Skip to content

Commit

Permalink
Merge pull request #56 from thomas-fossati/hannestschofenig-patch-5
Browse files Browse the repository at this point in the history
Certificate Revocation
  • Loading branch information
hannestschofenig authored Sep 23, 2024
2 parents 13f4944 + 3dc2dfd commit e2c49a6
Showing 1 changed file with 12 additions and 12 deletions.
24 changes: 12 additions & 12 deletions draft-ietf-uta-tls13-iot-profile.md
Original file line number Diff line number Diff line change
Expand Up @@ -448,22 +448,23 @@ Since the publication of RFC 7925 the need for firmware update mechanisms
has been reinforced and the work on standardizing a secure and
interoperable firmware update mechanism has made substantial progress,
see {{?RFC9019}}. RFC 7925 recommends to use a software / firmware update
mechanism to provision devices with new trust anchors.
mechanism to provision devices with new trust anchors. This approach only addresses the distribution of trust anchors and not end-entity certificates or certificates of subordinate CAs.

The use of device management protocols for IoT devices, which often include
an onboarding or bootstrapping mechanism, has also seen considerable uptake
in deployed devices and these protocols, some of which are standardized,
allow updates of certificates on demand. This enables a
in deployed devices. These protocols, some of which are standardized,
allow for the distribution and updating of certificates on demand. This enables a
deployment model where IoT device utilize end-entity certificates with
shorter lifetime making certificate revocation protocols, like OCSP
and CRLs, less relevant. Whenever certificates
are updated the TLS stack needs to be informed since the communication
endpoints need to be aware of the new certificates. This is particularly
important when long-lived TLS connections are used. In such a case, the
a post-handshake authentication exchange needs to be triggered. TLS 1.3
provides client-to-server post-handshake authentication only. Mutual
authentication via post-handshake messages is available via {{?RFC9261}}
but requires the application layer protocol to carry the payloads.
and CRLs, less relevant. Whenever certificates are updated the TLS stack
needs to be informed since the communication endpoints need to be aware
of the new certificates. This is particularly important when long-lived
TLS connections are used. In such a case, the a post-handshake
authentication exchange is triggered when the application requires it. TLS 1.3 provides
client-to-server post-handshake authentication only. Mutual
authentication via post-handshake messages is available by the use of the "Exported
Authenticator" {{?RFC9261}} but requires the application layer protocol
to carry the payloads.

Hence, instead of performing certificate revocation checks on the IoT device
itself this specification recommends to delegate this task to the IoT device
Expand All @@ -476,7 +477,6 @@ extension indicates how to access information like the online certificate
status service (OCSP). Both extensions SHOULD NOT be set. If set, they
MUST NOT be marked critical.


## Root CA Certificate

This section outlines the requirements for root CA certificates.
Expand Down

0 comments on commit e2c49a6

Please sign in to comment.