Re: [ltans] I-D ACTION:draft-ietf-ltans-xmlers-07.txt

Tobias Gondrom <tobias.gondrom@gondrom.org> Tue, 19 October 2010 23:45 UTC

Return-Path: <tobias.gondrom@gondrom.org>
X-Original-To: ltans@core3.amsl.com
Delivered-To: ltans@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A81713A6959 for <ltans@core3.amsl.com>; Tue, 19 Oct 2010 16:45:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -94.808
X-Spam-Level:
X-Spam-Status: No, score=-94.808 tagged_above=-999 required=5 tests=[AWL=0.419, BAYES_00=-2.599, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR=2.426, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001, HTTP_ESCAPED_HOST=0.134, RDNS_DYNAMIC=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FFJ3D77SKEw4 for <ltans@core3.amsl.com>; Tue, 19 Oct 2010 16:45:19 -0700 (PDT)
Received: from lvps83-169-7-107.dedicated.hosteurope.de (lvps83-169-7-107.dedicated.hosteurope.de [83.169.7.107]) by core3.amsl.com (Postfix) with ESMTP id CBC043A693A for <ltans@ietf.org>; Tue, 19 Oct 2010 16:45:18 -0700 (PDT)
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=gondrom.org; b=jSxp+ah0eSWGrzKIP5uy9a8L3ZUcOus90D0kxV1MiKMtzWwzlZa3dH0vC8Vmu5iSgJbTz0e87jXUQLD06i1/XpPyinZ6f1O7OzJnoF3mm9U9Zx0gf7B/0T/C6m4wynS1; h=Received:Received:Message-ID:Date:From:User-Agent:MIME-Version:To:Subject:References:In-Reply-To:X-Enigmail-Version:Content-Type;
Received: (qmail 1761 invoked from network); 20 Oct 2010 01:46:46 +0200
Received: from 94-194-102-93.zone8.bethere.co.uk (HELO seraphim.heaven) (94.194.102.93) by lvps83-169-7-107.dedicated.hosteurope.de with (DHE-RSA-AES256-SHA encrypted) SMTP; 20 Oct 2010 01:46:46 +0200
Message-ID: <4CBE2DE6.5010007@gondrom.org>
Date: Wed, 20 Oct 2010 00:46:46 +0100
From: Tobias Gondrom <tobias.gondrom@gondrom.org>
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.9) Gecko/20100914 SUSE/3.1.4 Lightning/1.0b2 Thunderbird/3.1.4
MIME-Version: 1.0
To: ltans@ietf.org
References: <B365DBD652563B41A90F1F3B546A6C8FB95407@localpolitix.setcce.local> <DreamMail__192913_38246487245@msga-001.frcl.bull.fr>
In-Reply-To: <DreamMail__192913_38246487245@msga-001.frcl.bull.fr>
X-Enigmail-Version: 1.1.1
Content-Type: multipart/alternative; boundary="------------040000050900090205000804"
Subject: Re: [ltans] I-D ACTION:draft-ietf-ltans-xmlers-07.txt
X-BeenThere: ltans@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: LTANS Working Group <ltans.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ltans>, <mailto:ltans-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ltans>
List-Post: <mailto:ltans@ietf.org>
List-Help: <mailto:ltans-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ltans>, <mailto:ltans-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Oct 2010 23:45:21 -0000

 Ok, let's try to resolve this.
Over the last three days I've been working on possible changes to the
current draft that offer a way to store dssc in it. And I think I found
options that could be done fairly straight forward, but will need to
discuss the best options/wording with Aljosa tomorrow.
And I think we can add something to the security considerations, too.

Regarding Denis point #3: you mentioned that beyond the additional
discussion in the security considerations you feel further changes to
the main body would be necessary. Could you please elaborate, why, what
you mean by that / what you think is missing or a problem?

