[OAUTH-WG] Re: Call for adoption - PIKA
Tom Jones <thomasclinganjones@gmail.com> Tue, 17 September 2024 23:57 UTC
Return-Path: <thomasclinganjones@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E70F9C151524 for <oauth@ietfa.amsl.com>; Tue, 17 Sep 2024 16:57:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.104
X-Spam-Level:
X-Spam-Status: No, score=-7.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_FONT_FACE_BAD=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7AdzmZeVM39A for <oauth@ietfa.amsl.com>; Tue, 17 Sep 2024 16:57:21 -0700 (PDT)
Received: from mail-ed1-x530.google.com (mail-ed1-x530.google.com [IPv6:2a00:1450:4864:20::530]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2F5AFC151534 for <oauth@ietf.org>; Tue, 17 Sep 2024 16:57:21 -0700 (PDT)
Received: by mail-ed1-x530.google.com with SMTP id 4fb4d7f45d1cf-5c4226a5af8so6326638a12.1 for <oauth@ietf.org>; Tue, 17 Sep 2024 16:57:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1726617439; x=1727222239; darn=ietf.org; h=cc:to:subject:message-id:date:from:reply-to:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=QPlyY1faaer8B2aJISklEnJLeDvghyTziTx+HmUPjNs=; b=e8aAZYOwa+QYMIJ6D/WJDIEbpBh9GQ6oTBBOav/lhG2tdzFMD4UjqTEN6Hd33NMh/E vnnfT6ro+XTRJdG4b0mHxRhvSAqy8KaDp6ojizfh2ccrDGB2FDZqDV+oMGGyXYHI6o1g rvQrf2Ze4u4pMbIRcaTxB67WPtOObKvGlAn+YrN+K1jVr/H0bdcZkV5/yAQqaR/UxdPq gP/Nz89GK5iXK93aJ31H/G/HjiU097SI9mJXcrepk4iAOPgW843rKmdJtt5L+b9vdBXo pQRn9jkhc+rvVsKRx+DEDm9GcPB29bRq3yt6z/oTLyYfkfjPnNX4snzEOgQYRY/yiNln vc2w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1726617439; x=1727222239; h=cc:to:subject:message-id:date:from:reply-to:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=QPlyY1faaer8B2aJISklEnJLeDvghyTziTx+HmUPjNs=; b=C0pidnqYzj/fkFzuykT2xswc8R0VEjJ9zfr3emuO9ZANo5QGs71jMCXmifsZzkepwU qSll4GqJxUsslJ2zUDjwEvGSskRHx7qrSsBG+LrlNrWVekbLuUshwmvcfCPjDXi+0vxT vGJKvLxSJMum48/yaPZQie3+eDoDpA2R7udsc/sIBSFqj1jVUnZU6FvI3lG+Aq3waJg4 WiEaTGv4l/+xd00JfFo0FP0A+dlcY2zqneudYGkLf6JihedIMj0iZ8KxHWAg+lBqgoi8 IJa0hjuD4nmJhrFNH2LoAEH4zAJvzRV3NEnKWM14ZL12z6a7zhb90ZxxoIU6jwIuuIZf c4VQ==
X-Gm-Message-State: AOJu0YzFOtB1nWNNJyGuW8hqT0p+pWF7EKCoNnDPAVOt9FZJHw6cvjSK BJ+bKHrmksHu4IMZUzS/5dQ5ZxQMgKhDLAJsQNetPRdjonZJiNwKAzHfMbscsmQ4QE4I9xBuffm YnA4Euy/uJ6q7ge70mWDwOXIWzKFpEEfG
X-Google-Smtp-Source: AGHT+IG5tcee9WisAnAr9x2aev9mWG27cRgWI0IIOzeRNA9Q8SFpbI33VUwCb2PraSN+Vw4SkLaifBTWUHANpOkI/3M=
X-Received: by 2002:a05:6402:354a:b0:5c2:439e:d6d6 with SMTP id 4fb4d7f45d1cf-5c413e117ebmr18739775a12.11.1726617439154; Tue, 17 Sep 2024 16:57:19 -0700 (PDT)
MIME-Version: 1.0
References: <CADNypP80YnzxOc_NDbFqK0bv=i0Ys1s8hYHwo-PqhUPbAWs4sg@mail.gmail.com> <ff6a0d93-af5d-479f-9ae7-14815364a73e@connect2id.com>
In-Reply-To: <ff6a0d93-af5d-479f-9ae7-14815364a73e@connect2id.com>
From: Tom Jones <thomasclinganjones@gmail.com>
Date: Tue, 17 Sep 2024 16:57:07 -0700
Message-ID: <CAK2Cwb6EFbt4tz5QkanVbWeB4_NFDwxa4GtAoEb6X3ss0TTSDA@mail.gmail.com>
To: Vladimir Dzhuvinov <vladimir@connect2id.com>
Content-Type: multipart/alternative; boundary="0000000000001fba7706225973cb"
Message-ID-Hash: E6UFWIQIKHLW2PAUQ5PDB6Y6XILYLK4P
