[TLS] OCSP stapling problem

"T.Tributh" <tls@tributh.net> Sat, 15 December 2018 16:24 UTC

Return-Path: <tls@tributh.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7DAD2130DD3 for <tls@ietfa.amsl.com>; Sat, 15 Dec 2018 08:24:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.701
X-Spam-Level:
X-Spam-Status: No, score=-1.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (4096-bit key) reason="fail (message has been altered)" header.d=tributh.net header.b=bp1OdrJF; dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=tributh.net header.b=b0nOi9Mu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OAxyNB3GO5db for <tls@ietfa.amsl.com>; Sat, 15 Dec 2018 08:24:08 -0800 (PST)
Received: from mx02.tributh.net (mx02.tributh.net [IPv6:2a00:dca0:100:5:c0de:ba5e:dead:c0de]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 55DD3130DCD for <tls@ietf.org>; Sat, 15 Dec 2018 08:24:08 -0800 (PST)
ARC-Seal: i=1; cv=none; a=rsa-sha256; d=tributh.net; s=rfc8301; b=SESbvDSqUVLc5pFCZ7RDmB1AtOVNowJ3xflbs8BfTCCoa9ATyHPTI/hBCcqEssDCqLbv1JOvdh uUBZS2qVaWJKWXahOJhZbYvOYnKqkligsK7fI3bmUdkTPrnAn66Er3Y4Vep0BiktwUymRqmyor VAmMRph1nwMs4CEjZgrzAenH6C3qr3sk94EQ9dlk+nqRLNRjDY/Ak2TIF09ckmxWCUQWZ6KyWm Dd8R6kBrMz+w2XsgGYV9BUwSNEAUDEiljEELbApbiOq/w/YJ0K5XdsZREh8QVFdSUJ9dYv8CxW KMPOFHLi047nmLoEa3/8X3ZRTtMmckPqb3EqF1SExf5uhnwuFbOwXHJyg7KPIrX7UqDsyfHJjg FUyciuh3Aj1hEv21d7qQUHT/g/rSDOJ5g7AO2UItOBa2FZ+P8c1TS+RobR4b1LrjhUurc7nzb0 71EVkpbTJSHCCzhuhD7SGxkmZhFWDoBj6cNsvkoX0k346pwm0EJZD8a1uFrOKgHV4Ly/7POpf/ lW5NPo1srk27b3vcjZnEU2NIpjStVn11YLvADg3jUukYdwQop4lVIcEPm09Wx4I3uJn+IO6Yg/ nkNheLXz79iJvbnOWbJcWhSc5oPf4Tl4+0cbSNNUbw1i08KNnsNfZbF7eL+90z2PWXFRU7cj88 fSRRAI7io9EfzxuLc=;
ARC-Authentication-Results: i=1; tributh.net; iprev=pass; auth=pass
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed; d=tributh.net; s=rfc8301; bh=zvILT0jYuaurjzf2kIAAFv4C2rHVsxFwWGmUeKUuLIg=; h=MIME-Version:Content-Type:Date:Subject:From:To:DKIM-Signature: DKIM-Signature; b=TM8iOhV0yJwb2k/gOt2aNopQeGNLN4ARI4rXMFh1VbCFUSlrJgvD4gubPSizzhZD163qkL8OXt NlrtE6GjLa1YlsuWyjYX0mxAAsoWYBjPQtoo8UemzeVVypLCIKnW76K3UazLL+ja1loXRyXs+H +ktzCtxF6LL4rQR4RS9f30bKNHEwQOUQ4Q1/K75HLSvwfr5LXvZZSifT/G5z6i86ZobYhGcj++ E6R0Ksch5jJ9TSL8pImZH94RqCCccb9mgi4zqPBzTqB5K0InwBwmhIF8DZ2aeA/wR7xoHwkHWb Ns2FPKJsgaXd8PYRWv3Na5+sXYaejgJozDDJ0cNqLO2wGIhJeO0/NzC+tjRlUckpkMdqUllSG/ Mw4YjCMzRat3Wc2wyvgXQ+akwhknQAjLdSRdQroq74giYB+IXTBK2Ly7aQN7169qcDEG/MMoMo zEpXaG8RV0G+f3tMHZkq/EXYNke39PHs8175SBeMhFwAJkuFNUitBVp/SJK1zIRq2yQ0eoil8Z jSnXg9d+7efTAsIY/n+Dp1UNUW0HFUB7DAFcFSfr9g8T2bVmllq++pRmdGq7jM8FygDALYw63p XTQRWc1DNWtsu1XjNhEKfhU+Ypdx423kANsPq3J9wAniKqzR2RYvi5YwhqnJINbiI0wu3Z2G5d 8GIQNu0qHNMagCplk=;
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=simple/simple; d=tributh.net; s=rfc8301; h=MIME-Version:Content-Type:Date:Subject:From:To:Sender:Reply-To: Message-ID:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=zvILT0jYuaurjzf2kIAAFv4C2rHVsxFwWGmUeKUuLIg=; i=@tributh.net; b=bp1OdrJF/S B0x+OpWTjlp0QE2CGulY9hprm82EPzy5seZHyCBRbCxpAnK3U3q4u5qy3yZk2D4IHi3gowFBqNxfq jP/XR9ZlPei3OHmuttzxsxB930HSTFvScGYnz80ujbwRAAQ+2ZxaUFdEZTwjn4Ypy0BHZDs0989Gd ++zFPdCP7yUPkPys3GWyPyFlFrTVrVz2S79Jm4fGo/YV0rLWrKXHEpZWhEZrv6ZTAgxy3m7yjlWxB 9OaTMrODILD5qydpxHsO+ooaYSPoiAPK3rcykPzD/PsDjHtH3z0OcqoMYUDnOIqhvvA2m/RF0U7wf rNwZfxajTAb4k/76V32lfx/6KjCddM9gcz4GILzA7FJPa5uqgSPdCQfzefcTgvOpTpyDBwHbsrNuw alY7KqxGr4nCTCVtJFsDOi+wwemjpGFKEqkmr3liD1ZhS3TY1pb3ocbTxW6e8JmblAq/HLsHGnyJx ZADct4P/VbiiJT9I6nSCzImLU5lEC1Pw59HAR7CcLoQ5z/ASaAcZ95XHDqn/PX0WSXn1Np0iS3LtM HlElK3s5uKHLGegTOuBJD+y5icfYoOjEsExCmpNXBSrIzw3O+QEK47jA0UWfpLAm8VaWIHTM/EahS 20grbGEpmaQKyqMbnYeMYVF/npH2ZfSkz7R7e5IFGNYpp5aKi5caGiLZA=;
DKIM-Signature: v=1; a=ed25519-sha256; q=dns/txt; c=simple/simple; d=tributh.net; s=rfc8463; h=MIME-Version:Content-Type:Date:Subject:From:To: Sender:Reply-To:Message-ID:Cc:Content-Transfer-Encoding:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=zvILT0jYuaurjzf2kIAAFv4C2rHVsxFwWGmUeKUuLIg=; i=@tributh.net; b=b0nOi9MuM2 K3+z1Ni5G9RHjRwC13RdO3pZOPUV84x6+cidhFWsvuvHPBGbXv62p7IBQFXNp5C3VT5VUpiaaVAA= =;
Authentication-Results: tributh.net; iprev=pass; auth=pass
To: tls@ietf.org
From: "T.Tributh" <tls@tributh.net>
Autocrypt: addr=tls@tributh.net; prefer-encrypt=mutual; keydata= mDMEXA6oGBYJKwYBBAHaRw8BAQdAWAMJzzBdGRUE2HDizTM440RmFuF8TH7HuuG9cNKtwbC4 OARcDqgYEgorBgEEAZdVAQUBAQdABPr2xlbHb2LVrVzoCYPWwB2ZIiyRR2+ToufEot5ukzwD AQgHiH4EGBYIACYWIQR4xFJw5asLJFctxReOEUrj2exHEgUCXA6oGAIbDAUJCWYBgAAKCRCO EUrj2exHEmF9AP0X4iVQwtfUOU64lC6N2NLzHAnU5Kx6j+eq/Tqu67N8tgEA0/boy0cM9NA+ JeFPy7S3cWUhnIl/vqQNVNjl5RDUxQo=
Date: Sat, 15 Dec 2018 17:24:01 +0100
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="eTRmYvXXsvnMwyBwLNESszXBAoj6OdjjK"
MIME-Version: 1.0
"Message-Id: <1gYCjU-0004Qr-CR@tributh.net>"
Message-Id: <20181215162408.55DD3130DCD@ietfa.amsl.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/mSgsiYqUHnqD6C-im7w1GvmnWxY>
X-Mailman-Approved-At: Tue, 18 Dec 2018 06:52:19 -0800
Subject: [TLS] OCSP stapling problem
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 15 Dec 2018 16:32:45 -0000

