Re: [Iotops] BRSKI and IDevID (non-!)issues with draft-ietf-uta-use-san

Eliot Lear <lear@cisco.com> Fri, 14 May 2021 06:52 UTC

Return-Path: <lear@cisco.com>
X-Original-To: iotops@ietfa.amsl.com
Delivered-To: iotops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1C3313A2635; Thu, 13 May 2021 23:52:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.899
X-Spam-Level:
X-Spam-Status: No, score=-11.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 45xkMQxo1Tbo; Thu, 13 May 2021 23:52:43 -0700 (PDT)
Received: from aer-iport-3.cisco.com (aer-iport-3.cisco.com [173.38.203.53]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A1F823A2629; Thu, 13 May 2021 23:52:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4570; q=dns/txt; s=iport; t=1620975163; x=1622184763; h=from:message-id:mime-version:subject:date:in-reply-to:cc: to:references; bh=+5jCRNzanRLjskmNRX5GFTGuehlhCFwlGEGolH5tvTw=; b=ipYz8yhiUB/Avn2JIs49zBPChHALBMRODMzkX/2MkB1HaknL//DzJYxr bQti67vZCW4ofkWA5NUzZHRsHnhtXAvXouTMdry7PJEXkQD75Whk1DS6Z ZUfkFaFwamdac+VJxxd+ZxgdlAbGVTBJ5YpXft3ERgAZYlCSBqFLds0OC A=;
X-Files: signature.asc : 488
X-IPAS-Result: A0ADAQDQHZ5g/xbLJq1RCRsBAQEBAQEBAQUBAQESAQEBAwMBAQGCF4MiVgEnEjGER4kEiH4DnQwEBwEBAQoDAQEtFAQBAYFbgnQCgXUmOBMCBAEBAQEDAgMBAQEBBQEBBQEBAQIBBgRxE4VQDYZEAQEBAwEjBEsHBQsLDAwqAgI9GgYTgnEBgmYhpzp6fzOBAYRjhSEQgTqBU4wQQ4INgRUnHIJfPoJhBIEyg0M2gi0EgkVlBFUfAWM/XQWRXByLPYEqnSSDIINKgUmEbpNDBSODWYFBj3GQLp8olR9lhAoCBAYFAhaBayMrgS4zGggbFTsqAYI+CTUSGQ6SD4pfPwMvOAIGAQkBAQMJikstghgBAQ
IronPort-HdrOrdr: A9a23:j307NKG0EXxFoHWgpLqE7ceALOsnbusQ8zAXPo5KOH9om62j+/ xG88576faZslwssTQb+exoRpPsfZqsz/FICOAqVN/IYOClghrMEGgI1+XfKlPbak/DH5ZmpM Ndm2wUMqyXMbC85vyKhzWFLw==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.82,299,1613433600"; d="asc'?scan'208";a="33570436"
Received: from aer-iport-nat.cisco.com (HELO aer-core-1.cisco.com) ([173.38.203.22]) by aer-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 14 May 2021 06:52:38 +0000
Received: from smtpclient.apple ([10.61.144.21]) by aer-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id 14E6qbPQ002764 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Fri, 14 May 2021 06:52:37 GMT
From: Eliot Lear <lear@cisco.com>
Message-Id: <D426B94E-6C3B-44C3-A580-310D2953D0CD@cisco.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_7FF024FA-EC88-456D-B2BC-D9A9FC03E584"; protocol="application/pgp-signature"; micalg="pgp-sha256"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.80.0.2.43\))
Date: Fri, 14 May 2021 08:52:36 +0200
In-Reply-To: <15280.1620951766@localhost>
Cc: "Salz, Rich" <rsalz@akamai.com>, "uta@ietf.org" <uta@ietf.org>, iotops@ietf.org, anima@ietf.org
To: Michael Richardson <mcr+ietf@sandelman.ca>
References: <F538FFD7-D172-4AEE-82DD-CF6F93936C3B@akamai.com> <D341C730-EBA1-4BF5-B200-0BE1A4B8A1D0@cisco.com> <413CBCFE-1FDF-458E-9F0E-E3D58F86E5D9@bluepopcorn.net> <A5B94C6E-419D-454E-92E8-FEEB5F8EDE17@cisco.com> <8A41ED29-2448-4633-AC45-33DE98A6BC81@akamai.com> <7B51BB81-1C9D-4B2F-AF83-1E528E620AE7@cisco.com> <CAFewVt4Pm6-T3XC65uEceuzpXjNubEYLWY9h1cmHdNBPcpOVXQ@mail.gmail.com> <42739D1C-004F-4DAD-8023-8E9731B46E05@cisco.com> <15280.1620951766@localhost>
X-Mailer: Apple Mail (2.3654.80.0.2.43)
X-Outbound-SMTP-Client: 10.61.144.21, [10.61.144.21]
X-Outbound-Node: aer-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/iotops/2Cjxk3YKR_DpK_A0XRwmaJwfsL0>
Subject: Re: [Iotops] BRSKI and IDevID (non-!)issues with draft-ietf-uta-use-san
X-BeenThere: iotops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IOT Operations <iotops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/iotops>, <mailto:iotops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/iotops/>
List-Post: <mailto:iotops@ietf.org>
List-Help: <mailto:iotops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/iotops>, <mailto:iotops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 May 2021 06:52:59 -0000

