Thanks, Ben. I think we're close to declaring victory. :)  Jeff and I
will work to push out version -12 in the next 48 hours.

On 12/9/10 7:52 AM, Ben Campbell wrote:
> Still WFM.
> 
> On Dec 8, 2010, at 5:55 PM, Peter Saint-Andre <stpe...@stpeter.im> wrote:
> 
>> And the wordsmithing continues...
>>
>> On 12/8/10 3:52 PM, =JeffH wrote:
>>> see way below...
>>>
>>> PeterSA wrote on Wed, 08 Dec 2010 07:54:52 -0700 (06:54 PST)
>>>>
>>>> On 12/8/10 7:37 AM, Ben Campbell wrote:
>>>>>
>>>>>
>>>>> On Dec 8, 2010, at 7:10 AM, Peter Saint-Andre <stpe...@stpeter.im>
>>>>> wrote:
>>>>>
>>>>>> On 12/7/10 10:45 PM, Ben Campbell wrote:
>>>>>>>
>>>>>>> On Dec 7, 2010, at 11:12 PM, Peter Saint-Andre wrote:
>>>>>>>
>>>>>>>> On 12/7/10 6:35 PM, Ben Campbell wrote:
>>>>>>>>>
>>>>>>>>> On Dec 6, 2010, at 7:00 PM, =JeffH wrote:
>>>>>>>>>
>>>>>>>>>> Peter Saint-Andre <peter.saintan...@webex.com> replied..
>>>>>>>>>>>
>>>>>>>>>>> On 12/3/10 2:24 PM, "Ben Campbell" <b...@nostrum.com>
>>>>>>>>>>> wrote:
>>>>>>>>
>>>>>>>> <snip/>
>>>>>>>>
>>>>>>>>>>>> -- 3.1, 1st paragraph:
>>>>>>>>>>>>
>>>>>>>>>>>> It's probably worth emphasizing that the rules are
>>>>>>>>>>>> often cumulative.  I think someone thinking about these
>>>>>>>>>>>> for the first time might not grasp that until they see
>>>>>>>>>>>> examples later in the doc.
>>>>>>>>>>>
>>>>>>>>>>> I've added the second sentence to this paragraph:
>>>>>>>>>>>
>>>>>>>>>>> When a certification authority issues a certificate based
>>>>>>>>>>> on the fully-qualified DNS domain name at which the
>>>>>>>>>>> application service provider will provide the relevant
>>>>>>>>>>> application, the following rules apply to the
>>>>>>>>>>> representation of application service identities.  The
>>>>>>>>>>> reader needs to be aware that some of these rules are
>>>>>>>>>>> cumulative and can interact in important ways that are
>>>>>>>>>>> illustrated later in this document.
>>>>>>>>>>
>>>>>>>>>> LGTM.
>>>>>>>>>
>>>>>>>>> WFM
>>>>>>>>>
>>>>>>>>> In fact, as I was re-reading RFC 5922, it occurred to me to
>>>>>>>>> wonder if people need guidance one way or another on the idea
>>>>>>>>> of "multi-purpose" certs that might have any number of
>>>>>>>>> subjectAltName entries for different purposes. I'm talking
>>>>>>>>> about virtual domain hosting, or multi-protocol hosts. I
>>>>>>>>> assume in the latter case, you would expect a host to use
>>>>>>>>> different certs for different protocols. In the first case,
>>>>>>>>> is their any guidance to give. I can't remember, do you
>>>>>>>>> mention the TLS server_name extension?
>>>>>>>>>
>>>>>>>>> (I don't mean to suggest any real action here--just thinking
>>>>>>>>> out loud about something that would have been much better to
>>>>>>>>> bring up well before IETF LC. :-)  )
>>>>>>>>
>>>>>>>> Those scenarios are important, but IMHO how the server
>>>>>>>> determines which certificate to present (e.g., based on the SNI
>>>>>>>> or something else, such as the 'to' address on an XMPP stream
>>>>>>>> header) is something that an application protocol specification
>>>>>>>> needs to define.
>>>>>>>
>>>>>>> Agreed. Does this draft need to say that, or do we just take it
>>>>>>> as given?
>>>>>>
>>>>>> I think it's appropriate to add a few words about that. I
>>>>>> suggest...
>>>>>>
>>>>>> 1.1
>>>>>>
>>>>>> ... When a client connects to an application service using
>>>>>> Transport Layer Security [TLS] or Datagram Transport Layer Security
>>>>>> [DTLS], it references some notion of the server's identity while
>>>>>> attempting to establish a secure connection (e.g., "the website at
>>>>>> example.com") and typically specifies at least the DNS domain name
>>>>>> with which it is trying to communicate (e.g., using a Server Name
>>>>>> Indication during TLS negotiation as described in [TLS-EXT]).
>>>>>>
>>>>>> 1.5
>>>>>>
>>>>>> presented identifier:  An identifier that is presented by a server
>>>>>> to a client within a PKIX certificate when the client attempts to
>>>>>> establish a secure connection with the server; the certificate can
>>>>>> include one or more presented identifiers of different types, and
>>>>>> the certificate presented is typically based on a DNS domain name
>>>>>> specified by the client when initiating communication (e.g., using
>>>>>> a Server Name Indication during TLS negotiation as described in
>>>>>> [TLS-EXT]).
>>>>>>
>>>>>
>>>>> Do you think server_name extension use is actually common enough to
>>>>> call typical? I'm not saying it's not--I don't really know one way or
>>>>> another. Otherwise, WFM.
>>>
>>> I don't think the TLS server_name extension (aka SNI) is in common
>>> enough use yet to call it "typical". There's a certain
>>> still-widely-deployed version of a certain desktop OS that doesn't
>>> support it, unfortunately.
>>
>> I had changed it to:
>>
>>      if the server hosts more than one domain then the certificate it
>>      presents might be based on a DNS domain name specified by the
