Re: [Acme] [EXT] Re: I-D Action: draft-ietf-acme-dtnnodeid-09.txt

Robert Lee <robert.lee@globalsign.com> Wed, 25 May 2022 08:59 UTC

Return-Path: <robert.lee@globalsign.com>
X-Original-To: acme@ietfa.amsl.com
Delivered-To: acme@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 44B25C14F612 for <acme@ietfa.amsl.com>; Wed, 25 May 2022 01:59:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level:
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, MIME_HTML_ONLY=0.1, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=globalsign.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y1MctsDwdHhx for <acme@ietfa.amsl.com>; Wed, 25 May 2022 01:58:56 -0700 (PDT)
Received: from APC01-SG2-obe.outbound.protection.outlook.com (mail-sgaapc01on20715.outbound.protection.outlook.com [IPv6:2a01:111:f400:feab::715]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A2E20C14F608 for <acme@ietf.org>; Wed, 25 May 2022 01:58:55 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=gI2our67o5hYUHT587Ky52l3vEaTxMd4z+gnqqCKSOJMN4N/TX5gjncPlwAHJRXeqU23TOztGVt2GamLDp+vU1MTm4qqO3DzWS0jAj3W/jEX6NSLF9aWcA8jJiEV4ZGDw4LwfXxH5d4bjFZgLpIY4JoQak2pWXa1q9+4z1B8Z27JrIFVuZhsFa7p38v3uO9IU4xS5ZsLma3c8prVTVL5173Y7to1POR2zUPxz+hFbF10OJuzYPm9cWpoKO3eqgWZg+Na2ZpMuCh11tKfhTisHF/imL1ZoqRLTkThKJ8Dr4KN8F92oqMYvRYSNqxYjy1xAlZtbr92IPLnvj1oGpiLfg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=HuTNsMI9vd03/InyBEOgbx2aMx1BeXQ9OcY1NvEupBk=; b=MyOOO8cDsqNiL75vRBmyaSr2h5zJkrOL9ogWQlqYfkjtH0d8e249OBsoEVN946Ir96NBQuqJcsloBiwNb9t9mrRHdwH6Ru1KVmeMIJq2spkV4iWzEoBjUW6PW8+Reu67QVBW/grTp1T8cCFlxC+EavkgIMdssMyXKetD6N7tuPBI5O8ss/UvRwH3vuk82QBtSMjGEhk5HD69k1ldxFpNnC/RvgsDqD4ppyVeH0HQL/ATFan6iyM6Y+C7Tc1JAej+mGJTuq495ZW88uJl2dS6ZCngIjoHqtb9Lzq8ebIjx+wR0IDS20Op3k6rIPOSJLsnj2b31BHHirvQpsT5+uGUaQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=globalsign.com; dmarc=pass action=none header.from=globalsign.com; dkim=pass header.d=globalsign.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=globalsign.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HuTNsMI9vd03/InyBEOgbx2aMx1BeXQ9OcY1NvEupBk=; b=PEh6e5BKOhXvO3QklBKrQPSTZyei9+obRaMEtcI01TeDnHBBbL3dN/aZN2YZG1m9cCuHSsTNkygiYYKkRbLYq9paODmMbQlurO1hv0le3Ak0LYURFyQYOSeuuW2/M8i1P2bSEeza2O310wKp2Rhj2+ujGCuwvRP2AOjND7hUQwI=
Received: from PSAPR03MB5784.apcprd03.prod.outlook.com (2603:1096:301:8d::14) by KL1PR0302MB5380.apcprd03.prod.outlook.com (2603:1096:820:33::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5293.7; Wed, 25 May 2022 08:58:48 +0000
Received: from PSAPR03MB5784.apcprd03.prod.outlook.com ([fe80::8d3e:847b:5a53:9f9e]) by PSAPR03MB5784.apcprd03.prod.outlook.com ([fe80::8d3e:847b:5a53:9f9e%8]) with mapi id 15.20.5293.013; Wed, 25 May 2022 08:58:48 +0000
From: Robert Lee <robert.lee@globalsign.com>
To: IETF ACME <acme@ietf.org>
Thread-Topic: [Acme] [EXT] Re: I-D Action: draft-ietf-acme-dtnnodeid-09.txt
Thread-Index: AQHYb7VWAvRVEw2eh02i5BZu1nZSHq0vQdSg
Date: Wed, 25 May 2022 08:58:48 +0000
Message-ID: <PSAPR03MB5784D7DC4EEA67F219371DE0F3D69@PSAPR03MB5784.apcprd03.prod.outlook.com>
References: <164626769621.28373.14001307971144520385@ietfa.amsl.com> <CAM1+-gjWA9DYp1vuoaaQKSPHBe0ox-MWtWO3ZU7sPHsQBJeKtA@mail.gmail.com> <BN2P110MB1107FB763ED574E300071AE3DC159@BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM> <CAGgd1OeLpu3AEYuYJDTk02TpqPMMSEys_QQOJC1EAyMH9O6-yg@mail.gmail.com> <CAGgd1OdYeTXGjC-Rf+vCJbYb4u-MXEaJsXfqkdZu9+D1XGco4A@mail.gmail.com> <54419b031a6f49d08e72c07644b00fd8@jhuapl.edu>
In-Reply-To: <54419b031a6f49d08e72c07644b00fd8@jhuapl.edu>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=globalsign.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 7bfc5d4e-0dca-42ed-6396-08da3e2cc803
x-ms-traffictypediagnostic: KL1PR0302MB5380:EE_
x-microsoft-antispam-prvs: <KL1PR0302MB5380534EFBC5CCB6FC308F14F3D69@KL1PR0302MB5380.apcprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PSAPR03MB5784.apcprd03.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(366004)(44832011)(6506007)(38070700005)(966005)(66946007)(26005)(21615005)(38100700002)(316002)(91956017)(76116006)(55016003)(122000001)(7696005)(33656002)(53546011)(508600001)(8676002)(86362001)(66476007)(66446008)(64756008)(66556008)(6916009)(52536014)(8936002)(2906002)(66574015)(166002)(5660300002)(99936003)(186003)(83380400001)(71200400001)(9686003); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg="sha256"; boundary="_71E14954-0D5B-F44F-979D-4FF21D2C57E9_"
MIME-Version: 1.0
X-OriginatorOrg: globalsign.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PSAPR03MB5784.apcprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7bfc5d4e-0dca-42ed-6396-08da3e2cc803
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 May 2022 08:58:48.0869 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 8fff67c1-8281-4635-b62f-93106cb7a9a8
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 0FkdiWK/lBjiZ3S1d/45UIn9sEW3FFYq7KUkjIc60wuBaG4fpllN1YdZH0fcBy8BEF9Ayi7GDKE6pgwUzwQyDjFAojvqDRMwSmtz0O86BLQ=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: KL1PR0302MB5380
Archived-At: <https://mailarchive.ietf.org/arch/msg/acme/VpRvzYg_n_FM9VU0Ee50J0amJ8Q>
Subject: Re: [Acme] [EXT] Re: I-D Action: draft-ietf-acme-dtnnodeid-09.txt
X-BeenThere: acme@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: Automated Certificate Management Environment <acme.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/acme>, <mailto:acme-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/acme/>
List-Post: <mailto:acme@ietf.org>
List-Help: <mailto:acme-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/acme>, <mailto:acme-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 May 2022 08:59:00 -0000