Hi,

I think we’re past this, but just to be clear:

There are a VAST number of devices that run off of iDevIDs: they never transition off of them.  I’m not a fan, but that’s what they do.

Eliot

> On 14 May 2021, at 02:22, Michael Richardson <mcr+ietf@sandelman.ca> wrote:
> 
> Signed PGP part
> 
> I read the document before it was adopted (before SECDISPATCH), and I didn't
> see any problems with it.
> 
> I have re-read it in the context of IoT or enterprise (routers) devices that
> might contain long-lived IDevID (sometimes called Manufacturer Installed
> Certificates, confusingly appreviated "MIC").
> CISCO calls them Secure Unique Device Identifier (SUDI), and there are many
> other manufacturers with their own interesting names.
> I believe that the CHIP/MATTER effort also mandates such a thing for the
> purposes of identity and device attestation.
> 
> In BRSKI (about to be RFC8995) TLS connections are initiated from a client
> (the pledge) to a Registrar.  The TLS connections make use of
> ClientCertificates for identification.  RFC6125 rules are not relevant
> to validation of the client certificate.
> If a CN=, emailAddress= or DC= was present in the ClientCertificate it would
> not be used as part of the validation in a compliant Registrar.
> The Registrar cares about the X520SerialNumber (aka "serialNumber=") only.
> 
> In the other direction, the pledge does not initially validate the Registrar
> ServerCertificate at all.  It is taken as given, provisionally, until such
> time as the pledge gets corroboration from an RFC8366 voucher.  In general,
> the Registrar certificate is issued from a private (enterprise) PKI, and the
> corroboration depends upon a sales relationship with the vendor (the MASA).
> 
> RFC6125 DNS-ID validations may occur in the MASA, depending upon policy.
> The new rules from use-san should apply without a problem, if any 6125
> validation (vs explicit pinning) was used.
> The Registrar->MASA connection is already explicitely RFC6125 DNS-ID only.
> 
> In summary, I don't see anything in use-san that will affect BRSKI.
> 
> It may be that Cisco and other manufacturers use their certificates in other
> ways, and I can't speak for whether they might be affected.
> 
> 
> Some nits:
> 
>>  While not discussed in [RFC6125] this section also implicitly
>>  prohibits the use of the Domain Component or emailAddress RDN's.
> 
> 1) it seems like, since it's mentioned here, that it's not "implicit" at all.
>   It seems rather explicit to me.
> 
> 2) I think that the deprecation of a sequence of "DC=" probably warrants a
>   sentence of its own.
> 
> 3) I'm unclear how emailAddress was used when a DNS name was desired.
>   Were there rules that allowed the client to say, "connect to example.com"
>   and then validation was okay if the certificate says emailAddress=foo@example.com?
>   If so, then I think that this situation should be more clearly deprecated.
> 
> 4) I suggest that section 3 "The New Rules" should be in positive language
>   only.  Most of the language is what not to do.  I think that this is
>   important to list, but I suggest it be split up into a section "Do this"
>   and a section "Do not do this"
> 
> --
> Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 IøT consulting )
>           Sandelman Software Works Inc, Ottawa and Worldwide
> 
> 
> 
> 
> 
>