The new text is kind-of normative, but IMO it's a significant improvement over 
the old text. Thanks!

On 6/27/22, 22:16, "Peter Saint-Andre" <stpe...@stpeter.im> wrote:

    On 6/24/22 5:07 PM, Peter Saint-Andre wrote:

    >> * Which identifier types a client includes in its list of reference 
    >> identifiers, and their priority, is a matter of local policy - given 
    >> the situation today, can we have a normative recommendation for 
    >> clients to be strict in constructing their reference list? If we don't 
    >> include such normative text, we're basically telling people to make 
    >> the easier choice and build lenient clients.
    > 
    > It seems to me that the local policy will depend a great deal on the 
    > protocol(s) that an application supports, the state of SRV-ID and URI-ID 
    > support in that protocol and its implementations/deployments, etc. 
    > However, I do think that we can formulate some more strict rules that 
    > ought to be followed by implementations. Text to follow.

    Here is a proposed change.

    OLD

        Which identifier types a client includes in its list of reference
        identifiers, and their priority, is a matter of local policy.  For
        example, a client that is built to connect only to a particular kind
        of service might be configured to accept as valid only certificates
        that include an SRV-ID for that application service type.  By
        contrast, a more lenient client, even if built to connect only to a
        particular kind of service, might include both SRV-IDs and DNS-IDs in
        its list of reference identifiers.

    NEW

        Which identifier types a client includes in its list of reference
        identifiers, and their priority, is a matter of local policy.  The
        substance of such a policy might depend on the application
        protocol that a client supports, the state of SRV-ID and URI-ID
        support in that protocol, and similar factors.  In general, a client
        SHOULD follow a policy that is consistent with the highest level of
        security and strictest rules for service identification available in
        an application protocol.  For instance, if the protocol defines an
        SRV-ID or URI-ID for the application service type and that SRV-ID or
        URI-ID is commonly included in certificates issued to such services,
        then the client ought to be configured to accept as valid only
        certificates that include the SRV-ID or URI-ID (not merely a DNS-ID).
        Such a policy can help to avoid cross-protocol attacks.

    Peter


_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to