Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

IRC specific X.509 data fields for user certificates #125

Open
GIJack opened this issue Jul 3, 2024 · 3 comments
Open

IRC specific X.509 data fields for user certificates #125

GIJack opened this issue Jul 3, 2024 · 3 comments

Comments

@GIJack
Copy link

GIJack commented Jul 3, 2024

When authenticating with a certificate, most of the User config data should be put in the x.509 cert.

Fields:
username
nick, or list of valid nicks(to be authenticated against which one is used with nickserv)
real name
email (optional)
networks - list of networks certificate is valid for.

@slingamn
Copy link

slingamn commented Jul 4, 2024

What problem would this solve? The client still has to send the nickname, IRC username, and realname via NICK and USER to complete connection registration. Should the server ignore the NICK and USER lines in favor of the X509 fields?

Normally the function of adding X509 fields to the certificate is that they are trusted data signed by the certificate issuer, but that seems largely inapplicable to the IRC case.

If the goal is to simplify client configuration of those fields, then I'm not sure what the value-add is from using X509.

@GIJack
Copy link
Author

GIJack commented Jul 8, 2024

What problem would this solve? The client still has to send the nickname, IRC username, and realname via NICK and USER to complete connection registration. Should the server ignore the NICK and USER lines in favor of the X509 fields?

That was the plan, or at least stick them in an X.509 cert.

The idea is to move to a user profile that is identified and authenticated by public key, or at least make that an optional part of the spec.

@grawity
Copy link

grawity commented Jul 8, 2024

If the certificates are meant to be self-signed, then I don't really see how this is useful – anyone who can use the certificate (i.e. has a private key) can self-sign another variant of the certificate with new fields, so it doesn't protect anything, only adds new complexity to achieve the same thing that's already done.

If the certificates are meant to be issued by the network, then it might work (reminds me of Lotus Notes...) but

  1. I would be strongly against having 'Real Name' as one of the fields – it is not part of the IRC account, and IRC networks shouldn't get into the business of verifying it;

  2. otherwise, such certificates would work as long as each network issues its own, but multi-network certificates (the "list of networks certificate is valid for" part) aren't going to work:

    If the fields in the certificate are supposed to be anything but decorative, then something needs to certify them – you need a CA that somehow validates ownership of those nicknames, and that the networks in question agree to trust it, and I don't see the latter ever happening.

    (Not to mention you now have revocation to solve! For a single network that's easy, it only needs to update its own revocation list, but for multiple networks that's about as likely to work as TLS cert revocation.)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants