Re: [Acme] AD review of draft-ietf-acme-authority-token-05

Roman Danyliw <rdd@cert.org> Tue, 26 October 2021 15:17 UTC

Return-Path: <rdd@cert.org>
X-Original-To: acme@ietfa.amsl.com
Delivered-To: acme@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 062213A12AD; Tue, 26 Oct 2021 08:17:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=seicmu.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X1Jzz3-lAZGV; Tue, 26 Oct 2021 08:17:51 -0700 (PDT)
Received: from USG02-BN3-obe.outbound.protection.office365.us (mail-bn3usg02on0097.outbound.protection.office365.us [23.103.208.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A08103A12A7; Tue, 26 Oct 2021 08:17:50 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector5401; d=microsoft.com; cv=none; b=hNQ7FTyz5QgO8hpyhUz/FQWJVLHYG77ssP2fxZ3k9ESSZJ+GsE3PN4pcmgYnRit5bGr2hFFqD3yjeUhpD9FirVI+3Ugf1zpOozHGOJX+1VEJEXGgkWIRCWACtgLN5MWAp+PHGlkO5jikOZAFKohECvICTt1GFeYBaH4y9vH0W3i5doBbIkx8qGM4AuAujpElqAjKeBMvic03wULJk4EIle0m56HsRD8ijJofs7eWWFNF9J0It85Btd8KpUqeRa5+r9Ms7Bi/KXEKuTafMiQ8flxrCChGl4yxeSe285vIrWAb9b9blEFO8niTUO7X7+jw9r/JHL/+3y9/R4Z7SKxwxw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector5401; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=/08ztio6jfWuFipTyXpFQmROr8RL6ackHSDf8YTB44k=; b=Esy6+l8GS+7kDozfHsm1fCSwltUmMMSNhystx6jaMrpZIpmFHSONVA7+ctaW2FrTUB0VwQTIsJdhTERgFUCWVfZGEgBc10VWc1QgjjWo13C2KVONOHRxUOQwwyiFjm4XICuREimvrckh6qyLM3dhZP8uSsVC6aAelgC4uJ0FxiISRHLHkm65HlcsL1O1pOTxRJWFH8T7wavfZvZGfzR14j4HipygmU59FkJLH86rgctK2qb87OhSae2laC49FuwUBFas4t8Qta+E+bLXgLIihKzNbeST9yDjYPh/v+y/0pISGYdaciAPq/lRs35fT+B8sYiIeHoapRHgTTxJrFRLQQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cert.org; dmarc=pass action=none header.from=cert.org; dkim=pass header.d=cert.org; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=seicmu.onmicrosoft.com; s=selector1-seicmu-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/08ztio6jfWuFipTyXpFQmROr8RL6ackHSDf8YTB44k=; b=SqnDGAleWFXhuohrHv1T+lKRumATmVPXeFbZ6qvNEf/bicN9tmKTJ9ZMENw1AxsgdYfwIn8K7mhng2rE7ig2jqSNQrac1MS4bBJZfD5Ofwl3EZyIJcFFA4N7RXE45Ad3OABQSVq+GKIJ7MMx0XhHYJ2A4dV6wNxejwLSJiEdpZg=
Received: from BN1P110MB0939.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:134::12) by BN1P110MB0577.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:135::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4628.16; Tue, 26 Oct 2021 15:17:47 +0000
Received: from BN1P110MB0939.NAMP110.PROD.OUTLOOK.COM ([fe80::4463:48d1:9769:567f]) by BN1P110MB0939.NAMP110.PROD.OUTLOOK.COM ([fe80::4463:48d1:9769:567f%6]) with mapi id 15.20.4628.020; Tue, 26 Oct 2021 15:17:47 +0000
From: Roman Danyliw <rdd@cert.org>
To: "Peterson, Jon" <jon.peterson@team.neustar>, "acme@ietf.org" <acme@ietf.org>
