Re: [netconf] [Anima] [lamps] Long-lived certificates, but frequently renewed certificates

Eliot Lear <lear@cisco.com> Thu, 18 March 2021 19:22 UTC

Return-Path: <lear@cisco.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 586B23A3241; Thu, 18 Mar 2021 12:22:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.901
X-Spam-Level:
X-Spam-Status: No, score=-11.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gGTgmZjXINoD; Thu, 18 Mar 2021 12:22:51 -0700 (PDT)
Received: from aer-iport-3.cisco.com (aer-iport-3.cisco.com [173.38.203.53]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C4AE83A3242; Thu, 18 Mar 2021 12:22:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3678; q=dns/txt; s=iport; t=1616095371; x=1617304971; h=from:message-id:mime-version:subject:date:in-reply-to:cc: to:references; bh=V8X8ssA6dpzLXGcp+dSAWsGwDw9NoxQZpbqsewbe8FI=; b=jhPHDb/qsQdE09aOp4f6LvctGr63mmdE8OW9NWrAsJsgKVbuvPFy0RL1 g2EErDegol740dLpGMbpmVADLMMtXcyAq1Fh/sqcZ7vp1tUcTYrEvAm6N nWWPr5KlHwBvJA1odEe9ycXqQ5jrT6zVbuEMBVSLJSPyrhFidvZv4OnF5 E=;
X-Files: signature.asc : 488
X-IPAS-Result: A0BXAwByp1Ng/xbLJq1aHAEBAQEBAQcBARIBAQQEAQGCEIN3AScSMYRCiQSIRQOBCZlpgWgEBwEBAQoDAQE0BAEBgVuCdQKBeiY4EwIDAQEBAwIDAQEBAQUBAQECAQYEcYVuhkQBAQEDASNWBQsLGCoCAlcGCgmCcAGCZiGqaHeBMoVYhFwQgTmBU4twQoILgREnHIIjNT6EAiaDLjWCKwSCQAUBAWdOJVsKFSoIESEBnhGccoMOgzmBQJdXAx+DRJBDLI9/swxeAYN5AgQGBQIWgWsjgVkzGggbFWUBgj4+EhkNjlWOE0ADLzgCBgEJAQEDCY97AQE
IronPort-HdrOrdr: A9a23:BcJpua1YuCgUCOiWRGrzDAqjBDAkLtp033Aq2lEZdDV+eKWj5q OTtd4c0gL5jytUZWE4lbm7VJWobHvA+fdOgLU5EqylWGDd0leADIYn1of6xi2lJiuWzI5g/I NtabJ3BtG1LVUSt6vHyS25F9pl/9Wd6qCvgo7loEtFdg1hZ6F+4woRMG/yeXFefwVICYE0E5 CR/KN81l+dUE4KZce2DGRtZYb+juDM/aiWAyIuNloC4AmKgSjA0s+fLzGomjEDTjhI3bAutU /CngCR3NTEj9iLjjnBymTU85Na3OHE9+IGLsmNhs8JQw+c7TqVWA==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.81,259,1610409600"; d="asc'?scan'208";a="31872841"
Received: from aer-iport-nat.cisco.com (HELO aer-core-1.cisco.com) ([173.38.203.22]) by aer-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 18 Mar 2021 19:22:46 +0000
Received: from [10.61.144.57] ([10.61.144.57]) by aer-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id 12IJMjlC030894 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 18 Mar 2021 19:22:46 GMT
From: Eliot Lear <lear@cisco.com>
Message-Id: <718D80AD-8F12-4AA0-9D2A-2D8806B487C2@cisco.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_62026F26-6622-4F78-9FA3-C24CFF3B5A70"; protocol="application/pgp-signature"; micalg="pgp-sha256"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.60.0.2.21\))
Date: Thu, 18 Mar 2021 20:22:44 +0100
In-Reply-To: <2113.1616093888@localhost>
Cc: Nico Williams <nico@cryptonector.com>, Toerless Eckert <tte@cs.fau.de>, LAMPS <spasm@ietf.org>, netconf@ietf.org, anima@ietf.org
To: Michael Richardson <mcr+ietf@sandelman.ca>
References: <20210318165455.GM8957@faui48f.informatik.uni-erlangen.de> <20210318183001.GN30153@localhost> <2113.1616093888@localhost>
X-Mailer: Apple Mail (2.3654.60.0.2.21)
X-Outbound-SMTP-Client: 10.61.144.57, [10.61.144.57]
X-Outbound-Node: aer-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/8iXhe-vzfx4WjUcz3DTqyrjroHY>
Subject: Re: [netconf] [Anima] [lamps] Long-lived certificates, but frequently renewed certificates
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Mar 2021 19:22:53 -0000

Hiya,

> On 18 Mar 2021, at 19:58, Michael Richardson <mcr+ietf@sandelman.ca> wrote:
> 
> A pity that EST (and I think SCEP, but I haven't read it all), just returns
> the resulting certificate, and not something more useful, like a JSON dict
> that includes the certificate.
> 
> RFC7030 has a 202, Retry-After, which could be used to tell the holder to
> go away and come back later, but the intended use is not to say not now,
> but rather, "I'm working on it".

This is definitely a problem in a number of deployments.  One aspect that people have to deal with is not so much the gross expiry time, but when it is convenient to take a risk of moving to a new cert.  Of course you’re going to want to make that operation as bullet-proof as possible, but in some environments they want multiple levels of resilience.  So scheduling does become an issue.

The big question is- who does the scheduling?  Is it the end system?  Is it the EST server?  Who knows when “convenient” is?  Probably the answer is “both”.

Eliot

> 
> If the whole thing was more RESTful, then holders could be told to GET their
> certificate from some place, and we could use ETag, and Expiry headers to
> tell the holder that it hasn't changed, and isn't expected to change for
> awhile, so piss off and come back then.
> 
> In the full ACP situation, then we might expect holders to have active
> RESTCONF management, and then we can renew certificates in a push scenario
> using draft-ietf-netconf-sztp-csr-01, which I note is now past WGLC.
> 
>> A related idea is that an RP can want certificates to be "fresh" enough
>> regardless of when their notAfters are, and again, there's no signaling
>> that via the supplicant's certificate unless somehow the issuer is
>> expected to know a policy all RPs want.
> 
> I'm much less concerned about the RP here.
> The reason to issue long lifetime certificates is that things don't break
> just because some less critical infrastructure is not alive, or not reachable.
> 
> Our reference example/use case in brski-async-enroll is communication between
> thermostats and furnaces in a (newly built) residence.
> The furnace needs to heat keep the home above zero even when the house is not
> occupied, and possibly has not yet been occupied.
> 
> Maybe abuse of the certificate renewal process is the wrong way to accomplish
> transfers of ownership.
> 
> --
> Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 IøT consulting )
>           Sandelman Software Works Inc, Ottawa and Worldwide
> 
>