Re: [Anima] rfc822Name use in Autonomic Control Plane document

Eliot Lear <lear@cisco.com> Thu, 18 June 2020 16:37 UTC

Return-Path: <lear@cisco.com>
X-Original-To: anima@ietfa.amsl.com
Delivered-To: anima@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 156483A0940 for <anima@ietfa.amsl.com>; Thu, 18 Jun 2020 09:37:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.6
X-Spam-Level:
X-Spam-Status: No, score=-9.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FTHw3LBUb4Dg for <anima@ietfa.amsl.com>; Thu, 18 Jun 2020 09:37:27 -0700 (PDT)
Received: from aer-iport-3.cisco.com (aer-iport-3.cisco.com [173.38.203.53]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 045153A0941 for <anima@ietf.org>; Thu, 18 Jun 2020 09:37:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=43582; q=dns/txt; s=iport; t=1592498247; x=1593707847; h=from:message-id:mime-version:subject:date:in-reply-to:cc: to:references; bh=A+mq7NSJ2Uu5ylRQJQSQqxFQ6UUqXUtdY+KmCnkVutk=; b=Yx5NZomA7ks0UDbMo36M4fyLSX6/W/93q5Ut/zpdI36eqsrHFd/nxnoS TqzYm3S3Gytt+V1Cn4aN/XxwzwoVWTuQ7BMjzIHU93QYCs1iN6iMvdAM4 qPvtMD29e5/4xSskIxlxbCRMy77Mj43iCNyd4AU00SgPutKvPyYj/PA2g g=;
X-IPAS-Result: A0BeAABVl+te/xbLJq1mDgsBAQEBAQEBAQEBAQEBAQEBAQESAQEBAQEBAQEBAQEBggoCgSEBgXVUASASLIQkiQGICIMQmGgFCwEBAQwBARgBDAoEAQGBUIJ0AoInJTgTAgMBAQEDAgMBAQEBBQEBAQIBBgRthVsMQgEQAYUeAQEBAQMBASFIAwsQCxcBIAEJAgInKAgGExuDCwGCfA+3MXaBMoQ6AQMCgRGFN4E4AYtAgTiCAIERJxyBfSIuPoIjOQEBAgGBMxGDLDOCCyIEjnKCdocam0mCZIMChUCQZQMdgnCBF4gIkmSZZYFSkFuDTgIEBgUCFYFAKiKBVjMaCBsVOyoBggoBMwk1EhkNjioXg06FFIUEQD8DMAILKgIGAQcBAQMJhg2IHgImB4IXAQE
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos; i="5.75,251,1589241600"; d="scan'208,217"; a="24824969"
Received: from aer-iport-nat.cisco.com (HELO aer-core-4.cisco.com) ([173.38.203.22]) by aer-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 18 Jun 2020 16:37:22 +0000
Received: from ams3-vpn-dhcp4671.cisco.com (ams3-vpn-dhcp4671.cisco.com [10.61.82.62]) by aer-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id 05IGbLtI008515 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 18 Jun 2020 16:37:22 GMT
From: Eliot Lear <lear@cisco.com>
Message-Id: <DF7CE76D-32AE-4BBB-B97E-EC7FAABB8565@cisco.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_DCC78DC6-BAF6-486B-A4E4-AA85FA11BCB4"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\))
Date: Thu, 18 Jun 2020 18:37:20 +0200
In-Reply-To: <20200617024412.GA11992@kduck.mit.edu>
Cc: Brian E Carpenter <brian.e.carpenter@gmail.com>, Michael Richardson <mcr+ietf@sandelman.ca>, sean+ietf@sn3rd.com, Russ Housley <housley@vigilsec.com>, anima@ietf.org
To: Benjamin Kaduk <kaduk@mit.edu>
References: <11428.1592266833@localhost> <a0face89-da68-f75d-4a57-4deb9d0f244d@gmail.com> <20200617024412.GA11992@kduck.mit.edu>
X-Mailer: Apple Mail (2.3608.80.23.2.2)
X-Outbound-SMTP-Client: 10.61.82.62, ams3-vpn-dhcp4671.cisco.com
X-Outbound-Node: aer-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/anima/q2Evub5VeFLZfqN6H-t74nqf98U>
Subject: Re: [Anima] rfc822Name use in Autonomic Control Plane document
X-BeenThere: anima@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Autonomic Networking Integrated Model and Approach <anima.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/anima>, <mailto:anima-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/anima/>
List-Post: <mailto:anima@ietf.org>
List-Help: <mailto:anima-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/anima>, <mailto:anima-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Jun 2020 16:37:30 -0000

