Re: [Gen-art] [lamps] Gen-ART Last Call review of draft-ietf-lamps-rfc3709bis-06

Russ Housley <housley@vigilsec.com> Tue, 25 October 2022 20:04 UTC

Return-Path: <housley@vigilsec.com>
X-Original-To: gen-art@ietfa.amsl.com
Delivered-To: gen-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1C716C14CE30; Tue, 25 Oct 2022 13:04:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lEsHL0ZJhBVc; Tue, 25 Oct 2022 13:04:43 -0700 (PDT)
Received: from mail3.g24.pair.com (mail3.g24.pair.com [66.39.134.11]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 88CF3C14CE2A; Tue, 25 Oct 2022 13:04:43 -0700 (PDT)
Received: from mail3.g24.pair.com (localhost [127.0.0.1]) by mail3.g24.pair.com (Postfix) with ESMTP id BDF9F92AFB; Tue, 25 Oct 2022 16:04:42 -0400 (EDT)
Received: from [10.0.1.2] (pfs.iad.rg.net [198.180.150.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail3.g24.pair.com (Postfix) with ESMTPSA id 5A9619294C; Tue, 25 Oct 2022 16:04:42 -0400 (EDT)
From: Russ Housley <housley@vigilsec.com>
Message-Id: <3BD87947-7F66-4233-9B81-6CD2E1C06B9E@vigilsec.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_E4772B47-8383-4FCD-A60C-927C386E8D95"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.21\))
Date: Tue, 25 Oct 2022 16:04:41 -0400
In-Reply-To: <5e772c71-3187-fb33-9541-26c816a4c791@alum.mit.edu>
Cc: IETF Gen-ART <gen-art@ietf.org>, LAMPS <spasm@ietf.org>
To: Paul Kyzivat <pkyzivat@alum.mit.edu>
References: <3abe8edb-a4a1-06d9-7af3-028e3c58b52a@alum.mit.edu> <49EDE68B-258E-432A-BD2C-C272DC58E759@vigilsec.com> <5e772c71-3187-fb33-9541-26c816a4c791@alum.mit.edu>
X-Mailer: Apple Mail (2.3445.104.21)
X-Scanned-By: mailmunge 3.09 on 66.39.134.11
Archived-At: <https://mailarchive.ietf.org/arch/msg/gen-art/YFVsNQSfmr0R8xsVUpEPJ0WJmJA>
Subject: Re: [Gen-art] [lamps] Gen-ART Last Call review of draft-ietf-lamps-rfc3709bis-06
X-BeenThere: gen-art@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/gen-art>, <mailto:gen-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/gen-art/>
List-Post: <mailto:gen-art@ietf.org>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/gen-art>, <mailto:gen-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Oct 2022 20:04:49 -0000

Paul:

>>> 1) MINOR: In Section 4.1 (Extension Format):
>>> 
>>> The following:
>>> 
>>> "CAs SHOULD use the one-way hash function that is associated with the certificate signature to compute the hash value, and CAs MAY include other hash values."
>>> 
>>> introduces the possibility that a client might not support *any* of the provided hash algorithms. This seems bad.
>>> 
>>> RFC3709 didn't have this problem because it required that an SHA-1 hash be included and supported.
>>> 
>>> This can be fixed by changing "CAs SHOULD" to "CAs MUST".
>> We are seeing a few signature algorithms that are not following the hash-then-sign pattern. I'm not sure how to allow the signature on the certificate to use one of them (like EdDSA) when one has to know a lot about the algorithm details to determine which hash is used internally.  As you say, the "CAs MUST" would require the certificate issuer to do that research.  Do others have an opinion?
> 
> Well then, how about picking some algorithm (to replace SHA-1) that clients must support and that must be used in cases when cert signature algorithm can't be used?
> 
> Or worst case, discuss what is to be done by a client who doesn't support any of the offered hash algorithms.

I copied the WG on my reply.  I'd like to hear what others think before proposing text.

Russ