On 10/6/10 1:57 PM, Jim Schaad wrote:
> 
> 
>> -----Original Message----- From: Peter Saint-Andre
>> [mailto:[email protected]] Sent: Wednesday, October 06, 2010 10:08
>> AM To: [email protected] Cc: Jim Schaad; [email protected];
>> [email protected] Subject: Re: [certid] section 4.6 rewrite (aka: Bad
>> certificate handling)
>> 
>> On 10/5/10 11:47 AM, Martin Rex wrote:
>>> Jim Schaad wrote:
>>>> 
>>>> Martin Rex wrote:
>>>>> 
>>>>> (2) support for server certs that do not succeed certificate 
>>>>> path validation to one of the (pre-)configured trust anchors
>>>> 
>>>> This is from the abstract of the document in question:
>>>> 
>>>> "This document specifies best current practices for 
>>>> representing and verifying the identity of application services
>>>> in such interactions."
>>>> 
>>>> As you see the document is about how to do name comparisons.
>>>> If you believe a document on trust , path validation and
>>>> pinning are needed I would strongly suggest that you write such
>>>> a draft.
>>> 
>>> Thanks! I was asking for removal of the reference to path
>>> validation from that one paragraph:
>>> 
>>> PeterSA wrote:
>>>> 
>>>> then the client MUST verify that the presented certificate is
>>>> the same as the cached certificate, including verification of
>>>> the entire certification path.
>>> 
>>> So the "including verification of the entire certification path" 
>>> should be completely removed,
>> 
>> I'd be curious to see what Jim's feedback is on that point, since
>> he suggested the inclusion of text about the certification path.
> 
> I don't care if you remove the word verification.  What I want to say
> is that the presented certificate and it's chain back to the trust
> anchor is the same as when it was first checked by the advanced user.
> If the path has changed then the answer should be re-obtained.
> 
> 
> 4.6.2. Case #2: No Match Found, Name Association Cached
> 
> If the client does not find a presented identifier matching any of
> the reference identifiers, but has previously associated one of the
> reference identifiers with the certificate (a) by a human user during
> a previous interaction with this application service or (b) via
> configuration settings, the server identity check succeeds.  The
> cached name association needs to include the certificate presented
> and the context in which in which it was accepted.  The context
> includes the chain of certificates from the presented certificate to
> the trust anchor.

That seems better. Thanks for the proposed text. Tweaked slightly in our
working copy, as follows:

   If the client does not find a presented identifier matching any of
   the reference identifiers, but has previously associated one of the
   reference identifiers with the certificate (a) because of positive
   acceptance by a human user during a previous interaction with this
   application service or (b) because of configuration settings, then
   the server identity check succeeds.  The cached name association
   needs to take account of both the certificate presented and the
   context in which it was accepted or configured (where the context
   includes the chain of certificates from the presented certificate to
   the trust anchor).

>>> and the "cached certificate" ought to be clarified to mean
>>> memorized "CERT-ID" reference identifier to make it clearly
>>> distinct from anything related to TLS session caching.
> 
> I don't any any big issues here with the word cached.  Although you
> might want to use "cached name association"

Yes, I like that phrase.

Peter

-- 
Peter Saint-Andre
https://stpeter.im/


_______________________________________________
certid mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/certid

Reply via email to