On Wed, Sep 08, 2021 at 04:45:24PM +0000, Salz, Rich wrote:
> >    Perhaps the text can be made more concise, but I don't think full
>     removal is warranted.  This is *not* the fragile key pinning from HPKP.
> 
> Right now the text has this.  Is more needed?
> 
> ### Failure: No Match Found
> 
> If the client does not find a presented identifier matching any of the
> reference identifiers then the client MUST
> proceed as described as follows.
> 
> If the client is an automated application not directly controlled
> by a human user, then it SHOULD terminate the communication attempt with
> a bad certificate error and log the error appropriately.
> An automated application
> MAY provide a configuration setting that disables this behavior, but it
> MUST enable the behavior by default.
> 
> If the client is an interactive client that is directly controlled by a human
> user, then it SHOULD inform the user of the identity mismatch and 
> automatically
> terminate the communication attempt with a bad certificate error; this 
> behavior
> is preferable because it prevents users from inadvertently bypassing security
> protections in hostile situations.
> 
> Some interactive clients give advanced users the option
> of proceeding with acceptance despite the identity mismatch.
> Although this behavior can be appropriate in certain specialized
> circumstances, it needs to be handled with
> extreme caution, for example by first encouraging even an advanced user to
> terminate the communication attempt and, if the advanced user chooses to
> proceed anyway, by forcing the user to view the entire certification path
> before proceeding.

This is most of what's needed.  Plus something along the lines of:

    In some cases the user should be able to accept the certificate in
    question as valid also for subsequent connections.  Such ad-hoc
    "pinning" should typically not restrict future connections to just
    the pinned certificate.

    Local policy that statically enforces a given certificate for a
    given peer is best made available only as prior configuration,
    rather than a just-in-time override for a failed connection.

Feel free to word smith if largely acceptable, or clarify objections if
not...

-- 
    Viktor.

_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to