[Acme] Re: 回复: Re: 回复: [EXTERNAL] Re: Introducting a new draft about adding a new ACME challenge type: public key challgenge

Q Misell <q@as207960.net> Mon, 02 December 2024 09:02 UTC

Return-Path: <q@as207960.net>
X-Original-To: acme@ietfa.amsl.com
Delivered-To: acme@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 31A0CC14CE22 for <acme@ietfa.amsl.com>; Mon, 2 Dec 2024 01:02:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=as207960.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1ArBVE-o1EJI for <acme@ietfa.amsl.com>; Mon, 2 Dec 2024 01:02:48 -0800 (PST)
Received: from mail-oi1-x232.google.com (mail-oi1-x232.google.com [IPv6:2607:f8b0:4864:20::232]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9F37BC14F6F4 for <acme@ietf.org>; Mon, 2 Dec 2024 01:02:48 -0800 (PST)
Received: by mail-oi1-x232.google.com with SMTP id 5614622812f47-3ea47651a10so1467643b6e.0 for <acme@ietf.org>; Mon, 02 Dec 2024 01:02:48 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=as207960.net; s=google; t=1733130167; x=1733734967; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=AORQ0SxPhiaiQEw12v+g1paNN1uIFYgHmRNDm4Hm2KA=; b=BTMhMfng8J1a8qk9mW4sN3fa9E6G37tN987hpj/lRYnPUsps/B4lzABHgJIJfCeNLU pIAPKu24tcQk0e1FsIaflHUKiXDJtcoycSb2WG709vJ65jesrmQ2XIAkFQosQWxvi81r ZL+8Fv/CdwsuApiO7n29Hfdma8AuaLlfqYauv+DVS417V6+JE4swEnIMaUHa8CXtpUkx Syu/EPMh0IC0vMouASwcHkm+OQE6gtgwP1mWFWrA36ewyRnVMY/2G1byO78b/zbQnQl2 DGu49nxflllm3McNM3czNNIv29LC2Cd3IU6ZbXLShfFhrTCJ8lVtR8GlGDuaDohaK1Hu c78w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1733130167; x=1733734967; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=AORQ0SxPhiaiQEw12v+g1paNN1uIFYgHmRNDm4Hm2KA=; b=kGNulf3yabfKRh7X8M4WxxWJfp5Ai3Wcaz95qnSjE/KlNGpo/fG3S7VZTrEmx+os86 rLKm+DC+lG8GupjeojEHK6asHxugi1MRvjPnHzThO2ufEc0IUINmbR8vjbydf4zmge5S C2vpNzS9anuOAm0xfCUh8bdOq7MrusDt3myoLus8uK77hsDdrN5F+oW25aUcl4AQhfeQ bB/0vOiLWxJw3PTy/F4cnp5j+sqrZbU4V4LgMhz+Lw3YDz4YlxSVGReQr2gJV/2EaBs7 s6ssFvcVX9ULTgx0Ql5PvIRacHvXfZWCQGBG3q//AIiuJ9v8Px8aF7FIpmogVt8YTweo 8Abw==
X-Forwarded-Encrypted: i=1; AJvYcCVGehL23qFfThO2t/2jslzsnUlnPmtkU7Cdp2T/3HMfQjCmyAAxdw3BDcPzwtkr1RhJulHx@ietf.org
X-Gm-Message-State: AOJu0Yw94yHW37Gnh4orp8YdzawYu4b/XZ2wTPPjo/o4QK0Fd1jqkjgI j31h01/4TtGISgAHg7W+B2xnckwFbxxRHPyVfMAxhZUMS0+Y+q59XACrQRgRBoh9lrJf/x4l4Kk W1xHwlgIIofrBKr1TQw+Xhu57xieEGdXamfURwA==
X-Gm-Gg: ASbGnct68bikLsY2vAuVY9UV18Nqyy40vGKtZKx1dRUSY91aagS4mNYNR1nxApiVQsU zHZJoY7A1+hdRFXgGszeRYxoIsLF3241+ZhWemaTsDJqDAficAM3iQvE+ZEc9m4nO
X-Google-Smtp-Source: AGHT+IGDLwQFHdYba0Z82aY5NPIJ49ctCEtRFptcwIUVvRiWxYsTI2/XsIK36SeVBzysyeyfdHLtHXNAYXa2UvzYNeQ=
X-Received: by 2002:a05:6808:1986:b0:3e6:24ec:d6f5 with SMTP id 5614622812f47-3ea6db8eeadmr18842322b6e.1.1733130167125; Mon, 02 Dec 2024 01:02:47 -0800 (PST)
MIME-Version: 1.0