>>      client when initiating communication (e.g., using a Server Name
>>      Indication during TLS negotiation as described in [TLS-EXT]).
>>
>> That seems suitably vague about how common SNI is. But per your message
>> I think this might belong in a different place.
>>
>>>> We could say "and if the server hosts more than one domain then the
>>>> certificate presented is typically based..."
>>>
>>> Upon re-reading what we presently have in -11 for [S1.1], I don't think
>>> we need to introduce in that intro paragraph the notion of
>>> disambiguating names in a multi-domain situation. I'd leave that para
>>> as-is.
>>
>> Yes, I'd already removed any mention of SNI from Section 1.1.
>>
>>> in terms of the defn for "presented identifier" in [S1.5], I'd update it
>>> like so (I don't think mentioning SNI is reasonable in that defn proper)..
>>>
>>> presented identifier:  An identifier that is presented by a server
>>> to a client within a PKIX certificate when the client attempts to
>>> establish a secure connection with the server; the certificate can
>>> include one or more presented identifiers of different types, and
>>> if the server hosts more than one domain then the certificate might
>>> present distinct identifiers for each domain.
>>
>> WFM.
>>
>>> I'm wondering if we ought to add an "implementation note" at the end of
>>> [S3.1] where we mention why one might have a cert with multiple
>>> presented identifiers or a client may employ SNI.
>>>
>>>
>>> Implementation Note:  A given application service may be addressed by
>>> multiple domain names for a variety of reasons. In the default [TLS]
>>> handshake exchange,
>>> there is no indication by the client as to the domain name the client
>>> trying to connect to, and the TLS server returns only one certificate
>>> for itself. Thus absent an extension to [TLS], a typical workaround used
>>> to facilitate mapping an application service to multiple domain names is
>>> to embed the said domain names into the returned application service
>>> certificate. Another approach, more recent and formally specified, is
>>> for the client to use the TLS "Server Name Indication" extension, when
>>> sending the client_hello message, stipulating the domain name the client
>>> used to connect with the application service. The application service
>>> can then return the appropriate certificate in its Certificate message.
>>> This latter certificate could thus contain a single domain name.
>>>
>>> of course, the FDA notes that the above will require generous
>>> wordsmithing before use.
>>
>> Wordsmithed as follows:
>>
>> ##
>>
>> 5.4.  Multiple Identifiers
>>
>>   A given application service might be addressed by multiple DNS domain
>>   names for a variety of reasons, and a given deployment might service
>>   multiple domains (e.g., in so-called "virtual hosting" environments).
>>   In the default TLS handshake exchange, the client is not able to
>>   indicate the DNS domain name with which it wants to communicate, and
>>   the TLS server returns only one certificate for itself.  Absent an
>>   extension to TLS, a typical workaround used to facilitate mapping an
>>   application service to multiple DNS domain names is to embed all of
>>   the domain names into a single certificate.
>>
>>   A more recent approach, formally specified in [TLS-EXT], is for the
>>   client to use the TLS "Server Name Indication" (SNI) extension when
>>   sending the client_hello message, stipulating the DNS domain name it
>>   desires or expects of the service.  The service can then return the
>>   appropriate certificate in its Certificate message, and that
>>   certificate can represent a single DNS domain name.
>>
>>   To accommodate the workaround that was needed before the development
>>   of the SNI extension, this specification allows multiple DNS-IDs,
>>   SRV-IDs, or URI-IDs in a certificate; however, it explicitly
>>   discourages multiple CN-IDs.  Although it would be preferable to
>>   forbid multiple CN-IDs entirely, there are several reasons at this
>>   time why this specification states that they SHOULD NOT (instead of
>>   MUST NOT) be included:
>>
>>   o  At least one significant technology community of interest
>>      explicitly allows multiple CN-IDs [EV-CERTS].
>>
>>   o  At least one significant certification authority is known to issue
>>      certificates containing multiple CN-IDs.
>>
>>   o  Many service providers often deem inclusion of multiple CN-IDs
>>      necessary in virtual hosting environments because at least one
>>      widely-deployed operating system does not yet support the SNI
>>      extension [TLS-EXT].
>>
>>   It is hoped that the recommendation regarding multiple CN-IDs can be
>>   further tightened in the future.
>>
>> ###
>>
>>
>>
>> _______________________________________________
>> Gen-art mailing list
>> Gen-art@ietf.org
>> https://www.ietf.org/mailman/listinfo/gen-art

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art

Reply via email to