CC: "draft-ietf-acme-authority-token@ietf.org" <draft-ietf-acme-authority-token@ietf.org>
Thread-Topic: [Acme] AD review of draft-ietf-acme-authority-token-05
Thread-Index: AQHW6ejlOEYeQcveQkikId7N6kJ3Waq2j80AgCoPh8CAW30v8IAEfNGAgAtGD2CAmbKdAIABkmcA
Date: Tue, 26 Oct 2021 15:17:47 +0000
Message-ID: <BN1P110MB09394A5E71A61C56FB860705DC849@BN1P110MB0939.NAMP110.PROD.OUTLOOK.COM>
References: <9FF54993-6265-49F5-9663-63A99DB7762B@akamai.com> <5bcc3911ebce4a78a26a98df1575210d@cert.org> <cf930a798fcd433c889a61ca16f0a3d0@cert.org> <DM3P110MB05386DAABC8EAFF8FF322ECFDC189@DM3P110MB0538.NAMP110.PROD.OUTLOOK.COM> <DE0959B4-84DC-40AE-A13D-40C8F79D9E4E@team.neustar> <DM3P110MB053877433E71A708207C539CDCEA9@DM3P110MB0538.NAMP110.PROD.OUTLOOK.COM> <1616EA83-A3CC-425E-A8EB-A9C682E3FD9D@team.neustar>
In-Reply-To: <1616EA83-A3CC-425E-A8EB-A9C682E3FD9D@team.neustar>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: team.neustar; dkim=none (message not signed) header.d=none;team.neustar; dmarc=none action=none header.from=cert.org;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: cb272ff3-eed8-4300-94bf-08d99893c468
x-ms-traffictypediagnostic: BN1P110MB0577:
x-microsoft-antispam-prvs: <BN1P110MB0577954D11DEFD6C88E42B45DC849@BN1P110MB0577.NAMP110.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN1P110MB0939.NAMP110.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(366004)(82960400001)(71200400001)(122000001)(7696005)(55016002)(8936002)(53546011)(4326008)(498600001)(64756008)(66556008)(83380400001)(66446008)(9686003)(5660300002)(66476007)(52536014)(6506007)(76116006)(110136005)(38070700005)(2906002)(186003)(86362001)(26005)(8676002)(66946007)(33656002)(38100700002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: cert.org
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN1P110MB0939.NAMP110.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: cb272ff3-eed8-4300-94bf-08d99893c468
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Oct 2021 15:17:47.1758 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 95a9dce2-04f2-4043-995d-1ec3861911c6
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN1P110MB0577
Archived-At: <https://mailarchive.ietf.org/arch/msg/acme/lDSWlq5BcH8uq9dxZ1SeQ_jx-Vs>
Subject: Re: [Acme] AD review of draft-ietf-acme-authority-token-05
X-BeenThere: acme@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Automated Certificate Management Environment <acme.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/acme>, <mailto:acme-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/acme/>
List-Post: <mailto:acme@ietf.org>
List-Help: <mailto:acme-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/acme>, <mailto:acme-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Oct 2021 15:17:56 -0000

