Is there an intention that any semantics are attached to the SAN being a URI or 
DNS name or IP or ...? Or is it still intended to be an opaque identifier?

> On 6 Nov 2018, at 01:55, Brian Campbell 
> <bcampbell=40pingidentity....@dmarc.ietf.org> wrote:
> 
> Thanks Evan for bringing this to the WG's attention. More or less the same 
> question/issue was raised yesterday in the area director's review of the 
> document as well. I plan to bring this up as a discussion item in the meeting 
> today. But my sense from some early discussions is that there is likely to be 
> (rough) consensus to make some change in order to allow a SAN to be specified 
> as the certificate subject identifier in the PKI client auth mode. We'll need 
> to figure out the specifics of how that works. I don't think there are 
> significant drawbacks to extending the number of client registration metadata 
> parameters per se. I guess I've just been attracted to the idea of 
> overloading the existing value because that felt like maybe a less invasive 
> change. But perhaps that's shortsighted. And there's nothing inherently wrong 
> with additional client metadata parameters. 
> 
> I don't know if we could get away with a single new parameter that could 
> carry the value for any SAN type. Something like, { ... 
> "tls_client_auth_san": "spiffe://trust-domain/path" ...}. In practice I feel 
> like that'd probably be okay but in theory there's the potential for 
> confusion of the value across different types. So probably there's a need to 
> indicate the SAN type too. Either with more client metadata parameters like 
> tls_client_auth_san_uir, tls_client_auth_san_email, tls_client_auth_san_ip, 
> etc. or maybe with a structured value of some sort like {... 
> "tls_client_auth_san": {"type":"URI", "value":"spiffe://trust-domain/path"} 
> ... }. And then deciding which types to support and if/how to allow for the 
> extensible types. 
> 
> Anyway, those are just some thoughts on it. And it'll be discussed more 
> today. Suggested/proposed text is always helpful though (even if it's not 
> used directly it can help move the conversation forward and/or help editor(s) 
> to have prospective wording). 
> 
> 
> 
> 
> 
>> On Tue, Nov 6, 2018 at 5:53 AM Evan Gilman <evan2...@gmail.com> wrote:
>> Hello everyone..
>> 
>> Very excited to see this draft. It helps tremendously in addressing
>> use cases around oauth client management in machine-to-machine
>> scenarios. Particularly, the PKI authentication method.
>> 
>> In reviewing the document, I noticed that the only supported method
>> for identifying a client using the PKI authentication method is by
>> referencing its distinguished name. This caught me a bit by surprise -
>> many newer projects aimed at automating X.509 issuance in the
>> datacenter utilize SAN extensions rather than distinguished name in
>> order to encode identity. I am further under the impression that the
>> community is, in general, moving away from the subject extension
>> altogether in favor of SAN-based identification.
>> 
>> Full disclosure: I am one of the maintainers on a project called
>> SPIFFE, which provides identity specifications for datacenter workload
>> applications. For X.509, SPIFFE encodes identity into a URI SAN
>> extension. A number of projects using SPIFFE do not configure the
>> subject with identifying information (SPIRE and Google Istio being
>> just a couple). I am also hearing of other X.509 automation projects
>> which are moving away from subject/distinguished name (even if they
>> are not using SPIFFE).
>> 
>> While I think support for distinguished name is absolutely necessary,
>> I worry that supporting it solely will render it incompatible with
>> some of the more modern PKIX systems and not stand the test of time. I
>> know that I am a little late to this, and for that I apologize... but
>> I feel this is a significant point.
>> 
>> I would like to open a discussion on supporting the most commonly used
>> SAN extension types in addition to distinguished name. To accomplish
>> this, amending section 2.1.2 `Client Registration Metadata` with
>> additional parameters seems appropriate. In my experience, the most
>> commonly used SAN extensions are: DNS name, IP address, URI, and email
>> address.
>> 
>> Are there significant drawbacks to extending the number of client
>> registration metadata parameters? I would very much like to see this -
>> without it, many existing projects will be unable to use the spec. I
>> am happy to contribute time and text to this, assuming people feel
>> that this is a beneficial addition. Sorry again for the timing
>> 
>> -- 
>> evan
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
> CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
> material for the sole use of the intended recipient(s). Any review, use, 
> distribution or disclosure by others is strictly prohibited..  If you have 
> received this communication in error, please notify the sender immediately by 
> e-mail and delete the message and any file attachments from your computer. 
> Thank you.
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to