Re: Review of draft-ietf-sip-domain-certs-06

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 04/10/2010 05:30 PM, Bernard Aboba wrote:
> I reviewed the document draft-ietf-sip-domain-certs-06 in general
> and for its operational impact.

Dear Bernard: Thank you for your time in reviewing this
document.  Please see inline for more information.

> IMHO, a better prescription would be to require that
> implementations be capable of accepting identities in any of
> the permitted formats (though a given deployment might choose
> to further constrain identity placement by policy).

SIP WG consensus was very clear that given a choice between an
identity in the CN and SAN, the identity in SAN is accorded
higher preference.  The draft reflects that consensus.

> [BA] Where an SRV or NAPTR RR is used, it is possible for a domain
> to be delegated so that the matching process described above would
> fail, yet the delegation would still be legitimate (e.g. the
> SRV/NAPTR RRs could be signed via DNSSEC,and might point to an
> FQDN that matches the identifier extracted from the certificate,
> rather than the FQDN in the SIP URI.

When SRV or NAPTR RR is used, it is possible to end up at a
delegated domain whose identity does not match the domain portion
of a SIP AUS query.  This is true, but there was strong consensus
in the SIP WG that either the delegated domain possess an appropriate
identity in the SAN of the certificate, or that the matching
fails.

> [BA] At this point, 8 years after the issuance of RFC 3261, wildcards
> are widely deployed within SIP certificates. It is therefore
> not appropriate to prohibit them.

We had discussed this in the SIP WG as well, and there was good
consensus to prohibit wildcards.  Unlike HTTP, SIP already has a well
defined and uniform way to to map a domain (the right side of a SIP URL)
to one or more hosts that provide service for that domain - the
NAPTR/SRV mechanisms in RFC 3263.  HTTP, by contrast, uses a variety of
mechanisms with a range of formality to their definition.  As a result,
HTTP more or less informally adopted wildcard certificates as a
'solution' to the problem that fully qualified host names didn't always
exactly match the domain part of the HTTPS URL.  In the case of SIP, we
don't have that problem - the mapping from the domain address part to
the hostname(s) that provides service for that domain is well defined
and widely used (of course, sometimes the mapping is just 1-1, but
that's the easy case) - in large part, this specification is intended to
clarify for implementers that it is the original domain they should be
looking for in the server cert because the DNS translations of that name
may be unreliable.

Once again, thank you for your time to reviewing the draft.

Cheers,

- vijay
--
Vijay K. Gurbani, Bell Laboratories, Alcatel-Lucent
1960 Lucent Lane, Rm. 9C-533, Naperville, Illinois 60566 (USA)
Email: vkg@{alcatel-lucent.com,bell-labs.com,acm.org}
Web:   http://ect.bell-labs.com/who/vkg/
_______________________________________________
Ietf mailing list
Ietf@xxxxxxxx
https://www.ietf.org/mailman/listinfo/ietf

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]