Re: [dane] Question regarding RFC 8162

Tawhidul Islam <tislam20@gmu.edu> Thu, 15 September 2022 19:08 UTC

Return-Path: <tislam20@gmu.edu>
X-Original-To: dane@ietfa.amsl.com
Delivered-To: dane@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6CF00C14F734 for <dane@ietfa.amsl.com>; Thu, 15 Sep 2022 12:08:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.089
X-Spam-Level:
X-Spam-Status: No, score=0.089 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URI_DOTEDU=1.997] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=gmuedu.onmicrosoft.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id on45bxfVXvHG for <dane@ietfa.amsl.com>; Thu, 15 Sep 2022 12:08:06 -0700 (PDT)
Received: from na01-obe.outbound.protection.outlook.com (mail-eastusazlp170110004.outbound.protection.outlook.com [IPv6:2a01:111:f403:c100::4]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D5293C14F73B for <dane@ietf.org>; Thu, 15 Sep 2022 12:08:00 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=euGCRtc8xbqrR/nqwkYqszw/VGAHtynywNYIEujsHugWQqGuWybcYbTJ0T/lgLKZUR/9tv4OCpp2R2FJ1IlDJDtHSo/BoF6I18ENFxKuBxRPvyxtsq3qZ6ueqDCShrRaCYsoUTgkbEgpkCKWzGmgVgsT1lpf5q0Jf6xCflnthi5T/pM87/WLBaD/YFoNhYO0pHec10lBS8RzBoHfRsPXK6ugagA7sy0RsJM/T5NssGXk2dM1aIYszy1ydTM2c/MWVB+XjG4mpPN2T4/EfhAxrmZGZiaT8XzuJpGVHnsPQKj27QX7cFk80HfhWLkZXA5yUa7Ji6OimIEuwN+m6HSIaQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=fkEOU0UZrBC2KdaAzjNSlxLZb9rWizANQcqGn4tXI3k=; b=di/dRlEG1YddHUY0xLHGE54dQSbCD3z7SzEFB75IZeBgPhHZfUYSZZuyS6GpgEE49+Y7am2AwsleccokEJBw3KSTTFwYayewgiFhJVEBfNP8ZDKtCH98QqjrAQIynCKmaXocBrG723iwKD7K7swiLkkyXV1utRZyk0DosJqI9e8ukSbwq3NwGjzChAU25joFgbJJLfilS6T9DVjZOifVBKXK1R2IWZ4P/U0KJ/9e9fc/4ndxvPDILS6dSglrQpxsTlLG1QisI0HH4D0oy8rmf0TPLAnchdIWInglEsiQAe9C19NqiZtNyefGbyzA3ByJcCw6sO/XjAP+XDCLuo6zsw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=gmu.edu; dmarc=pass action=none header.from=gmu.edu; dkim=pass header.d=gmu.edu; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmuedu.onmicrosoft.com; s=selector2-gmuedu-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fkEOU0UZrBC2KdaAzjNSlxLZb9rWizANQcqGn4tXI3k=; b=sWAHoa+aZ2YQZmVs7SPjuqR2kKUguf0TASwNpN/jyhQFcipmt6d8LeI8LHrFNKAsv8OGizSKQI43rkkzP01Jgd8ISudGNPWPXTBh76KN4HnOQXYfc1KntXApQaVtdOHgDLnP4mSb6o5Kfeh85G6b3aWf0I2+CLhPW3JFyqJkyJE=
Received: from MN2PR05MB6943.namprd05.prod.outlook.com (2603:10b6:208:18e::29) by MN2PR05MB6224.namprd05.prod.outlook.com (2603:10b6:208:cd::30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5612.14; Thu, 15 Sep 2022 19:07:56 +0000
Received: from MN2PR05MB6943.namprd05.prod.outlook.com ([fe80::2484:dfbc:e677:a630]) by MN2PR05MB6943.namprd05.prod.outlook.com ([fe80::2484:dfbc:e677:a630%7]) with mapi id 15.20.5632.011; Thu, 15 Sep 2022 19:07:56 +0000
From: Tawhidul Islam <tislam20@gmu.edu>
To: Metin Savignano <ms@savignano.net>
CC: "dane@ietf.org" <dane@ietf.org>
Thread-Topic: [dane] Question regarding RFC 8162
Thread-Index: AQHYyRCf8IGY6hNgMEaOEar5HrMhaa3gp92x
Date: Thu, 15 Sep 2022 19:07:56 +0000
Message-ID: <MN2PR05MB69433EC12366ACA794A42897D3499@MN2PR05MB6943.namprd05.prod.outlook.com>
References: <7B212BFE-F674-46AA-86E8-FEF77D909536@savignano.net> <1CD1C43B-6080-4C58-BF9F-E085CA97FD43@osterweil.net> <B526F1E6-74A8-4731-86ED-597BFF34DB25@savignano.net>
In-Reply-To: <B526F1E6-74A8-4731-86ED-597BFF34DB25@savignano.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=gmu.edu;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MN2PR05MB6943:EE_|MN2PR05MB6224:EE_
x-ms-office365-filtering-correlation-id: cac1a57f-dbeb-4e97-a057-08da974d9920
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR05MB6943.namprd05.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(396003)(366004)(136003)(39860400002)(346002)(376002)(451199015)(33656002)(66446008)(38100700002)(75432002)(8936002)(8676002)(64756008)(122000001)(83380400001)(26005)(966005)(2906002)(38070700005)(66556008)(53546011)(71200400001)(166002)(786003)(9686003)(478600001)(55016003)(9326002)(86362001)(5660300002)(7696005)(66476007)(6916009)(76116006)(66946007)(52536014)(6506007)(316002)(4326008)(186003)(41300700001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_MN2PR05MB69433EC12366ACA794A42897D3499MN2PR05MB6943namp_"
MIME-Version: 1.0
X-OriginatorOrg: gmu.edu
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR05MB6224
Archived-At: <https://mailarchive.ietf.org/arch/msg/dane/O8Es7GC-tszK1KvbLspPAJSI3bk>
Subject: Re: [dane] Question regarding RFC 8162
X-BeenThere: dane@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: DNS-based Authentication of Named Entities <dane.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dane>, <mailto:dane-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dane/>
List-Post: <mailto:dane@ietf.org>
List-Help: <mailto:dane-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dane>, <mailto:dane-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Sep 2022 19:08:10 -0000

