Re: Report on preliminary decision on TLS 1.3 and client auth
Martin Thomson <martin.thomson@gmail.com> Fri, 25 September 2015 17:12 UTC
Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 658141A854B for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Fri, 25 Sep 2015 10:12:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.012
X-Spam-Level:
X-Spam-Status: No, score=-7.012 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1_SoMomXA-L3 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Fri, 25 Sep 2015 10:12:49 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 36E5C1A6FCA for <httpbisa-archive-bis2Juki@lists.ietf.org>; Fri, 25 Sep 2015 10:12:48 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1ZfWUu-00032i-FU for ietf-http-wg-dist@listhub.w3.org; Fri, 25 Sep 2015 17:09:24 +0000
Resent-Date: Fri, 25 Sep 2015 17:09:24 +0000
Resent-Message-Id: <E1ZfWUu-00032i-FU@frink.w3.org>
Received: from lisa.w3.org ([128.30.52.41]) by frink.w3.org with esmtps (TLS1.2:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <martin.thomson@gmail.com>) id 1ZfWUo-00031x-Gl for ietf-http-wg@listhub.w3.org; Fri, 25 Sep 2015 17:09:18 +0000
Received: from mail-yk0-f177.google.com ([209.85.160.177]) by lisa.w3.org with esmtps (TLS1.2:RSA_ARCFOUR_SHA1:128) (Exim 4.80) (envelope-from <martin.thomson@gmail.com>) id 1ZfWUm-00034S-5Y for ietf-http-wg@w3.org; Fri, 25 Sep 2015 17:09:18 +0000
Received: by ykdt18 with SMTP id t18so120959940ykd.3 for <ietf-http-wg@w3.org>; Fri, 25 Sep 2015 10:08:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=dqFUpfolteDO31DsjDlkjo6P2/WQgvJU1D9Bbb0TOq8=; b=ZiMIdwkbNYvGh+aICi/3IP750U3rO47bw9AZnkQlQbiuLuS9/zTOqahbYRKxxZodyY 6mpmQemJb4tBgChlEkfXh5/3oNL38a0TFTyuLftC50WCrIIfa3I4nzaLnCq0AOPpPnpJ Ad39EkO5pYCXwGssZJQLxcNeTIBaBqe5V14rv0jVQJ0VtOQw0bT4r52psEXWfr9+cwYD TiJ1uoBrLrV8+dIMqt4W5hfXads6CYQ6P0ZBLm/7ti/2wlyPrSBrlqUZZFMPRhykfvgm FZUvSdA5M3EAdPXQ7XvhEdJmuaIWkeJcJptZrv4riSDoajSHuG3qbT4OV89XX7mEf3mS 7YQA==
MIME-Version: 1.0
X-Received: by 10.129.159.131 with SMTP id w125mr2313663ywg.56.1443200930266; Fri, 25 Sep 2015 10:08:50 -0700 (PDT)
Received: by 10.129.133.130 with HTTP; Fri, 25 Sep 2015 10:08:50 -0700 (PDT)
In-Reply-To: <7301.1443176081@critter.freebsd.dk>
References: <CABkgnnWREq6X+chcvookChGAZGxkJ6Zs_7FGwz7Mbn12XMxewQ@mail.gmail.com> <5603599F.8090303@treenet.co.nz> <CABkgnnVq9FDeGf_=JF0m0AkgfO1G3DVV2QN_aPrbYnFtfRLFrw@mail.gmail.com> <5603745A.7020509@treenet.co.nz> <6818.1443172702@critter.freebsd.dk> <8F0BC939-B0BD-43F6-AB41-7676B5B94054@gmail.com> <7301.1443176081@critter.freebsd.dk>
Date: Fri, 25 Sep 2015 10:08:50 -0700
Message-ID: <CABkgnnXDVDp1DPDBkWiOJm82WZXHnsJOpk95NPY1ccHUQ+RYiw@mail.gmail.com>
From: Martin Thomson <martin.thomson@gmail.com>
To: Poul-Henning Kamp <phk@phk.freebsd.dk>
Cc: Yoav Nir <ynir.ietf@gmail.com>, Amos Jeffries <squid3@treenet.co.nz>, HTTP Working Group <ietf-http-wg@w3.org>
Content-Type: text/plain; charset="UTF-8"
Received-SPF: pass client-ip=209.85.160.177; envelope-from=martin.thomson@gmail.com; helo=mail-yk0-f177.google.com
X-W3C-Hub-Spam-Status: No, score=-7.9
X-W3C-Hub-Spam-Report: AWL=1.842, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, W3C_AA=-1, W3C_DB=-1, W3C_IRA=-1, W3C_IRR=-3, W3C_WL=-1
X-W3C-Scan-Sig: lisa.w3.org 1ZfWUm-00034S-5Y d60ad65c14966c72932256e1d31de9d7
X-Original-To: ietf-http-wg@w3.org
Subject: Re: Report on preliminary decision on TLS 1.3 and client auth
Archived-At: <http://www.w3.org/mid/CABkgnnXDVDp1DPDBkWiOJm82WZXHnsJOpk95NPY1ccHUQ+RYiw@mail.gmail.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/30275