X-Message-ID-Hash: E6UFWIQIKHLW2PAUQ5PDB6Y6XILYLK4P
X-MailFrom: thomasclinganjones@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-oauth.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: oauth@ietf.org
X-Mailman-Version: 3.3.9rc4
Precedence: list
Reply-To: peace@acm.org
Subject: [OAUTH-WG] Re: Call for adoption - PIKA
List-Id: OAUTH WG <oauth.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/Cn8IngiJZK0OsDmaUd4Q0-eOBao>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Owner: <mailto:oauth-owner@ietf.org>
List-Post: <mailto:oauth@ietf.org>
List-Subscribe: <mailto:oauth-join@ietf.org>
List-Unsubscribe: <mailto:oauth-leave@ietf.org>
This is not the way I used PKI for user proofing. For convenience we added the Subject Alternative Name (SAN) which I guess is what you mean by a TLS certificate. This cert key was added to the TPM and used to sign JSON messages from the client to the server. Please don't mix the attributes of the PKI for the actual purpose of the key and cert. Peace ..tom jones On Tue, Sep 17, 2024 at 1:01 PM Vladimir Dzhuvinov <vladimir@connect2id.com> wrote: > I frankly don't see how the central premise of PIKA - the reliance on a > TLS web domain certificate - can be made to work in practice. > > > Reasons: Infrastructure in the real world, mixing of concerns, conflict > with CA policies and CAB Forum requirements, NIST etc guidance compliance > issues. > > > The argument - JWKs are already published at an HTTPS URL - so let's take > the private key from the web reverse proxy (assuming there is no HSM) and > start signing JWTs at some application with it - how I would be able to > make this argument at some company X. > > When we look at how infrastructure is setup and administered - even if we > here in the OAuth WG decide to say "using the private TLS key for other > purposes is entirely okay" - there are significant practical issues with > this. It's not just a matter of being theoretically able to cross from the > app layer into the TLS layer. These two layers are typically managed by > different departments in orgs, and there are good reasons to isolate them. > I can't imagine being able to go to the admins and say, make me a copy of > the private key so I can sign JWTs with it, or let me install this service > on your infra to sign my JWTs. > > Let's also think about the potential legal and compliance issues. > > CAs that issue certs that prove web domain control have policies. These > policies are linked to the EKU values in the certs. Using the cert to sign > stuff other than that expressly identified in the CA policy and the > extKeyUsage fields can be seen as breaking those policies. > > https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf > > 3.6 Installation and Use of Your Certificate > > The purpose of Your Certificate is to authenticate and encrypt Internet > communications. > > I'd also suggest to go and check whether the CA / Browser Forum, in its > "Baseline Requirements for the Issuance and > Management of Publicly‐Trusted TLS Server Certificates" does not stipulate > an overarching policy for CAs that generally prohibits issue