Ryan Sleevi <ryan-i...@sleevi.com> wrote:
On Sat, Nov 20, 2021 at 6:58 AM John Mattsson 
<john.mattsson=40ericsson....@dmarc.ietf.org<mailto:40ericsson....@dmarc.ietf.org>>
 wrote:
- In some applications using mutually authenticated TLS, e.g., between nodes in 
5G core networks or in mesh networks there is basically no difference between 
the client and the server. It would be very good if the document states that 
for such use cases the recommendations apply also for the client certificate.

How do these examples construct their set of reference identifiers? And are 
they using the same identifiers, or, as is common in these cases, bespoke 
identifiers unique / scoped to a particular community? For example, the classic 
"extract the name from the certificate" used in such mutual/mesh networks is 
something the spec explicitly disclaims in Section 6.1.1, so it's difficult to 
see how to unify such an approach safely?

John: I agree with Section 6.1.1 that the client need a limited set of 
reference identifiers. Reading 6.1. again, i think that the term "set" that you 
use might be better than list. Is the intention to forbid sets of reference 
identifiers such as:

    *.eaptlsserver.ssid-ipv6only.ietf112.ietf.org

That seems too strict for general TLS (i.e., not only HTTPS), and too much of 
an implementation detail. Using a wildcard reference identifies seems like a 
better security solution than using a wildcard presentation identifier in some 
cases.

John: Thinking a bit more, what I wanted to say was that there are use cases 
that are symmetrical in the way that any of the two nodes can start TLS. Such 
use cases can use the same certificate for both the TLS client and TLS server 
role. While TLS has a strict client and server roles, that division might not 
be done before one of the nodes sends a client hello. Unless there are any 
problems I don't see, I think it would be good if the document stated.

"In some use cases the same certificate is used for both client and server 
roles. A server certificate following this specification MAY be used also as a 
client certificate.”

- I think it would be good if the document made the use of IPaddress for Naming 
of Application Services NOT RECOMMENDED. They should probably only be used to 
reach DNS resolvers.

There's been past discussion within ACME on this point. There's no reason to 
believe that IP Addresses are any less useful or less secure than DNS names 
from a client validation point: they both have central registries (RIRs/LIRs or 
the IANA/ICANN TLDs, respectively), and are generally recognized legally as a 
form of tangible property, albeit with potential time-bounded use. The concerns 
around IP address certificates primarily comes down to the validation 
practices, and whether or not there are sufficient, and reliable, metadata 
channels to convey the authorization of a certificate being issued (e.g. ACME's 
DNS record format making an explicit protocol agreement for authorizing 
certificates), but from a client/UTA perspective, that seems unrelated. For 
that matter, for the better part of the HTTPS/TLS specifications lifetime, DNS 
validation as practiced by most non-internally-operated CAs was just as 
ill-defined, and that didn't seem to result in a NOT RECOMMENDED for DNS names.

I realize I'm making assumptions about your objections in the absence of 
details, and so that's largely based on past IETF conversations about the 
merits of IP vs DNS names. However, if the above wasn't your concern, could you 
elaborate more on the NOT RECOMMENDED, and how that applies to concerns 
regarding client validation behaviours versus CA issuance practices?

John: I agree with what you say. There is no reason to believe that IP 
Addresses are less secure. My NOT RECOMMENDED came from that issuance and 
validation of IP addresses in certificates seems much less mature than DNS 
names, it is problematic to get working. I have also seen services go down when 
the IP address change (but reliance on a local DNS might be equally bad (or 
worse) for reliability). I would generally like to keep down the number of 
options. Identities in X.509 is a mess. But if there are use cases we should 
fix the problem instead. I don’t think any normative recommendations on IP 
addresses are needed.

I think I am mostly questioning the "Identifiers such as IP address are not 
discussed.". Surely UTA can give the reader some more guidance than that. I 
think just writing some few sentences about the pros and cons of IP addresses 
vs. DNS names would be helpful for the reader.
_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to