Tobias



On 10/19/2010 06:29 PM, Denis Pinkas wrote:
> Responses are in-line.
>  
>
>     ----- Message reçu -----
>     *De :* ltans-bounces <mailto%20:ltans-bounces@ietf.org>
>     *À :* ltans <mailto%20:ltans@ietf.org>
>     *Date :* 2010-10-18, 20:49:37
>     *Sujet :* Re: [ltans] I-D ACTION:draft-ietf-ltans-xmlers-07.txt
>
>     Denis,
>
>     My comments in-line
>
>      
>     > Carl,
>     >
>     > 1 - You said:
>     >
>     > [Carl] DSSC applies at validation time. I agree with Tobias that
>     while
>     > one could package the policy with a data item it is not
>     necessary. It
>     > doesn't really matter what policy the LTA had in mind.
>     > What matters is that the evidence record passes the policy used
>     by the
>     > relying party.
>     > I see no reason to make a change to include DSSC policy in the
>     XMLERS
>     > format.
>     >
>     > Let us make a comparison with the concept of signature policy.
>     > Electronic sigantures comes with two flavors: BES (Basic ES) and
>     EPES
>     > (Explicit Policy ES).
>     >
>     > In EPES, the signature policy is indicated. My request is to be
>     able to
>     > incorporate the maintenance policy, like in EPES.
>     > You say you don't need it, like in BES. So let us make it OPTIONAL,
>     > which means that it will be possible to place it in the structure,
>     > whereas it is not the case today.
>
>     We can evaluate this option and see if it fits as my concern is to
>     what
>     extent optional parameters are to be added. In case of maintenance
>     policy I would at least miss the original operation policy. With this
>     info one could decide on the reliability of ERS evidences and ERS
>     operation.
>
> I understand the first sentence, but not clearly the second one.
>
>     > 2 - You said:
>     >
>     > [Carl] I disagree, for reasons you have cited in the past. There
>     will
>     > always be a grace period applied at validation time so this "MUST be
>     > proven at the time the new TST is applied" cannot be true. In any
>     > case, these sorts of issues are for the relying party to
>     appraise and
>     > the policies used by relying parties may vary, hence DSSC need
>     not be
>     > included.
>     >
>     > When you consider a grace period, the TST on the previous data
>     can be
>     > applied first and the CRL for the previous TST captured, e.g. 24
>     hours
>     > later.
>
>     Now what happens if the CRL is compromised or ceases to exist, so its
>     integrity is questionable? The information (CRL) provided after
>     TST does
>     not give any value at all only if it is ERSed as the rest of the
>     information. Similarly, the AES does not consider such approach.
>
> The AES (Advanced Electronic Signature) does support that case.
> However, it does not mandate to support it, since the risk of a CRL
> Issuer compromise
> is much lower than the risk of the signer's key compromise.
>
> A second time stamp token can be placed on the references of the
> certification path
> including the revocation information. Since the references include a
> hash of the values,
> there is a full protection. For example, see  XAdES-X type 2.
>
>      > The DSCC information used at that time should also be added to the
>     > structure, before the new TST is applied.
>     >
>     > In this way, it will be possible to split the overall
>     verification by
>     > doing two sequences of verifications in any order:
>     > a) verifying the whole structure, making the assumption that
>     every DSCC
>     > information that has been used is correct, and
>     > b) verifying that every DSCC information placed in the structure
>     comes
>     > from a reliable source and was correct
>     > at the time indicated in the associated TST.
>     >
>     > The advantage is that check a) can be fully automated.
>
>     Agree if the reason for DSSC inclusion stands.
>      
>
> Fine.
>
>  
>
>     > 3 - You said:
>     >
>     > [Carl] A security consideration on this topic seems like a
>     reasonable
>     > thing to do. Tobias, can you add a security consideration to address
>     > the separation of evidence record from policy? I think that will
>     close
>     > this issue.
>     >
>     > Addressing the issue in the security considerations is fine.
>     However,
>     > changes in the main body of the document are still necessary.
>
>     As said before, optional element might be considered, however in this
>     case, I would say, the question remains open with the original ERS
>     syntax (I think you have mentioned that already). Security
>     considerations can be updated to address the above issues.
>      
>
> Indeed, ERS does not support these features.
>
>  
>
>     Aljosa
>     _______________________________________________
>     ltans mailing list
>     ltans@ietf.org <mailto:%20ltans@ietf.org>
>     https://www.ietf.org/mailman/listinfo/ltans
>
>
> _______________________________________________
> ltans mailing list
> ltans@ietf.org
> https://www.ietf.org/mailman/listinfo/ltans