Re: [pkix] Last Call: draft-ietf-pkix-tamp (Trust Anchor Management Protocol (TAMP)) to Proposed Standard

"Denis Pinkas"<denis.pinkas@bull.net> Mon, 25 January 2010 08:49 UTC

Return-Path: <denis.pinkas@bull.net>
X-Original-To: ietf@core3.amsl.com
Delivered-To: ietf@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D8B593A683E; Mon, 25 Jan 2010 00:49:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.589
X-Spam-Level:
X-Spam-Status: No, score=0.589 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_FR=0.35, HTML_MESSAGE=0.001, RCVD_BAD_ID=2.837]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jFWZCQke0ukt; Mon, 25 Jan 2010 00:49:06 -0800 (PST)
Received: from odin2.bull.net (odin2.bull.net [129.184.85.11]) by core3.amsl.com (Postfix) with ESMTP id ED6C63A6405; Mon, 25 Jan 2010 00:49:05 -0800 (PST)
Received: from MSGA-001.frcl.bull.fr (msga-001.frcl.bull.fr [129.184.87.31]) by odin2.bull.net (Bull S.A.) with ESMTP id 817571801B; Mon, 25 Jan 2010 09:51:55 +0100 (CET)
Received: from FRCLS4013 ([129.181.81.6]) by MSGA-001.frcl.bull.fr (Lotus Domino Release 5.0.11) with SMTP id 2010012509490770:76144 ; Mon, 25 Jan 2010 09:49:07 +0100
From: Denis Pinkas <denis.pinkas@bull.net>
To: ietf <ietf@ietf.org>
Subject: Re: [pkix] Last Call: draft-ietf-pkix-tamp (Trust Anchor Management Protocol (TAMP)) to Proposed Standard
Date: Mon, 25 Jan 2010 09:49:05 +0100
Message-Id: <DreamMail__094905_04101423050@msga-001.frcl.bull.fr>
References: <20100114173414.94CAE3A67ED@core3.amsl.com>
MIME-Version: 1.0
X-Priority: 3 (Normal)
X-Mailer: DreamMail 4.4.1.0
X-MIMETrack: Itemize by SMTP Server on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 25/01/2010 09:49:09, Serialize by Router on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 25/01/2010 09:49:10, Serialize complete at 25/01/2010 09:49:10
Content-Type: multipart/alternative; boundary="----=_NextPart_10012509490381920256854_002"
X-Mailman-Approved-At: Mon, 25 Jan 2010 08:10:23 -0800
Cc: pkix <pkix@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: denis.pinkas@bull.net
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Jan 2010 08:49:07 -0000

The current protocol has severe limitations.
They have been pointed during the last call at the PKIX WG level, but the protocol 
has not been modified to address them.The end result has only been to add text 
to explain the limitations without removing these limitations.
See section 3: "When using these structures without any additional extension, 
for which purposes the trust anchor info shall be used to verify 
certification paths needs to be locally defined; this means that different 
usages for the same or different trust anchors placed in the same TAS 
are not possible either.
One way to have different usages for different trust anchors without 
using extensions is to use a different TAS for every different usage".

The consequences are as follows:

All web browser providers currently use a different model to manage trust anchors. 
They are able to associate different key usages for every leaf certificate 
with any trust anchor (all placed in the same trust anchor store). This can be done 
in a single operation.

Furthermore, with the introduction of EV SSL Certificates 
(i.e. Extended Validation SSL certificates) the Certification Policy OIDs of 
leaf certificates that fulfills the requirements of EV SL certificates 
are added to the trust anchor to which the EV SSL certificate relates.

This means that supporting the web browser model mandates to be able to add 
key usages (e.g. EKU extended key usages) for leaf certificates 
as well as Certification Policies for leaf certificates.

This is not possible with the proposed protocol.

As a consequence, the current protocol is unable to accomodate the web browser model.
 
Since the protocol seems to be sufficient for another community 
(but not to the Internet community), it is proposed to place this document 
on the EXPERIMENTAL track rather than on the standards track.

Denis

Date : 2010-01-14, 18:34:14
Sujet : [pkix] Last Call: draft-ietf-pkix-tamp (Trust Anchor Management Protocol (TAMP)) toProposed Standard


The IESG has received a request from the Public-Key Infrastructure 
(X.509) WG (pkix) to consider the following document:

- 'Trust Anchor Management Protocol (TAMP) '
   <draft-ietf-pkix-tamp-05.txt> as a Proposed Standard

This document includes a downref to draft-ietf-pkix-new-asn1, which
is under consideration by the IESG for publication as an Informational RFC.
This document updates ASN.1 modules for PKIX specifications to conform to
the 2002 version of ASN.1, but makes no changes to the bits on the wire.
The community is specifically requested to consider whether down refs
to draft-ietf-pkix-new-asn1 are appropriate in the general case, 
in addition to the specific case of draft-ietf-pkix-tamp.

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2010-01-28. Exceptionally, 
comments may be sent to iesg@ietf.org instead. In either case, please 
retain the beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-pkix-tamp-05.txt


IESG discussion can be tracked via
https://datatracker.ietf.org/public/pidtracker.cgi?command=view_id&dTag=17760&rfc_flag=0

_______________________________________________
pkix mailing list
pkix@ietf.org
https://www.ietf.org/mailman/listinfo/pkix