[TLS] Re: Adoption Call for Trust Anchor IDs
Christopher Wood <caw@heapingbits.net> Fri, 07 February 2025 11:05 UTC
Return-Path: <caw@heapingbits.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 39501C180B6A for <tls@ietfa.amsl.com>; Fri, 7 Feb 2025 03:05:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.794
X-Spam-Level:
X-Spam-Status: No, score=-2.794 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=heapingbits.net header.b="G6/EAKn+"; dkim=pass (2048-bit key) header.d=messagingengine.com header.b="Efrw4oYv"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1l3vNFvpvEvy for <tls@ietfa.amsl.com>; Fri, 7 Feb 2025 03:05:19 -0800 (PST)
Received: from fhigh-b2-smtp.messagingengine.com (fhigh-b2-smtp.messagingengine.com [202.12.124.153]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5CC60C180B47 for <tls@ietf.org>; Fri, 7 Feb 2025 03:05:18 -0800 (PST)
Received: from phl-compute-12.internal (phl-compute-12.phl.internal [10.202.2.52]) by mailfhigh.stl.internal (Postfix) with ESMTP id E2D39254019C; Fri, 7 Feb 2025 06:05:17 -0500 (EST)
Received: from phl-mailfrontend-01 ([10.202.2.162]) by phl-compute-12.internal (MEProxy); Fri, 07 Feb 2025 06:05:17 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=heapingbits.net; h=cc:cc:content-type:content-type:date:date:from:from :in-reply-to:in-reply-to:message-id:mime-version:references :reply-to:subject:subject:to:to; s=fm3; t=1738926317; x= 1739012717; bh=M6PMvnYnhLcOpb8Tsf5QLOi012MYYOo3QwYYnehPZWA=; b=G 6/EAKn+3fxf82TCZIYEwoTaIzpdIpAKDgi45800sZW1eoRtV/9inn6Ep4RHihZDk T70H2sqk6HdS1Qfksl+Sqi6e3wzK36Et0aY4UEuPQ4LFupIfwf2uCzMb/UxAPka6 aV6d1yqQS18B7/QJNwyt7Csrv01au/ssl9Smys7aN57qn6WWQGQTlnL/WV/Z5GWc o/rRPFW0fR9ud9NWTKCnugdMZJKh0hxPuF8k+6Iju3M+Zei//Ha8hmBNk2oVL9/y +Oriq51YBZLLz8TV0fZTS+rNMMRrq/OuX7oXoXz/GVjsy5c6E/T780qelkEqmdkp sXgHedcWtrZT3kdi36Hpg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:cc:content-type:content-type:date:date :feedback-id:feedback-id:from:from:in-reply-to:in-reply-to :message-id:mime-version:references:reply-to:subject:subject:to :to:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; t= 1738926317; x=1739012717; bh=M6PMvnYnhLcOpb8Tsf5QLOi012MYYOo3QwY YnehPZWA=; b=Efrw4oYvIRfU+5HJ9Stch8aN5n4NcymLj+yJG6BkQYRTinGoxxe NlfGNWZSlDixPvhKVpNCKh0v9l/vRPxnK6l+CRs0RwUpaG6rXjRvDWel7RiAsgXg Zoeb2sgaO8lmydhWpkGgZaFBtzi8OatCPvsEJWDaOWAhsN6UVEWC19NjEm5tV7ak v8s/k5Q07xEW3f1VtZwwoO2X6uMDVaxaCWYaDKQJwJlFo8dRG7MlAKjh/RfPup6D 8Pm3RTPI18hJMIymRCF2KLBlgiDByzdwzHDRRoFmlD8nhwJjgAb0gzo8I26Ah94Z kTSPiQfv6l3c4gsktCdNr5Umvvjoi/Jja7A==
X-ME-Sender: <xms:7eilZzI-6bqkyzaW1oU6tpO9QVVE31X421maXqzrokDPVQXw-b66wQ> <xme:7eilZ3KDPh26BdZDn_3hyvbLSZ-2uwlLDryWd70ofVmBRNHl4O0mXO_Xft93-spqq RANxxUQ_uxbbcZ2yT4>
X-ME-Received: <xmr:7eilZ7u7Lp5r0Rgz4_MmX4gqad3xDiISkikZym4EvI_7pADtf6VXpD5bCLdswgrTH_1RpjcPiEmJ7g9AkUyGJVq0yObVudOoL9S_nhC9C94>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeefvddrtddtgddvleduvdcutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpggftfghnshhusghstghrihgsvgdp uffrtefokffrpgfnqfghnecuuegrihhlohhuthemuceftddtnecunecujfgurhephffktg ggufffjgevvfhfofesrgdtmherhhdtjeenucfhrhhomhepvehhrhhishhtohhphhgvrhcu hghoohguuceotggrfieshhgvrghpihhnghgsihhtshdrnhgvtheqnecuggftrfgrthhtvg hrnhepgedtkeethedugeeiffefleejudeggeeiffeigffghffftdfggfdvheevleeiieej necuffhomhgrihhnpehivghtfhdrohhrghenucevlhhushhtvghrufhiiigvpedtnecurf grrhgrmhepmhgrihhlfhhrohhmpegtrgifsehhvggrphhinhhgsghithhsrdhnvghtpdhn sggprhgtphhtthhopedvpdhmohguvgepshhmthhpohhuthdprhgtphhtthhopehjohgvse hsrghlohifvgihrdhnvghtpdhrtghpthhtohepthhlshesihgvthhfrdhorhhg