Hi John!

Thanks for these changes in -07 and the clarifications you made below (that didn’t results in changes in text).  All of my feedback is addressed.  I've advanced this document to IETF LC.

After it's through, my plan is to put both this document and draft-ietf-acme-authority-token-tnauthlist on the same IESG telechat for review.

Regards,
Roman

> -----Original Message-----
> From: Peterson, Jon <jon.peterson@team.neustar>
> Sent: Monday, October 25, 2021 3:14 PM
> To: Roman Danyliw <rdd@cert.org>; acme@ietf.org
> Cc: draft-ietf-acme-authority-token@ietf.org
> Subject: Re: [Acme] AD review of draft-ietf-acme-authority-token-05
> 
> 
> Hi Roman,
> 
> With my characteristic alacrity, here are some update notes inline on the
> authority-token draft:
> 
> On 7/27/21, 10:00 PM, "Roman Danyliw" <rdd@cert.org> wrote:
> 
>     Thanks for this clean-up.  Are you use that you need the downref to RFC
> 8396?  It's use in the document seems to be for illustrative purpose.
> 
> [JFP] True, we don't need this to be normative - moved to informative.
> 
>     > We've taken the tack you suggest above of clarifying that this requirements
>     > need to be satisfied by a combination of authority-token and its tkauth
>     > subtypes.
> 
>     Thanks for these updates.  One remaining thing -- this document seems to be
> defining and registering the “atc” claim (as in this is the base reference for the
> claim).  However, no guidance is provided on how to compute the fingerprint.
> On the other hand, Section 5.4 of draft-ietf-acme-token-tnauthlist covers this
> topic in depth.  Is there one fingerprint computation method for all
> instantiations of the atc claim, or does the procedure vary by the selected
> tktype.  If it’s the former, then the fingerprint computation needs to be here or
> a normative reference is needed to the tnauthlist.  If the method varies by the
> tktype, then please explicitly state that.
> 
> [JFP] I believe the draft is explicit that it varies by tktype - see section 4, "the
> specification of how the binding is generated is left to the identifier type profile
> for the Authority Token."
> 
>     >     > > >
>     >     > > >     ** Section 4.  Should the values of tktype be constrained to the
>     >     > > > IANA "ACME Identifier Types" registry?
>     >
>     > This is another one where I don't have a super strong feeling... it would
>     > certainly be helpful if it were, but it doesn't seem like it's worth normative
>     > language to that effect.
> 
>     I personally do feel that constraining the values of the tktype to some
> defined set of code points would be helpful and that there would be an
> identifier-to-atc sub-field mapping.  However, if the WG doesn’t want to do
> that, then minimally we need some text here saying that the ACME client will
> somehow know how to populate the atc sub-fields (and which ones) based on
> local configuration or declare out it knows it as out of scope.
> 
> [JFP]  Okay, not a problem - added, and when the tnauthlist draft goes forward,
> then "TNAuthList" will appear in that registry, and it probably makes sense that
> any future things would as well. But this brings us to the tough one...
> 
>     >     > > >     ** Section 8.  This text registers "atc" as an ACME identifier.
>     >     > > > When and how is that used?  I thought that identifier profiles
>     >     > > > specified an identifier and that the atc what the
> challenge/verification
>     > type.
>     >
>     > This was a point of misalignment with tnauthlist; we've rectified that by
>     > deleting this "atc" ACME identifier.
> 
>     The inter-relationship between the ACME identifier and validation registries
> still doesn’t appear to be threaded.  Note:
> 
>     (a) Section 9.7.8 of RFC8555 says the following about the Validations
> Method registry:
> 
>        The
>        "Identifier Type" field must be contained in the Label column of the
>        "ACME Identifier Types" registry.
> 
>     (b) The current (-06) text in Section 7 says:
> 
>        This document requests that IANA populate a new ACME Validation
>        Method (again per [RFC8555]) for the label "tkauth-01", identifier
>        type "atc", an ACME value of "Y", and a reference pointing to
>        [RFCThis].
> 
>     The current text noted in (b) is using an identifier type of “atc” but (a)
> explicitly says that only identifier types in the Identifier registry are permitted
> there.  Shouldn’t the identifier type read “TNAuthList” (that’s registered in the
> draft-ietf-acme-authority-token-tnauthlist)?  "atc" isn't a valid ACME identifier
> type to include in the new order request ("atc" is a tkauth-type).  The end-to-
> end example in Section 4 draft-ietf-acme-authority-token-tnauthlist suggests
> that.
> 
> [JFP] Um, correct, the threading here still wasn't right. That is fixed. I also fixed
> a little corresponding text up at the end of Section 3 that I hope clarifies a bit.
> 
>     Because the new validation method and new identifier each reference each
> other, but are in separate documents, we have a circular dependency this first
> time (which isn’t necessarily problem, we can handle that with a “RFC
> cluster”).  Subsequent identifiers using this challenge won't have that issue.
> 
> [JFP] Yes, historically because of the way the draft evolved, we've ended up
> with circular dependencies between these documents that requires them to
> progress together.  The text I added makes that a bit clearer, I hope - again, I'm
> kind of patching some problems that arose because of how we separated the
> drafts.
> 
>     Editorially, this entire IANA section would be clear if each distinction ask to
> IANA was a separate section.  I’m sharing this in advance because this has been
> a consistent COMMENT provided another AD across a few documents in the
> IESG review process.
> 
> [JFP]  That is implemented in the new version.
> 
> Thanks for the notes again Roman!
> 
> Jon Peterson
> Neustar, Inc.
> 
>     Regards,
>     Roman
> 
>