Re: [Acme] draft-ietf-acme-star

Richard Barnes <rlb@ipv.sx> Mon, 09 September 2019 22:43 UTC

Return-Path: <rlb@ipv.sx>
X-Original-To: acme@ietfa.amsl.com
Delivered-To: acme@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D8335120869 for <acme@ietfa.amsl.com>; Mon, 9 Sep 2019 15:43:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ipv-sx.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G2zTQx21FB0M for <acme@ietfa.amsl.com>; Mon, 9 Sep 2019 15:43:52 -0700 (PDT)
Received: from mail-ot1-x32f.google.com (mail-ot1-x32f.google.com [IPv6:2607:f8b0:4864:20::32f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E4A2712022D for <acme@ietf.org>; Mon, 9 Sep 2019 15:43:51 -0700 (PDT)
Received: by mail-ot1-x32f.google.com with SMTP id g19so15032965otg.13 for <acme@ietf.org>; Mon, 09 Sep 2019 15:43:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipv-sx.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=HTDoVsOKrno2P7c9Qvitzz25v4rB7kT2X0XuKI5qBpY=; b=mzLbkUXEv8BF6XO6ZctsOTpaL5UQpeVFNZjWPvzyIa9eoNQsRzBcF3zmxkEMKZdu64 euppnRO9ucq5Et2C4FIHAt4XDOwxtYpkMBCD/hPdogs9ZdbmP/vhhseB9OwsYP0Uk2zC wkTo5XxEvcolV8CYeCgewP1RDbsk2MxteGRdcjIwZmLI2uV/5w9cEl2bVhA/XctJbmOk NDnWvNc8GQto0FSAbI81d0LAJA8XOmoId0PzJPQX2Dbn6wJVWNGA8JCTrJ1XHIIskhwM WLPAq1pkSj/6TXUknsLROctVvHHFoLkbgUhYDSDm0Jl2/xTB8p0AJgdikZhrKAYNSw83 MkJw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=HTDoVsOKrno2P7c9Qvitzz25v4rB7kT2X0XuKI5qBpY=; b=lrcc2WqbYpbj5YISpyqu9SdB7zK68dZiLJ9f053TjWyo18EPi7p2CInin32e6Nm4KY d15uf3pc2K4P3HTfXOS6KSlzh1+OUNl6tTgO3qOSEPOlz9ZxWNaWne6iVMRJmCmostsJ QGX074lsHMfYMip4AqnpkxSOGWNFPekArZe/jrrusl+YBYwwy/bSlu6fhqUUSmodsjRp SFZO++pMgTA7T08bSVSy/kzt964VO2MeyDNzZUF6cZKcFD6dOysSc0TiC4ImxRdRbQ5q SWSmaORrajNV370xoLCLpjAgUnydicH4yitzQVgwdRXMIerS6MLfYH+8b3EoaS4ZNeVJ 6Qig==
X-Gm-Message-State: APjAAAXKpc6Xc15pHbnHve5kAA+BXMx89slEToLuuMaNi1gNM8Cjjpko hR+YuUfREQN5WwUewv05699MtTYtrrUP9GiK1AdOQA==
X-Google-Smtp-Source: APXvYqwPHHXERaunnq3F91eoalk2gjbF2o2pGTO3Cc8UFrVOYiypfA/FXNC1q1Ms1eq2tjBAr0KFl4+Vr8c+4EANTAY=
X-Received: by 2002:a05:6830:1509:: with SMTP id k9mr4537059otp.42.1568069031092; Mon, 09 Sep 2019 15:43:51 -0700 (PDT)
MIME-Version: 1.0
References: <CAL02cgST77G9uR23x4Hf0L8_hqi6zSuJqB=dbunGYcDPEDpbDg@mail.gmail.com> <94D1B74E-8AD8-4623-8DFB-E9C132BBB940@arm.com>
In-Reply-To: <94D1B74E-8AD8-4623-8DFB-E9C132BBB940@arm.com>
From: Richard Barnes <rlb@ipv.sx>
Date: Mon, 09 Sep 2019 18:43:35 -0400
Message-ID: <CAL02cgTM+dTJ6enzpnb=dSCzbDMR+3Xadp4r4a3xuzzhxPgJag@mail.gmail.com>
To: Thomas Fossati <Thomas.Fossati@arm.com>
Cc: IETF ACME <acme@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000095020505922685d1"
Archived-At: <https://mailarchive.ietf.org/arch/msg/acme/4Wo9qB81UL6cP3Mm21ON-3tPmys>
Subject: Re: [Acme] draft-ietf-acme-star
X-BeenThere: acme@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Automated Certificate Management Environment <acme.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/acme>, <mailto:acme-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/acme/>
List-Post: <mailto:acme@ietf.org>
List-Help: <mailto:acme-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/acme>, <mailto:acme-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Sep 2019 22:44:00 -0000

