Re: [Dance] CRLs/OCSP and DANE at RIPE84

Geoff Huston <gih902@gmail.com> Tue, 24 May 2022 19:56 UTC

Return-Path: <gih902@gmail.com>
X-Original-To: dance@ietfa.amsl.com
Delivered-To: dance@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DE7DEC1D34F1 for <dance@ietfa.amsl.com>; Tue, 24 May 2022 12:56:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.848
X-Spam-Level:
X-Spam-Status: No, score=-6.848 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5lS4e5vlvBkh for <dance@ietfa.amsl.com>; Tue, 24 May 2022 12:56:43 -0700 (PDT)
Received: from mail-pj1-x102e.google.com (mail-pj1-x102e.google.com [IPv6:2607:f8b0:4864:20::102e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 625E0C1D34E2 for <dance@ietf.org>; Tue, 24 May 2022 12:56:38 -0700 (PDT)
Received: by mail-pj1-x102e.google.com with SMTP id m10-20020a17090a3f8a00b001e07a64c461so2355246pjc.4 for <dance@ietf.org>; Tue, 24 May 2022 12:56:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=9l9+KZFpBbYObFJ9Waomr2ujbHmKpAVrWozAUJNiQQA=; b=YjObYTCya5stNi61yCPRWxzKep/SmnnancT9alIxpGJGVU7zgKxM4lXbaI3cwHBBrG H3WBTP80/rOGaGzsoZb64FNxIaaOGNBdPJ6gpJPUy7kxlg5Y+4UPE8/UTAfFTcwHxj8Y kYQ3xtdY6gjR3nAG/LmfNebQQSAfNFWp+3llRP8ycbwXkexFsoe0+9LTMLcEtWkpgszL IGNKZVViB15opPfOD2PMMWGHWznbxNIv7qw0j17pDeNafMm+yTV2lrW1F0gEWx+EEdsC 3uS0i7e+tQElVngYb+KHFO1SVTFzA+fbtj89XhdLaV3jD07Sofa0ZiSVO0w+q4t+JODV b90Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=9l9+KZFpBbYObFJ9Waomr2ujbHmKpAVrWozAUJNiQQA=; b=8RcrcNPKNKz3gOgIjYpQd1pQ5XzREkWp6sXSyMcc9rrI+4X3cKO39m0F+bfI66RCT6 7fM6hVawp5xeGtYUF/rZqOuOJWCqToJJuLonZo6lNEtlD6grB74Cxss1+teeWw/m3psf Ihzdq8/918c4Em3RXJgU5Wpdo+X7+7vG6xtZpl0O9U5uZ5OpB7z2SyQFPzbDigcF7eaf 8pHqfQnuCc7R913SQ5MPJnn9ozjOdLSV7LuQUOZkYoyz4KUDTvXMOBpaeRo1U8yrpLva QHj4jtzhKOZOygZiYr9T2VvHzuCQvUtewT0ejENmqYM5qkIeYJb4uvL0qbEz8LjrbXZQ tuaw==
X-Gm-Message-State: AOAM531Y5cqYBVLMp2x8rC4pcWeYCMqZBk248j//AKAj4P/iU8QYGvtF NmzyRuLB8gLgMa6/blpMPScDWWP5Z5k=
X-Google-Smtp-Source: ABdhPJzICuP9rSqKVWcyOzM2WedW+epNi5moF91KiEELDE+dwkcZOvQCChafeh9QmDafx2vab6KDKw==
X-Received: by 2002:a17:90b:ed2:b0:1e0:a082:b2c5 with SMTP id gz18-20020a17090b0ed200b001e0a082b2c5mr560175pjb.91.1653422197298; Tue, 24 May 2022 12:56:37 -0700 (PDT)
Received: from smtpclient.apple ([2001:8003:1dec:da00:f8da:5b32:92d7:ce07]) by smtp.gmail.com with ESMTPSA id o2-20020a170902d4c200b0016168e90f2csm7736961plg.208.2022.05.24.12.56.35 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Tue, 24 May 2022 12:56:36 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.100.31\))
From: Geoff Huston <gih902@gmail.com>
In-Reply-To: <CAHPuVdXED50HMmBzkPCRa6pTqUnD8FA_upyWSMZy9OBt=q1GfA@mail.gmail.com>
Date: Wed, 25 May 2022 05:56:32 +1000
Cc: Michael Richardson <mcr+ietf@sandelman.ca>, dance <dance@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <699A8C62-503E-44EF-B891-56A0ED382550@gmail.com>
References: <887547.1653131902@dooku> <CAHPuVdXED50HMmBzkPCRa6pTqUnD8FA_upyWSMZy9OBt=q1GfA@mail.gmail.com>
To: Shumon Huque <shuque@gmail.com>
X-Mailer: Apple Mail (2.3696.100.31)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dance/nLbWR-IpV3HmsGSUw6T04ACtQfk>
Subject: Re: [Dance] CRLs/OCSP and DANE at RIPE84
X-BeenThere: dance@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: DANE Authentication for Network Clients Everywhere <dance.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dance>, <mailto:dance-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dance/>
List-Post: <mailto:dance@ietf.org>
List-Help: <mailto:dance-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dance>, <mailto:dance-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 May 2022 19:56:47 -0000

As I said in the presentation, it still seems remarkably wrong that the 
X.509 certificate system handles revocation so badly. Now this would not be
a problem if Evil Acts took more than the average X.509 certificate lifetime 
to set up and execute, but given that it takes only a small number of hours
for a key compromise to be exploited, then the conclusion is that this 
X.509 framework is simply not fit for purpose.

I appreciate the depressing reality that saying that X.509 is the massive incumbent
and we’ve grown used to its foibles and weaknesses, but its about as useful for
victims of certificate malfeasance as a full armour plating made of wet lettuce
leaves! Certificate lifetimes are working on scales of months and years, revocation
is broken and can't scale, and bad practices and evil deeds are executed
in hours or even minutes. The mismatch of attack and defence capabilities
plays in favour of the attacker.

I know we’ve tilted at this X.509 windmill for many years, but the observation
I would make is that in no case as the X.509 environment changed in response.
The exposed problems appear to be a constant. On the other hand attackers
do learn and adapt and the exploited vulnerabilities in the very design
of the X.509 system become factors every just has to accommodate. 

I am still optimistic about DANE and DANCE. To my mind there is little else
around that can make this sad state of affairs any better.

Sorry for taking up the WG’s time here. I know this is straying off topic!

Geoff




> On 24 May 2022, at 12:33 am, Shumon Huque <shuque@gmail.com> wrote:
> 
> On Sat, May 21, 2022 at 7:18 AM Michael Richardson <mcr+ietf@sandelman.ca> wrote:
> 
> https://ripe84.ripe.net/archives/video/864/
> Geoff Houston looks at Revocation, and who it is just not working, and suggests DNSSEC+DANE.
> Very much Worth watching.
> 
> I'm kind of sympathetic to Geoff's views.
> 
> But the prospects of DANE generally replacing (or constraining) PKIX and delivering a DNS
> based revocation capability seem pretty slim to me, especially in the web arena, which seemed
> to be the focus of Geoff's presentation. Note the failed attempt to standardize the TLS DNSSEC
> chain extension in the TLS working group (now published as an experimental RFC via the ISE).
> 
> In other application areas, like DANCE, there will hopefully be better prospects.
> 
> Shumon.
> 
> -- 
> Dance mailing list
> Dance@ietf.org
> https://www.ietf.org/mailman/listinfo/dance