| < draft-ietf-tls-multiple-cert-status-extension-02.txt | draft-ietf-tls-multiple-cert-status-extension-03.txt > | |||
|---|---|---|---|---|
| Network Working Group Y. Pettersen | Network Working Group Y. Pettersen | |||
| Internet-Draft Opera Software ASA | Internet-Draft January 9, 2013 | |||
| Intended status: Standards Track October 19, 2012 | Intended status: Standards Track | |||
| Expires: April 22, 2013 | Expires: July 13, 2013 | |||
| The TLS Multiple Certificate Status Request Extension | The TLS Multiple Certificate Status Request Extension | |||
| draft-ietf-tls-multiple-cert-status-extension-02 | draft-ietf-tls-multiple-cert-status-extension-03 | |||
| Abstract | Abstract | |||
| This document defines the Transport Layer Security (TLS) Certificate | This document defines the Transport Layer Security (TLS) Certificate | |||
| Status Version 2 Extension to allow clients to specify and support | Status Version 2 Extension to allow clients to specify and support | |||
| multiple certificate status methods. Also defined is a new method | multiple certificate status methods. Also defined is a new method | |||
| based on the Online Certificate Status Protocol (OCSP) that servers | based on the Online Certificate Status Protocol (OCSP) that servers | |||
| can use to provide status information not just about the server's own | can use to provide status information not just about the server's own | |||
| certificate, but also the status of intermediate certificates in the | certificate, but also the status of intermediate certificates in the | |||
| chain. | chain. | |||
| skipping to change at page 1, line 36 ¶ | skipping to change at page 1, line 36 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on April 22, 2013. | This Internet-Draft will expire on July 13, 2013. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2012 IETF Trust and the persons identified as the | Copyright (c) 2013 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| skipping to change at page 7, line 7 ¶ | skipping to change at page 7, line 7 ¶ | |||
| message, even if it has received a "status_request_v2" extension in | message, even if it has received a "status_request_v2" extension in | |||
| the client hello message and has sent a "status_request_v2" extension | the client hello message and has sent a "status_request_v2" extension | |||
| in the server hello message. Additionally, note that that a server | in the server hello message. Additionally, note that that a server | |||
| MUST NOT send the "CertificateStatus" message unless it received | MUST NOT send the "CertificateStatus" message unless it received | |||
| either a "status_request" or "status_request_v2" extension in the | either a "status_request" or "status_request_v2" extension in the | |||
| client hello message and sent a corresponding "status_request" or | client hello message and sent a corresponding "status_request" or | |||
| "status_request_v2" extension in the server hello message. | "status_request_v2" extension in the server hello message. | |||
| Clients requesting an OCSP response and receiving one or more OCSP | Clients requesting an OCSP response and receiving one or more OCSP | |||
| responses in a "CertificateStatus" message MUST check the OCSP | responses in a "CertificateStatus" message MUST check the OCSP | |||
| response(s) and abort the handshake, if the response is a revoked | response(s) and abort the handshake if the response is a revoked | |||
| status or is otherwise not satisfactory with a | status or other unacceptable responses (as determined by client | |||
| bad_certificate_status_response(113) alert. This alert is always | policy), with a bad_certificate_status_response(113) alert. This | |||
| fatal. | alert is always fatal. | |||
| [[Open issue: At least one reviewer has suggested that the client | If the response is inconclusive, then the client MAY decide to allow | |||
| should treat an unsatisfactory (non-revoked) response as an empty | the connection if it believes it will have the opportunity to check | |||
| response for that particular response and fall back to the | the validity of the certificate through another means, e.g., by | |||
| alternative method described above]] | directly querying the issuer's CRL or OCSP responders. The client | |||
| MUST abort the connection if it needs to engage in activities that | ||||
| require trust in the server, and the server certificate has not been | ||||
| sufficiently validated. An example of where the client might wish to | ||||
| continue is with EAP-TLS, where the client can use another mechanism | ||||
| to check the status of a certificate once it obtains network access. | ||||
| In this case, the client could continue with the handshake, but it | ||||
| would be inappropriate for the client to disclose a username and | ||||
| password until it has fully validated the server certificate. | ||||
| 3. IANA Considerations | 3. IANA Considerations | |||
| Section 2.1 defines the new TLS Extension status_request_v2 enum, | Section 2.1 defines the new TLS Extension status_request_v2 enum, | |||
| which should be added to the ExtensionType Values list in the IANA | which should be added to the ExtensionType Values list in the IANA | |||
| TLS category after IETF Concensus has decided to add the value. | TLS category after IETF Concensus has decided to add the value. | |||
| Section 2.2 describes a TLS CertificateStatusType Registry to be | Section 2.2 describes a TLS CertificateStatusType Registry to be | |||
| maintained by the IANA. CertificateStatusType values are to be | maintained by the IANA. CertificateStatusType values are to be | |||
| assigned via IETF Review as defined in [RFC5226]. The initial | assigned via IETF Review as defined in [RFC5226]. The initial | |||
| skipping to change at page 9, line 8 ¶ | skipping to change at page 9, line 11 ¶ | |||
| Housley, R., and W. Polk, "Internet X.509 Public Key | Housley, R., and W. Polk, "Internet X.509 Public Key | |||
| Infrastructure Certificate and Certificate Revocation List | Infrastructure Certificate and Certificate Revocation List | |||
| (CRL) Profile", RFC 5280, May 2008. | (CRL) Profile", RFC 5280, May 2008. | |||
| [RFC6066] Eastlake, D., "Transport Layer Security (TLS) Extensions: | [RFC6066] Eastlake, D., "Transport Layer Security (TLS) Extensions: | |||
| Extension Definitions", RFC 6066, January 2011. | Extension Definitions", RFC 6066, January 2011. | |||
| Author's Address | Author's Address | |||
| Yngve N. Pettersen | Yngve N. Pettersen | |||
| Opera Software ASA | ||||
| Email: yngve@opera.com | Email: yngve@spec-work.net | |||
| End of changes. 8 change blocks. | ||||
| 15 lines changed or deleted | 22 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||