Re: [Gen-art] Gen-ART last call review of draft-ietf-mile-rfc6046-bis-05

Alexey Melnikov <alexey.melnikov@isode.com> Mon, 23 January 2012 13:19 UTC

Return-Path: <alexey.melnikov@isode.com>
X-Original-To: gen-art@ietfa.amsl.com
Delivered-To: gen-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 27B6E21F8741; Mon, 23 Jan 2012 05:19:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.062
X-Spam-Level:
X-Spam-Status: No, score=-102.062 tagged_above=-999 required=5 tests=[AWL=-0.063, BAYES_00=-2.599, J_CHICKENPOX_24=0.6, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qd45dHvHd-BT; Mon, 23 Jan 2012 05:19:17 -0800 (PST)
Received: from rufus.isode.com (cl-125.lon-03.gb.sixxs.net [IPv6:2a00:14f0:e000:7c::2]) by ietfa.amsl.com (Postfix) with ESMTP id 2048F21F871B; Mon, 23 Jan 2012 05:19:17 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1327324755; d=isode.com; s=selector; i=@isode.com; bh=WAsuywX8KsIsAvEmy3cvGqZ65eVyCc1OIH5i2Ss/9u8=; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version: In-Reply-To:References:Content-Type:Content-Transfer-Encoding: Content-ID:Content-Description; b=YRqrlDiDthwYFiHNqK0ACs6VXye4OJ9m5EDNuF2PoSatrLPf5QEbO7vJDHAbos/W1JiOy+ oyVhKs8x6aGKXnQQg8DHvIdDbsnM/8Qr3MFRqLZqW7WKWysaXRudpjGBxvnCnSVIv7JUH+ MSu4km89dJ3A2vd214ucuyNZOHqQEMw=;
Received: from [172.16.1.29] (shiny.isode.com [62.3.217.250]) by rufus.isode.com (submission channel) via TCP with ESMTPSA id <Tx1eUQAV55FG@rufus.isode.com>; Mon, 23 Jan 2012 13:19:15 +0000
Message-ID: <4F1D5E5A.6090505@isode.com>
Date: Mon, 23 Jan 2012 13:19:22 +0000
From: Alexey Melnikov <alexey.melnikov@isode.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:8.0) Gecko/20111105 Thunderbird/8.0
To: Brian Trammell <trammell@tik.ee.ethz.ch>
References: <4F11E975.9070307@isode.com> <10722E0B-059E-4800-84C0-B330F397B63A@tik.ee.ethz.ch> <4F16D95A.3000006@isode.com> <89E47BB4-C228-4700-94C4-3F4ED03F99A2@tik.ee.ethz.ch> <4F1704DE.1090208@isode.com> <4F170904.2000603@isode.com> <60243B0C-A3FF-4B51-AFF8-27C34158E02E@tik.ee.ethz.ch> <4F185391.9050005@isode.com> <4F18704B.4010309@stpeter.im> <C36BCAAE-5F03-4514-8F18-34A5476C3F8E@tik.ee.ethz.ch>
In-Reply-To: <C36BCAAE-5F03-4514-8F18-34A5476C3F8E@tik.ee.ethz.ch>
MIME-Version: 1.0
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: gen-art@ietf.org, Kathleen Moriarty <kathleen.moriarty@emc.com>, The IESG <iesg@ietf.org>, Peter Saint-Andre <stpeter@stpeter.im>
Subject: Re: [Gen-art] Gen-ART last call review of draft-ietf-mile-rfc6046-bis-05
X-BeenThere: gen-art@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/gen-art>, <mailto:gen-art-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/gen-art>
List-Post: <mailto:gen-art@ietf.org>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/gen-art>, <mailto:gen-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Jan 2012 13:19:18 -0000

On 19/01/2012 22:05, Brian Trammell wrote:
> Hi, Peter, Alexey, all,

Hi Brian,
> On Jan 19, 2012, at 8:34 PM, Peter Saint-Andre wrote:
>
>> On 1/19/12 10:32 AM, Alexey Melnikov wrote:
>>> Hi Brian,
>>>
>>> On 19/01/2012 09:48, Brian Trammell wrote:
>>>> On Jan 18, 2012, at 7:01 PM, Alexey Melnikov wrote:
>>>>> On 18/01/2012 17:43, Alexey Melnikov wrote:
>>>>>> Hi Brian,
>>>>>>
>>>>>> On 18/01/2012 16:16, Brian Trammell wrote:
>>>>>>> On Jan 18, 2012, at 3:38 PM, Alexey Melnikov wrote:
>>>>>>>
>>>>>>> Actually, since the binding between RID and a PKI is better defined
>>>>>>> in rfc6045-bis, 6046-bis now refers to it, as follows:
>>>>>>>
>>>>>>>     Each RID system SHOULD authenticate its peers via a PKI as
>>>>>>> detailed
>>>>>>>     in Section 9.3 of [I-D.ietf-mile-rfc6045-bis].
>>>>>>>
>>>>>>> Would this address the concern?
>>>>>> Let me check.
>>>>> So the text in rfc6045bis seems to suggest that all server
>>>>> certificates will be verified based on some prior arrangement. Is my
>>>>> understanding correct?
>>>> Yes; in essence, a RID consortium is "closed".
>>> I think that this approach is unwise, because this wouldn't scale. But
>>> if nobody else see a problem with this, I will let it go.
>> I have a problem with it.
>>
>> Version -05 said:
>>
>>    Each RID consortium SHOULD use a trusted public key infrastructure
>>    (PKI) to manage identities for RID systems participating in TLS
>>    connections.  At minimum, each RID system MUST trust a set of X.509
>>    Issuer identities ("Certificate Authorities") [RFC5280] to directly
>>    authenticate RID system peers with which it is willing to exchange
>>    information, and/or a specific white list of X.509 Subject identities
>>    of RID system peers.
>>
>>    RID systems MUST provide for the verification of the identity of a
>>    RID system peer presenting a valid and trusted certificate, by
>>    verifying the fully-qualified domain name and service name from the
>>    DNS SRV record, if available, against that stored in the certificate,
>>    as in Section 6 of [RFC6125].
>>
>> In version -06, that was replaced with:
>>
>>    Each RID system SHOULD authenticate its peers via a PKI as detailed
>>    in Section 9.3 of [I-D.ietf-mile-rfc6045-bis].
>>
>> As far as I can see, a RID system is not the same as a RID consortium.
>> Even if every RID system is a member of such a consortium, it seems like
>> a bad idea to leave the authentication rules up to the consortium,
>> without providing any sort of guidance. Version -05 at least pointed to
>> RFC 6125. Since 6046bis is the HTTPS/TLS binding only, it might be more
>> appropriate to point to RFC 2818 here instead of RFC 6125, but I think
>> we need to say *something* about how authentication works (matching of
>> endpoint identities and such) instead of hoping that consortia get the
>> security right.
>
> Okay; how about the following (including Alexey's comments from the previous review, and pointing more specifically to 6125)
>
>      <t>RID systems MUST verify the identity of their peers against that stored
>      in the certificate presented, as in section 6 of<xref target="rfc6125"/>.
>      As RID systems are identified not by URI and RID does not use DNS SRV
>      records, they are identified solely by their DNS Domain Names; see Section
>      6.4 of<xref target="rfc6125"/>.
(I think you are saying that [using RFC 6125 terminology] DNS-IDs are 
supported, but SRV-IDs or URI-IDs aren't.)

This is better, but I think you need to say a bit more. Are CN-IDs 
allowed? Are wildcards allowed?

Another example of the document that describes
http://tools.ietf.org/html/draft-melnikov-email-tls-certs-00

> General information on the use of PKI
>      with RID systems is detailed in Section 9.3 of<xref
>      target="I-D.ietf-mile-rfc6045-bis"/>.</t>