Re: [ltans] I-D ACTION:draft-ietf-ltans-xmlers-07.txt

"Denis Pinkas"<denis.pinkas@bull.net> Tue, 19 October 2010 17:27 UTC

Return-Path: <denis.pinkas@bull.net>
X-Original-To: ltans@core3.amsl.com
Delivered-To: ltans@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AD8C93A68C2 for <ltans@core3.amsl.com>; Tue, 19 Oct 2010 10:27:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.589
X-Spam-Level:
X-Spam-Status: No, score=0.589 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_FR=0.35, HTML_MESSAGE=0.001, RCVD_BAD_ID=2.837]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2SRMWUbCrP7q for <ltans@core3.amsl.com>; Tue, 19 Oct 2010 10:27:48 -0700 (PDT)
Received: from odin2.bull.net (odin2.bull.net [129.184.85.11]) by core3.amsl.com (Postfix) with ESMTP id E42B93A68B7 for <ltans@ietf.org>; Tue, 19 Oct 2010 10:27:47 -0700 (PDT)
Received: from MSGA-001.frcl.bull.fr (msga-001.frcl.bull.fr [129.184.87.31]) by odin2.bull.net (Bull S.A.) with ESMTP id 63560180DE for <ltans@ietf.org>; Tue, 19 Oct 2010 19:35:33 +0200 (CEST)
Received: from FRCLS4013 ([129.184.39.15]) by MSGA-001.frcl.bull.fr (Lotus Domino Release 5.0.11) with SMTP id 2010101919291728:15343 ; Tue, 19 Oct 2010 19:29:17 +0200
From: Denis Pinkas <denis.pinkas@bull.net>
To: ltans <ltans@ietf.org>
Date: Tue, 19 Oct 2010 19:29:13 +0200
Message-Id: <DreamMail__192913_38246487245@msga-001.frcl.bull.fr>
References: <B365DBD652563B41A90F1F3B546A6C8FB95407@localpolitix.setcce.local>
MIME-Version: 1.0
X-Priority: 3 (Normal)
X-Mailer: DreamMail 4.4.1.0
X-MIMETrack: Itemize by SMTP Server on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 19/10/2010 19:29:17, Serialize by Router on MSGA-001/FR/BULL(Release 5.0.11 |July 24, 2002) at 19/10/2010 19:29:18, Serialize complete at 19/10/2010 19:29:18
Content-Type: multipart/alternative; boundary="----=_NextPart_10101919291279112304808_002"
Subject: Re: [ltans] I-D ACTION:draft-ietf-ltans-xmlers-07.txt
X-BeenThere: ltans@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: denis.pinkas@bull.net
List-Id: LTANS Working Group <ltans.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ltans>, <mailto:ltans-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ltans>
List-Post: <mailto:ltans@ietf.org>
List-Help: <mailto:ltans-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ltans>, <mailto:ltans-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Oct 2010 17:27:49 -0000

Responses are in-line.

----- Message reçu ----- 
De : ltans-bounces 
À : ltans 
Date : 2010-10-18, 20:49:37
Sujet : Re: [ltans] I-D ACTION:draft-ietf-ltans-xmlers-07.txt


Denis,

My comments in-line

 
> Carl,
> 
> 1 - You said:
> 
> [Carl] DSSC applies at validation time. I agree with Tobias that
while
> one could package the policy with a data item it is not necessary. It
> doesn't really matter what policy the LTA had in mind.
> What matters is that the evidence record passes the policy used by the
> relying party.
> I see no reason to make a change to include DSSC policy in the XMLERS
> format.
> 
> Let us make a comparison with the concept of signature policy.
> Electronic sigantures comes with two flavors: BES (Basic ES) and EPES
> (Explicit Policy ES).
> 
> In EPES, the signature policy is indicated. My request is to be able to
> incorporate the maintenance policy, like in EPES.
> You say you don't need it, like in BES. So let us make it OPTIONAL,
> which means that it will be possible to place it in the structure,
> whereas it is not the case today.

We can evaluate this option and see if it fits as my concern is to what
extent optional parameters are to be added. In case of maintenance
policy I would at least miss the original operation policy. With this
info one could decide on the reliability of ERS evidences and ERS
operation.
I understand the first sentence, but not clearly the second one.
> 2 - You said:
> 
> [Carl] I disagree, for reasons you have cited in the past. There will
> always be a grace period applied at validation time so this "MUST be
> proven at the time the new TST is applied" cannot be true. In any
> case, these sorts of issues are for the relying party to appraise and
> the policies used by relying parties may vary, hence DSSC need not be
> included.
> 
> When you consider a grace period, the TST on the previous data can be
> applied first and the CRL for the previous TST captured, e.g. 24 hours
> later.

Now what happens if the CRL is compromised or ceases to exist, so its
integrity is questionable? The information (CRL) provided after TST does
not give any value at all only if it is ERSed as the rest of the
information. Similarly, the AES does not consider such approach.
The AES (Advanced Electronic Signature) does support that case. 
However, it does not mandate to support it, since the risk of a CRL Issuer compromise 
is much lower than the risk of the signer's key compromise.
A second time stamp token can be placed on the references of the certification path 
including the revocation information. Since the references include a hash of the values, 
there is a full protection. For example, see  XAdES-X type 2. 
 > The DSCC information used at that time should also be added to the
> structure, before the new TST is applied.
> 
> In this way, it will be possible to split the overall verification by
> doing two sequences of verifications in any order:
> a) verifying the whole structure, making the assumption that every DSCC
> information that has been used is correct, and
> b) verifying that every DSCC information placed in the structure comes
> from a reliable source and was correct
> at the time indicated in the associated TST.
> 
> The advantage is that check a) can be fully automated.

Agree if the reason for DSSC inclusion stands.

Fine.

> 3 - You said:
> 
> [Carl] A security consideration on this topic seems like a reasonable
> thing to do. Tobias, can you add a security consideration to address
> the separation of evidence record from policy? I think that will
close
> this issue.
> 
> Addressing the issue in the security considerations is fine. However,
> changes in the main body of the document are still necessary.

As said before, optional element might be considered, however in this
case, I would say, the question remains open with the original ERS
syntax (I think you have mentioned that already). Security
considerations can be updated to address the above issues.

Indeed, ERS does not support these features.

Aljosa
_______________________________________________
ltans mailing list
ltans@ietf.org
https://www.ietf.org/mailman/listinfo/ltans