Re: [Anima] [Iot-onboarding] Device Certificate Deployment Automation with ACME using BRSKI

"Owen Friel (ofriel)" <ofriel@cisco.com> Tue, 06 August 2019 13:05 UTC

Return-Path: <ofriel@cisco.com>
X-Original-To: anima@ietfa.amsl.com
Delivered-To: anima@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EE856120182; Tue, 6 Aug 2019 06:05:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level:
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=h8zbGema; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=usSMb//+
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gozgpRjbRcdd; Tue, 6 Aug 2019 06:05:29 -0700 (PDT)
Received: from alln-iport-3.cisco.com (alln-iport-3.cisco.com [173.37.142.90]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4B98C12013E; Tue, 6 Aug 2019 06:05:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=35545; q=dns/txt; s=iport; t=1565096729; x=1566306329; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=Qj6K71pRIp2teNpXMhSYBUCEQheaeEV0PEIJvDIgfOA=; b=h8zbGemaCXlX928mRkGm9bxxcEyF3CnfjF5WpY8E+OtsPcfDfHApRouN yU7PmCZ324hWDSwYV3cJ05C+604szpRZz5rXo96yzI152NTo5uBLjfxe5 cOGkAd2f3KOWa9rxxiyiUluYarLL5+Y4FGrD1OYPEd05a3NayzEX+kpTB c=;
X-Files: draft-friel-brski-cloud.md : 16965
IronPort-PHdr: 9a23:aGYHxxHpOvQ9xyVacsROrZ1GYnJ96bzpIg4Y7IYmgLtSc6Oluo7vJ1Hb+e4w3Q3SRYuO7fVChqKWqK3mVWEaqbe5+HEZON0pNVcejNkO2QkpAcqLE0r+efnkdS03GOxJVURu+DewNk0GUMs=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0CNAABiekld/4UNJK1mHAEBAQQBAQcEAQGBUwcBAQsBgRUvJCwDbVUgBAsqCoQUg0cDhFKGXkyCD5MEhFeBLoEkA1QCBwEBAQkDAQEtAgEBhD8CF4InIzQJDgEDAQEBBAEBAgEGbYUnDIVKAQEBAQMSEQoTAQE4DwIBCBEEAQErAgICMB0IAgQBEggGDQeDAYEcTgMdAQKhCQKBOIhgcYEygnoBAQWFDBiCDAcJgTQBgVCIUYFBF4FAP4ERRoIeLj6ERoMJMoImjCKCaIUGgQQJlg8JAoIcgy2CII5vmCyEGokvl3ICBAIEBQIOAQEFgVA4gVhwFYMngkI3gzqKU3KBKYwKAYEgAQE
X-IronPort-AV: E=Sophos;i="5.64,353,1559520000"; d="md'?scan'208,217";a="313474558"
Received: from alln-core-11.cisco.com ([173.36.13.133]) by alln-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 06 Aug 2019 13:05:28 +0000
Received: from XCH-ALN-016.cisco.com (xch-aln-016.cisco.com [173.36.7.26]) by alln-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id x76D5SrJ026846 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 6 Aug 2019 13:05:28 GMT
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by XCH-ALN-016.cisco.com (173.36.7.26) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 6 Aug 2019 08:05:27 -0500
Received: from xhs-aln-002.cisco.com (173.37.135.119) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 6 Aug 2019 08:05:26 -0500
Received: from NAM01-BN3-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Tue, 6 Aug 2019 08:05:26 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=M+Gu2GK2dJFkHn/mWPGp0V2XFhv+M0+wKDo5ZA+Hf1br/pcbNdyDyIUcBEPYIA59u93bcRSIb6nNx9BPhxV9QOK7ptkvTWgHQofMWJ7z02BOzZOemfHkDNBG46yeV27mtQk5ewjNSQ6tFPHILbxCQ4dVPvZHMinzGad1zGvVfpkE96gE+rPzSUwp4hpJ+aSatUFfUMk0li2fO99Ry7/iyfUddb4gXQKJZWL+3olIxG1j0ErqBPRjN8cMNRKTUHN0XB/L+bmHmsmUqps0Cizs8F1xTcSqHYmdYsV5FQphi3cSmokxwaDCU8/6C4QIk64F7kZfeW2nyIJEs115zH5hvA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0dHXpNmefEH9eMb80vfzhOeAfaxq59lx3O3mIaX3yQY=; b=MZbGyMTpIaChqLkWNt1gOmPKGU+P2QR8Xq2oPkYfukY00YCIhz9w3VzkpH9tuOi4VhicoJUyXdZNs6QNn9GKqF3cqA56t8oVSJedDPm2HVyfcuR+cdqSEhBbUgpp8vrpzkFrconIHDAshFXhpxyPWLDu5C+/MaZjHPLPFGEDpKT7lQfsgB9ORniF8Ivsuisdyw6pN72/3ML4X6IMJrR5WOv3wkXkZ0ii4+nrEPtFVgZbKE2CybDnaxRSlDpFqSq/lSOoW9b0eTvjV+VjFnxh9gos63kblN7VjU+teX0rqsvSgwn077AawrnhDJpvyEPHcwb7bOmZwOF04YnLAgnwgQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=cisco.com;dmarc=pass action=none header.from=cisco.com;dkim=pass header.d=cisco.com;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0dHXpNmefEH9eMb80vfzhOeAfaxq59lx3O3mIaX3yQY=; b=usSMb//+U3PfyJzUfSrkBXrSb4E+uAfm7hqobpK0WjuuRbgfZfRd+9p091x0Ovar2/r2NCrkQqE8l6OUXC7lTVt1he+G8qYg+SdGelUguCa28GemlaS4TbCR9BF9o7EY0aEqoI/3925t6or0dVa6LZ/MbfxqsV7nbElIEX6k5ig=
