Re: [TLS] Commentary on the client authentication presentation slides
Ilari Liusvaara <ilari.liusvaara@elisanet.fi> Sat, 08 August 2015 09:03 UTC
Return-Path: <ilari.liusvaara@elisanet.fi>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9330D1B2A2F for <tls@ietfa.amsl.com>; Sat, 8 Aug 2015 02:03:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 76ptIVe-etuF for <tls@ietfa.amsl.com>; Sat, 8 Aug 2015 02:03:55 -0700 (PDT)
Received: from emh03.mail.saunalahti.fi (emh03.mail.saunalahti.fi [62.142.5.109]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 45E691ACD84 for <tls@ietf.org>; Sat, 8 Aug 2015 02:03:54 -0700 (PDT)
Received: from LK-Perkele-VII (a91-155-194-207.elisa-laajakaista.fi [91.155.194.207]) by emh03.mail.saunalahti.fi (Postfix) with ESMTP id 0C0F518879A; Sat, 8 Aug 2015 12:03:51 +0300 (EEST)
Date: Sat, 08 Aug 2015 12:03:51 +0300
From: Ilari Liusvaara <ilari.liusvaara@elisanet.fi>
To: Andrei Popov <Andrei.Popov@microsoft.com>
Message-ID: <20150808090351.GA14947@LK-Perkele-VII>
References: <20150720141036.GA32204@LK-Perkele-VII> <BLUPR03MB1396E33D0B7ADBED918C54D08C810@BLUPR03MB1396.namprd03.prod.outlook.com> <CAF8qwaAAXv3Ts8JB25e5GB4Xrh8DU2Xg3UCXuDUObgGHubUFUw@mail.gmail.com> <CAF8qwaCz=ZtdANYas+vSatJGzai6AeyiLtw7_H_qP9iXf7dV8g@mail.gmail.com> <20150801084849.GA7162@LK-Perkele-VII> <CAF8qwaBADYYuKNkUnanJOwv3+ZurDHK3QTmQMsyqJ-a4yiSkKw@mail.gmail.com> <20150802182908.GA29836@LK-Perkele-VII> <BLUPR03MB139631EC62ABC0732E0C70CA8C760@BLUPR03MB1396.namprd03.prod.outlook.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
In-Reply-To: <BLUPR03MB139631EC62ABC0732E0C70CA8C760@BLUPR03MB1396.namprd03.prod.outlook.com>
User-Agent: Mutt/1.5.23 (2014-03-12)
Sender: Ilari Liusvaara <ilari.liusvaara@elisanet.fi>
Archived-At: <http://mailarchive.ietf.org/arch/msg/tls/5c5zuC9M_QWEbq9VGSnzaNxhCgU>
Cc: "tls@ietf.org" <tls@ietf.org>
Subject: Re: [TLS] Commentary on the client authentication presentation slides
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 08 Aug 2015 09:03:57 -0000
On Tue, Aug 04, 2015 at 12:37:47AM +0000, Andrei Popov wrote: > > Well, TLS is also used for non-browser HTTPS and stuff other than HTTPS. > > There one likely "preconfigures" client certificates if needed. > The proposed client authentication mechanism specifically addresses > the case where the client does not have one "preconfigured" cert. What sort of usecase you have in mind for this? I can't come up with single one that I don't think is a hack at best. Note: It is very easy to misuse capability like this (even if it is restricted to work only once per connection) to create nasty security issues (one example being trying to use this for HTTP/2 in browser environment). > > - TLS-level client certificate auth on client request on connect (this > > currently can't be cleanly done, sometimes one even sees that "renego > > immediately to provoke CR" hack). > With the proposed change, there will be no need to renegotiate in > order to authenticate the client. Where's the capability for client to unilaterially decide to send a certificate without valid configuration? The 0-RTT certificate authentication requires a valid configuration. E.g. one way to implement that would be certificate_request_request extension, which would request server to send a CertificateRequest. Tho with the changes to always sign the key exchange, using 0-RTT client certs doesn't work unless the server requested certificates back then. > > - Application-level client auth (via CB capability of TLS). > The proposed mechanism does not preclude this option. That was given as second of two entries in list of kinds of authentication I think are useful (and precluding it would mean removing TLS-Unique and TLS-Extractor, which is something that I really don't see happening). -Ilari
- [TLS] Commentary on the client authentication pre… Ilari Liusvaara
- Re: [TLS] Commentary on the client authentication… Andrei Popov
- Re: [TLS] Commentary on the client authentication… Ilari Liusvaara
- Re: [TLS] Commentary on the client authentication… Andrei Popov
- Re: [TLS] Commentary on the client authentication… David Benjamin
- Re: [TLS] Commentary on the client authentication… Ilari Liusvaara
- Re: [TLS] Commentary on the client authentication… David Benjamin
- Re: [TLS] Commentary on the client authentication… Ilari Liusvaara
- Re: [TLS] Commentary on the client authentication… Andrei Popov
- Re: [TLS] Commentary on the client authentication… Ilari Liusvaara
- Re: [TLS] Commentary on the client authentication… Andrei Popov
- Re: [TLS] Commentary on the client authentication… Yoav Nir
- Re: [TLS] Commentary on the client authentication… Andrei Popov
- Re: [TLS] Commentary on the client authentication… David Benjamin
- Re: [TLS] Commentary on the client authentication… Yoav Nir
- Re: [TLS] Commentary on the client authentication… Andrei Popov
- Re: [TLS] Commentary on the client authentication… Ilari Liusvaara
- Re: [TLS] Commentary on the client authentication… Dave Garrett
- Re: [TLS] Commentary on the client authentication… Martin Thomson
- Re: [TLS] Commentary on the client authentication… Andrei Popov
- Re: [TLS] Commentary on the client authentication… Martin Rex