References: <1cef6a03e3b94cf0bbe9b0b4dea64203@huawei.com> <CAMEWqGsUDpdyc7opxYKNPpg6WnQCD56_5zaDUv6ysjrmYwG_Tg@mail.gmail.com> <CH0PR11MB573998C7B1781074E3E3133E9F2E2@CH0PR11MB5739.namprd11.prod.outlook.com> <73547adca6b4494faf2e5d3709c18c8b@huawei.com> <CAEmnErdyL9qkfQRw7USOX8-LYoCSQS7U0qCi1HQYkj_yWDiVBA@mail.gmail.com> <CAL02cgTCOwECrPpJ_WZghD0JO5ON_39mhfsDk1QaaQXRFOpCVg@mail.gmail.com> <8e0aebc38cc945bbab74dca308555ba1@huawei.com> <CAMEWqGv6yR6x7i7a5ns_x3U0M7Wj8r4B=cA=v0W4nsBT-QzBdA@mail.gmail.com> <cf77f751fbb54546b01a11c4361e651a@huawei.com> <CAMEWqGsSBQs7P=PBW8GLjPA7mkjCyHqxpD15mknqJd8A_a00Wg@mail.gmail.com> <0fe02043c353492e8f61748acc2c2039@huawei.com>
In-Reply-To: <0fe02043c353492e8f61748acc2c2039@huawei.com>
From: Q Misell <q@as207960.net>
Date: Mon, 02 Dec 2024 10:02:11 +0100
Message-ID: <CAMEWqGtDNzBhU8Byik6uJdOp5ia7rurTpKSdEQkPTSBVJabhyw@mail.gmail.com>
To: "Xialiang(Frank, IP Security Standard)" <frank.xialiang=40huawei.com@dmarc.ietf.org>
Content-Type: multipart/alternative; boundary="000000000000f62924062845cff1"
Message-ID-Hash: GQDQGM7GCTV3DIMNEMYFYFSVGMAJPGIN
X-Message-ID-Hash: GQDQGM7GCTV3DIMNEMYFYFSVGMAJPGIN
X-MailFrom: q@as207960.net
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-acme.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Richard Barnes <rlb@ipv.sx>, Aaron Gable <aaron@letsencrypt.org>, Mike Ounsworth <Mike.Ounsworth@entrust.com>, IETF ACME <acme@ietf.org>, "draft-geng-acme-public-key.authors@ietf.org" <draft-geng-acme-public-key.authors@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Acme] Re: 回复: Re: 回复: [EXTERNAL] Re: Introducting a new draft about adding a new ACME challenge type: public key challgenge
List-Id: Automated Certificate Management Environment <acme.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/acme/GuPMoqyWfF3jdUiYSZK8gLvR42o>
List-Archive: <https://mailarchive.ietf.org/arch/browse/acme>
List-Help: <mailto:acme-request@ietf.org?subject=help>
List-Owner: <mailto:acme-owner@ietf.org>
List-Post: <mailto:acme@ietf.org>
List-Subscribe: <mailto:acme-join@ietf.org>
List-Unsubscribe: <mailto:acme-leave@ietf.org>

I don't see why EAB can't be used to link to an identity - perhaps you
could elaborate?
------------------------------

Any statements contained in this email are personal to the author and are
not necessarily the statements of the company unless specifically stated.
AS207960 Cyfyngedig, having a registered office at 13 Pen-y-lan Terrace,
Caerdydd, Cymru, CF23 9EU, trading as Glauca Digital, is a company
registered in Wales under № 12417574
<https://find-and-update.company-information.service.gov.uk/company/12417574>,
LEI 875500FXNCJPAPF3PD10. ICO register №: ZA782876
<https://ico.org.uk/ESDWebPages/Entry/ZA782876>. UK VAT №: GB378323867. EU
VAT №: EU372013983. Turkish VAT №: 0861333524. South Korean VAT №:
522-80-03080. AS207960 Ewrop OÜ, having a registered office at Lääne-Viru
maakond, Tapa vald, Porkuni küla, Lossi tn 1, 46001, trading as Glauca
Digital, is a company registered in Estonia under № 16755226. Estonian VAT
№: EE102625532. Glauca Digital and the Glauca logo are registered
trademarks in the UK, under № UK00003718474 and № UK00003718468,
respectively.


On Mon, 2 Dec 2024 at 03:12, Xialiang(Frank, IP Security Standard)
<frank.xialiang=40huawei.com@dmarc.ietf.org> wrote:

> No, my point is ACME EAB is only about account authenticity, but not about
> identity and certificate.
