Re: [TLS] Summary of discussion regarding spontaneuous authentication
Eric Rescorla <ekr@rtfm.com> Mon, 27 October 2014 22:08 UTC
Return-Path: <ekr@rtfm.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 129331A03E1 for <tls@ietfa.amsl.com>; Mon, 27 Oct 2014 15:08:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.977
X-Spam-Level:
X-Spam-Status: No, score=-1.977 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QhWrCoTnvp52 for <tls@ietfa.amsl.com>; Mon, 27 Oct 2014 15:08:12 -0700 (PDT)
Received: from mail-wg0-f50.google.com (mail-wg0-f50.google.com [74.125.82.50]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 55C6B1A03A0 for <tls@ietf.org>; Mon, 27 Oct 2014 15:08:04 -0700 (PDT)
Received: by mail-wg0-f50.google.com with SMTP id z12so4110179wgg.21 for <tls@ietf.org>; Mon, 27 Oct 2014 15:08:03 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type; bh=IuL43cGpumhYnLLGmsUqZyTw/7E42TRyvEY0Jajc/bo=; b=TvE+dlo8pbd/4zZ+BNnqhTN3ecNGDiZ4G69Q5ak1KuUUgrvMrnLjHiRvoYyl/Zh1Sp l8iVNaV7nUX8TQExu8kPRPm7G+WABOToIwGwHgqxG4rWlWGwNktlB4eFzBwaWr0JWnA/ dE5lM0fCEPwqJSaulAsc8GqYK5/6Ts2eef+lb1asgQt7x2fwpouVP9gkLKGzpe0Ea1Ol /myPsU11+SSS0fGgkowd2B3TfabsJnTYXQasMcfNnqK4LaiuedhUluV2Ym6yDx3Ax7xs ok/ptVTAzKvcObh1iEcgICHxDuCez/fVenhCYIHztqJzwRl1gVDv1s++cLaXfv0D45Dx gDEQ==
X-Gm-Message-State: ALoCoQnUBIgPXQnGJPR1MunrUh//aQhEDzVBB2//s+OHhkiUJSAhonKIlNTws571zv3PWE6pWU13
X-Received: by 10.180.103.233 with SMTP id fz9mr22984363wib.80.1414447682960; Mon, 27 Oct 2014 15:08:02 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.216.49.198 with HTTP; Mon, 27 Oct 2014 15:07:22 -0700 (PDT)
In-Reply-To: <2A0EFB9C05D0164E98F19BB0AF3708C71D3A8C4F98@USMBX1.msg.corp.akamai.com>
References: <CABkgnnUAhEV=wLZyTew=ne7VgSq50XYR3Fo5EfjNXc8=_hbpyg@mail.gmail.com> <CABkgnnXAk+HU2yaUJdOQ0w-heHwYrPK6Zf3HrH5tU+2Tk7_cCA@mail.gmail.com> <20141022125359.GA18704@LK-Perkele-VII> <CABkgnnW=aVzsi+cq=icpn4z9PjFuoiu_LQz_mnfeyPPom6LROQ@mail.gmail.com> <20141022132623.GA19894@LK-Perkele-VII> <CABkgnnVe3T56ia-bxgqNrpF_vXQD=T7xisrZb0Szu+L1X05+NQ@mail.gmail.com> <2A0EFB9C05D0164E98F19BB0AF3708C71D3A8C4F98@USMBX1.msg.corp.akamai.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Mon, 27 Oct 2014 15:07:22 -0700
Message-ID: <CABcZeBNvtOi9UuQGdbuxvPGqZqRx+ZCw9CvMp830Dpq47WwxVg@mail.gmail.com>
To: "Salz, Rich" <rsalz@akamai.com>
Content-Type: multipart/alternative; boundary="f46d044280cab2566b05066ec3b7"
Archived-At: http://mailarchive.ietf.org/arch/msg/tls/dKc9urls54Ct0fbDvHgZWNbIs4U
Cc: "tls@ietf.org" <tls@ietf.org>
Subject: Re: [TLS] Summary of discussion regarding spontaneuous authentication
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Oct 2014 22:08:17 -0000
One way to handle this would be to separate out the things that indicate
cryptographic capabilities from those that indicate proposed identity.
