV-IDs,
>    or URI-IDs in a certificate.
>
>
>
> Should that go away now?  If so, that will have ripple effects.  Perhaps
> just add that this MAY be the equivalent of multiple names, could enable
> cross-protocol attacks, and should be avoided unless necessary?
>

What sort of ripple effects are you thinking? I agree that, in practice,
the use of multiple names has been normalized beyond the "SNI workaround"
(e.g. the discussions on cross-SNI resumption or the ORIGIN frame), so
removing that text seems acceptable, but I suspect that we'd both be on the
same page of wanting to say _something_ about the risks, such as
cross-protocol attacks. And if we're going to discuss those, would it also
be appropriate to discuss the concerns about accepting multiple different
_types_ of identifiers within a message, and the intersection that can play
with, for example, nameConstraints.

That is, I've seen far too many implementations that will accept (DNS-ID ||
URI-ID) within a TLS endpoint, but will happily ignore that while a DNS-ID
will be constrained by DNS nameConstraints, those same nameConstraints
won't constrain the URI-ID unless URI nameConstraints are included, and
notably... they aren't required to be included in popular PKIs like the Web
PKI.

Happy to suggest text if folks think it's worth tackling during this
revision, although it seems a separate-but-related attack to the
cross-protocol attack.
_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to