of TLS certs > with additional EKU values. > > Orgs that seek compliance with NIST and similar guidance are likely to see > issue with this approach too. Documents like NIST Special Publication > 800-57 / Recommendation for Key Management. > > I'm not in favour of adopting this spec as it is in the WG. Let's consider > the practical situation apart from what seems technically possible. > > I made a diff between drafts 01 & 02 and noticed that in 02 the policy > issues of using CA TLS certs for PIKA were probably recognised to some > degree, in the "5.2. Signing Key Compromise" section. > > > https://author-tools.ietf.org/iddiff?url1=draft-barnes-oauth-pika-00&url2=draft-barnes-oauth-pika-01&difftype=--html > > Apart from the "5.2. Signing Key Compromise" section, draft 02 that is > now proposed for adoption is identical to the original 01 that wasn't > adopted in June. It's okay to explain the intent to resubmit without > changes, just as it's okay to disagree on a particular adoption. I get it > that the topic of PIKA feels contentious. > > > Vladimir Dzhuvinov > > On 03/09/2024 13:47, Rifaat Shekh-Yusef wrote: > > All, > > As per the discussion in Vancouver, this is a call for adoption for the *Proof > of Issuer Key Authority (PIKA) *draft: > https://datatracker.ietf.org/doc/draft-barnes-oauth-pika/ > > Please, reply on the mailing list and let us know if you are in favor or > against adopting this draft as WG document, by *Sep 17th*. > > Regards, > Rifaat & Hannes > > _______________________________________________ > OAuth mailing list -- oauth@ietf.org > To unsubscribe send an email to oauth-leave@ietf.org > > _______________________________________________ > OAuth mailing list -- oauth@ietf.org > To unsubscribe send an email to oauth-leave@ietf.org >
- [OAUTH-WG] Call for adoption - PIKA Rifaat Shekh-Yusef
- [OAUTH-WG] Re: Call for adoption - PIKA Neil Madden
- [OAUTH-WG] Re: Call for adoption - PIKA Giuseppe De Marco
- [OAUTH-WG] Re: Call for adoption - PIKA Falk Andreas
- [OAUTH-WG] Re: Call for adoption - PIKA Joel Kamp
- [OAUTH-WG] Re: Call for adoption - PIKA Ethan Heilman
- [OAUTH-WG] Re: Call for adoption - PIKA Rohan Mahy
- [OAUTH-WG] Re: Call for adoption - PIKA Joseph Salowey
- [OAUTH-WG] Re: Call for adoption - PIKA Pieter Kasselman
- [OAUTH-WG] Re: Call for adoption - PIKA Kristina Yasuda
- [OAUTH-WG] Re: Call for adoption - PIKA Michael Jones
- [OAUTH-WG] Re: Call for adoption - PIKA Richard Barnes
- [OAUTH-WG] Re: Call for adoption - PIKA Michael Jones
- [OAUTH-WG] Re: Call for adoption - PIKA Vladimir Dzhuvinov
- [OAUTH-WG] Re: Call for adoption - PIKA Giuseppe De Marco
- [OAUTH-WG] Re: Call for adoption - PIKA Tom Jones
- [OAUTH-WG] Re: Call for adoption - PIKA David Waite
- [OAUTH-WG] Re: Call for adoption - PIKA Watson Ladd
- [OAUTH-WG] Re: Call for adoption - PIKA Tom Jones
- [OAUTH-WG] Re: Call for adoption - PIKA Richard Barnes
- [OAUTH-WG] Re: Call for adoption - PIKA Richard Barnes
- [OAUTH-WG] Re: Call for adoption - PIKA Michael Jones
- [OAUTH-WG] Re: Call for adoption - PIKA Tom Jones
- [OAUTH-WG] Re: Call for adoption - PIKA Richard Barnes