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>
On 25 September 2015 at 03:14, Poul-Henning Kamp <phk@phk.freebsd.dk> wrote: > What I tried to say above is that we don't know which cookie > identifies the session. That's definitely true. Cookies are a pretty crude tool for something like this. I think that your general observation about client certificates is overwhelmingly true. On the web at least, I'm seeing a general trend away from using the TLS layer to authenticate clients. If cookies are crude, client certificates make them look like a picture of sophistication by comparison. As you say, they are a poor fit for both the protocol and the architecture. What I neglected to mention earlier is that client certificate mechanism that was being added was viewed more as a necessary evil than an important feature. No one liked having to do this, but as Mark pointed out, there are far more people relying on having the functionality than we previously thought. I'd like to find other solutions for the use cases that drive this, but the view was that we still needed something like this so that we don't strand those users on old protocols. We don't have to *like* it though. There was strong agreement that this feature would be accompanied by a prominent and severe admonishment against using it. I definitely want to talk about what the alternatives look like, but perhaps we should start a separate thread on that subject.
- Report on preliminary decision on TLS 1.3 and cli… Martin Thomson
- Re: Report on preliminary decision on TLS 1.3 and… Amos Jeffries
- Re: Report on preliminary decision on TLS 1.3 and… Martin Thomson
- Re: Report on preliminary decision on TLS 1.3 and… Amos Jeffries
- Re: Report on preliminary decision on TLS 1.3 and… Martin Thomson
- Re: Report on preliminary decision on TLS 1.3 and… Ilari Liusvaara
- Re: Report on preliminary decision on TLS 1.3 and… Poul-Henning Kamp
- Re: Report on preliminary decision on TLS 1.3 and… Yoav Nir
- Re: Report on preliminary decision on TLS 1.3 and… Poul-Henning Kamp
- Re: Report on preliminary decision on TLS 1.3 and… Martin Thomson
- Re: Report on preliminary decision on TLS 1.3 and… Poul-Henning Kamp
- Re: Report on preliminary decision on TLS 1.3 and… Kyle Rose
- Re: Report on preliminary decision on TLS 1.3 and… Martin Thomson
- Re: Report on preliminary decision on TLS 1.3 and… Willy Tarreau
- Re: Report on preliminary decision on TLS 1.3 and… Poul-Henning Kamp
- Re: Report on preliminary decision on TLS 1.3 and… Ilari Liusvaara
- Re: Report on preliminary decision on TLS 1.3 and… Willy Tarreau
- Re: Report on preliminary decision on TLS 1.3 and… Willy Tarreau
- Difffent ways to authenticate (Was: Re: Report on… Ilari Liusvaara
- Re: Report on preliminary decision on TLS 1.3 and… Martin Thomson
- Re: Report on preliminary decision on TLS 1.3 and… Ilari Liusvaara
- Re: Report on preliminary decision on TLS 1.3 and… Jason T. Greene
- Re: Report on preliminary decision on TLS 1.3 and… Martin Thomson
- Re: Report on preliminary decision on TLS 1.3 and… Martin Thomson
- Re: Report on preliminary decision on TLS 1.3 and… Kyle Rose
- Re: Report on preliminary decision on TLS 1.3 and… Martin Thomson
- Re: Report on preliminary decision on TLS 1.3 and… Kyle Rose
- Re: Report on preliminary decision on TLS 1.3 and… Yoav Nir
- RE: Report on preliminary decision on TLS 1.3 and… Mike Bishop
- Re: Report on preliminary decision on TLS 1.3 and… Yoav Nir