Hi all,

Last year, we spoke about a possible refresh of RFC 4642 (TLS with NNTP)
to be consistent with the latest published RFCs about TLS, notably UTA
BCP 195.
I based my work on RFC 7590 (TLS with XMPP).

In case you have any comments about the following document, that is now
in Last Call stage, please tell.

    https://tools.ietf.org/html/draft-elie-nntp-tls-recommendations-01


I have especially two questions for UTA (Appendix E):

Here are wording proposals, that I shall integrate in the next revision of the draft. In case you see something wrong, please do not hesitate to speak up.



1/    Should the following paragraph in Section 2.2.2 of [RFC4642]
      remain as-is or should it be modernized with another wording?
      (And which one?  or is it already done by the reference to
      [RFC7525]?)

Quoting [RFC4642]:
   Servers MUST be able to understand backwards-compatible TLS Client
   Hello messages (provided that client_version is TLS 1.0 or later),
   and clients MAY use backwards-compatible Client Hello messages.
   Neither clients nor servers are required to actually support Client
   Hello messages for anything other than TLS 1.0.  However, the TLS
   extension for Server Name Indication ("server_name") [TLS-EXT] SHOULD
   be implemented by all clients; it also SHOULD be implemented by any
   server implementing STARTTLS that is known by multiple names.
   (Otherwise, it is not possible for a server with several hostnames to
   present the correct certificate to the client.)

   The first two sentences are removed.  There is no special
   requirement for NNTP with regards to TLS Client Hello messages.
   Section 7.4.1.2 and Appendix E of [RFC5246] apply.

   The last two sentences are removed.  Section 3.6 of [RFC7525] apply.


The consequence of the removal of the last two sentences is:

   o  NNTP implementations and deployments MUST support the Server Name
      Indication (SNI) extension defined in Section 3 of [RFC6066],
      contrary to Section 2.2.2 of [RFC4642] for which it was only a
      SHOULD.  All clients and servers known by multiple names MUST
      support the SNI extension, in conformance with Section 3.6 of
      [RFC7525].



2/    Should the paragraphs in Section 5 of [RFC4642] dealing with how
      the client checks the server hostname and the binding between the
      identity of servers and the public keys presented be modernized?
      (Obsolete them in favour of [RFC6125] for instance?  or maybe
      [RFC7525] is enough as it also points to [RFC6125])

Quoting [RFC4642]:
   During the TLS negotiation, the client MUST check its understanding
   of the server hostname against the server's identity as presented in
   the server Certificate message, in order to prevent man-in-the-middle
   attacks.  Matching is performed according to these rules:
[...]

I've seen in private with Peter Saint-Andre, who pointed me to the recently published RFC 7817 as a source of wording inspiration. I'll have a look, though I am half-tempted to just keep the current RFC 4642 wording for now. I am under the impression that a separate RFC like RFC 7817 would be better. (The current wording about certificate validation is still OK in RFC 4642, so there is currently no urgent need to update NNTP certificate validation to match RFC 6125, contrary to the other updates mentioned in the draft about RC4, TLS-level compression and strict TLS.)

--
Julien ÉLIE

« Ils ont coulé mon entreprise. » (les pirates, dans _Astérix_)

_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to