Re: [Acme] SNI extension for tls-alpn-01 challenge in draft-ietf-acme-ip-05

Michael Richardson <mcr+ietf@sandelman.ca> Tue, 23 April 2019 21:17 UTC

Return-Path: <mcr@sandelman.ca>
X-Original-To: acme@ietfa.amsl.com
Delivered-To: acme@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4749712039C for <acme@ietfa.amsl.com>; Tue, 23 Apr 2019 14:17:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z2enpyb7NOu3 for <acme@ietfa.amsl.com>; Tue, 23 Apr 2019 14:17:40 -0700 (PDT)
Received: from relay.sandelman.ca (relay.cooperix.net [IPv6:2a01:7e00::f03c:91ff:feae:de77]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E655712060B for <acme@ietf.org>; Tue, 23 Apr 2019 14:17:39 -0700 (PDT)
Received: from dooku.sandelman.ca (unknown [75.98.19.133]) by relay.sandelman.ca (Postfix) with ESMTPS id B7ECD1F457 for <acme@ietf.org>; Tue, 23 Apr 2019 21:17:35 +0000 (UTC)
Received: by dooku.sandelman.ca (Postfix, from userid 179) id 7AC1C3B51; Tue, 23 Apr 2019 17:12:15 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: "acme@ietf.org" <acme@ietf.org>
In-reply-to: <CAErg=HHFtog0NY21BCVfQoZnWnmv9tzpmYp6Gw+gA=jdePRoEA@mail.gmail.com>
References: <MN2PR18MB28457CCBEF6FFE2B70E286FCC3250@MN2PR18MB2845.namprd18.prod.outlook.com> <CAErg=HGYuRc+tOBwRedx5a9tnH9iVm3bfWYhfXeiHCgcvp8gMA@mail.gmail.com> <MN2PR18MB2845DBA634A0BC648222C627C3230@MN2PR18MB2845.namprd18.prod.outlook.com> <CAErg=HG=LgqDxZ8QxVSAq2K6MsKJX36o6O7v0ojS3rsgUXuHVw@mail.gmail.com> <24216.1556044089@dooku.sandelman.ca> <CAErg=HH2NqHH-+AUAXvMWBrmhOPH=86twOkr=b=F0TduB45KSw@mail.gmail.com> <32047.1556051326@dooku.sandelman.ca> <CAErg=HHFtog0NY21BCVfQoZnWnmv9tzpmYp6Gw+gA=jdePRoEA@mail.gmail.com>
Comments: In-reply-to Ryan Sleevi <ryan-ietf@sleevi.com> message dated "Tue, 23 Apr 2019 16:40:12 -0400."
X-Mailer: MH-E 8.6; nmh 1.6; GNU Emacs 24.5.1
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha256"; protocol="application/pgp-signature"
Date: Tue, 23 Apr 2019 17:12:15 -0400
Message-ID: <3267.1556053935@dooku.sandelman.ca>
Archived-At: <https://mailarchive.ietf.org/arch/msg/acme/CfG3iDQKYaIog05BmY3yfMXTYHA>
Subject: Re: [Acme] SNI extension for tls-alpn-01 challenge in draft-ietf-acme-ip-05
X-BeenThere: acme@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Automated Certificate Management Environment <acme.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/acme>, <mailto:acme-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/acme/>
List-Post: <mailto:acme@ietf.org>
List-Help: <mailto:acme-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/acme>, <mailto:acme-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Apr 2019 21:17:49 -0000

Ryan Sleevi <ryan-ietf@sleevi.com> wrote:
    > That same logic applies here - we 'could' use a distinct ALPN method,
    > in which case, omitting the IP is fine. However, including the IP
    > (albeit, encoded) makes it easier to reason about, dispatch, and less
    > likely to result in implementation flaws, and in particular, given that
    > the draft is reusing the ALPN tag of TLS-ALPN, observes the semantics
    > and security properties required of servers that 'speak' TLS-ALPN.

I ommited your great explanation of the situation.
*I* think that certificates bound to IP addresses are useful for things like
server management systems (Dell DRACs, HP iLO, IBM RSA..).  As such, there
are no cloud issues involved.

A second use case is for end-systems to get certificates for use in things
like TLS ClientCertificates.  I can see my desktop or appliances doing this
given that they might have a stable IPv6 addresses.  Few users would have
stable, public IPv4 today though.  ACME could still be used to talk to
internal CAs though.

You have a different use case, and I still don't understand it.

Maybe the document needs an applicability statement.

-- 
]               Never tell me the odds!                 | ipv6 mesh networks [ 
]   Michael Richardson, Sandelman Software Works        | network architect  [ 
]     mcr@sandelman.ca  http://www.sandelman.ca/        |   ruby on rails    [