Received: from DM6PR11MB3385.namprd11.prod.outlook.com (20.176.123.12) by DM6PR11MB3737.namprd11.prod.outlook.com (20.179.16.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2136.13; Tue, 6 Aug 2019 13:05:25 +0000
Received: from DM6PR11MB3385.namprd11.prod.outlook.com ([fe80::21d7:6788:7090:d0ae]) by DM6PR11MB3385.namprd11.prod.outlook.com ([fe80::21d7:6788:7090:d0ae%7]) with mapi id 15.20.2115.005; Tue, 6 Aug 2019 13:05:24 +0000
From: "Owen Friel (ofriel)" <ofriel@cisco.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, "anima@ietf.org" <anima@ietf.org>, "iot-onboarding@ietf.org" <iot-onboarding@ietf.org>
Thread-Topic: [Iot-onboarding] Device Certificate Deployment Automation with ACME using BRSKI
Thread-Index: AQHVSV2H3NB63QcBKUu8AXFFCSgthabuGrdw
Date: Tue, 06 Aug 2019 13:05:24 +0000
Message-ID: <DM6PR11MB3385FD834E826E25160B53AADBD50@DM6PR11MB3385.namprd11.prod.outlook.com>
References: <CAGL6epJRmAvDB4=M6RiQaC93wvy1XDgcbhOmuKUtqmEhBWC72w@mail.gmail.com>
In-Reply-To: <CAGL6epJRmAvDB4=M6RiQaC93wvy1XDgcbhOmuKUtqmEhBWC72w@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=ofriel@cisco.com;
x-originating-ip: [64.103.40.24]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: c458845f-376d-4475-06aa-08d71a6ebef0
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(49563074)(7193020); SRVR:DM6PR11MB3737;
x-ms-traffictypediagnostic: DM6PR11MB3737:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <DM6PR11MB373708BEDC981F5F37372866DBD50@DM6PR11MB3737.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0121F24F22
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(346002)(39860400002)(136003)(366004)(396003)(376002)(199004)(189003)(52536014)(81156014)(8676002)(478600001)(6436002)(81166006)(11346002)(256004)(7736002)(5024004)(9686003)(2501003)(74316002)(6306002)(54896002)(55016002)(33656002)(53936002)(8936002)(71200400001)(71190400001)(14454004)(66066001)(66556008)(66476007)(66616009)(476003)(64756008)(66446008)(66946007)(76116006)(25786009)(229853002)(110136005)(5660300002)(486006)(2906002)(316002)(99286004)(6506007)(53546011)(6246003)(2201001)(186003)(68736007)(86362001)(446003)(76176011)(3846002)(102836004)(6116002)(790700001)(7696005)(99936001)(26005); DIR:OUT; SFP:1101; SCL:1; SRVR:DM6PR11MB3737; H:DM6PR11MB3385.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: ZJta8tqk8HsJpSlK1y+P4UCU8Ujzo0JNBa79Lh2PAZYsLKlhiYI9DO+jZ5Max7HvXkblhBZXZu7ihQM2UmpW0KJfsYMuHKJ52ZuCc/ZAz4m7FIcyqJrL2CHZTCGZZmlXbKUtGplpJW8ZNeT5Do2UFKJ4eN3jzaSh4P7WeQ4vzXucWXatu6RoTQENOx40oAWQNObbL49dPCI4NIqYSY96bRPYnlouX0I952VFW+tK1RP9X3JdQYd+jXBT4/Q3MdJ+zJUXg067FWbik+XE9FZzHg0cgzAiExTMnrtJ0l4pIrVe187jPzdySZTRMioaetBMhJDN0blBV57VRUWq36ZB2SzXlb0Ssg60TJti/pMyuLgqxG3yt7FrUnh+zWtaOX9tGHnDnpmhPbRlVSnd0hk2wAAu+aTvPX5TaVWDSd5Y4/Y=
Content-Type: multipart/mixed; boundary="_004_DM6PR11MB3385FD834E826E25160B53AADBD50DM6PR11MB3385namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: c458845f-376d-4475-06aa-08d71a6ebef0
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Aug 2019 13:05:24.7621 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ofriel@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR11MB3737
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.26, xch-aln-016.cisco.com
X-Outbound-Node: alln-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/anima/23Fv6pRuoFrazLy_Yotcn4eXW6M>
Subject: Re: [Anima] [Iot-onboarding] Device Certificate Deployment Automation with ACME using BRSKI
X-BeenThere: anima@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Autonomic Networking Integrated Model and Approach <anima.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/anima>, <mailto:anima-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/anima/>
List-Post: <mailto:anima@ietf.org>
List-Help: <mailto:anima-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/anima>, <mailto:anima-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Aug 2019 13:05:32 -0000

