Re: [Acme] Proposal: ACME Profiles

Deb Cooley <debcooley1@gmail.com> Mon, 09 October 2023 10:10 UTC

Return-Path: <debcooley1@gmail.com>
X-Original-To: acme@ietfa.amsl.com
Delivered-To: acme@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2A4C2C151998 for <acme@ietfa.amsl.com>; Mon, 9 Oct 2023 03:10:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.854
X-Spam-Level:
X-Spam-Status: No, score=-1.854 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TV8NvayvLYbi for <acme@ietfa.amsl.com>; Mon, 9 Oct 2023 03:10:19 -0700 (PDT)
Received: from mail-il1-x130.google.com (mail-il1-x130.google.com [IPv6:2607:f8b0:4864:20::130]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 79214C151068 for <acme@ietf.org>; Mon, 9 Oct 2023 03:10:19 -0700 (PDT)
Received: by mail-il1-x130.google.com with SMTP id e9e14a558f8ab-3527428a402so14413285ab.0 for <acme@ietf.org>; Mon, 09 Oct 2023 03:10:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1696846218; x=1697451018; darn=ietf.org; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :from:to:cc:subject:date:message-id:reply-to; bh=PmbXiAoAthybwGYvfUwyHXXmI6cYQ1JktDH4PORNwgA=; b=XQfPJ2XejdPZa0LtGiTa6LmZUEKCnjtiV2dT5z7dyWClFihYku9iX+3M1S6JXAWVPw 5v6HcDhFIRIdFCtcirDRhVqIpOBMPeasFbIG9cT5JHusZ4NNSPcnpAV9vmniyByRbWkD zwOl5feHbmMQOm2ZQeXQVqKi1Cp+ImyRylml7kfPG2a+VJutwVnTsDI7xpyw/mSuqY9u FCu/6SjJpN3hJitCiQgJfdXpwLUcsUYSYeaDymcIyNPRLmSDNTOfoq+H4KSyz9BoGi5B lvhmHoyI/N25mfxzMDd+KY3uYprqym2wbR4LA4L255kcm9XwKKQxFb+iIpJwrf1HS+Fe 2XIg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696846218; x=1697451018; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=PmbXiAoAthybwGYvfUwyHXXmI6cYQ1JktDH4PORNwgA=; b=KCuABaDRpSHLXAlNP4F2yLpoCkKBi9wRoaze6ngfuyEAZYiy51PlL1v84+LgwoD80N 22xbgLlZ+4Ac/YxKQSMvnAQVv5IfMLAvUlpATyYcHsQznkK8GKaFu2O/4wp7AkB7svk7 sD0BajRsKapO4Brt6hup/wk9qP1+K98lyiM56Zve+fFEEhMi5ViAMQ7/afcP9q27oWsw 7taDK6QW2XvIQQM02Q9BPy6jApSEAel1MD9bQbt+cKkfxkSQb8Oiq/m3IQ5x5iLcPB88 QM1hDwcRJUqsqeyjhzPaXC0zVp4AJ4VHguLCEaKPgRBhpL+ih4qhY1ZjZiCf8tAoXcFG RKRg==
X-Gm-Message-State: AOJu0YxRsvgk+c/09/KYY5E2nZ5Qs8hF9e9Wzlzf1vt2mJvYjNaI5If7 VIj7qNU2JYbQw2ej8dZg0JrvnMaP/aHT+L30XjnWx4k=
X-Google-Smtp-Source: AGHT+IEvQMBqd3DEiZu/1wM+Moe9lqRNQQ00d2Wq5/YQ7oGHNIg2lx0mW7E7We5R13h7k4XsdqJkXrsR4OVLrDDbHkU=
X-Received: by 2002:a05:6e02:1e02:b0:34f:fdbd:244a with SMTP id g2-20020a056e021e0200b0034ffdbd244amr18267960ila.32.1696846218013; Mon, 09 Oct 2023 03:10:18 -0700 (PDT)
MIME-Version: 1.0
References: <CAEmnErfJvsxR15OL2BCWX5L0g-wrv5ur3xgsH7H5U5UpR7dWNg@mail.gmail.com> <CAOJjKpytkFr9_G6rh4rGFGKTAP-Kh9_a-n8bcXMMjoB07Sj75A@mail.gmail.com> <CAKh5S0Y67MUDLvpPiBbg4Yuf-BSqug3BJjNaiPVbW=2riCwDpA@mail.gmail.com>
In-Reply-To: <CAKh5S0Y67MUDLvpPiBbg4Yuf-BSqug3BJjNaiPVbW=2riCwDpA@mail.gmail.com>
From: Deb Cooley <debcooley1@gmail.com>
Date: Mon, 09 Oct 2023 06:10:07 -0400
Message-ID: <CAGgd1OfROHe89h9tF7aOXZz7=ifmmEWZsQeAtk+xeU0JW58hXQ@mail.gmail.com>
To: IETF ACME <acme@ietf.org>, Aaron Gable <aaron=40letsencrypt.org@dmarc.ietf.org>
Content-Type: multipart/alternative; boundary="00000000000010335e060745ccf7"
Archived-At: <https://mailarchive.ietf.org/arch/msg/acme/HKEePKdLUdXoiJmPvaiSDEqNWwc>
Subject: Re: [Acme] Proposal: ACME Profiles
X-BeenThere: acme@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Automated Certificate Management Environment <acme.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/acme>, <mailto:acme-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/acme/>
List-Post: <mailto:acme@ietf.org>
List-Help: <mailto:acme-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/acme>, <mailto:acme-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Oct 2023 10:10:23 -0000