Specifically, CertificateRequest currently contains:
struct {
ClientCertificateType certificate_types<1..2^8-1>;
SignatureAndHashAlgorithm
supported_signature_algorithms<2^16-1>;
DistinguishedName certificate_authorities<0..2^16-1>;
} CertificateRequest;
But as is noted in 5246, there is redundancy here:
The interaction of the certificate_types and
supported_signature_algorithms fields is somewhat complicated.
certificate_types has been present in TLS since SSLv3, but was
somewhat underspecified. Much of its functionality is superseded by
supported_signature_algorithms. The following rules apply:
And since we have removed the non-signing modes in 1.3, arguably we *just*
need signature_algorithms to specify the cryptographic parameters. Further,
I would argue that the certificate_authorities field is an practice a mess
and doesn't belong at the TLS layer (note that we don't have an analog to
it for the client to tell the server which CAs it supports). [0]
I would argue that the natural thing to do is to keep the cryptographic
pieces
in TLS but move them into the extensions (to match what the client sends).
Specifically, in TLS 1.3 do:
1. Modify https://tools.ietf.org/html/rfc5246#section-7.4.1.4.1 to let the
server send the SignatureAlgorithms extension in the ServerHello.
2. Allow the server to send the Supported Elliptic Curves extension
https://tools.ietf.org/html/rfc4492#section-5.1.1 in the ServerHello.
This would have a number of advantages:
1. A more symmetric design since you would use the same extensions in
both directions.
2. A more expressive (and yet simpler) cryptographic negotiation design
since we could indicate both algorithms and groups.
3. Push off the clumsy PKI-based part into the application while leaving the
TLS-relevant crypto part in TLS.
4. It's consistent with both server-solicited and unsolicited authentication
because the client knows what kinds of certificate it is allowed to deliver.
If we make this change, we could still leave CertificateRequest in place,
but
it could be empty, just indicating that the server wants some kind of client
auth and let the client decide. We might also allow the client to say that
he is going to provide it and let the server say OK, to match MT's CANT
draft. The point is that this would leave us with an orthogonal design that
detached capabilities from requests.
-Ekr
On Wed, Oct 22, 2014 at 8:59 AM, Salz, Rich <rsalz@akamai.com> wrote:
> > I tend to think that we need a more general mechanism for indicating
> > support for certificate types and signature algorithms. Maybe we could
> > unconditionally include those in the early handshake instead.
>
> Yes. In two years when MSFT and Google start deprecating SHA-2 for
> Keccak, it'd be nice to know which cert chain to send. Or when I don't
> know whether to send an RSA or ECDSA certificate next year.
>
> --
> Principal Security Engineer, Akamai Technologies
> IM: rsalz@jabber.me Twitter: RichSalz
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
- [TLS] Summary of discussion regarding spontaneuou… Martin Thomson
- Re: [TLS] Summary of discussion regarding spontan… Martin Thomson
- Re: [TLS] Summary of discussion regarding spontan… Tom Ritter
- Re: [TLS] Summary of discussion regarding spontan… Ilari Liusvaara
- Re: [TLS] Summary of discussion regarding spontan… Manuel Pégourié-Gonnard
- Re: [TLS] Summary of discussion regarding spontan… Martin Thomson
- Re: [TLS] Summary of discussion regarding spontan… Ilari Liusvaara
- Re: [TLS] Summary of discussion regarding spontan… Martin Thomson
- Re: [TLS] Summary of discussion regarding spontan… Manuel Pégourié-Gonnard
- Re: [TLS] Summary of discussion regarding spontan… Watson Ladd
- Re: [TLS] Summary of discussion regarding spontan… Eric Rescorla
- Re: [TLS] Summary of discussion regarding spontan… Watson Ladd
- Re: [TLS] Summary of discussion regarding spontan… Martin Thomson
- Re: [TLS] Summary of discussion regarding spontan… Ilari Liusvaara
- Re: [TLS] Summary of discussion regarding spontan… Martin Rex
- Re: [TLS] Summary of discussion regarding spontan… Salz, Rich
- Re: [TLS] Summary of discussion regarding spontan… Tom Ritter
- Re: [TLS] Summary of discussion regarding spontan… Joseph Salowey
- Re: [TLS] Summary of discussion regarding spontan… Martin Thomson
- Re: [TLS] Summary of discussion regarding spontan… Andrei Popov
- Re: [TLS] Summary of discussion regarding spontan… Manuel Pégourié-Gonnard
- Re: [TLS] Summary of discussion regarding spontan… Eric Rescorla
- Re: [TLS] Summary of discussion regarding spontan… Martin Thomson
- Re: [TLS] Summary of discussion regarding spontan… Joseph Salowey
- Re: [TLS] Summary of discussion regarding spontan… Martin Thomson
- Re: [TLS] Summary of discussion regarding spontan… Joseph Salowey
- Re: [TLS] Summary of discussion regarding spontan… Peter Gutmann
- Re: [TLS] Summary of discussion regarding spontan… Santosh Chokhani