-
Notifications
You must be signed in to change notification settings - Fork 57
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Move name validation #642
Move name validation #642
Conversation
This is partly motivated by my interests in doing something evil, but mostly this is because coupling name validity to ECH config validity is a layering violation. It's fine to invoke some name validation, but that should be dictated by the needs of the thing that ends up relying on that name. This corrects both problems. In doing this, I realized that RFC 791 says nothing about the IP address textual format. That's problematic, but I couldn't come up with anything better in short notice. Closes tlswg#628. Closes tlswg#637.
Co-authored-by: David Benjamin <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@bemasc any objections? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
No objection.
Co-authored-by: Benjamin M. Schwartz <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sorry for late review. just officially submitting it in this diff, opened a new issue as #643 though.
Prior to attempting a connection, a client SHOULD validate the `ECHConfig` to | ||
ensure that the public_name can be authenticated. Clients SHOULD ignore any |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
One change I see compared to the earlier text is "ensure that the public_name can be authenticated".
What does "authenticated" mean exactly in this context?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That it can be bound to a valid WebPKI certificate. With that said, I agree that this text is confusing, because the "to ensure" is actually the purpose of the validation, rather than a separate requirement, so I propose to just remove "to ensure..." and following. @bemasc any objections?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it would be clearer to remove this whole sentence. It seems to be redundant with the next sentence (which is also repeated by the sentence after that!), and asking clients to "validate" without explaining what that entails seems odd.
This keeps MT's move but adopts the IP address rejection rule from before. From #638