Hi all,

 

So, I’ve read the draft a couple of times recently and am happy to review.  Generally I think the technical content is sound and effectively does what it says it’s trying to do.  I also think it’s clearly explained and easy to follow.

 

I do have two comments that I’d like to make (apologies if I’m a little late to the party on some of this).

 

Firstly, I’m not sure I buy the argument in the intro about changing certificate lifetimes and renewing at issuedcert.not_after – x.  From my experience the most recent couple of changes to certificate lifetimes made via root store policy changes have only affected certs issued after a date in the future and not certs that have already been issued.  If a subscriber gets a new cert a week before their current one expires then that approach would continue to work even if the lifetime of new certs was changed.  I’ll admit though that it’s less resistant to changes of certificate lifetimes than renewing x% through the lifetime of the current cert.

 

That being said, I wonder if a second justification for ARI might be scheduled revocation (which is a change of the certificate lifetime but would cause problems for all three of the use cases in the intro so I assume it was validity periods mentioned there).  The new Mozilla Root Store Policy changes included a requirement for cascading revocation (even between subscribers) in one of the keyCompromise use cases.  I wonder if ARI might be useful in the situation where customer a has revoked for keyCompromise with proof-of-possession and then customer b using the same key can be notified that they need a new certificate within the next 24 hours.  Happy to try and write something if it would help.

 

Secondly, I think the key words around client action and the suggested renewal window are a bit inconsistent.  If the renewal window is in the future then one MUST uniformly pick a random time in the window to renew but if you’ve already missed it then the guidance is you SHOULD attempt to renew immediately.  Then if the window is before you’d poll ARI again then you MAY attempt to renew immediately.

 

I don’t mind the latter two as much but I wonder if the “MUST” is a little strong and if it would be better to downgrade it to a “SHOULD” or to “It is RECOMMENDED that conforming clients select a uniform random…”.  In this I’m mainly considering the case where checking ARI is integrated into a notification system that tells a person to renew the cert using their ACME client rather than when the entire thing is automated.  Again, can open a PR for this if there is agreement.

