Re: [jose] JOSE and PKCS11

Nathaniel McCallum <npmccallum@redhat.com> Wed, 27 February 2019 15:50 UTC

Return-Path: <nmccallu@redhat.com>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4EF1130FDB for <jose@ietfa.amsl.com>; Wed, 27 Feb 2019 07:50:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NrkkVOKvqPcI for <jose@ietfa.amsl.com>; Wed, 27 Feb 2019 07:50:54 -0800 (PST)
Received: from mail-io1-f42.google.com (mail-io1-f42.google.com [209.85.166.42]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A47281200B3 for <jose@ietf.org>; Wed, 27 Feb 2019 07:50:54 -0800 (PST)
Received: by mail-io1-f42.google.com with SMTP id p196so13851916iod.9 for <jose@ietf.org>; Wed, 27 Feb 2019 07:50:54 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=OW8MYm3k5vmLqNwct8iKYkmthyvMluzEcUH6M9wkVU0=; b=J1/mwcNjiLH6VG8Cd3ZjmDWlKuCIL2wZXzrwTCrDQNrEucCZQxiyj6LUuFabm358Tn ihu3DG3qeoSXqJEDSMZtfbA0cN+6MgjzQo3AcrrEyQp8EdDNPLEQDCGtYhsaLbeerVl/ y69j9h3N/lO3d0g3Zrp7GOrEPka48zxm0APFG+AYIgSi4yjFEWCf2zHw1XuuX1w6idSO gZVBLbySZ+vRUM72Dy+k51HwObdiYOlRkwq4LLuCEvdpZZd2mFW9YaUncAPHpDf+Xh+o LYkw4u/t3Xc38ARPLQjkLps1FAwNyr5kwz4HHXA5g3JfBr7yg2prfy14wihNCMDuk7yU tgFA==
X-Gm-Message-State: APjAAAXVJNrMtd7aV2KGoiLALEUd8j1Xzl/DTexaVWBcd2kjKjmPm9pY vdSzKhaudxIr9me5VnJeF9Y4SEX2sgVTtCBGgiGhRQ==
X-Google-Smtp-Source: APXvYqxwgtmj6pWu9cTa3D0YAcby80gUH6rnihgezKjPV+bD9KHZzHcvaQ+PEFJKwvt04sUvL/hX4Ke0Kw5qygStOfM=
X-Received: by 2002:a6b:8d55:: with SMTP id p82mr2343440iod.171.1551282653465; Wed, 27 Feb 2019 07:50:53 -0800 (PST)
MIME-Version: 1.0
References: <OF5CBAD5FA.DA05866D-ON00258338.007B994B-00258338.007BD260@notes.na.collabserv.com> <CAOASepMU3waryT=TKpw7sKFw-FT+JE3h-3xWUS7AZQwGgp8X5A@mail.gmail.com> <OF2BF5119B.748538F2-ON002583AD.007FDFBF-852583AD.0081099B@notes.na.collabserv.com> <E824FA9C-1E86-4B6A-909B-4EF7875C9BE9@forgerock.com> <OFB3CFC7BB.B88F2A57-ON002583AE.004D3EAD-852583AE.004E2F43@notes.na.collabserv.com> <48AE6835-F622-43AE-A1EA-23C3546B7DB8@forgerock.com> <CAOASepNpA8Mcj983ZSnZ7Pi1OZocT=sFap5Me_PtikzELGtJuw@mail.gmail.com> <93ACE34C-E89F-4EC5-AD7D-89A85B530A56@forgerock.com>
In-Reply-To: <93ACE34C-E89F-4EC5-AD7D-89A85B530A56@forgerock.com>
From: Nathaniel McCallum <npmccallum@redhat.com>
Date: Wed, 27 Feb 2019 10:50:42 -0500
Message-ID: <CAOASepP0+kFaaJ59VQ4bf+GD_YsSFkY22Q-x39Y8tN27H1xxqg@mail.gmail.com>
To: Neil Madden <neil.madden@forgerock.com>
Cc: Stefan Berger <stefanb@us.ibm.com>, jose <jose-bounces@ietf.org>, jose@ietf.org
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/jose/gL-w0R3IqRtOJcxII8wBR5a4_4U>
Subject: Re: [jose] JOSE and PKCS11
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/jose/>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Feb 2019 15:50:58 -0000

On Wed, Feb 27, 2019 at 10:09 AM Neil Madden <neil.madden@forgerock.com> wrote:
>
> On 27 Feb 2019, at 14:36, Nathaniel McCallum <npmccallum@redhat.com> wrote:
> >
> > On Wed, Feb 27, 2019 at 9:26 AM Neil Madden <neil.madden@forgerock.com> wrote:
> >>
> >> [snip]
>
> >> That already works just fine. Set the “kid” claim in your public JWK to the pkcs11/kmip URI and then make sure the client sends you the same value in the “kid” header of the encrypted JWE. This is precisely what the “kid” JWK claim and header are for.
> >>
> >> Depending on the sensitivity of the information in the URI, you may want to either encrypt it or replace it with an opaque identifier that you store in a local lookup table.
> >
> > The "kid" claim is not a good fit for this.
> >
> > First, "kid" may need to be used in conjunction with "p11". For
> > example, where "p11" replaces key material, the URI only refers to how
> > to find the key material. But it does not provide credentials to
> > access that key material. The "kid" may be needed to look up those
> > credentials.
>
> If you need the kid to lookup the credentials, can you not also use it to lookup the PKCS#11 URI?

You *may* need the kid to look up the credentials. You might also need
it for other reasons, like looking up usage policy or other things
unrelated to PKCS#11. The important bit here is that this is optional.

I chose the "p11" assertion precisely because I don't want to consume
"kid" with this information. In practice, libraries will handle "p11"
and applications will handle "kid". That, to me, justifies having two.

> > Second, "p11" needs to have its own well-defined security
> > considerations. There are security implications of using a PKCS#11 URI
> > in publicly disclosed fields. These need to be carefully outlined.
> > This is different than "kid" which is always presumed to be safe to
> > disclose.
>
> Again, this comes back to use cases. If the PKCS#11 URI is not safe to disclose then why do you want to expose it in a JWK? I know that JWK allows private key material to be represented, because this is sometimes useful to allow transmitting that key material. But with a PKCS#11 URI it is not key material, but instead a reference to key material in a locally/network-attached HSM, so presumably you are only sending it to yourself or another party locally connected to the same HSM? I’m struggling to see the interoperability requirement that would need this to be standardised.

First, PKCS#11 is a general purpose crypto API. HSMs are the
predominant, but not only, use case.

Second, PKCS#11 URIs are generally safe to disclose given the right
handling. Security is not black and white. This is precisely why the
Security Considerations section of IETF standards exist: to discuss
the details. These details are enough to justify a standard.

Third, there is a clear interoperability issue here: JOSE libraries.
Applications aren't going to be doing PKCS#11 directly (it is,
frankly, too hard). They're going to use JOSE libraries. So even if
the protocol between them is proprietary, they are going to hand a JWK
over to the library and expect PKCS#11 to work (within a set of
constraints).

Please keep this in mind: the JOSE WG is closed. This standard will
probably end up as an individual submission. I'm doing most of the
work. Implementers, including me, are finding value in it. I plan to
continue this work. However, if you would like to have discussion over
the specifics in the existing draft (including "p11" vs "kid"), I'm
glad to do so.