Re: What ASN.1 got right

Phillip Hallam-Baker <phill@hallambaker.com> Wed, 03 March 2021 05:34 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A13B3A1984 for <ietf@ietfa.amsl.com>; Tue, 2 Mar 2021 21:34:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.399
X-Spam-Level:
X-Spam-Status: No, score=-1.399 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.249, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.25, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 05rH0Cpy5yKX for <ietf@ietfa.amsl.com>; Tue, 2 Mar 2021 21:34:31 -0800 (PST)
Received: from mail-yb1-f174.google.com (mail-yb1-f174.google.com [209.85.219.174]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 803AF3A1982 for <ietf@ietf.org>; Tue, 2 Mar 2021 21:34:31 -0800 (PST)
Received: by mail-yb1-f174.google.com with SMTP id u3so23260084ybk.6 for <ietf@ietf.org>; Tue, 02 Mar 2021 21:34:31 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=YQWiW/SBU/GIty9AIzM13koUl3aYe67XUCptRym8Bvg=; b=DAiK8fd86yOiqI/xDQ8f+NP/yhMkyrOwNfp038k6fvsTFKu37rs7+Yu54HbAiki/99 1U1VSWj23C/gln17eFp+2f9LzPK+MYQT63M6QsEe3yyRRwCTX5OrU6uuleFADGxScW3y btksRn+ve8laXZ1u5fqyuaQPf/i7OYdTCmjliUikbZ63lWvqSVGLvuMJYRKn80ljGM7y VXqwmxTQDCu78OIJXbIDvlezQpd2B2gGeG8jXUhGRLYMUzbNUnEJpdCG/kE28Pi3jNjK w8qwwPWijgqK9YsBABdNvflnnqP7UZKZrx99iReuXpZKgPdwdhydgLOG2fffK4bNCmq/ JjTA==
X-Gm-Message-State: AOAM533npE/O/I2PHrTlVO2l7B4C7GAWlbwBn92oO97/pJ5j5Kb/lHKs 2ZXhXn0qLhYJuGlfjWXNxFPfzTG44xxWOdvien9BVVFMD/s=
X-Google-Smtp-Source: ABdhPJwXqq3C5VORAbqhMMVQkZA3ois5k+g6wNpWm5yLh0w6lvlj2dBP17uQm0ckoflB201aH9LkhrMtYqgOD3a2OUw=
X-Received: by 2002:a25:2ac3:: with SMTP id q186mr37623420ybq.213.1614749670627; Tue, 02 Mar 2021 21:34:30 -0800 (PST)
MIME-Version: 1.0
References: <CAMm+LwifpPg-Sg9cXLpWvjmExt8KfuYq6oRZd4D1L0ZBR3nRFg@mail.gmail.com> <1631e20d-9d8a-b8c2-9d5e-6c7f4defa72d@mtcc.com> <20210302234928.GX30153@localhost> <cb4960e2-05a1-9d28-f17b-9f610ac378c9@mtcc.com> <20210303002330.GZ30153@localhost> <7d70044c-88e8-0165-5ce3-4c8612965f16@mtcc.com> <20210303005136.GB30153@localhost> <8e4d3b84-0357-524e-b8f5-b8f7290adf2b@mtcc.com> <20210303022234.GE30153@localhost> <b87a101d-dcad-1f75-aeec-a2d19022ce35@mtcc.com> <20210303033555.GG30153@localhost>
In-Reply-To: <20210303033555.GG30153@localhost>
From: Phillip Hallam-Baker <phill@hallambaker.com>
Date: Wed, 03 Mar 2021 00:34:19 -0500
Message-ID: <CAMm+LwgJG_dcVd01iTQLSh3x0Jd8j2DodnXvsbhipuiFkZRMvw@mail.gmail.com>
Subject: Re: What ASN.1 got right
To: Nico Williams <nico@cryptonector.com>
Cc: Michael Thomas <mike@mtcc.com>, IETF Discussion Mailing List <ietf@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000084dca205bc9b3469"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/QWt0L9399BBAVLFQHvORUOdPNDI>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Mar 2021 05:34:33 -0000

The practical limit on certificate lifespan is 48 hours renewed every 24
unless you have a means of reliably getting trusted time into the client.

I have been trying to find info on SSH user certs on and off for quite a
while. Seems like an under-documented feature... They solve a big problem
for me :-)

On Tue, Mar 2, 2021 at 10:36 PM Nico Williams <nico@cryptonector.com> wrote:

> On Tue, Mar 02, 2021 at 07:00:35PM -0800, Michael Thomas wrote:
> > NRE vs constant help desk. [...]
>
> I can't parse "NRE".
>
> > Where are all of these use cases that need offline verification? I asked
> > somebody else and didn't get an answer.
>
> Admins *really* like to be able to get into their servers when bad
> things happen on their networks and necessary infrastructure is down.
> SSH generally gives you that.
>
> > All of this tells me that there is a witching hour with certs that hasn't
> > been broken in almost 40 years.
>
> Short-lived certs == no one ever forgets to automate the fetching of new
> ones.
>
> When you have two-year certs you need CRLs and OCSP and you always
> forget to renew.
>
> When you have five-day certs you cannot forget to renew more than twice
> because you won't like the constant outages, so you'll automate.
>
> Heck, you could dial that down to eight-hour certs.  After all, with JWT
> we use JWKs that last only a few hours, so you *really* have to fetch
> them on a schedule.
>
> Nico
> --
>