X-ME-Proxy: <xmx:7eilZ8Zc19VlP-ylNtezrRu6BwoY_pXzbYtuwe4xO5OFENRcmWYkSA> <xmx:7eilZ6Yo2AD8DlfTlFLKLlSBHCBpOuvOB9Jzh_UQwwflpYOucVLNqw> <xmx:7eilZwAPfX4Jt4-N-JYBUPvPwocPufrYcMiQnwo_NJpruRZ1FKyRWQ> <xmx:7eilZ4b0Vn1fcR43FDwXmNWd_f50sA9FlqY3Z6DcKp35llqTmrRfVg> <xmx:7eilZ5lk5RMVitd9oOOkI1NgX-XS_iYwGG1AzBM47_dKo4gijo34WK_t>
Feedback-ID: i2f494406:Fastmail
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Fri, 7 Feb 2025 06:05:17 -0500 (EST)
From: Christopher Wood <caw@heapingbits.net>
Message-Id: <DB026A36-2BEA-4A29-8208-B016E6AD2BA2@heapingbits.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_03B3E8BC-74E3-4FEF-966D-7767AA6BEC3E"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3826.400.131.1.6\))
Date: Fri, 07 Feb 2025 06:05:06 -0500
In-Reply-To: <CAOgPGoDHaHXAcpXjtzoA7U-T7B0LoqxSxXsbp7-Rq+gF3shj7Q@mail.gmail.com>
To: Joe Salowey <joe@salowey.net>
References: <CAOgPGoDHaHXAcpXjtzoA7U-T7B0LoqxSxXsbp7-Rq+gF3shj7Q@mail.gmail.com>
X-Mailer: Apple Mail (2.3826.400.131.1.6)
Message-ID-Hash: ADI6GFCKNH73EO5GQBUHM2E2PAIVXWVT
X-Message-ID-Hash: ADI6GFCKNH73EO5GQBUHM2E2PAIVXWVT
X-MailFrom: caw@heapingbits.net
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "TLS@ietf.org" <tls@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: Adoption Call for Trust Anchor IDs
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/IlLaFPU3OdcKkBYGHrpcwfdXAvo>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>
I support adoption of [1] towards solving the problem identified during October’s interim meeting. I anticipate the shape of the solution will change in time as this group further develops the specification and acquires more information through implementation and experimentation. As with anything new, there are deployment considerations to be mindful of and risks to take into account. [2] identifies some of those risks. It’s clear that some of the risks are serious, but what's not clear — though has been argued — is that the likelihood of those risks will change substantially based on the solution space. I personally do not find these to be compelling arguments to stop exploring this solution space this early in the process. We benefit from the IETF’s inability to do anything quickly, giving us ample time to revisit and reevaluate potential risks over time. Should [1] be adopted, I expect the WG to seriously engage with that risk assessment throughout the process. Rigorous deployment considerations are no less required than security considerations, which are table stakes these days. Finally, it’s true that the initial shape of a draft heavily influences its final shape, though I do not consider this to be a problem in practice. We are not obligated to publish anything here. This WG has abandoned plenty of adopted work items in the past, and I see no reason why we would not be comfortable doing the same here if the evidence suggests that is the best outcome for all relevant stakeholders, with preferential treatment towards end users. Best, Chris > On Jan 15, 2025, at 10:59 AM, Joseph Salowey <joe@salowey.net> wrote: > > At the trust tussle Interim in October we had consensus that the working group was interested in