ietf
[Top] [All Lists]

Re: Last Call: <draft-ietf-lamps-eai-addresses-05.txt> (Internationalized Email Addresses in X.509 certificates) to Proposed Standard

2017-02-16 12:29:09

On Feb 16, 2017, at 10:30 AM, Wei Chuang <weihaw(_at_)google(_dot_)com> wrote:

How about if a CA with only rfc822Name constraints can't issue certs
with SmtpUTF8Names at all, and of course vice versa.  If you want both
kinds of names, the CA has to constrain both.

I had asked a few folks at Google for an opinion about the name constraints.
Let me post Ryan Sleevi's (CC'ed) opinion: 

https://mailarchive.ietf.org/arch/msg/ietf/ngUOjvCHubjcyiG4uZ0w16-5-fg
[the above] basically says option 3 [the acceptable approach of the 3],
but unfortunately suffers from 'legacy' - namely, you cannot assume that
all rfc822Name clients will be updated to support SmtpUtf8Name, and short
of marking it critical (which would mean its undeployable), you can't
assume that an SmtpUtf8Name nameConstraint will constrain an rfc822Name.

Given that rfc822Name is a well-known legacy element, while SmtpUtf8Name
is a novel element, the prescription can be asymmetric.  Specifically,
all that's really needed (in the simpler model proposed by John) is
to disallow SmtpUtf8Name altnames when (only) rfc822Name constraints
are present.

The converse is not required, a parent CA that is SmtpUtf8Name aware
and wants to issue a child CA with SmtpUtf8Name constraints can and
should also include appropriate rfc822Name constraints that ensure
that the desired SmtpUtf8Name constraints are not bypassed via
unauthorized rfc822Name altnames.

The rfc822Name constraints can either permit only equivalent domain
names (LDH or A-label forms), or, if no rfc822Name can be compatible
with the SmtpUtf8Name constraints, permit only something like
"nouser@nodomain.invalid", thereby excluding all valid rfc822 addresses.

-- 
        Viktor.

<Prev in Thread] Current Thread [Next in Thread>