Aaron,

Also (very) late to the game, and my experience is mostly with private CAs:

We have used certificate profiles for decades, but not with ACME.  These
profiles are currently specified in a document called 'certificate
profiles'.  Even in our most widely used systems (that issue to more than
TLS), there aren't more than 20-30 profiles.  Generally, we specify the
algorithm/key size choices w/in a single profile (currently one can choose
RSA 2K or above and ECDSA w/ P384, for example).  Certificate validity is
done the same way (less than x time).  What does vary are the KU and EKU
fields for each profile, where some EKUs are mandatory and some are
optional.  These profiles have very simple names.  When a request is made,
as long as the CSR matches the options we have given them in the profile,
the cert is issued.

I think this old school method should scale to ACME without too much
trouble.  There would need to be a default profile for your old
clients/accounts.
And the profile offerings can be set by what EKUs are chosen (where there
are both mandatory EKUs and optional EKUs).  Having this profile ability
will allow the use of ACME CAs in more areas than just TLS.

My last comment is that this should be kept simple.  Most server operators
struggle today, and get it wrong.  The simpler we can keep it, the more
likely they will be to configure it correctly - enabling secure
communications.

Deb




On Tue, Sep 19, 2023 at 8:33 PM Matthew McPherrin <mattm=
40letsencrypt.org@dmarc.ietf.org> wrote:

