[TLS] Re: Last Call: <draft-ietf-dance-client-auth-09.txt> (TLS Client Authentication via DANE TLSA records) to Proposed Standard
Shumon Huque <shuque@gmail.com> Mon, 26 January 2026 16:39 UTC
Return-Path: <shuque@gmail.com>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id C6942AD2D1A5 for <tls@mail2.ietf.org>; Mon, 26 Jan 2026 08:39:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P_FavaZ1sLEs for <tls@mail2.ietf.org>; Mon, 26 Jan 2026 08:39:57 -0800 (PST)
Received: from mail-oi1-x231.google.com (mail-oi1-x231.google.com [IPv6:2607:f8b0:4864:20::231]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 8D6BDAD2D010 for <tls@ietf.org>; Mon, 26 Jan 2026 08:39:52 -0800 (PST)
Received: by mail-oi1-x231.google.com with SMTP id 5614622812f47-45c7c841904so2892861b6e.3 for <tls@ietf.org>; Mon, 26 Jan 2026 08:39:52 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; t=1769445586; cv=none; d=google.com; s=arc-20240605; b=CemLBok3d3JF7y0ykwc4F3TaXWNSDZjOiIvGtX1w4o5a65pJMsq6AHGtHH1hdELMtA F8vkFQnzBu9yiHdH/W7ZFA9VrZ/I7NJOC11Edr8v8qDzQYvf43+GW6QB7hz2yjJ/I0Jj mXezll+wgzS9F/RX9pycEUq84xHn6RDYQ4THKI9c2KAezbzop+fk7pwuosVju+WOb9yw tcwCZestVQRx2JaepLyCnW5oZfU0yHgRjF18yc6cbGniw6eOullBij5a93ifUcM6NzQR BiPNoH/MwHLy1bxHepMf/7tVR4nJB62bBu1xhZAwmJw6tOOwdUw43GbeB/KG+YWAmwKm aa/g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:dkim-signature; bh=JNHyMSE14Er9OwGqYoFZYbzIntdH6oXkwwZJPgbir5M=; fh=uzcJobJLZn/WwUUUhZz0kETKYftOAKt8beViQId1hZw=; b=XgEnt0B01XSqoQ3hGr3DhnnvHwWg/u/pwwBvdWmZogdxfj6A4LnUGMPttNqbNOfK4t /FmgjZiJG7NAEXVquja8GkrYhvi1BAFfAuXKcH6ySH1gvTwRPCPJvFNueEQBv0jzjjPC RcgjbXqmerkRvSmtXFDKeHozIDszlyL99SQEhOhzPHOYkdLF/BBlMpgPtbHofMGK6O5a Ncopkg0VPbs5xlaZy+ZMp86Am5lwmEZyth/xDT2fQS+++dbg2xiljWlPylFpG2Fw3rWQ xipFtuD4JOOZSdUb6y/dzsN34gC+0+MRe36/y21tm0diFYs45pD65VpW/q/jy0JFbq6k WIJw==; darn=ietf.org
ARC-Authentication-Results: i=1; mx.google.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1769445586; x=1770050386; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=JNHyMSE14Er9OwGqYoFZYbzIntdH6oXkwwZJPgbir5M=; b=fNx68kQR9cH1Xm88D9dnyS/3fKzWh9j8yCt7hhTl5E6SkvmE7rpoxJdb4XTdl8IyW/ 3vphPzcfz4eaeWvReoF+6JSGGWbUCzijLxy7uZ1cruw9UWUV6prbZoQkpz72+2unj9o6 OulvO3QCPanerfZm5GbYh9m/t08RLoR1wrziABOxxXyMxYYkf+ipK4D2NvQlv2WmSXis /57Xw3usi08FGGKHY9kLfyToDBh+mTYKqDdhmsy5UXbMIRmO5SMcgqNgivskYle97rRV l+cnXscMzTby0b7GkGvlniSFgPZ5rlQo+SB8iNHakWUBGhiyvYQDbcrE2L4QylYzfEiQ X1tg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769445586; x=1770050386; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=JNHyMSE14Er9OwGqYoFZYbzIntdH6oXkwwZJPgbir5M=; b=coyp3tz31JIOJTLktgCdQMmsQQG3cC/6STyGMIpS56kqikW5QsZ4O7KfMi7ZpuFx0p RNn9PvuVEJh9aZ3fxyKimsi6l/HwIwCQ5l2NeGT+996A/zy6LzaeJN3Ixbfluq+eg93O ikj+Jk+tMJcn6ghNQvpGlAexj/S1NREkPDnu3/w8XH+d0tZ5Oo6NZ0n85/qyGjBlMgXk 148UbdVfUYFwjqR1PZVRhv9MfpiVdGnwEMroGHndlxqMF9kDp3BugEn4BVJZwTbehKVA hzvBoERb1kJew9I1RxcLHERJqtLgpyzA0cpqVvn5MUMS+QcEr+1V2EM5S7zW3+Hfatws AIxg==
X-Forwarded-Encrypted: i=1; AJvYcCUAQFOw5rI1fxbhbewKy4zbTR353/bVxu5QSmsCwpNfROKFoXxo/6pMX5k28eUQ8Jo4lxg=@ietf.org
X-Gm-Message-State: AOJu0YyYBhLo6nzBJaGM/n/YhkRZ3ckaY7yDHlrRphHcHI1dzvU58NK9 GRmP4W81pgs1x4OyK3wub/iqyuUqjkVKc6za0AIu9ie7RgK4xppGPER9X7SYhrhQoRy75UGbsKz tPNpNHHidJ1D84HbzStMjcR/J+doR264=
X-Gm-Gg: AZuq6aLc0klE3hh2XeHPdhq6mSUyI6AKGKFDt4zWKwxPbGehg2o46EgXfDP8Chi//Di /rbz839aR4Q7xooiSsapJdzoT5Icx6GPBsIcVIU7PjQ04QurjCikgtyhh2mC1/hhqjq1/05F85O Ywzx5C5ZSEoWjEtbZsGCe6dMQ1NwEBm7f2ynXv1cbw/tSVPkLWZbOKUexiSupI6qfZ0rXADfchZ wxN6KP6Ao05nJe1aT8PiauwfvVsuU5pVrDNNOCNmWP0wB0cMap5zg6TOtN5oBO48NAl8o4=
X-Received: by 2002:a05:6808:c3e9:b0:45c:9b88:d385 with SMTP id 5614622812f47-45ed99cf11bmr2198156b6e.33.1769445586329; Mon, 26 Jan 2026 08:39:46 -0800 (PST)
MIME-Version: 1.0
References: <176529902699.1146491.1360588667931244217@dt-datatracker-5bd94c585b-wk4l4> <CABcZeBOCNZf-mYJ2DM1YTnUAYpvtyc5Ba2qQ6aOmsYhS1y5fvA@mail.gmail.com> <CAHPuVdV4TvP4kHsEC=7K5QNFZUktYCRU44LqJr33fzB5Md+Q1Q@mail.gmail.com> <MN2PR17MB4031E3807DE7137A169C2E24CD93A@MN2PR17MB4031.namprd17.prod.outlook.com>
In-Reply-To: <MN2PR17MB4031E3807DE7137A169C2E24CD93A@MN2PR17MB4031.namprd17.prod.outlook.com>
From: Shumon Huque <shuque@gmail.com>
Date: Mon, 26 Jan 2026 11:39:35 -0500
X-Gm-Features: AZwV_QiZTOOpcte2Q4ZXNYIqeRhKuLZAYlpda7Gq2wxD9kp2gnubwmkpIUkgCgs
Message-ID: <CAHPuVdWssWuFsZNjKHOXc=sRyEDwAzpbtaUkZuTMvZW0=BXGJA@mail.gmail.com>
To: "Salz, Rich" <rsalz@akamai.com>
Content-Type: multipart/alternative; boundary="0000000000009f652c06494d276a"
Message-ID-Hash: DLM2WQF6WQIX2ZE3SAGUYBP5Z2SZFKNX
X-Message-ID-Hash: DLM2WQF6WQIX2ZE3SAGUYBP5Z2SZFKNX
X-MailFrom: shuque@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "last-call@ietf.org" <last-call@ietf.org>, "dance-chairs@ietf.org" <dance-chairs@ietf.org>, "dance@ietf.org" <dance@ietf.org>, "draft-ietf-dance-client-auth@ietf.org" <draft-ietf-dance-client-auth@ietf.org>, "mcr+ietf@sandelman.ca" <mcr+ietf@sandelman.ca>, "paul.wouters@aiven.io" <paul.wouters@aiven.io>, TLS WG <tls@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: Last Call: <draft-ietf-dance-client-auth-09.txt> (TLS Client Authentication via DANE TLSA records) to Proposed Standard
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/tRNqG8dMwComUkm-cPldH3xOGYo>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>
On Mon, Jan 26, 2026 at 10:56 AM Salz, Rich <rsalz@akamai.com> wrote: > > > - > This has the effect of revealing the client's identity on the wire. > > > > - It does, I guess unless encrypted DNS transport is being used. > - A number of other protocol mechanisms already have similar problems, > - don't they, like TLS client's lookup of SVCB records for ECH, etc, if > - not done with encrypted DNS transport. > > > A client looking up SVCB records does not expose the client’s identity. > EKR pointed out that this doc explicitly has the server look up the client > identity. > Yes, I was speaking about the general topic of not revealing domain name identities on the wire (for client or server). TLS 1.3 wants to do both. > At one