>
>
>
> *发件人:* Q Misell <q=40as207960.net@dmarc.ietf.org>
> *发送时间:* 2024年11月29日 23:07
> *收件人:* Xialiang(Frank, IP Security Standard) <frank.xialiang@huawei.com>
> *抄送:* Richard Barnes <rlb@ipv.sx>; Aaron Gable <aaron@letsencrypt.org>;
> Mike Ounsworth <Mike.Ounsworth@entrust.com>; IETF ACME <acme@ietf.org>;
> draft-geng-acme-public-key.authors@ietf.org
> *主题:* Re: [Acme] 回复: Re: 回复: [EXTERNAL] Re: Introducting a new draft
> about adding a new ACME challenge type: public key challgenge
>
>
>
> ACME EAB actually has no restrictions on its use. It might be used to link
> to a financial account for billing purposes, or could be used to link to an
> identity account as you desire.
> ------------------------------
>
> Any statements contained in this email are personal to the author and are
> not necessarily the statements of the company unless specifically stated.
> AS207960 Cyfyngedig, having a registered office at 13 Pen-y-lan Terrace,
> Caerdydd, Cymru, CF23 9EU, trading as Glauca Digital, is a company
> registered in Wales under № 12417574
> <https://find-and-update.company-information.service.gov.uk/company/12417574>,
> LEI 875500FXNCJPAPF3PD10. ICO register №: ZA782876
> <https://ico.org.uk/ESDWebPages/Entry/ZA782876>. UK VAT №: GB378323867.
> EU VAT №: EU372013983. Turkish VAT №: 0861333524. South Korean VAT №:
> 522-80-03080. AS207960 Ewrop OÜ, having a registered office at Lääne-Viru
> maakond, Tapa vald, Porkuni küla, Lossi tn 1, 46001, trading as Glauca
> Digital, is a company registered in Estonia under № 16755226. Estonian VAT
> №: EE102625532. Glauca Digital and the Glauca logo are registered
> trademarks in the UK, under № UK00003718474 and № UK00003718468,
> respectively.
>
>
>
>
>
> On Thu, 28 Nov 2024 at 03:31, Xialiang(Frank, IP Security Standard)
> <frank.xialiang=40huawei.com@dmarc.ietf.org> wrote:
>
> Hi Q,
>
> Thanks for your pointing out the reference, I have read this section and
> found that it (external account binding) is another thing about account
> authenticity and performed in the ACME “Account Management” phase,
> different from what our draft proposed about public key authenticity and
> performed in the “Identifier Validation Challenges” phase.
>
>
>
> Hopefully my understanding is not wrong~~
>
>
>
> B.R.
>
> Frank
>
>
>
> *发件人:* Q Misell <q=40as207960.net@dmarc.ietf.org>
> *发送时间:* 2024年11月27日 21:34
> *收件人:* Xialiang(Frank, IP Security Standard) <frank.xialiang@huawei.com>
> *抄送:* Richard Barnes <rlb@ipv.sx>; Aaron Gable <aaron@letsencrypt.org>;
> Mike Ounsworth <Mike.Ounsworth@entrust.com>; IETF ACME <acme@ietf.org>;
> draft-geng-acme-public-key.authors@ietf.org
> *主题:* Re: [Acme] 回复: Re: 回复: [EXTERNAL] Re: Introducting a new draft
> about adding a new ACME challenge type: public key challgenge
>
>
>
> Frank, External Account Binding refers to RFC8555 § 7.3.4.
> ------------------------------
>
> Any statements contained in this email are personal to the author and are
> not necessarily the statements of the company unless specifically stated.
> AS207960 Cyfyngedig, having a registered office at 13 Pen-y-lan Terrace,
> Caerdydd, Cymru, CF23 9EU, trading as Glauca Digital, is a company
> registered in Wales under № 12417574
> <https://find-and-update.company-information.service.gov.uk/company/12417574>,
> LEI 875500FXNCJPAPF3PD10. ICO register №: ZA782876
> <https://ico.org.uk/ESDWebPages/Entry/ZA782876>. UK VAT №: GB378323867.
> EU VAT №: EU372013983. Turkish VAT №: 0861333524. South Korean VAT №:
> 522-80-03080. AS207960 Ewrop OÜ, having a registered office at Lääne-Viru
> maakond, Tapa vald, Porkuni küla, Lossi tn 1, 46001, trading as Glauca
> Digital, is a company registered in Estonia under № 16755226. Estonian
> VAT №: EE102625532. Glauca Digital and the Glauca logo are registered
> trademarks in the UK, under № UK00003718474 and № UK00003718468,
> respectively.