Ok, so I just want to add that I have been able to populate otherName with garbage and have it get signed by a public CA.  My point is that at least some public CAs are loose.  If LE is important to this space, and if it’s really important, then this is not a solution.  Anyway, Here was the line that I used for my jabber server (it’s certainly not correct):

subjectAltName = DNS:www.ofcourseimright.com,DNS:upstairs.ofcourseimright.com,otherName:1.3.6.1.5.5.7.8.7;IA5:ofcourseimright.com,otherName:1.3.6.1.5.5.7.8.7;IA5:_xmpp-client._tcp.ofcourseimright.com,otherName:1.3.6.1.5.5.7.8.7;IA5:_xmpp-server._tcp.ofcourseimright.com,otherName:1.3.6.1.5.5.7.8.7;UTF8:ofcourseimright.com

And here’s what I got:

McNext> openssl x509 -noout -text -in jabber_ofcourseimright_com.crt 
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            58:12:20:cd:47:fe:82:af:35:8d:75:50:75:05:a6:cb
    Signature Algorithm: sha256WithRSAEncryption
        Issuer: C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA
        Validity
            Not Before: Jun 18 00:00:00 2020 GMT
            Not After : Jul 18 23:59:59 2020 GMT
        Subject: CN=jabber.ofcourseimright.com
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (2048 bit)
                Modulus:
                    00:9e:c8:c0:61:b6:5c:d1:fc:bf:2d:d2:13:6b:db:
                    97:09:45:e8:22:bf:89:24:7e:09:01:fe:91:37:85:
                    ee:25:77:54:92:68:05:07:d2:70:f5:6f:5c:fc:b4:
                    c6:7f:2d:e6:3e:11:68:4b:55:74:10:39:bc:1c:19:
                    3c:82:76:c1:76:ad:9b:6a:be:c3:be:35:dc:e5:5a:
                    48:95:2c:c9:9f:d7:68:c6:6f:83:b4:8d:c8:8a:0a:
                    b8:73:2e:10:c9:0e:a1:70:cb:a4:29:a0:b3:32:34:
                    72:69:9a:7d:20:35:9c:58:f1:a3:17:3f:fd:6f:22:
                    23:e5:58:24:65:56:38:51:6f:10:46:4b:77:fb:2d:
                    c9:5b:ca:db:8e:74:77:20:8b:b4:04:0a:63:75:03:
                    4c:be:19:9f:1f:9a:63:cd:9b:12:3e:b3:09:10:de:
                    d0:a1:d3:8b:bc:83:66:6a:4e:28:3c:5f:f7:ab:23:
                    a7:b6:da:46:59:21:eb:d7:ef:57:53:d8:72:be:55:
                    07:a5:95:c9:61:97:f7:39:c0:78:82:c0:1e:bd:53:
                    fc:ae:2c:6c:7a:c2:69:a0:c4:80:44:ac:b3:6b:f8:
                    01:fc:8f:ab:7e:8b:b8:24:0e:cd:7b:0e:74:94:77:
                    1c:4d:11:a2:d8:36:53:08:1a:d8:1b:fc:23:86:4c:
                    b3:f1
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Authority Key Identifier: 
                keyid:8D:8C:5E:C4:54:AD:8A:E1:77:E9:9B:F9:9B:05:E1:B8:01:8D:61:E1

