Alright, I have misremembered.  But, this brings up a point:

What's the appropriate response to a 3,0 or 3,1 protocol server that
sends a 0-length ClientCertificateType Certificate request message?
Under a strict reading of the RFC (2246 is the one I'm looking at, for
TLS 1.0 (corresponding to 3,1)), the only appropriate answer would be
to close with a fatal illegal_parameter alert?

-Kyle H

On Wed, Mar 18, 2009 at 5:54 AM, Nelson B Bolyard <nel...@bolyard.me> wrote:
> Kyle Hamilton wrote, On 2009-03-18 04:20:
>> On Wed, Mar 18, 2009 at 3:28 AM, Nelson B Bolyard <nel...@bolyard.me> wrote:
>>> b) they have NO CA CERTIFICATES marked as trusted to issue client certs,
>>> so they violate the SSL and TLS 1.0 protocols by sending out empty lists
>>> of issuer names for CA certs, which give clients no information with which
>>> to determine which (if any) of that client's certs should be sent, which
>>> defeats automatic client cert selection, and
>>
>> SSL2, SSL3, and TLS1.0 protocols specifically state that the empty
>> list is to be considered the set of all possible certificates.  Your
>> statement that they are in violation is incorrect.
>
> No, That is incorrect.
>
> SSL2 had NO list of issuer names in its certificate request.  The client
> had to somehow "just know" which CAs were acceptable to the server.
> This was considered one of the larger deficiencies of SSL2 that was
> addressed in SSL 3.0.
>
> SSL 3.0 and SSL 3.1 (TLS 1.0) specifically require at least one issuer
> name be present in the message.  It is a violation of those protocol
> specifications to send an empty list of issuer names.  Look at the
> minimum size of the certificate_authorities element of the message
> to see that it is non-zero.
>
> TLS 1.1 (SSL 3.2) in RFC 4346 was the first version of SSL 3.x to allow
> an empty list of issuer names.  It changed the minimum size of the
> certificate_authorities element to zero.  It was the first version to
> specify what an empty list meant.  However, it does not mean "all possible
> certificates".  The RFC says:
>
>                                       If the certificate_authorities
>         list is empty then the client MAY send any certificate *of the*
>         *appropriate ClientCertificateType*, unless there is some
>         external arrangement to the contrary.
>
> If you doubt this, read the documents for yourself.
> --
> dev-tech-crypto mailing list
> dev-tech-crypto@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-tech-crypto
>
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to