 

Best Regards,

Rob

 

Dr. Robert Lee MEng PhD

Senior Software Engineer

http://www.globalsign.co.uk/" rel="nofollow">www.globalsign.co.uk|http://www.globalsign.eu/" rel="nofollow">www.globalsign.eu

 

 

From: Acme <acme-bounces@ietf.org> on behalf of Sipos, Brian J. <Brian.Sipos@jhuapl.edu>
Date: Tuesday, 24 May 2022 at 22:29
To: Deb Cooley <debcooley1@gmail.com>, IETF ACME <acme@ietf.org>, Brian Sipos <brian.sipos+ietf@gmail.com>
Cc: Roman Danyliw <rdd@cert.org>, Dorothy E Cooley <decoole@radium.ncsc.mil>
Subject: Re: [Acme] [EXT] Re: I-D Action: draft-ietf-acme-dtnnodeid-09.txt

You don't often get email from brian.sipos@jhuapl.edu. https://aka.ms/LearnAboutSenderIdentification" rel="nofollow">Learn why this is important

All,

I haven’t seen any reviews of the last draft version -09. I hope that the closer alignment with RFC 8823 makes its understanding and analysis easier.

 

From: Acme <acme-bounces@ietf.org> On Behalf Of Deb Cooley
Sent: Tuesday, May 24, 2022 7:39 AM
To: IETF ACME <acme@ietf.org>; Brian Sipos <brian.sipos+ietf@gmail.com>
Cc: Roman Danyliw <rdd@cert.org>; Dorothy E Cooley <decoole@radium.ncsc.mil>
Subject: [EXT] Re: [Acme] I-D Action: draft-ietf-acme-dtnnodeid-09.txt

 

APL external email warning: Verify sender acme-bounces@ietf.org before clicking links or attachments

 

Did we ever get reviews on the updated draft?  If not, can we get some (or revive the) volunteers?

 

Deb Cooley

 

On Mon, Mar 21, 2022 at 7:12 AM Deb Cooley <debcooley1@gmail.com> wrote:

It is on the agenda.  We will ask for volunteers to review.

 

Deb

 

On Sun, Mar 20, 2022 at 5:29 PM Roman Danyliw <rdd@cert.org> wrote:

Hi!

 

We’re past IETF LC in terms of document processing and -08 and -09 appear to have changed protocol behavior.  Since there hasn’t been any discussion about this on the mailing list yet, I’d like to ask the WG to review these changes (https://www.ietf.org/rfcdiff?url1=draft-ietf-acme-dtnnodeid-07&url2=draft-ietf-acme-dtnnodeid-09" rel="nofollow">https://www.ietf.org/rfcdiff?url1=draft-ietf-acme-dtnnodeid-07&url2=draft-ietf-acme-dtnnodeid-09).  Please raise any objections by Friday April 1. 

 

Helpfully, this document is on the ACME meeting agenda tomorrow at IETF 113.

 

Regards,

Roman

 

From: Acme <acme-bounces@ietf.org> On Behalf Of Brian Sipos
Sent: Wednesday, March 2, 2022 11:27 PM
To: IETF ACME <
acme@ietf.org>
Subject: Re: [Acme] I-D Action: draft-ietf-acme-dtnnodeid-09.txt

 

All,

I have posted an update to the Node ID Validation document which updates references to now-published DTN RFCs (yay!) and adds algorithm agility for the Key Authorization Digest to avoid the validation method being stuck on SHA-256. It does add a publication dependency on the COSE hash document, but that is in AUTH48 (though it's been stuck in that state for some time now).

Comments are welcome and can be discussed at the next IETF.

Brian S.

 

On Wed, Mar 2, 2022 at 7:35 PM <internet-drafts@ietf.org> wrote:


A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Automated Certificate Management Environment WG of the IETF.

        Title           : Automated Certificate Management Environment (ACME) Delay-Tolerant Networking (DTN) Node ID Validation Extension
        Author          : Brian Sipos
        Filename        : draft-ietf-acme-dtnnodeid-09.txt
        Pages           : 31
        Date            : 2022-03-02

Abstract:
   This document specifies an extension to the Automated Certificate
   Management Environment (ACME) protocol which allows an ACME server to
   validate the Delay-Tolerant Networking (DTN) Node ID for an ACME
   client.  The DTN Node ID is encoded as a certificate Subject
   Alternative Name (SAN) of type otherName with a name form of
   BundleEID and as an ACME Identifier type "bundleEID".


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-acme-dtnnodeid/" rel="nofollow">https://datatracker.ietf.org/doc/draft-ietf-acme-dtnnodeid/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-acme-dtnnodeid-09.html" rel="nofollow">https://www.ietf.org/archive/id/draft-ietf-acme-dtnnodeid-09.html

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-acme-dtnnodeid-09" rel="nofollow">https://www.ietf.org/rfcdiff?url2=draft-ietf-acme-dtnnodeid-09


Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts


_______________________________________________
Acme mailing list
Acme@ietf.org
https://www.ietf.org/mailman/listinfo/acme" rel="nofollow">https://www.ietf.org/mailman/listinfo/acme

_______________________________________________
Acme mailing list
Acme@ietf.org
https://www.ietf.org/mailman/listinfo/acme" rel="nofollow">https://www.ietf.org/mailman/listinfo/acme