            X509v3 Subject Key Identifier: 
                65:8C:F2:D4:46:7C:FB:D1:5E:62:BC:8C:70:B6:99:D0:95:4B:EB:98
            X509v3 Key Usage: critical
                Digital Signature, Key Encipherment
            X509v3 Basic Constraints: critical
                CA:FALSE
            X509v3 Extended Key Usage: 
                TLS Web Server Authentication, TLS Web Client Authentication
            X509v3 Certificate Policies: 
                Policy: 1.3.6.1.4.1.6449.1.2.2.7
                  CPS: https://sectigo.com/CPS
                Policy: 2.23.140.1.2.1

            Authority Information Access: 
                CA Issuers - URI:http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt
                OCSP - URI:http://ocsp.sectigo.com

            X509v3 Subject Alternative Name: 
                DNS:jabber.ofcourseimright.com, DNS:www.jabber.ofcourseimright.com
            1.3.6.1.4.1.11129.2.4.2: 
                ......v...\..}h.....#....W|W..j..a:.i......r.e.......G0E.!...f...R...r.S...w.E%.}.J.i.M..... )................!.0...L.e.fs.Z..w.....7~.b....a...{7.V..&[...K.ATn...r.e.:.....H0F.!....~...V.....5F.h.\C.....e.'57.{.!.. 8.I...8...U.Y........f._.6..bb
    Signature Algorithm: sha256WithRSAEncryption
         1c:0d:7b:38:be:c5:b5:58:8e:0e:d9:7d:c8:90:9d:ea:29:94:
         de:a7:a1:11:db:1e:b7:9c:f8:25:48:da:2d:87:2f:76:0b:f8:
         ba:2d:72:49:87:50:3e:e2:9b:2f:a4:ab:61:24:8c:6c:65:c1:
         91:16:c2:7e:50:27:50:93:a8:36:38:ad:66:c4:e4:66:ae:2f:
         21:40:8f:41:f7:53:51:61:80:59:a8:2a:56:9b:9b:e5:85:a4:
         8b:6e:31:0b:b8:ca:4d:82:af:2c:34:83:25:2b:fc:94:05:28:
         f6:04:f8:96:61:3c:21:9b:11:13:48:1d:c0:77:c0:df:d3:47:
         ff:6e:d3:6a:66:eb:16:40:d7:45:67:a0:25:1d:9f:fa:7f:85:
         20:34:08:70:b2:3b:d5:b4:15:77:9b:d5:c0:4e:08:99:ce:24:
         fb:6e:c3:4d:a9:fc:ff:25:d9:09:d0:cd:e1:8b:69:c1:bb:f0:
         40:0a:ad:1b:36:4f:ba:a0:aa:e9:f1:af:cd:73:5a:2a:0f:8a:
         0d:04:ca:52:85:10:eb:d9:fe:85:6c:a6:ae:a3:de:04:a7:9a:
         e0:8c:5d:40:b6:1f:f6:f2:b1:d9:dc:f2:f4:fd:a8:f5:b4:25:
         80:c0:ec:84:1f:bf:02:e6:3d:0c:ca:41:d5:61:d9:a3:a2:c8:
         a0:f2:46:3c


