RE: [NSIS] TLS in the GIST draft

Pasi.Eronen@nokia.com Mon, 07 November 2005 21:21 UTC

Received: from localhost.cnri.reston.va.us ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1EZEQz-0002iQ-Df; Mon, 07 Nov 2005 16:21:45 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1EZEQx-0002df-1L for nsis@megatron.ietf.org; Mon, 07 Nov 2005 16:21:43 -0500
Received: from ietf-mx.ietf.org (ietf-mx [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA08615 for <nsis@ietf.org>; Mon, 7 Nov 2005 16:21:17 -0500 (EST)
From: Pasi.Eronen@nokia.com
Received: from mgw-ext03.nokia.com ([131.228.20.95]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1EZEga-0000dn-V5 for nsis@ietf.org; Mon, 07 Nov 2005 16:37:55 -0500
Received: from esebh105.NOE.Nokia.com (esebh105.ntc.nokia.com [172.21.138.211]) by mgw-ext03.nokia.com (Switch-3.1.7/Switch-3.1.7) with ESMTP id jA7LIuJi028633; Mon, 7 Nov 2005 23:18:59 +0200
Received: from esebh103.NOE.Nokia.com ([172.21.143.33]) by esebh105.NOE.Nokia.com with Microsoft SMTPSVC(6.0.3790.1830); Mon, 7 Nov 2005 23:21:36 +0200
Received: from esebe105.NOE.Nokia.com ([172.21.143.53]) by esebh103.NOE.Nokia.com with Microsoft SMTPSVC(6.0.3790.1830); Mon, 7 Nov 2005 23:21:35 +0200
X-MimeOLE: Produced By Microsoft Exchange V6.5.7233.31
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable
Subject: RE: [NSIS] TLS in the GIST draft
Date: Mon, 07 Nov 2005 23:21:33 +0200
Message-ID: <B356D8F434D20B40A8CEDAEC305A1F2401C1243A@esebe105.NOE.Nokia.com>
Thread-Topic: [NSIS] TLS in the GIST draft
Thread-Index: AcXTbmmrzpaKZGvORFOnk1y3buFk+AQcsdvA
To: robert.hancock@roke.co.uk, nsis@ietf.org
X-OriginalArrivalTime: 07 Nov 2005 21:21:35.0905 (UTC) FILETIME=[3BB8F110:01C5E3E1]
X-Spam-Score: 0.3 (/)
X-Scan-Signature: b4a0a5f5992e2a4954405484e7717d8c
Content-Transfer-Encoding: quoted-printable
Cc:
X-BeenThere: nsis@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Next Steps in Signaling <nsis.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/nsis>, <mailto:nsis-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:nsis@ietf.org>
List-Help: <mailto:nsis-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/nsis>, <mailto:nsis-request@ietf.org?subject=subscribe>
Sender: nsis-bounces@ietf.org
Errors-To: nsis-bounces@ietf.org

Robert Hancock wrote:

> hi pasi, john, all, 
> 
> [warning: long, dense mail] 
>
> i've had time to think about this a little. in terms of what one
> could specific about TLS, there seem to be 4 (related) issues, all
> of one it would be good to see some more discussion on.
>
> 1. TLS version. The draft currently says MUST 1.0, SHOULD 1.1.
> Given that GIST will be built from TLS libraries (rather than
> already deployed TLS code), maybe we could be more prescriptive
> about wanting 1.1; would that be a good or bad thing?

Many existing TLS libraries don't support 1.1 yet, and since the
improvements in 1.1 are really minor, I don't see why we should
require it.

> 2. Cipher suites (raised earlier in this thread). AFAICT from
> reading them, the TLS documents specify a single (mandatory to
> implement) cipher suite, so TLS compliance is enough to provide
> interoperability from that point of view. Is there a need to be more
> prescriptive here? (Why did Diameter do so?)

The mandatory-to-implement ciphersuite specified in RFC 2246 is
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA. This can't be used in 
many situations because it requires certificates containing DSS
public keys (most certs are RSA).

TLS 1.1 changes this to TLS_RSA_WITH_3DES_EDE_CBC_SHA, which 
is slightly better. But IMHO it is still worthwhile to clarify 
this explicitly in the NSIS specs, especially if we do not
mandate 1.1.

> 3. What authentication methods (certificates, EAP, SRP, etc.  etc.)
> should be implemented. (Sometimes the authentication method seems to
> be implied by offering a certain special ciphersuite, as in the PSK
> case in particular.)

The ciphersuite does imply something about the authentication,
but not necessarily everything that's needed. But if we copy the
Diameter text, it pretty unambiguously talks about mutual
authentication using certificates.

> 4. How to decide which identity is to be asserted and authenticated
> (of querying and responding node
>
<snip>
>
> Even if we do stick with the NLI, there may still be a need to write
> something about operational issues. That could be to encourage some
> uniformity in the selection of authentication techniques, and also
> (maybe) proposing a structure for the PI field in the NLI (if only
> to make it human-readable).  That might be for the GIST spec itself,
> or (more likely?)  for some separate BCP-like thing.

If it's required for actual interoperability, then it IMHO needs
to be in the GIST spec (or if it's a separate document, the GIST
spec will need a normative reference to it)... but I guess
it depends on the ambition level. It seems that for certificates,
this isn't really an issue, so copying the Diameter text would
be fine.

Best regards,
Pasi

_______________________________________________
nsis mailing list
nsis@ietf.org
https://www1.ietf.org/mailman/listinfo/nsis