Re: [Iotops] [Acme] Fwd: New Version Notification for draft-sweet-iot-acme-04.txt

Carl Wallace <carl@redhoundsoftware.com> Wed, 30 August 2023 14:02 UTC

Return-Path: <carl@redhoundsoftware.com>
X-Original-To: iotops@ietfa.amsl.com
Delivered-To: iotops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3C517C15153F for <iotops@ietfa.amsl.com>; Wed, 30 Aug 2023 07:02:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.104
X-Spam-Level:
X-Spam-Status: No, score=-2.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=redhoundsoftware.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RPHtS4tkVhWr for <iotops@ietfa.amsl.com>; Wed, 30 Aug 2023 07:02:50 -0700 (PDT)
Received: from mail-oi1-x236.google.com (mail-oi1-x236.google.com [IPv6:2607:f8b0:4864:20::236]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A9D85C151543 for <iotops@ietf.org>; Wed, 30 Aug 2023 07:02:46 -0700 (PDT)
Received: by mail-oi1-x236.google.com with SMTP id 5614622812f47-3a85b9deeb3so3824753b6e.1 for <iotops@ietf.org>; Wed, 30 Aug 2023 07:02:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhoundsoftware.com; s=google; t=1693404165; x=1694008965; darn=ietf.org; h=mime-version:in-reply-to:references:thread-topic:message-id:to:from :subject:date:user-agent:from:to:cc:subject:date:message-id:reply-to; bh=ipJUvU5PQJiA0yVpshsUJU8oxZPLNgsRNActm503Ags=; b=FAsJccWlDV3vg2KxtgnLwKNJNntamaE+y3NkCO5qEf9Ic0b6FfBFvvZiH68Rk8tcNq 5rVZG9iIi9m7G7slMEwQGaLAFt0Iw9AR4sjWehcwmmSQRCgc0bNFVwgFAAjMRvPEq7Lr vIbKGCyuldajWIKh71NjQ0aRH+x0+uoJZiVVU=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693404165; x=1694008965; h=mime-version:in-reply-to:references:thread-topic:message-id:to:from :subject:date:user-agent:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=ipJUvU5PQJiA0yVpshsUJU8oxZPLNgsRNActm503Ags=; b=BZEtP1ZFOl8G9yKmnwYfmFG+XNrepShdVv5wYBTlxFoj26aUR6mN2ypmvhi0kjWX98 lw+NXESdkU7H0YD7s33GR8WXHUMW5mUYhFkH7ccy9KEtndQa8vI0kIAOM4jhegleLkDG LFIa3HFyYUGsrYhu0xGQet0DJaOqIHyM2yyA1v9emgbHCtK21lYRptdyqIcZv1Fz+Zv3 n7ZB+3hnJA2hI5FPPT5sO8dO7RUMcli3pOMWLX5DiKSyXipcUhQAMp2/9sh0DJwu+AIH 7TZv7KjDW676hHocVsTx5WyhKqKosPclpExsXasUHNHQ3u1ykVaARYM8xeUXJ6oq3dRD frWg==
X-Gm-Message-State: AOJu0YzIFHVf2+zhGsaZAE6AC23akjo/aMjVGlPnfRaPKq82CZOHk4/0 myjrxmh0RvUKlXvJaEqFGqcq+VmrmwVuTDiHdiA=
X-Google-Smtp-Source: AGHT+IEsuIYFgZHvr33lOTgn2h29bUGRjZXquITUe15fpLTsq6Uz3d1i5N4ZDyUQpEZ54eWEsYsSrA==
X-Received: by 2002:a05:6808:308d:b0:3a7:6224:8424 with SMTP id bl13-20020a056808308d00b003a762248424mr2666429oib.56.1693404165070; Wed, 30 Aug 2023 07:02:45 -0700 (PDT)
Received: from [192.168.1.2] ([2600:100a:b029:be38:5580:8241:3eb2:d1d1]) by smtp.gmail.com with ESMTPSA id u12-20020a056808150c00b003a747ea96a8sm5576915oiw.43.2023.08.30.07.02.43 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Wed, 30 Aug 2023 07:02:44 -0700 (PDT)
User-Agent: Microsoft-MacOutlook/16.76.23082700
Date: Wed, 30 Aug 2023 09:02:42 -0500
From: Carl Wallace <carl@redhoundsoftware.com>
To: Michael Sweet <msweet=40msweet.org@dmarc.ietf.org>, IOTOPS Working Group <iotops@ietf.org>, acme@ietf.org, PWG IPP Workgroup <ipp@pwg.org>
Message-ID: <DA50710F-C755-458A-94E5-08C71BFB09BA@redhoundsoftware.com>
Thread-Topic: [Acme] Fwd: New Version Notification for draft-sweet-iot-acme-04.txt
References: <169099211414.11957.13218136675686326535@ietfa.amsl.com> <C33D08FE-DB2A-4319-9FCD-45B6C2379D55@msweet.org>
In-Reply-To: <C33D08FE-DB2A-4319-9FCD-45B6C2379D55@msweet.org>
Mime-version: 1.0
Content-type: multipart/alternative; boundary="B_3776230964_419419817"
Archived-At: <https://mailarchive.ietf.org/arch/msg/iotops/xu4HE2BjekPG6U8z509gsz2I8_Y>
Subject: Re: [Iotops] [Acme] Fwd: New Version Notification for draft-sweet-iot-acme-04.txt
X-BeenThere: iotops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IOT Operations <iotops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/iotops>, <mailto:iotops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/iotops/>
List-Post: <mailto:iotops@ietf.org>
List-Help: <mailto:iotops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/iotops>, <mailto:iotops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Aug 2023 14:02:55 -0000

