Re: Client Certificates - re-opening discussion

Stephen Farrell <stephen.farrell@cs.tcd.ie> Mon, 21 September 2015 16:29 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8B8221A9129 for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 21 Sep 2015 09:29:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.012
X-Spam-Level:
X-Spam-Status: No, score=-7.012 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OOD2uWsHUHCu for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 21 Sep 2015 09:29:42 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3D4481A9128 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Mon, 21 Sep 2015 09:29:41 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1Ze3vE-0004MP-5R for ietf-http-wg-dist@listhub.w3.org; Mon, 21 Sep 2015 16:26:32 +0000
Resent-Date: Mon, 21 Sep 2015 16:26:32 +0000
Resent-Message-Id: <E1Ze3vE-0004MP-5R@frink.w3.org>
Received: from maggie.w3.org ([128.30.52.39]) by frink.w3.org with esmtps (TLS1.2:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <stephen.farrell@cs.tcd.ie>) id 1Ze3v6-0004LH-MJ for ietf-http-wg@listhub.w3.org; Mon, 21 Sep 2015 16:26:24 +0000
Received: from [134.226.56.6] (helo=mercury.scss.tcd.ie) by maggie.w3.org with esmtps (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from <stephen.farrell@cs.tcd.ie>) id 1Ze3v4-0001yj-Uy for ietf-http-wg@w3.org; Mon, 21 Sep 2015 16:26:24 +0000
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id C3F4DBE77; Mon, 21 Sep 2015 17:25:52 +0100 (IST)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uZ3irpqZh_Jg; Mon, 21 Sep 2015 17:25:51 +0100 (IST)
Received: from [10.87.48.73] (unknown [86.46.24.221]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id D12B4BE5C; Mon, 21 Sep 2015 17:25:50 +0100 (IST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cs.tcd.ie; s=mail; t=1442852751; bh=mGIdhwAwQXc8Xmnckz+/1l02MY6zxuYKBKYbtKakxdI=; h=Subject:To:References:From:Date:In-Reply-To:From; b=s5GOgr89rD27BodRY75gYjpyPjRnrtyBaqNsfdsPksG8mgAq9nRnIxt5mkhmQ/9jp o5hEO44teODybWp8XS/+uFMziZIu/DvmbJG8p4hio03O28xLoqzdGR9tg9B7zzOb5S HuZBX9Avc4jUbwr7PbJTQdgCWkIHG57w4pAIdo6M=
To: Mark Nottingham <mnot@mnot.net>, HTTP Working Group <ietf-http-wg@w3.org>
References: <63DECDF0-AB59-4AFD-8E48-8C2526FD6047@mnot.net>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Openpgp: id=D66EA7906F0B897FB2E97D582F3C8736805F8DA2; url=
Message-ID: <56002F8E.2020109@cs.tcd.ie>
Date: Mon, 21 Sep 2015 17:25:50 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.2.0
MIME-Version: 1.0
In-Reply-To: <63DECDF0-AB59-4AFD-8E48-8C2526FD6047@mnot.net>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Received-SPF: pass client-ip=134.226.56.6; envelope-from=stephen.farrell@cs.tcd.ie; helo=mercury.scss.tcd.ie
X-W3C-Hub-Spam-Status: No, score=-8.1
X-W3C-Hub-Spam-Report: AWL=1.409, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, RDNS_NONE=0.793, SPF_PASS=-0.001, W3C_AA=-1, W3C_IRA=-1, W3C_IRR=-3, W3C_WL=-1
X-W3C-Scan-Sig: maggie.w3.org 1Ze3v4-0001yj-Uy dbcaccca2b77a61ad4b1a67e6946b389
X-Original-To: ietf-http-wg@w3.org
Subject: Re: Client Certificates - re-opening discussion
Archived-At: <http://www.w3.org/mid/56002F8E.2020109@cs.tcd.ie>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/30250
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>


On 17/09/15 23:10, Mark Nottingham wrote:
> Hi,
> 
> We've talked about client certificates in HTTP/2 (and elsewhere) for
> a while, but the discussion has stalled.
> 
> I've heard from numerous places that this is causing Pain. So, I'd
> like to devote a chunk of our time in Yokohama to discussing this.
> 
> If you have a proposal or thoughts that might become a proposal in
> this area, please brush it off and be prepared. Of course, we can
> discuss on-list in the meantime.

As an occasional developer, I'm not fussed about how HTTPS with client
certificate based authentication works, but I have made use of this
in various server-server use-cases. It's really handy to be able to
e.g. setup a new virtual host and to be able use or test that via
curl. I suspect I'm not alone in having done that and don't recall
seeing it mentioned in this thread. (Apologies if I'm repeating stuff.)

While I could probably do all I need to without HTTP, it's easier
and I get more code/tool re-use to use client certificates. (Note,
for all cases I care about myself I can roll a new CA and certify
all the parties so I have no dependency on a 3rd party PKI like the
WebPKI.)

And while continuing to use HTTP/1.1 would be just fine for me, I'd
prefer to use standard configurations for tools, which means at some
point wanting this feature for HTTP/2 as well.

Cheers,
S.

PS: In case it's not clear, the above is wearing no IETF-hat:-)

> 
> Cheers,
> 
> -- Mark Nottingham   https://www.mnot.net/
> 
> 
> 
> 
> 
>