Re: [Ace] Proposing document draft-amsuess-ace-brski-ace-00

Christian Amsüss <christian@amsuess.com> Fri, 21 July 2023 13:12 UTC

Return-Path: <christian@amsuess.com>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DD90DC14CE4F; Fri, 21 Jul 2023 06:12:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.895
X-Spam-Level:
X-Spam-Status: No, score=-6.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FROM_EXCESS_BASE64=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3Bizp9-nlwNb; Fri, 21 Jul 2023 06:12:42 -0700 (PDT)
Received: from smtp.akis.at (smtp.akis.at [IPv6:2a02:b18:500:a515::f455]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2B61DC15107F; Fri, 21 Jul 2023 06:12:23 -0700 (PDT)
Received: from poseidon-mailhub.amsuess.com (095129206250.cust.akis.net [95.129.206.250]) by smtp.akis.at (8.17.1/8.17.1) with ESMTPS id 36LDCKRT038101 (version=TLSv1.2 cipher=ECDHE-ECDSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 21 Jul 2023 15:12:20 +0200 (CEST) (envelope-from christian@amsuess.com)
X-Authentication-Warning: smtp.akis.at: Host 095129206250.cust.akis.net [95.129.206.250] claimed to be poseidon-mailhub.amsuess.com
Received: from poseidon-mailbox.amsuess.com (hermes.lan [10.13.13.254]) by poseidon-mailhub.amsuess.com (Postfix) with ESMTP id 4D588258CC; Fri, 21 Jul 2023 15:12:20 +0200 (CEST)
Received: from hephaistos.amsuess.com (hephaistos.lan [IPv6:2a02:b18:c13b:8010::d5b]) by poseidon-mailbox.amsuess.com (Postfix) with ESMTPSA id 0648326270; Fri, 21 Jul 2023 15:12:20 +0200 (CEST)
Received: (nullmailer pid 17450 invoked by uid 1000); Fri, 21 Jul 2023 13:12:19 -0000
Date: Fri, 21 Jul 2023 15:12:19 +0200
From: Christian =?iso-8859-1?Q?Ams=FCss?= <christian@amsuess.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>
Cc: ace@ietf.org, anima@ietf.org
Message-ID: <ZLqEM/PyTVz5egPu@hephaistos.amsuess.com>
References: <ZK8TLhCiiR/lR1Bc@hephaistos.amsuess.com> <25968.1689198750@localhost> <ZLlQEeeDhjSFgi5B@hephaistos.amsuess.com> <23437.1689878109@localhost>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="TevOXoPa4rGECuwB"
Content-Disposition: inline
In-Reply-To: <23437.1689878109@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/UhFeLJzaOxKQUN-FUlVRR-TTkNI>
Subject: Re: [Ace] Proposing document draft-amsuess-ace-brski-ace-00
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Jul 2023 13:12:45 -0000

On Thu, Jul 20, 2023 at 02:35:09PM -0400, Michael Richardson wrote:
> So draft-ietf-anima-constrained-voucher, has some optimizations that can
> sometimes let the pledge skip the /crts, but why is that interaction so expensive?
> Note that in lake-authz, the voucher isn't actually sent, rather just the
> signature on what we expected to see in the voucher.... so extensions to the
> voucher would be difficult to do.

My impression was that this was not just an optimization that saves an
initial request, but that the voucher (in all its augmentation that it
gets when the registrar turns the PVR into an RVR) could serve as the
one way the credentials are provisioned through. Packing everything into
the voucher was not motivated by saving round-trips, but by reducing
code paths.

> So if I understand you, you'd like to avoid additional round trips by
> stacking the certificate request with the PVR.   BRSKI-PRM does *exactly*
> that, because in the store-and-forward ("DTN") nature of PRM, round trips
> involve people walking up/down stairs.

I think a good next direction would be to skip the "stuffing things
into the voucher" part and instead focus on just doing the /cert /
/s(r)en equivalent of certificate based authentication.

So in a sketch, we'd do just as in authz+CoJP, and in the msg_3 request
(or even a later regular OSCORE request if we use CoJP too) ask the
registrar for the relevant AS data.

I'll try to estavblish that as a new baseline. (Not sure yet whether
that'd better be a -01, or an ace-est-ace as it's not really depending
on BRSKI any more). An upside of that scenario is that it has a
relatively straightforward story for rollover of the AS keys
(corresponding to the rollover of CA keys in EST where the device can
query for the newest values).

In such a scenario I'd only come back to PRM if there's good reason to
actually do PRM (i.e. there are stairs, not just because it looks
suitable), or when that rollover is AS initialized.

That handover gets me thinking: In authz-for-CoJP, the authenticator
plays the role of the JRC (I figure it'll play reverse proxy for the
actual one). Does that mean that the authenticator needs to stay around
(and keep its EDHOC created OSCORE session / roll it over as described
in CoJP), or can it ever hand the device off to a JRC directly?

>     > That'd mean that party V needs to serve both as a JRC and
>     > DTLS/OSCORE data -- nothing I'd rule out, just something that
>     > wouldn't have been apparent to me from the documents I've read
>     > so far.
> 
> Why would you need a DTLS context?

That was supposed to be an either-or; I don't suppose I'd have a device
that takes both. (Should actually have been cert/AS data). But having
the registar serve both JRC data and AS details sounds realistic to me.

> pick a "morning" in gather.town.
> I'm also remote.  Maybe Wednesday before ANIMA.

Wednesday before at gather.town sounds great, looking forward to it!

Thx
c

-- 
To use raw power is to make yourself infinitely vulnerable to greater powers.
  -- Bene Gesserit axiom