Re: [Uta] I-D Action: draft-ietf-uta-rfc7525bis-03.txt

Ilari Liusvaara <ilariliusvaara@welho.com> Mon, 25 October 2021 14:06 UTC

Return-Path: <ilariliusvaara@welho.com>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE7123A0BAE for <uta@ietfa.amsl.com>; Mon, 25 Oct 2021 07:06:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.497
X-Spam-Level:
X-Spam-Status: No, score=-1.497 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, KHOP_HELO_FCRDNS=0.4, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 36spoNsJQQSd for <uta@ietfa.amsl.com>; Mon, 25 Oct 2021 07:06:38 -0700 (PDT)
Received: from welho-filter2.welho.com (welho-filter2b.welho.com [83.102.41.28]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 80A573A0B0A for <uta@ietf.org>; Mon, 25 Oct 2021 07:05:59 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by welho-filter2.welho.com (Postfix) with ESMTP id 78D82D0160 for <uta@ietf.org>; Mon, 25 Oct 2021 17:05:52 +0300 (EEST)
X-Virus-Scanned: Debian amavisd-new at pp.htv.fi
Received: from welho-smtp1.welho.com ([IPv6:::ffff:83.102.41.84]) by localhost (welho-filter2.welho.com [::ffff:83.102.41.24]) (amavisd-new, port 10024) with ESMTP id Mr1N-UbRraZJ for <uta@ietf.org>; Mon, 25 Oct 2021 17:05:52 +0300 (EEST)
Received: from LK-Perkele-VII2 (87-92-216-160.rev.dnainternet.fi [87.92.216.160]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by welho-smtp1.welho.com (Postfix) with ESMTPSA id 29669286 for <uta@ietf.org>; Mon, 25 Oct 2021 17:05:51 +0300 (EEST)
Date: Mon, 25 Oct 2021 17:05:50 +0300
From: Ilari Liusvaara <ilariliusvaara@welho.com>
To: uta@ietf.org
Message-ID: <YXa5vm3YQzRIUEOU@LK-Perkele-VII2.locald>
References: <163516273059.11453.8401197443682661810@ietfa.amsl.com> <23EA14C8-4163-4DD1-99D7-FF32F01C9A12@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <23EA14C8-4163-4DD1-99D7-FF32F01C9A12@gmail.com>
Sender: ilariliusvaara@welho.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/uta/aZOsGzzjVyyUguEgQhOKtbf1MXk>
Subject: Re: [Uta] I-D Action: draft-ietf-uta-rfc7525bis-03.txt
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Oct 2021 14:06:47 -0000

On Mon, Oct 25, 2021 at 02:58:32PM +0300, Yaron Sheffer wrote:
> This is a relatively small rev from -02, with more clarity on key
> limits and mitigation of Triple Handshake (extended_master_secret). 
> 
> Our open issues are at https://github.com/yaronf/I-D/issues - fell
> free to comment or open new ones.
> 
> On 10/25/21, 14:53, "uta-bounces@ietf.org on behalf of internet-drafts@ietf.org" <uta-bounces@ietf.org on behalf of internet-drafts@ietf.org> wrote:
> 
> 
>     	Filename        : draft-ietf-uta-rfc7525bis-03.txt


"It is also RECOMMENDED that clients abort the handshake if the server
acknowledges the SNI hostname with a different hostname than the one
sent by the client."

AFAIK, this can not happen. From RFC 6066:

"In this event, the server SHALL include an extension of type
'server_name' in the (extended) server hello.  The 'extension_data'
field of this extension SHALL be empty."

So the server can not acknowledge name different from what the
client sent. Then there are some servers that do take client server_name
into account, but fail to acknowledge that.

Server certificate (if raw public keys are not used) is supposed to
be valid for the SNI hostname, but it can be valid for other names
as well. So it is not really acknowledgement for the SNI hostname.
However, it would make sense for clients to abort if server certificate
is not valid for sent SNI hostname.


-Ilari