> My personal opinion here is that adding a profile field to the Order
> object is likely to hamper client adoption, and as Ben just said, makes
> configuration more difficult if CAs don't have matching profiles.
>
> An alternative approach that I believe has been used is adding URL
> parameters to the directory URL, as Aaron mentioned in his initial email.
>
> The returned URLs in the directory can reflect those parameters, eg, on
> the newOrder endpoint, as required.
>
> The directory endpoint should only do so if the parameters are known.
>
> The directory url can contain metadata to advertise what parameters are
> available.
>
> So potentially an interactive client can display a UI of options to a user.
>
> Automated use-cases or older ACME clients would simply configure the
> directory URL as desired, with the query parameters included.
>
> I believe that adding parameters to directory URLs requires no additional
> standardization work, and Let's Encrypt can add a profile parameter
> immediately.
>
> What we may want to standardize is a method for advertising what query
> parameters are available, as well as a mechanism for returning warnings or
> errors about invalid or deprecated flags in the directory.
>
> Thanks, Matthew
>
> On Tue, Sep 19, 2023 at 7:17 PM Ben Burkert <benburkert@anchor.dev> wrote:
>
>> Hello,
>>
>> Apologies for chiming in late here; I'm with a startup that is just
>> coming out of stealth mode so I have been quietly following these
>> discussions. I bring this up because we build & operate ACME powered CAs
>> on behalf of users, and we've already introduced our own concept similar
>> to profiles. We focus entirely on the private CA market, but we have an
>> interest in seeing this concept standardized in a way that works well
>> for both the public & private ACME CAs.
>>
>> The way we solve this is at the intermediate CA level, which we refer to
>> as a SubCA. Each SubCA is an intermediate CA that issues end entity
>> certs, and a template that sets a common set of properties of the end
>> entity certs that it issues. For example, when creating a SubCA you can
>> specify the expiry time (as a duration), key usage and other extensions,
>> and allowed DNS/IP naming rules (which can turn into name constraints on
>> the intermediate).
>>
>> This works for us because creating new intermediate CA is easy to do in
>> our model. Also, we require EAB tokens on all ACME requests, and we
>> scope those tokens to specific SubCAs. This means clients effectively
>> pick a profile by picking a SubCA when creating EAB tokens.
>>
>> So we have something similar that works well for us today. But even so,
>> there are a whole bunch of business reasons I could go into about why we
>> would like to see a standardized profile concept. A lot of the reasons
>> probably aren't relevant to public CAs though, so I'll stick with my
>> thoughts related to public CAs.
>>
>> The "combinatorial explosion" of profiles seems like a bigger issue for
>> client authors and end users than for the CAs. If i'm trying to setup
>> multi-CA resiliency, today I only have to add some fallback directory
>> URLs and duplicate the manual or automated work to fulfill challenges.
>> But with profiles, does that mean I have to go to each CA and figure out
>> the right set of profiles? I don't like the added friction of having to
>> manually perform this intersection of policies.
>>
>> I think Rufus' idea about allowing profiles to point to other CAs could
>> address some of the "combinatorial explosion", but it could also
>> introduce centralization.  What happens when a CA hosting a popular
>> profile disappears? Or makes changes to the profile?
>>
>> >From an end user's perspective, picking a profile is a lot like
>> requesting a set of capabilities. Maybe there is a way to encode these
>> capabilities in a logic programming language. Something along the lines
>> of Biscuits[1], which has the nice properties of immutability and
>> attenuation. Making the profile object both resource and content
>> addressable could avoid "combinatorial explosion" without
>> centralization. And using machine readable logic language programs as
>> the standard format for profile objects could allow for "flags" without
>> some of the drawbacks that Matt brought up.
>>
>> [1] https://www.biscuitsec.org/
>>
>> Cheers,
>> -Ben
>>
>> On Wed, Aug 30, 2023 at 6:21 PM Aaron Gable
>> <aaron=40letsencrypt.org@dmarc.ietf.org> wrote:
>> >
>> > Hi ACME community,
>> >
>> >
>> > I believe it is time for us to seriously consider the topic of
>> “profiles”.
>> >
>> >
>> > For the purposes of this discussion, a profile is a collection of
>> characteristics which affect the contents of the final certificate issued
>> by an ACME CA. For example, two different profiles might cause certificates
>> to have different validity periods (e.g. 10 days vs 90 days), or different
>> EKUs (e.g. ServerAuth and ClientAuth vs ServerAuth only), or even be issued
>> from different intermediates.
>> >
>> >
>> > Historically, profile selection within ACME has been somewhat ad-hoc:
>> >