>
>
>
>
>
> On Wed, 27 Nov 2024 at 09:13, Xialiang(Frank, IP Security Standard)
> <frank.xialiang=40huawei.com@dmarc.ietf.org> wrote:
>
> Hi Richard,
>
> Thanks for your comments, see inline:
>
>
>
> *发件人:* Richard Barnes <rlb@ipv.sx>
> *发送时间:* 2024年11月26日 23:09
> *收件人:* Aaron Gable <aaron@letsencrypt.org>
> *抄送:* Xialiang(Frank, IP Security Standard) <frank.xialiang@huawei.com>;
> Mike Ounsworth <Mike.Ounsworth@entrust.com>; Q Misell <q@as207960.net>;
> IETF ACME <acme@ietf.org>; draft-geng-acme-public-key.authors@ietf.org
> *主题:* Re: [Acme] Re: 回复: [EXTERNAL] Re: Introducting a new draft about
> adding a new ACME challenge type: public key challgenge
>
>
>
> Looking at this thread and the document, I think there are two plausible
> objectives here:
>
>
>
> 1. Restricting issuance to clients that perform some secondary
> authentication (as the document seems to propose)
>
> 2. Removing the CSR from the protocol (as Aaron suggests)
>
>
>
> A "pubkey" identifier type is the wrong solution for both.
>
>
>
> Goal (1) can be solved today with external account binding.  Build an
> external thing that does whatever vetting you want on a client, then bind
> the vetted account to the ACME account.  If you wanted to make this a
> little more automated, you could do something like an OAuth or OpenID
> integration, but pulling the entire wild world of user authentication into
> ACME is the wrong answer.
>
> [Frank]: Can you clarify more about “external account binding” you mean
> here? I think our proposal is one of the binding, which is feasible, and
> more importantly, automated. If there any other external account binding
> methods have the same effect?
>
>
>
> Goal (2) is might not an unreasonable idea, but I would be concerned about
> (a) compatibility impacts with subjects, (b) compatibility impacts with CA
> back-end APIs, and (c) new cross-protocol risks usage of the certificate
> subject key pair (signing some JOSE thing as well as being used in TLS, vs.
> CSR+TLS, which has been done forever).  Even if we wanted to do this, then
> you don't need the whole machinery of ACME challenges.  You don't need an
> extensible set of ways to validate an ECDSA key, you need one, and probably
> not even one per algorithm -- you could just define a JWS structure that
> was the moral equivalent of a CSR and have the client attach it to an order.
>
> [Frank]: Concur with your concerns. The current ACME 3-phase design is
> good and provides enough compatibility.
>
>
>
> B.R.
>
> Frank
>
>
>
>
>
> On Tue, Nov 26, 2024 at 9:55 AM Aaron Gable <aaron=
> 40letsencrypt.org@dmarc.ietf.org> wrote:
>
> Hi all,
>
>
>
> I agree that it would be beneficial for the ACME protocol to have a pubKey
> identifier type, and to have challenges which can be used to prove control
> over the corresponding private key. However, it seems that I believe this
> would be useful for entirely different reasons than the authors here, and I
> am currently unconvinced by the motivations presented here.
>
>
>
> I believe that a pubKey identifier type is useful for two reasons:
>
> 1) it allows the CSR to be removed from the finalize request, as it will
> no longer be carrying any information that is not already found in other
> parts of the ACME protocol; and
>
> 2) proof-of-possession allows the ACME server to respect keyCompromise
> revocation requests which are signed by the Subscriber key instead of only
> accepting those which are signed by the certificate key.
>
>
>
> It seems that this draft is arguing for the inclusion of a pubKey type and
> corresponding challenges from a security perspective: that an adversary
> might replace the CSR in the finalize request and thereby get issuance of a
> certificate containing a malicious key. I must admit I do not understand
> this threat model.
>
>
>
> If the adversary is simply a network adversary between the legitimate
> Client and Server, then they cannot replace the CSR: the finalize request
> is signed by the ACME client key and cannot be tampered with without
> invalidating that signature. If the adversary is on the ACME client host,
> and has access to the ACME client key, then the game is already lost --
> that adversary *is* the Subscriber for all intents and purposes, and has
> significant latitude: they can change the ACME client key to one the victim
> doesn't control, they can (generally, based on the architecture of most
> clients) complete HTTP-01 and DNS-01 challenges, and they can prove
> possession of any private key they like.
>
>
>
> So I think that this document needs to be overhauled in two ways:
>
> - more clearly motivating the threat model: what exactly is the security
> issue being solved, and why is it import that it be solved; and
>
> - more clearly motivating the solution space: how do proof-of-possession
> challenges mitigate the threat, and why are this particular set of proposed
> challenges the best way to do so.
>
>
>
> Aaron
>
> _______________________________________________
> Acme mailing list -- acme@ietf.org
> To unsubscribe send an email to acme-leave@ietf.org
>
> _______________________________________________
> Acme mailing list -- acme@ietf.org
> To unsubscribe send an email to acme-leave@ietf.org
>
>