Sean Gallagher wrote:
> On 11/07/2023 5:33 pm, novoMedia via dovecot wrote:
> > I am not exactly sure what hosts have to do with this. The must-staple 
> > extension is a (cryptographically ensured) flag that is 'ingrained' 
> > into a certificate. It tells a client to only accept the certificate 
> > if a valid and recent OCSP response was stapled along with the 
> > certificate.
> > It wasn't clear that you were talking about using the same certificate 
> across many services on a single host. That's fair but I will point out 
> there is nothing stopping you from using several certificates for the 
> same server. One with the extension and one without. Every application 
> on that server can have a certificate tailored to it's own needs if need 
> be. And with free CA's available, it's actually pretty easy. It's really 
> an argument about manageability. It would be _nice_ to be able to use 
> one certificate for all services on a server. And so it would be _nice_ 
> if Dovecot supported OCSP stapling.

Right that would be a possibility. But I don't see the security advantage of 
must-staple if there's a 'sister-certificate' without must-staple right beside 
it. In case of an intrusion, the attacker would just grab the non-must-staple 
one. Before I'd do that, I would just plainly disable must-staple and keep OCSP 
optional. But yes, technically you are right.

> > Counter question: Why should John Doe connecting over HTTPS, doing - 
> > let's say - sensitive banking applications, be deprived of the 
> > security advantages of the 'must-staple' extension? Just because 
> > Thunderbird or Outlook does not support it? What does John Doe using 
> > Chrome have to do with Thunderbird/Outlook?
> > Seems like a confused argument. Why would John Doe's bank and John Doe's 
> email provider be forced to use the same certificate for their 
> respective servers.

The banking example was just made-up. It wasn't meant to be taken literally but 
only to get a point across.

> > I'd argue that a single scientific paper (from admittedly reputable 
> > universities) is hardly an industry poised to move back. In all 
> > honesty, this looks like an attempt to clout OCSP with undeserved 
> > doubts - for reasons unknown to me. But I think it's fair to say that 
> > Dovecot users finally deserve what is common practice in Nginx/HTTP 
> > and Exim/SMTP since ~8 Years(!) already.
> > I've go no axe to grind here, just calling it as I see it.. FireFox and 
> Chrome have already moved on this. Both browsers already support a CRL 
> 2.0 type mechanism and have stated they intend to stop checking OCSP. I 
> don't know what the other browsers are doing, but this seems to be the 
> direction things are heading in. If the web doesn't want OCSP any more, 
> will it stay around. I dunno.
> > If my response came across as confrontational I apologize in advance. 
> > It is not my intention to seek contention. I only want to find 
> > solutions. But after Years of waiting for this feature and reading 
> > arguments that mostly contradict all of my real life experiences, I 
> > feel compelled to speak as clearly and concisely as possible.
> > No confrontation here. I support you with your quest. It's just not 
> something I think I would ever use or need - so I didn't vote for it. I 
> also didn't vote against it - it would be nice to have,.
> Sean.

No worries Sean, thank you for your participation in this conversation. I am 
sure it made my standpoint to future participants more clear. Thanks for that.



Best regards,
novoMedia
_______________________________________________
dovecot mailing list -- dovecot@dovecot.org
To unsubscribe send an email to dovecot-le...@dovecot.org

Reply via email to