Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Move name validation #642

Merged
merged 5 commits into from
Feb 19, 2025
Merged

Move name validation #642

merged 5 commits into from
Feb 19, 2025

Conversation

ekr
Copy link
Collaborator

@ekr ekr commented Feb 9, 2025

This keeps MT's move but adopts the IP address rejection rule from before. From #638

martinthomson and others added 4 commits November 26, 2024 15:30
This is partly motivated by my interests in doing something evil,
but mostly this is because coupling name validity to ECH config
validity is a layering violation.  It's fine to invoke some name
validation, but that should be dictated by the needs of the thing that
ends up relying on that name.

This corrects both problems.

In doing this, I realized that RFC 791 says nothing about the IP address
textual format.  That's problematic, but I couldn't come up with
anything better in short notice.

Closes tlswg#628.
Closes tlswg#637.
Co-authored-by: David Benjamin <[email protected]>
Copy link
Contributor

@martinthomson martinthomson left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

WFM.

You should tag this PR as closing #638, #628, and #637.

@ekr
Copy link
Collaborator Author

ekr commented Feb 11, 2025

@bemasc any objections?

Copy link
Contributor

@bemasc bemasc left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No objection.

Co-authored-by: Benjamin M. Schwartz <[email protected]>
@ekr ekr merged commit 01a6cdb into tlswg:master Feb 19, 2025
1 check passed
Copy link

@ckcr4lyf ckcr4lyf left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sorry for late review. just officially submitting it in this diff, opened a new issue as #643 though.

Comment on lines +909 to +910
Prior to attempting a connection, a client SHOULD validate the `ECHConfig` to
ensure that the public_name can be authenticated. Clients SHOULD ignore any

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

One change I see compared to the earlier text is "ensure that the public_name can be authenticated".

What does "authenticated" mean exactly in this context?

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That it can be bound to a valid WebPKI certificate. With that said, I agree that this text is confusing, because the "to ensure" is actually the purpose of the validation, rather than a separate requirement, so I propose to just remove "to ensure..." and following. @bemasc any objections?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think it would be clearer to remove this whole sentence. It seems to be redundant with the next sentence (which is also repeated by the sentence after that!), and asking clients to "validate" without explaining what that entails seems odd.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants