Re: [COSE] Paul Wouters' Discuss on draft-ietf-cose-countersign-09: (with DISCUSS and COMMENT)

Carsten Bormann <cabo@tzi.org> Tue, 20 September 2022 15:19 UTC

Return-Path: <cabo@tzi.org>
X-Original-To: cose@ietfa.amsl.com
Delivered-To: cose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A17EFC1524C0; Tue, 20 Sep 2022 08:19:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.014
X-Spam-Level:
X-Spam-Status: No, score=-1.014 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_HTML_ONLY=0.1, MIME_HTML_ONLY_MULTI=0.001, MIME_QP_LONG_LINE=0.001, MPART_ALT_DIFF=0.79, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aAeUSIEOiFJ8; Tue, 20 Sep 2022 08:19:33 -0700 (PDT)
Received: from gabriel-smtp.zfn.uni-bremen.de (gabriel-smtp.zfn.uni-bremen.de [IPv6:2001:638:708:32::15]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F159DC15AE1B; Tue, 20 Sep 2022 08:18:50 -0700 (PDT)
Received: from smtpclient.apple (unknown [195.226.154.53]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by gabriel-smtp.zfn.uni-bremen.de (Postfix) with ESMTPSA id 4MX4v84BlBzDCgT; Tue, 20 Sep 2022 17:18:44 +0200 (CEST)
Content-Type: multipart/alternative; boundary="Apple-Mail-5EF23687-3AD8-4688-9C44-3AEA2A897131"
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (1.0)
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <7277D290-EB17-43AC-8817-FF9647CBBB0D@vigilsec.com>
Date: Tue, 20 Sep 2022 17:18:32 +0200
Cc: IESG <iesg@ietf.org>, draft-ietf-cose-countersign@ietf.org, Cose Chairs Wg <cose-chairs@ietf.org>, cose <cose@ietf.org>, Michael Richardson <mcr+ietf@sandelman.ca>, Paul Wouters <paul.wouters@aiven.io>
Message-Id: <A6B18F45-A108-4AE4-B894-5CB583ECE80D@tzi.org>
References: <7277D290-EB17-43AC-8817-FF9647CBBB0D@vigilsec.com>
To: Russ Housley <housley@vigilsec.com>
X-Mailer: iPhone Mail (20A362)
Archived-At: <https://mailarchive.ietf.org/arch/msg/cose/ifnPiKLwEaXzPmPQh8z2H0ZoO6g>
Subject: Re: [COSE] Paul Wouters' Discuss on draft-ietf-cose-countersign-09: (with DISCUSS and COMMENT)
X-BeenThere: cose@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: CBOR Object Signing and Encryption <cose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cose>, <mailto:cose-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cose/>
List-Post: <mailto:cose@ietf.org>
List-Help: <mailto:cose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cose>, <mailto:cose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Sep 2022 15:19:36 -0000



Sent from mobile, sorry for terse

On 20. Sep 2022, at 16:58, Russ Housley <housley@vigilsec.com> wrote:

Carsten:

Do you have a webpage anywhere that can be pointed to by this document?

Russ

On Sep 8, 2022, at 8:36 PM, Paul Wouters <paul.wouters@aiven.io> wrote:

I am fine with a pointer to a downloadable source which can also contain the commands to install the software. Upon compromise, the pointer can be updated to protect the immutable RFC text. Wether it points to GitHub or IETF or elsewhere doesn’t matter to me.

Paul

Sent using a virtual keyboard on a phone

On Sep 8, 2022, at 16:04, Russ Housley <housley@vigilsec.com> wrote:



On Sep 8, 2022, at 1:47 AM, Carsten Bormann <cabo@tzi.org> wrote:

On 2022-09-08, at 04:14, Paul Wouters via Datatracker <noreply@ietf.org> wrote:

----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

      gem install cbor-diag

I am concerned about adding install commands for "programs from the internet"
within an RFC. If the rubygem for some reason becomes malicious, we cannot
pull it from the RFC (even if we pull it from the datatracker link, it would
still live on in copies of the RFC elsewhere and malicious people could point
to copies of those original RFCs to point people to downlod the malicious rubygem.

I would be okay with an http://iet.org/" class="" rel="nofollow">iet.org download location of a ruby gem.

“gem install” is the appropriate way to install rubygems software, not a “location of a rubygem”.

What you seem to be asking for is some indirection so we can swap out the name of the gem in case cbor-diag becomes rogue.  That does make some sense to me, but we’d need to install that indirection somewhere in a place maintained by the IETF.

➔ “Please consult https://www.ietf.org/software/cbor-diag" class="" rel="nofollow">https://www.ietf.org/software/cbor-diag for the way to install this software”.
And that page would contain instructions including “gem install cbor-diag” until that goes rogue.

Can we get such a infrastructure of pages recommending software up and running?  Do we mire ourselves in process issues (who gets change control etc.)?

Data point from a quick search:
The RFCs that already suggest installing rubygems via a direct “gem install” include RFC 8152, RFC 8610, RFC 9052.

(In reality, I’d expect the rubygems organization to act more quickly on a report of cbor-diag going rogue than the IETF would.)

Grüße, Carsten


Paul:

Are you satisfied with this explanation? Or, would you prefer the pointer to https://www.ietf.org/software/cbor-diag" class="" rel="nofollow">https://www.ietf.org/software/cbor-diag

Russ