Re: [Uta] WGLC for draft-ietf-uta-rfc6125bis-06

"Salz, Rich" <rsalz@akamai.com> Mon, 27 June 2022 19:03 UTC

Return-Path: <rsalz@akamai.com>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 786FEC15791D; Mon, 27 Jun 2022 12:03:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.849
X-Spam-Level:
X-Spam-Status: No, score=-7.849 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.745, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=akamai.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pk-nI7MGVBt8; Mon, 27 Jun 2022 12:03:14 -0700 (PDT)
Received: from mx0b-00190b01.pphosted.com (mx0b-00190b01.pphosted.com [IPv6:2620:100:9005:57f::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 47EAAC14F74A; Mon, 27 Jun 2022 12:03:13 -0700 (PDT)
Received: from pps.filterd (m0050096.ppops.net [127.0.0.1]) by m0050096.ppops.net-00190b01. (8.17.1.5/8.17.1.5) with ESMTP id 25RIe94G006311; Mon, 27 Jun 2022 20:03:13 +0100
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=akamai.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=jan2016.eng; bh=kQ8pePZfIG/shu245w01gOtidHFejUariHAei3F6O2I=; b=F8B6a1UjcyecHy8mNE8AebeD/Wo22mj0jjgv5O5TrwgjA6rrvYbKXq6X0CC4OwnalaTC DoawCHZDhCYGEBYAh4jCdRYmYLXsmhymE27h01FOO0oMGpnyQoyF+5j1yv6NlDsFPP7D yEIUh0INkMRPenM/hh4nel3orIFvfr6YqDQG816ujdl9B3ZN89i4bnptbFjuCtRhh45G 6OGnzFMqzQunXBb0UkgjqqStwiRIF3NpP5s4yk21kDqbqvpUrIZf/hWRpIrQHsI5vWnY S/IQ0grXgfUQlI+pYsKZjjl+HD+k4RBeEtBIuiKUPKJoHqbeuYsG3GflJmN8noueFWJu 7g==
Received: from prod-mail-ppoint3 (a72-247-45-31.deploy.static.akamaitechnologies.com [72.247.45.31] (may be forged)) by m0050096.ppops.net-00190b01. (PPS) with ESMTPS id 3gwtsc62gr-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 27 Jun 2022 20:03:12 +0100
Received: from pps.filterd (prod-mail-ppoint3.akamai.com [127.0.0.1]) by prod-mail-ppoint3.akamai.com (8.17.1.5/8.17.1.5) with ESMTP id 25RIP9tO009439; Mon, 27 Jun 2022 15:03:12 -0400
Received: from email.msg.corp.akamai.com ([172.27.50.203]) by prod-mail-ppoint3.akamai.com (PPS) with ESMTPS id 3gy6pdat0d-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 27 Jun 2022 15:03:12 -0400
Received: from ustx2ex-dag4mb4.msg.corp.akamai.com (172.27.50.203) by ustx2ex-dag4mb4.msg.corp.akamai.com (172.27.50.203) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.26; Mon, 27 Jun 2022 12:03:11 -0700
Received: from ustx2ex-dag4mb4.msg.corp.akamai.com ([172.27.50.203]) by ustx2ex-dag4mb4.msg.corp.akamai.com ([172.27.50.203]) with mapi id 15.02.0986.026; Mon, 27 Jun 2022 12:03:11 -0700
From: "Salz, Rich" <rsalz@akamai.com>
To: Yaron Sheffer <yaronf.ietf@gmail.com>, Peter Saint-Andre <stpeter@stpeter.im>, Valery Smyslov <valery@smyslov.net>, "uta@ietf.org" <uta@ietf.org>, "draft-ietf-uta-rfc6125bis@ietf.org" <draft-ietf-uta-rfc6125bis@ietf.org>
CC: "uta-chairs@ietf.org" <uta-chairs@ietf.org>
Thread-Topic: [Uta] WGLC for draft-ietf-uta-rfc6125bis-06
Thread-Index: Adh+m/F5NsfNlikUQICzeXBktMWF+wJLnuSAABUVDQAADdQ4AAAA8f8AACA8QwAAZbkfgA==
Date: Mon, 27 Jun 2022 19:03:11 +0000
Message-ID: <28A6B727-9C0B-40FC-AD67-0F57458B446C@akamai.com>
References: <002e01d87e9c$78a002e0$69e008a0$@smyslov.net> <032e01d8878f$c2e8f630$48bae290$@smyslov.net> <A7E6035E-7BCF-4BB3-BB87-D261ED98532D@gmail.com> <ae5b3a02-bcc3-2106-a39a-b67aae55d85c@stpeter.im> <ac41a613-f802-0138-1e1b-326d2baa6574@stpeter.im> <BE6D8552-2723-4B64-9909-22C0BC32AC75@gmail.com>
In-Reply-To: <BE6D8552-2723-4B64-9909-22C0BC32AC75@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.61.22050700
x-originating-ip: [172.27.118.139]
Content-Type: text/plain; charset="utf-8"
Content-ID: <9854BF5DE12E8340BBEEE857C9A2D302@akamai.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.883,Hydra:6.0.517,FMLib:17.11.122.1 definitions=2022-06-27_06,2022-06-24_01,2022-06-22_01
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 adultscore=0 bulkscore=0 mlxscore=0 mlxlogscore=886 spamscore=0 phishscore=0 malwarescore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2204290000 definitions=main-2206270078
X-Proofpoint-ORIG-GUID: 3_niI0S07pqMVJjvhSi9Hn7QvTAb9j9V
X-Proofpoint-GUID: 3_niI0S07pqMVJjvhSi9Hn7QvTAb9j9V
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.883,Hydra:6.0.517,FMLib:17.11.122.1 definitions=2022-06-27_06,2022-06-24_01,2022-06-22_01
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 impostorscore=0 mlxlogscore=868 adultscore=0 spamscore=0 suspectscore=0 lowpriorityscore=0 malwarescore=0 mlxscore=0 clxscore=1015 phishscore=0 bulkscore=0 priorityscore=1501 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2204290000 definitions=main-2206270078
Archived-At: <https://mailarchive.ietf.org/arch/msg/uta/kn4ThBUwl01SK3Mx5f3Mpbdfdn8>
Subject: Re: [Uta] WGLC for draft-ietf-uta-rfc6125bis-06
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Jun 2022 19:03:18 -0000