On Mon, Sep 9, 2019 at 4:15 AM Thomas Fossati <Thomas.Fossati@arm.com>
wrote:

> Hi Richard,
>
> Thank you for the detailed review. As you note yourself, this is quite
> late in the document life-cycle (the draft completed IETF LC over a
> month ago), which is unfortunate, given that every one of your comments
> is an actual protocol change.


Do you have any implementations that this would break?  Or is this just
avoiding spec changes?

Most of the below should be pretty easy to address, so unless there's some
massively deployed code base that's going to be broken, I would propose
that they should be addressed before publication.

Note that there are some potential deployment blockers here, most
importantly the implication that the CA should pre-date certificates.

--Richard



> As far as we understand, none of them can
> be seen as a "showstopper" mistake in the protocol, and therefore we
> propose to move forward with the current draft version. Please let us
> know if we missed anything.
>
> Cheers, Thomas (on behalf of the authors)
>
> > On 28/08/2019 at 15:52, Richard Barnes <rlb@ipv.sx> wrote:
> >
> > I had a chance to take a look at this draft as a result of being a
> > designated expert on the registries.  I approved the registrations,
> > but independently, I have several major concerns about the draft.  In
> > no particular order
> >
> > - The use of the "STAR" acronym is not helpful.  This is not an
> > acronym that will be familiar to a reader, and less so an implementer
> > who has not fully read and absorbed this spec.  Instead, you should
> > say what you mean, e.g., for the "meta" fields:
> >
> > star-enabled -> auto-renewal-allowed star-min-cert-validity ->
> > min-cert-validity star-max-renewal -> max-auto-renewals
> >
> > - Likewise, "recurrent" is not a common word in English.  If you want
> > to use a single word, "recurring" is more common, but referring to
> > "auto-renewal" would be even better.
> >
> > - It would be even cleaner to group all these "recurrent" fields into
> > a sub-object, so that you wouldn't have to worry about them being
> > present if "recurrent" wasn't set.  In other words, just signal the
> > "recurrent" boolean by the presence of the object, and specify the
> > parameters in the object.
> >
> > { "auto-renew": { "start": ..., "end": ..., "lifetime": ..., } }
> >
> > - The idea of "predating" is toxic.  Pre-dating a certificate means
> > making the notBefore date earlier than when you actually issued it,
> > which is a huge problem for a real CA to do.  That's not what you mean
> > here..  You just want there to be some overlap between certificates.
> > Say that instead ("recurrent-certificate-predate" -> "overlap") and
> > adjust Section 3.5 accordingly.
> >
> > - The Not-Before and Not-After headers should be removed.  On the one
> > hand, it's not clear to me that it's any easier to parse these headers
> > than it is to parse the certificate.  On the other hand, there are
> > existing HTTP headers that express almost exactly the same semantics,
> > e.g., Expires.
> >
> > - It's not clear that there's any reason to negotiate certificate-GET
> > on a per-order basis.  Just have the CA allow it or not unilaterally
> > and delete the "recurrent-certificate-get" field.
> >
> > - The "star-certificate" attribute is unnecessary.  Instead, you
> > should just say that when auto-renewal is enabled, the "certificate"
> > attribute points to the current certificate, and use "previous" link
> > relations to expose earlier certs.
>
> IMPORTANT NOTICE: The contents of this email and any attachments are
> confidential and may also be privileged. If you are not the intended
> recipient, please notify the sender immediately and do not disclose the
> contents to any other person, use it for any purpose, or store or copy the
> information in any medium. Thank you.
>