Here are a few comments and questions:

 

Section 3.2.1 says root certificates "MUST contain subjectAltName extensions for ".local" and the local domain name(s), and MAY contain subjectAltName extensions for the current IP address(es) of the server." Section 3.3 says "Client Devices MUST NOT use ".local" host names or IP addresses to validate the CA certificate since those values are not unique." These statements appear to be in conflict. Re: 3.2.1, should there be a similar section for an intermediate CA or is the root expected to issue all certificates?

 

The MUST in section 4.5 seems like it should be split into a SHOULD for revocation and a MUST for re-issuance. The current text has a MUST for revocation or re-issuance.

 

Section 4.7 requires revocation of all certificates with an old name when its name changes. Is it necessarily the case that the appropriate local ACME server will be available to revoke the certificates? What should be done if it’s not?

 

In Section 4.9 what does "Client Devices MUST separately track and validate the root X.509 certificate for each local ACME Server" mean? Does this mean relative to TOFU, checking self-signed signature and SAN, or something else? The draft intimates there is a separate trust anchor store per network. If this is intended, it may be worth stating.

 

From: Acme <acme-bounces@ietf.org> on behalf of Michael Sweet <msweet=40msweet.org@dmarc.ietf.org>
Date: Wednesday, August 2, 2023 at 11:08 AM
To: IOTOPS Working Group <iotops@ietf.org>, <acme@ietf.org>, PWG IPP Workgroup <ipp@pwg.org>
Subject: [Acme] Fwd: New Version Notification for draft-sweet-iot-acme-04.txt

 

All,

 

This version addresses the feedback I've received since IETF-116, namely:

 

- Using the ACME server's root certificate as the network identifier

- Highlighting where/how this fits with secure network connection

- Clarifying the trust model

- Adding security considerations WRT key material

 

As always, feedback and questions are appreciated!

 



Begin forwarded message:

 

From: internet-drafts@ietf.org

Subject: New Version Notification for draft-sweet-iot-acme-04.txt

Date: August 2, 2023 at 12:01:54 PM EDT

To: "Michael Sweet" <msweet@msweet.org>

 


A new version of I-D, draft-sweet-iot-acme-04.txt
has been successfully submitted by Michael Sweet and posted to the
IETF repository.

Name:                   draft-sweet-iot-acme
Revision:              04
Title:                      ACME-Based Provisioning of IoT Devices
Document date:                2023-08-02
Group:                  Individual Submission
Pages:                   13
URL:            https://www.ietf.org/archive/id/draft-sweet-iot-acme-04.txt
Status:         https://datatracker.ietf.org/doc/draft-sweet-iot-acme/
Html:           https://www.ietf.org/archive/id/draft-sweet-iot-acme-04.html
Htmlized:       https://datatracker.ietf.org/doc/html/draft-sweet-iot-acme
Diff:           https://author-tools.ietf.org/iddiff?url2=draft-sweet-iot-acme-04

Abstract:
  This document extends the Automatic Certificate Management
  Environment (ACME) [RFC8555] to provision X.509 certificates for
  local Internet of Things (IoT) devices that are accepted by existing
  web browsers and other software running on End User client devices.




The IETF Secretariat


 

________________________
Michael Sweet

 

_______________________________________________ Acme mailing list Acme@ietf.org https://www.ietf.org/mailman/listinfo/acme