Eliot
> On 17 Jun 2020, at 04:44, Benjamin Kaduk <kaduk@mit.edu> wrote:
> 
> Hi Brian, Michael,
> 
> On Tue, Jun 16, 2020 at 02:14:24PM +1200, Brian E Carpenter wrote:
>> On 16-Jun-20 12:20, Michael Richardson wrote:
>>> 
>>> Hi, I have had a few conversations with Toerless who is trying to deal with
>>> the feedback on the ACP document.
>>> 
>>> An item that has come up is the use, or claimed abuse of the rfc822Name SAN.
>>> 
>>> We already had this debate.
>>> Some time ago.  The WG decided.
> 
> With all due respect, this is not the sole decision of the ANIMA WG to
> make.  If WGs had such authority then why bother with cross-area review?
> 
>>> Three or four years ago, I think.
>> 
>> Yes, this is relitigating an issue that was resolved a long time ago in discussing Ben's DISCUSS:
> 
> I'm not sure I understand why you use the word "resolved" here:
> 
>> https://mailarchive.ietf.org/arch/msg/anima/lnZ-ykqas487qih86sYNVsUGbsc
> 
> In this message, I say that "I still feel like this is not the best
> architectural choice" and that I will provide a sketch of an alternative in
> my (then-)forthcoming ballot position; that ballot position retains the
> Discuss-level concern about rfc822Name usage along with the promised
> alternative.
> 
>> The explanation is at https://tools.ietf.org/html/draft-ietf-anima-autonomic-control-plane-24#page-26
> 
> I appreciate that the attempted justification is clearly written; however,
> I do not find it compelling.  Russ did not, either, and I just heard back
> from Sean Turner a few days ago to confirm that he supports Russ's
> comments.  (There should be a few other editorial-ish comments that came
> out of that review that are still pending.)
> 
>> I believe it is incorrect IETF process to rediscuss this point yet again.
> 
> (I'm not sure if the "yet again" refers to "after the WG decided" or "after
> the (alleged) resolution of my first Discuss point".)
> 
> If you believe the technical answer is clear and that I am in error to
> continue to hold my Discuss point for it, are there not also clear IETF
> processes to follow?  E.g., asking for the "Single Discuss" ballot procedure
> described at https://www.ietf.org/standards/process/iesg-ballots/?  I
> believe I have mentioned this option to Toerless previously; my apologies
> if that is not the case.  While I'm willing to continue discussing the
> topic and pull in additional PKIX experts to weigh in, there is perhaps
> some consideration to matters of expediency.
> 
>>> 
>>> I sure wish that we could use something else.
>>> But, CAs and CA software make that very difficult.
>>> 
>>> Given that the era of publically anchored Enterprise CAs is dead, there are
>>> only two ways an (Enterprise) ACP Registrar is going to occur.
>>> 
>>> 1) by running a private CA.
>>>   Sure anything is possible if you are writing your own code, but
>>>   most will not be doing that. (I've supported otherName in my code for
>>>   other purposes, and it's not that difficult, but it's not trivial either)
>>>   My experience with COTS CA systems it that it's really hard to
>>>   get them to do it.    Please prove me wrong.
> 
> (Sadly, I have zero experience with COTS CA systems; I know too much about
> openssl at this point and would presumably be writing my own, in this
> position.)
> 
>>>   The most popular Enterprise CA software is the Microsoft CA.
>>> 
>>> 2) by using ACME to speak to a hosted CA.  Maybe WebPKI, maybe not.
>>>   Either way, getting otherName supported is even harder, because
>>>   nobody else uses it.
> 
> Is the concern the ACME protocol support or just getting the hosted CA to
> cope with it?  The former seems like something that we could make happen in
> the IETF, and the latter seems to have high overlap with point (1).
> 
>>> If we can't depend upon otherName being filled in, then we have to look for
>>> two things.  That means more code paths (two more) to test, more test
>>> vectors, and what exactly does an end point do when both are present, BUT
>>> THEY DO NOT MATCH?  So three more pages of text there.
>>> Remember, that just rejecting the certificate means that we have to send out
>>> a truck, which is what ACP aims to avoid, so that won't be popular.
>>> And of course, there could also be bugs (maybe even CVEs) in the code that
>>> tries to deal with the tie.
> 
> To be honest, this argument feels like a stronger one to me than the bits
> in the -24.  I'm still not willing to accept into the RFC Series a document
> that violates the rules set down by the specification for the technology
> it's making use of, but the refocus on the "running code" aspect is
> appreciated.
> 
> -Ben
> 
> _______________________________________________
> Anima mailing list
> Anima@ietf.org
> https://www.ietf.org/mailman/listinfo/anima