point we had considered whether the client should look up > its own DANE information and send it in an extension (the opposite > form of RFC 9102: TLS DNSSEC chain extension), but decided that this > >might be too much complexity to impose on the client, particularly since > >some of them might be resource constrained. That topic could be revisited. > > I think you should. A key point of TLS 1.3 is not to expose the client > identity. > Ok, I'm pondering this topic. Requiring the client to implement a complex DNSSEC chain extension like mechanism will likely be a significant barrier to implementation I feel. Especially in cases where hiding the client identity for the application may not be that important (like a warehouse full of machine identities). Careful use of encrypted DNS resolvers can also mitigate this and could be a recommendation. > As a bare minimum, if no changes are made, the security considerations should make this exposure explicit. Ack. >could also probably shore up the language to mandate the use > >of the extension (non-empty), instead of allowing it to be omitted > >if the certificate only has one dns SAN identifier. > > That seems like a good idea. > > >> Below you say that the client MUST supply the client identity > >> extension if there are >1 SANs but what is the server to do > >> if the client does not? > > >The server should abort the connection with an error (and maybe > >a tailored TLS alert needs to be defined). > > You probably do not want a custom alert as that gives out too much > information. > Good point. Shumon.
- [TLS] Re: Last Call: <draft-ietf-dance-client-aut… Shumon Huque
- [TLS] Fwd: Last Call: <draft-ietf-dance-client-au… Eric Rescorla
- [TLS] Re: Last Call: <draft-ietf-dance-client-aut… Salz, Rich
- [TLS] Re: Last Call: <draft-ietf-dance-client-aut… Shumon Huque
- [TLS] Re: Last Call: <draft-ietf-dance-client-aut… Eric Rescorla
- [TLS] Re: Last Call: <draft-ietf-dance-client-aut… Eric Rescorla
- [TLS] Re: Last Call: <draft-ietf-dance-client-aut… Paul Wouters
- [TLS] Re: Last Call: <draft-ietf-dance-client-aut… Muhammad Usama Sardar
- [TLS] Re: Last Call: <draft-ietf-dance-client-aut… Salz, Rich
- [TLS] Re: Last Call: <draft-ietf-dance-client-aut… Eric Rescorla
- [TLS] Re: Last Call: <draft-ietf-dance-client-aut… Paul Wouters
- [TLS] Re: Last Call: <draft-ietf-dance-client-aut… Eric Rescorla
- [TLS] Re: Last Call: <draft-ietf-dance-client-aut… Shumon Huque
- [TLS] Re: Last Call: <draft-ietf-dance-client-aut… Muhammad Usama Sardar
- [TLS] Re: Last Call: <draft-ietf-dance-client-aut… Eric Rescorla
- [TLS] Re: Last Call: <draft-ietf-dance-client-aut… Muhammad Usama Sardar
- [TLS] Re: Last Call: <draft-ietf-dance-client-aut… Eric Rescorla
- [TLS] Re: Last Call: <draft-ietf-dance-client-aut… Muhammad Usama Sardar
- [TLS] Re: Last Call: <draft-ietf-dance-client-aut… Paul Wouters
- [TLS] Re: Last Call: <draft-ietf-dance-client-aut… Paul Wouters
- [TLS] Re: [Last-Call] Re: Re: Last Call: <draft-i… Salz, Rich