see way below...

PeterSA wrote on Wed, 08 Dec 2010 07:54:52 -0700 (06:54 PST)
>
> On 12/8/10 7:37 AM, Ben Campbell wrote:
>>
>>
>> On Dec 8, 2010, at 7:10 AM, Peter Saint-Andre <[email protected]>
>> wrote:
>>
>>> On 12/7/10 10:45 PM, Ben Campbell wrote:
>>>>
>>>> On Dec 7, 2010, at 11:12 PM, Peter Saint-Andre wrote:
>>>>
>>>>> On 12/7/10 6:35 PM, Ben Campbell wrote:
>>>>>>
>>>>>> On Dec 6, 2010, at 7:00 PM, =JeffH wrote:
>>>>>>
>>>>>>> Peter Saint-Andre <[email protected]> replied..
>>>>>>>>
>>>>>>>> On 12/3/10 2:24 PM, "Ben Campbell" <[email protected]>
>>>>>>>> wrote:
>>>>>
>>>>> <snip/>
>>>>>
>>>>>>>>> -- 3.1, 1st paragraph:
>>>>>>>>>
>>>>>>>>> It's probably worth emphasizing that the rules are
>>>>>>>>> often cumulative.  I think someone thinking about these
>>>>>>>>> for the first time might not grasp that until they see
>>>>>>>>> examples later in the doc.
>>>>>>>>
>>>>>>>> I've added the second sentence to this paragraph:
>>>>>>>>
>>>>>>>> When a certification authority issues a certificate based
>>>>>>>> on the fully-qualified DNS domain name at which the
>>>>>>>> application service provider will provide the relevant
>>>>>>>> application, the following rules apply to the
>>>>>>>> representation of application service identities.  The
>>>>>>>> reader needs to be aware that some of these rules are
>>>>>>>> cumulative and can interact in important ways that are
>>>>>>>> illustrated later in this document.
>>>>>>>
>>>>>>> LGTM.
>>>>>>
>>>>>> WFM
>>>>>>
>>>>>> In fact, as I was re-reading RFC 5922, it occurred to me to
>>>>>> wonder if people need guidance one way or another on the idea
>>>>>> of "multi-purpose" certs that might have any number of
>>>>>> subjectAltName entries for different purposes. I'm talking
>>>>>> about virtual domain hosting, or multi-protocol hosts. I
>>>>>> assume in the latter case, you would expect a host to use
>>>>>> different certs for different protocols. In the first case,
>>>>>> is their any guidance to give. I can't remember, do you
>>>>>> mention the TLS server_name extension?
>>>>>>
>>>>>> (I don't mean to suggest any real action here--just thinking
>>>>>> out loud about something that would have been much better to
>>>>>> bring up well before IETF LC. :-)  )
>>>>>
>>>>> Those scenarios are important, but IMHO how the server
>>>>> determines which certificate to present (e.g., based on the SNI
>>>>> or something else, such as the 'to' address on an XMPP stream
>>>>> header) is something that an application protocol specification
>>>>> needs to define.
>>>>
>>>> Agreed. Does this draft need to say that, or do we just take it
>>>> as given?
>>>
>>> I think it's appropriate to add a few words about that. I
>>> suggest...
>>>
>>> 1.1
>>>
>>> ... When a client connects to an application service using
>>> Transport Layer Security [TLS] or Datagram Transport Layer Security
>>> [DTLS], it references some notion of the server's identity while
>>> attempting to establish a secure connection (e.g., "the website at
>>> example.com") and typically specifies at least the DNS domain name
>>> with which it is trying to communicate (e.g., using a Server Name
>>> Indication during TLS negotiation as described in [TLS-EXT]).
>>>
>>> 1.5
>>>
>>> presented identifier:  An identifier that is presented by a server
>>> to a client within a PKIX certificate when the client attempts to
>>> establish a secure connection with the server; the certificate can
>>> include one or more presented identifiers of different types, and
>>> the certificate presented is typically based on a DNS domain name
>>> specified by the client when initiating communication (e.g., using
>>> a Server Name Indication during TLS negotiation as described in
>>> [TLS-EXT]).
>>>
>>
>> Do you think server_name extension use is actually common enough to
>> call typical? I'm not saying it's not--I don't really know one way or
>> another. Otherwise, WFM.

I don't think the TLS server_name extension (aka SNI) is in common enough use yet to call it "typical". There's a certain still-widely-deployed version of a certain desktop OS that doesn't support it, unfortunately.


> We could say "and if the server hosts more than one domain then the
> certificate presented is typically based..."

Upon re-reading what we presently have in -11 for [S1.1], I don't think we need to introduce in that intro paragraph the notion of disambiguating names in a multi-domain situation. I'd leave that para as-is.

in terms of the defn for "presented identifier" in [S1.5], I'd update it like so (I don't think mentioning SNI is reasonable in that defn proper)..

 presented identifier:  An identifier that is presented by a server
 to a client within a PKIX certificate when the client attempts to
 establish a secure connection with the server; the certificate can
 include one or more presented identifiers of different types, and
 if the server hosts more than one domain then the certificate might
 present distinct identifiers for each domain.


I'm wondering if we ought to add an "implementation note" at the end of [S3.1] where we mention why one might have a cert with multiple presented identifiers or a client may employ SNI.


Implementation Note: A given application service may be addressed by multiple domain names for a variety of reasons. In the default [TLS] handshake exchange, there is no indication by the client as to the domain name the client trying to connect to, and the TLS server returns only one certificate for itself. Thus absent an extension to [TLS], a typical workaround used to facilitate mapping an application service to multiple domain names is to embed the said domain names into the returned application service certificate. Another approach, more recent and formally specified, is for the client to use the TLS "Server Name Indication" extension, when sending the client_hello message, stipulating the domain name the client used to connect with the application service. The application service can then return the appropriate certificate in its Certificate message. This latter certificate could thus contain a single domain name.

of course, the FDA notes that the above will require generous wordsmithing before use.

=JeffH


_______________________________________________
certid mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/certid

Reply via email to