+1 for removing tls_client_auth_root

> Am 28.08.2017 um 20:24 schrieb John Bradley <ve7...@ve7jtb.com>:
> 
> Having discussed it with Brian, I agree that removing “tls_client_auth_root” 
> is the way to go.  
> It would be hard to implement in some cases, and it is up to the AS to 
> configure the roots it trusts for client authentication.
> 
> In reality every TLS client auth deployment is likely to have custom rules 
> about trust.  I think this parameter adds confusion rather than reducing it.
> 
> John B.
> 
> 
>> On Aug 28, 2017, at 10:05 AM, Brian Campbell <bcampb...@pingidentity.com> 
>> wrote:
>> 
>> Some feedback was received recently off-list that pointed out difficulties 
>> with implementation around the "tls_client_auth_root_dn" constraint in the 
>> PKI method of OAuth MTLS client authentication from 
>> draft-ietf-oauth-mtls-03. Basically the feedback was that popular web 
>> servers such as Nginx and Apache don't expose sufficient information (easily 
>> or in some cases at all) from the client certificate chain to the 
>> application to enable proper checking of "tls_client_auth_root_dn". 
>> 
>> Following from that and some additional reasoning below, I'm proposing that 
>> "tls_client_auth_root_dn" be dropped from the draft-ietf-oauth-mtls draft. 
>> 
>> The original idea behind the "tls_client_auth_root_dn" client metadata 
>> parameter came from an MTLS client authentication feature we added to our AS 
>> product years ago. The feature provided a way to allow the AS to more 
>> tightly constrain trust in a particular context (from an otherwise global 
>> list of trust anchors). It was fine as a specific product feature but should 
>> have stayed at that. When I added metadata to the OAuth MTLS draft, I added 
>> the "tls_client_auth_root_dn" parameter with that AS product feature in mind 
>> as something an AS *might* want to be able to do (without thinking thorough 
>> it all sufficiently). But having it as a client metadata parameter has wider 
>> implications including shifting trust control to the client and requiring 
>> ASs to support it. So, after thinking about it some more and also seeing the 
>> potential implementation difficulties, I don't believe it's appropriate to 
>> have in the specification. The AS should be at liberty to do chain 
>> validation with the PKI method however is most appropriate for it. And not 
>> be required to support one specific way of doing things implied by 
>> "tls_client_auth_root_dn" (which is even infeasible to implement in some 
>> environments).  
>> 
>> 
>> 
>> CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
>> material for the sole use of the intended recipient(s). Any review, use, 
>> distribution or disclosure by others is strictly prohibited.  If you have 
>> received this communication in error, please notify the sender immediately 
>> by e-mail and delete the message and any file attachments from your 
>> computer. Thank you._______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to