working on the following problem: > > “Avoid client trust conflicts by enabling servers to reliably and efficiently support clients with diverse trust anchor lists, particularly in larger PKIs where the existing certificate_authorities extension is not viable” > > After IETF 121, we asked for submissions for possible working group adoption as a starting point for this work. We received two submissions: > > [1] Trust Anchor Identifiers, draft-beck-tls-trust-anchor-ids-03 <https://datatracker.ietf.org/doc/draft-beck-tls-trust-anchor-ids/> > [2] Trust is non-negotiable, draft-jackson-tls-trust-is-nonnegotiable-00 <https://datatracker.ietf.org/doc/draft-jackson-tls-trust-is-nonnegotiable/> > [1] defines a new protocol mechanism, while [2] provides an explanation of why the mechanism in [1] may not be needed and may be problematic. Since the second draft does not define a protocol mechanism we are not considering it for adoption, but we request that working group members review both documents and use [2] as input into determining whether we should adopt [1] as a working group item. Adoption as a working group item means the working group has change control over and can modify it as necessary; an adopted document is only a starting point. Please respond to this thread if you think the document should be adopted as a working group item. If you think the document is not appropriate for adoption please indicate why. This adoption call will close on February 7, 2025. Also please remember to maintain professional behavior and keep the discussion focused on technical issues. > > Thanks, > > Sean, Deirdre and Joe > > _______________________________________________ > TLS mailing list -- tls@ietf.org > To unsubscribe send an email to tls-leave@ietf.org
- [TLS] Adoption Call for Trust Anchor IDs Joseph Salowey
- [TLS] Re: Adoption Call for Trust Anchor IDs David Benjamin
- [TLS] Re: Adoption Call for Trust Anchor IDs Bob Beck
- [TLS] Re: Adoption Call for Trust Anchor IDs Andrew Chen
- [TLS] Re: Adoption Call for Trust Anchor IDs Ryan Hurst
- [TLS] Re: Adoption Call for Trust Anchor IDs Brendan McMillion
- [TLS] Re: Adoption Call for Trust Anchor IDs Robert Relyea
- [TLS] Re: Adoption Call for Trust Anchor IDs Loganaden Velvindron
- [TLS] Re: Adoption Call for Trust Anchor IDs Martin Thomson
- [TLS] Re: Adoption Call for Trust Anchor IDs David Adrian
- [TLS] Re: Adoption Call for Trust Anchor IDs Watson Ladd
- [TLS] Re: Adoption Call for Trust Anchor IDs Mike Shaver
- [TLS] Re: Adoption Call for Trust Anchor IDs Stephen Farrell
- [TLS] Re: Adoption Call for Trust Anchor IDs Thom Wiggers
- [TLS] Re: Adoption Call for Trust Anchor IDs Bas Westerbaan
- [TLS] Re: Adoption Call for Trust Anchor IDs Clint Wilson
- [TLS] Re: Adoption Call for Trust Anchor IDs Kyle Nekritz
- [TLS] Re: Adoption Call for Trust Anchor IDs Christopher Patton
- [TLS] Re: Adoption Call for Trust Anchor IDs Kathleen Moriarty
- [TLS] Re: Adoption Call for Trust Anchor IDs Dennis Jackson
- [TLS] Re: Adoption Call for Trust Anchor IDs Kampanakis, Panos
- [TLS] Re: Adoption Call for Trust Anchor IDs Nick Harper
- [TLS] Re: Adoption Call for Trust Anchor IDs Salz, Rich
- [TLS] Re: Adoption Call for Trust Anchor IDs David Schinazi
- [TLS] Re: Adoption Call for Trust Anchor IDs Christopher Wood
- [TLS] Re: Adoption Call for Trust Anchor IDs Joseph Salowey