Hi guys,

After the meeting and from corridor conversations with Toerless, I had actually already started on such a draft.

What I have started so far is attached. Its not on a public repo yet, but will put it there. You are already named on it Rifaat, happy to add you too Michael and you can help figure out some of the open redirect options outlined in it ☺

My high level thoughts on this were to keep the ACME specifics out of the draft, and use the draft to define the cloud RA behaviour, and the pledge behaviour when interacting with the cloud RA, and the various cert, CA, TLS, redirect, etc. details. The fact that the RA (whether cloud or local) *may* use ACME to talk to the CA is transparent to the pledge.

I was thinking that the ACME specifics could be covered in a different draft based on merging draft-yusef-acme-3rd-party-device-attestation and draft-friel-acme-integrations, but leave the BRSKI clarifications/specifics in this one.

Thoughts?
Owen




From: Iot-onboarding <iot-onboarding-bounces@ietf.org> On Behalf Of Rifaat Shekh-Yusef
Sent: 02 August 2019 19:09
To: anima@ietf.org; iot-onboarding@ietf.org
Subject: [Iot-onboarding] Device Certificate Deployment Automation with ACME using BRSKI

All,

During the last IETF meeting in Montreal we had a side meeting to discuss the
deployment automation of ACME issued certificates to devices, and the potential
use of the BRSKI mechanism to help with this. It was clear from the discussion
that BRSKI can be used to help address this use case, and that further discussion is
needed to define the needed enhancements to BRSKI.

The current BRSKI mechanism only briefly discusses the Cloud Registrar option in
section 2.7, which could be used to help address this use case.

Michael Richardson and I had another meeting over lunch yesterday to further
discuss this and we decided to work on a new draft to describe the issue and
define a solution.

Because of vacations and other commitments, we will try to publish the first
version of the draft early October.

Regards,
 Rifaat & Michael