>> > The NewOrder request contains “notBefore” and “notAfter” fields which
>> allow clients to request certain validity periods, but other aspects of the
>> certificate cannot be customized and support for these fields is minimal.
>> Let’s Encrypt rejects requests which contain these fields, and Google Trust
>> Services recommends that they be omitted, because clients are likely to
>> request values which the server cannot respect (e.g. notBefore dates
>> unacceptably far in the past, violating BRs requirements regarding
>> backdating).
>> >
>> > The CSR contained in the Finalize request message can carry additional
>> information, but copying values directly from CSRs to final certificates
>> has been the root cause of many CA incidents, so great care must be taken.
>> Let’s Encrypt does use the presence of the “ocspMustStaple” extension in
>> the CSR to cause the inclusion of the same extension in the final
>> certificate, but this is the only attribute we extract from the CSR and
>> frankly we’d rather not even do that much.
>> >
>> > I’m aware of one CA which uses url query parameters to control aspects
>> of the certificate profile. The client specifies query parameters in its
>> configured directory URL, the directory object reflects those same
>> parameters back in its newOrder URL, and then the newOrder endpoint
>> processes those query parameters to affect the certificate profile.
>> >
>> >
>> > Recently there has been an uptick in interest in profile selection in
>> ACME. For example, the recent PQC negotiation thread is largely an exercise
>> in profile selection. There’s also been significant discussion on the Let’s
>> Encrypt community forum, largely prompted by the desire for more control in
>> intermediate selection. Let’s Encrypt itself is interested in formalizing
>> profile selection so that we can make backwards-incompatible changes to our
>> current issuance profile without breaking clients. And of course I’ve
>> spoken with other CAs who are interested in the same.
>> >
>> >
>> > Therefore I believe it is time for ACME to grow support for some form
>> of profile selection. As argued above, I don’t think that the Finalize CSR
>> is a good format for this, so something will need to be added to the ACME
>> protocol itself. I propose the following very simple change:
>> >
>> >
>> > 1. The directory’s meta object gains a new “profiles” sub-object, whose
>> keys are short profile name strings (such as “default” or “rsa 2023”) and
>> whose values are human-readable descriptions of those profiles (such as
>> “our standard profile, but with a validity period of only 10 days” or a URL
>> pointing at more verbose documentation).
>> >
>> > 2. The Order object gains a new “profile” field, which can be set in
>> NewOrder requests, or will be set automatically by the Server according to
>> its own server policy if no recognized profile is requested.
>> >
>> >
>> > In some of the discussions mentioned above, much more complex systems
>> have been proposed. These systems would establish a format for a CA to
>> advertise every individual adjustable field and all values each field can
>> take. Clients would then have the ability to both tightly customize the
>> certificate they request, and to compare the offerings of multiple CAs to
>> select the one that most closely matches their operator’s preferences.
>> However, I believe that such a complex system would ultimately be largely a
>> failure, as most operators would not have complex desires to express, most
>> clients would not implement complex configuration mechanisms to allow
>> operators to do so, most CAs would not advertise directly-comparable sets
>> of attributes, and if we attempted to standardize the set of advertisable
>> attributes we would inevitably fail to anticipate actual needs.
>> Additionally, we’ve seen from TLS algorithm negotiation itself that it is
>> better to offer a few well-studied options than to allow (poorly configured
>> or misinformed) clients to pick-and-choose from a wide variety of options.
>> >
>> >
>> > Therefore I believe that this simple approach is best. It will be easy
>> for both clients and servers to adopt. It will allow CAs to offer
>> well-vetted profiles for clients who need specific attributes. And it will
>> allow CAs to preview upcoming profile changes to clients that want to opt
>> in and to gracefully evolve profiles over time.
>> >
>> >
>> > We are already working on a draft which formalizes the proposal above,
>> and hope to implement a version of this in the near future to facilitate
>> the evolution of our own issuance profile. We’d love to hear all of your
>> thoughts before we embark down this path!
>> >
>> >
>> > Thanks,
>> >
>> > Aaron
>> >
>> > _______________________________________________
>> > Acme mailing list
>> > Acme@ietf.org
>> > https://www.ietf.org/mailman/listinfo/acme
>>
>> _______________________________________________
>> Acme mailing list
>> Acme@ietf.org
>> https://www.ietf.org/mailman/listinfo/acme
>>
> _______________________________________________
> Acme mailing list
> Acme@ietf.org
> https://www.ietf.org/mailman/listinfo/acme
>