Re: [Uta] I-D Action: draft-ietf-uta-rfc7525bis-03.txt
Ilari Liusvaara <ilariliusvaara@welho.com> Mon, 25 October 2021 14:06 UTC
Return-Path: <ilariliusvaara@welho.com>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE7123A0BAE for <uta@ietfa.amsl.com>; Mon, 25 Oct 2021 07:06:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.497
X-Spam-Level:
X-Spam-Status: No, score=-1.497 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, KHOP_HELO_FCRDNS=0.4, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 36spoNsJQQSd for <uta@ietfa.amsl.com>; Mon, 25 Oct 2021 07:06:38 -0700 (PDT)
Received: from welho-filter2.welho.com (welho-filter2b.welho.com [83.102.41.28]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 80A573A0B0A for <uta@ietf.org>; Mon, 25 Oct 2021 07:05:59 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by welho-filter2.welho.com (Postfix) with ESMTP id 78D82D0160 for <uta@ietf.org>; Mon, 25 Oct 2021 17:05:52 +0300 (EEST)
X-Virus-Scanned: Debian amavisd-new at pp.htv.fi
Received: from welho-smtp1.welho.com ([IPv6:::ffff:83.102.41.84]) by localhost (welho-filter2.welho.com [::ffff:83.102.41.24]) (amavisd-new, port 10024) with ESMTP id Mr1N-UbRraZJ for <uta@ietf.org>; Mon, 25 Oct 2021 17:05:52 +0300 (EEST)
Received: from LK-Perkele-VII2 (87-92-216-160.rev.dnainternet.fi [87.92.216.160]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by welho-smtp1.welho.com (Postfix) with ESMTPSA id 29669286 for <uta@ietf.org>; Mon, 25 Oct 2021 17:05:51 +0300 (EEST)
Date: Mon, 25 Oct 2021 17:05:50 +0300
From: Ilari Liusvaara <ilariliusvaara@welho.com>
To: uta@ietf.org
Message-ID: <YXa5vm3YQzRIUEOU@LK-Perkele-VII2.locald>
References: <163516273059.11453.8401197443682661810@ietfa.amsl.com> <23EA14C8-4163-4DD1-99D7-FF32F01C9A12@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <23EA14C8-4163-4DD1-99D7-FF32F01C9A12@gmail.com>
Sender: ilariliusvaara@welho.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/uta/aZOsGzzjVyyUguEgQhOKtbf1MXk>
Subject: Re: [Uta] I-D Action: draft-ietf-uta-rfc7525bis-03.txt
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Oct 2021 14:06:47 -0000
On Mon, Oct 25, 2021 at 02:58:32PM +0300, Yaron Sheffer wrote: > This is a relatively small rev from -02, with more clarity on key > limits and mitigation of Triple Handshake (extended_master_secret). > > Our open issues are at https://github.com/yaronf/I-D/issues - fell > free to comment or open new ones. > > On 10/25/21, 14:53, "uta-bounces@ietf.org on behalf of internet-drafts@ietf.org" <uta-bounces@ietf.org on behalf of internet-drafts@ietf.org> wrote: > > > Filename : draft-ietf-uta-rfc7525bis-03.txt "It is also RECOMMENDED that clients abort the handshake if the server acknowledges the SNI hostname with a different hostname than the one sent by the client." AFAIK, this can not happen. From RFC 6066: "In this event, the server SHALL include an extension of type 'server_name' in the (extended) server hello. The 'extension_data' field of this extension SHALL be empty." So the server can not acknowledge name different from what the client sent. Then there are some servers that do take client server_name into account, but fail to acknowledge that. Server certificate (if raw public keys are not used) is supposed to be valid for the SNI hostname, but it can be valid for other names as well. So it is not really acknowledgement for the SNI hostname. However, it would make sense for clients to abort if server certificate is not valid for sent SNI hostname. -Ilari
- [Uta] I-D Action: draft-ietf-uta-rfc7525bis-03.txt internet-drafts
- Re: [Uta] I-D Action: draft-ietf-uta-rfc7525bis-0… Yaron Sheffer
- Re: [Uta] I-D Action: draft-ietf-uta-rfc7525bis-0… Ilari Liusvaara