Hi,

first I may introduce my problem.

We take a small mail server, in this case exim and enabling TLS with an
OCSP-Must-Staple certificate. We add the status_request
like described in  RFC 6066 and everything works fine for all clients
connecting to that server and send mail.
Now we turn to sending out a mail. In this moment this server become a
client connecting to another server, which can request our certificate.
We serve (this) Must-Staple certificate, but the status_request from RFC
6066 is not included and the server should see this certificate as
"invalid".

some more details under:
https://bugs.exim.org/show_bug.cgi?id=2350


In RFC 6066:
Constrained clients may wish to use a certificate-status protocol
   such as OCSP [RFC2560] to check the validity of server certificates,


there is no information about the other direction, where a server may
request from a client ....


RFC 8446 section 4.4.2.1
A server MAY request that a client present an OCSP response with its
   certificate by sending an empty "status_request" extension in its
   CertificateRequest message.

So RFC8446 changes RFC6066 in the way that also a server can request OCSP.
Is that only intended to match for TLS 1.3 ?
Or does this change is meant also for TLS 1.2, where implementations
actually lacking this case?

Should in this case RFC 6066 changed to make the "server request from
client" case being also described?

In the moment such a mail system must have two certificates for the
server and the client mode to offer a valid cert until TLS libraries
have offered both methods.

I assume the same problem for example also for XMPP where the server is
changing to client mode too.
There may be much more protocols, which I have not in mind now.

Am I getting this right?

Kind regards

Torsten Tributh