Hi Metin,

I’m Minar, an author of daneportal.net where we implement SMIMEA records in federated DANE cert provisioning. I’m happy to hear more DANE discussion! :)

You wrote:

So, for user_1@example.edu<mailto:user_1@example.edu> through user_n@example.edu<mailto:user_n@example.edu> , you would hit *.example.edu<http://secure-web.cisco.com/1m9sVPSr2H8pVH1HJOAF1RrIiLKJY3LofJCjye7q1iYK5IbIreyFPPI0SLhIjFKex1XPcUjIRbccOrw0hC2L5x5uLgtak3TqTOiaNlg_vivDAEt2s0j_ojpa2Zx2_9igqF6Np41tphXKyCDPUgG1Ucm6rahLlCjRvFvjbzyMIawyhcjURZFhaZ13yPe6vR9q5_KBZXpgON91R_9N8OUIlHzbmyyqmvYgfQwtmQtkF97iN5uJNI7Px1oNC-xw6SB-a1I83XYkwEBYnxWPxF9YciGZKXVXTHH2LpqUDgp4S4g32KfZNMOp5V9Ilas_RsMC2h1uEioyfQ21VBXr0IFO5mBfooMrApAmdMXEtJMebgokkA2G9-a8sgShgK41jx0dUW8R9OT8A7wucbfM5Ju1kp1jCu6Dj9mbtFd2I5gd5SEc4F-MxJBRzgEKD-teET4CN/http%3A%2F%2Fexample.edu%2F> SMIMEA, which would return the root cert.  Does that make sense?

However, it remained unclear to me if that is intended use? (And if so, how should anybody know as it is not mentioned in RFC 8162?)

I’m also curious about that. Maybe this merits a clarification update in an RFC?

It is recommended to use two separate certificates, one for encrypting and one for signing. If that recommendation is followed, how does RFC 8162 / RFC 6698 allow for this? Is it possible to have two records for the same user in the DNS (I’m not very familiar with the internals of DNS)?

It is totally possible to have many records for the same user. E.g. for jdoe@example.com<mailto:jdoe@example.com>, in the DNS this is as simple as serving multiple SMIMEA records for the “<jdoe_hashed>._smimecert.example.com” name.
Absurd example: Jane Doe could have 7 certificates all being served at the same time because she likes to change her signing key every day
DANE clients (e.g. using libCanute) could end up using any suitable cert for encrypting, and should try all suitable certs for verification (taking into account the USAGE field/related CA constraining SMIMEA records).