Most items Yaron raised (thanks for the review!)  are addressed in https://github.com/richsalz/draft-ietf-uta-rfc6125bis/pull/50/files

        >> * The DTLS reference should change to DTLS 1.3.
        >> * See Appendix A of [VERIFY]
        >> * The rules are brief - it's not clear from the text if this is a 
        >> summary of the totality of the new RFC, or just the changes from the 
        >> previosu version

Also see below.

I'll open new issues and sub-threads for 
	Definition of FQDN and non-public and .local names https://github.com/richsalz/draft-ietf-uta-rfc6125bis/issues/51
	XmppAddr https://github.com/richsalz/draft-ietf-uta-rfc6125bis/issues/52

        > * Similarly, it is not clear to me whether certs obtained through DANE 
        > are in or out of scope.

        Well, DANE (RFC 6698) post-dates RFC 6125 so we might need to update our 
        recommendations to take account of DANE. I'll need to think about the 
        exact text we need.

See separate sub-thread with comments by Viktor. He suggests that if needed we just say remove "per PKIX" from the last sentence of 1.2:
    In order to ensure proper
    authentication, applications need to verify the entire certification
    path>>> as per [PKIX]<<<.

He is an advocate and expert for DANE, so that is what I did.

	Do path validation
        > * And the same question for delegated credentials 

There should be nothing to do for this draft. The subcerts document is explicit about how the "minted" certificate is just holding a key, and that validation should be based on the "original, full" certificate issued to the origin.

        > * The Common Name RDN... can appear more than once in the subjectName. 
        > I'm probably missing something, but how is this different from multiple 
        > server names appearing in SAN when the certificate protects multiple 
        > services?

As it says at the end of Section 2, there are *two* reasons not to use CN. First, CN is an untyped text string, and interpretation is ambiguous. Second, because of that ambiguity, multiple instances are even more ambiguous; is "smtp" really "smtp.example.com":
	CN=www.example.com, CN=smtp

>    Sorry, should have been clearer. I am referring to this text, that lists two reasons why the Common Name RDN doesn't identify a service. I agree with the first reason but I think the second one is incorrect, because SubjectAltNames have the same property and we still use them.

I changed the second bullet to say:
   It can appear more than once in the subjectName, and the interaction
   of muliple instances is not defined.

Does that address your concern?