How could we identify which is which, unless the full certificate (not only the key) is stored in the DNS record? Even then, wouldn’t it be more practical to use different type values, so the client can specifically look for the the record it needs?

You’ve hit the mark -- the attributes are in the cert like usual if it is the full cert (SELECTOR=0). But that leaves the shortcoming that clients are doing extra processing/bigger DNS responses.

I’m happy to hear you bring this up, since I also agree that we are missing an important mechanism for clients to specifically search for a signature vs encrypting cert record on DNS -- it’s unfortunate the current RFC did not address this.

There was an older idea bounced around that we implemented for daneportal.net of having dedicated meta domains for those two:
E.g. Jane Doe’s encrypting cert would be an SMIMEA record under “<hash>._encr._smimecert.example.com”, and her 7 signature certs could all be in “<hash>._sign._smimecert.example.com”.
For the basic RFC compliance, this is done in addition to putting a copy of all those records in the usual <hash>._smimecert zone.
Clients that are wise to that non-standard _encr/_sign domains could speed up cert resolution with that pathway, but could always fallback to the standard _smimecert domain. The cert attributes are only considered if the USAGE calls for it (PKIX-CA/EE constrained).

(Psst that old RFC draft that included this discussion is readable in the Canute docs: https://github.com/gmu-msl/canute/blob/main/docs/draft-ietf-dane-smime-02-srose.txt though the current resolver in that repo is strictly RFC compliant)

That’s my two cents – please do touch back with any more discussion / questions! I’d love to collaborate and increase the presence of DANE / SMIME implementations.

-Minar

Sent from Mail<https://go.microsoft.com/fwlink/?LinkId=550986> for Windows

________________________________
From: dane <dane-bounces@ietf.org> on behalf of Metin Savignano <ms@savignano.net>
Sent: Thursday, September 15, 2022 10:37:04 AM
To: Eric Osterweil <lists@osterweil.net>
Cc: dane@ietf.org <dane@ietf.org>
Subject: Re: [dane] Question regarding RFC 8162

Hi Eric, hi everyone,

I haven’t seen any reaction my last message yet. I had hoped to get some clarification.

You wrote:

So, for user_1@example.edu<mailto:user_1@example.edu> through user_n@example.edu<mailto:user_n@example.edu> , you would hit *.example.edu<http://secure-web.cisco.com/1m9sVPSr2H8pVH1HJOAF1RrIiLKJY3LofJCjye7q1iYK5IbIreyFPPI0SLhIjFKex1XPcUjIRbccOrw0hC2L5x5uLgtak3TqTOiaNlg_vivDAEt2s0j_ojpa2Zx2_9igqF6Np41tphXKyCDPUgG1Ucm6rahLlCjRvFvjbzyMIawyhcjURZFhaZ13yPe6vR9q5_KBZXpgON91R_9N8OUIlHzbmyyqmvYgfQwtmQtkF97iN5uJNI7Px1oNC-xw6SB-a1I83XYkwEBYnxWPxF9YciGZKXVXTHH2LpqUDgp4S4g32KfZNMOp5V9Ilas_RsMC2h1uEioyfQ21VBXr0IFO5mBfooMrApAmdMXEtJMebgokkA2G9-a8sgShgK41jx0dUW8R9OT8A7wucbfM5Ju1kp1jCu6Dj9mbtFd2I5gd5SEc4F-MxJBRzgEKD-teET4CN/http%3A%2F%2Fexample.edu%2F> SMIMEA, which would return the root cert.  Does that make sense?

However, it remained unclear to me if that is intended use? (And if so, how should anybody know as it is not mentioned in RFC 8162?)

And please let me ask a second question:

It is recommended to use two separate certificates, one for encrypting and one for signing. If that recommendation is followed, how does RFC 8162 / RFC 6698 allow for this? Is it possible to have two records for the same user in the DNS (I’m not very familiar with the internals of DNS)?

How could we identify which is which, unless the full certificate (not only the key) is stored in the DNS record? Even then, wouldn’t it be more practical to use different type values, so the client can specifically look for the the record it needs?

Please forgive me for dumb questions.

Thanks!
Metin