[OAUTH-WG] Re: Call for adoption - PIKA

Watson Ladd <watsonbladd@gmail.com> Tue, 17 September 2024 22:27 UTC

Return-Path: <watsonbladd@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ADEEBC1C6340 for <oauth@ietfa.amsl.com>; Tue, 17 Sep 2024 15:27:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M-6T4rE_OQ7u for <oauth@ietfa.amsl.com>; Tue, 17 Sep 2024 15:27:33 -0700 (PDT)
Received: from mail-wr1-x432.google.com (mail-wr1-x432.google.com [IPv6:2a00:1450:4864:20::432]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 998F0C180B64 for <oauth@ietf.org>; Tue, 17 Sep 2024 15:27:33 -0700 (PDT)
Received: by mail-wr1-x432.google.com with SMTP id ffacd0b85a97d-374bd0da617so4237150f8f.3 for <oauth@ietf.org>; Tue, 17 Sep 2024 15:27:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1726612051; x=1727216851; darn=ietf.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=hBjTF6hv+3XhOrNorjA33We910Ql4818g73WuTtDDRA=; b=HUP7VtBEDb39Po+UjcSzPxTm5CkUfVdhlj+811w9qtBVtI1MeCgw5IF96mhIOZpfUN ODiP14XYtKrJZl0AJNRyBzyvCvMRKb4uGq5dXEnzWsoa7YbaDkOgtZr3vvsP5ItVRxOh +PBYi285GOGLyaxxVI3S73CkFq6sl+714U/1TrH99dd1EX+MWgqR386rx4B+ee9FkXrr BkZU46mQkrwFwfmK195QKT33N/SiFSmYEVoMPB5ulRl/qKSBVjyOuJ0zyxtkMqw8kyA2 9GdNswjX6Zj0mS+SsR+UbBatAVoZ8c4OkRHusCAv0J1ybJWvo47v7GU1V0VsDpZAF6+Q NrVg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1726612051; x=1727216851; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=hBjTF6hv+3XhOrNorjA33We910Ql4818g73WuTtDDRA=; b=JCxClx9pJnATZ5qd4UCZOjAAlhUoHCNqZmRRpJngzXbnzS3YrFA4oAg8L7KUO4vx0B xMBg3LNGrrEDF4HvVJGxnfyV1qr25hWQm5p2Zro7Q0K6Pr2L1OElVn+nwh23SDupp476 CQ83nQYYz05QKnmUS8NeHodA/aMu9EkkAQ+LCtlmEquEx03ntqG0apLF89s12ei/SqSx HEi3vZMMEp7lsT0dF5HUnAEBl++gfcFSMVNIHkYf6VTcahCfpLPfEcRSKEYUy+VTchyc GNHG26mUY0bGstwCOTctrYXRr4CMiU1QfOqpnkVfT0yONdbfm7KSc2aFBbX/J2KYNVlU O8oQ==
X-Gm-Message-State: AOJu0YxH1hq07rbym3sosa/jzcufP7ILGSdY+70o8BPHRcaQK8J3JkMA 9XbSgT5nWbSErdmAOgzTYwkh8cZPlgaJzBhJz9JnVlvtgpk1lH10ir2C6VHMce7jo7smhhBvU5d MkQAIzwdnW5x8ScJKI4JM3J4xUQE=
X-Google-Smtp-Source: AGHT+IFLMNJilt6dBw+FuntcNOgoHzPI3t20NQXpR70NWUwU8K+Jdc44GvtBi7l49FAzSKZuvvC6PlLVh+CK6E6krOM=
X-Received: by 2002:a05:6000:1cc:b0:367:9d2c:95ea with SMTP id ffacd0b85a97d-378c2d5585bmr11399358f8f.56.1726612051196; Tue, 17 Sep 2024 15:27:31 -0700 (PDT)
MIME-Version: 1.0
References: <CADNypP80YnzxOc_NDbFqK0bv=i0Ys1s8hYHwo-PqhUPbAWs4sg@mail.gmail.com> <ff6a0d93-af5d-479f-9ae7-14815364a73e@connect2id.com>
In-Reply-To: <ff6a0d93-af5d-479f-9ae7-14815364a73e@connect2id.com>
From: Watson Ladd <watsonbladd@gmail.com>
Date: Tue, 17 Sep 2024 15:27:20 -0700
Message-ID: <CACsn0cmR_MGM52yQZCvbLwXAXGXY4KWSW26k20MhRLqfU_=6qw@mail.gmail.com>
To: Vladimir Dzhuvinov <vladimir@connect2id.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Message-ID-Hash: SVVMFD3GDNJHL6XKJO7YS2CRPKWNE67J
X-Message-ID-Hash: SVVMFD3GDNJHL6XKJO7YS2CRPKWNE67J
X-MailFrom: watsonbladd@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-oauth.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: oauth@ietf.org
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [OAUTH-WG] Re: Call for adoption - PIKA
List-Id: OAUTH WG <oauth.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/aHZ1-ErtYt9KjN5CRRLFTxetxm8>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Owner: <mailto:oauth-owner@ietf.org>
List-Post: <mailto:oauth@ietf.org>
List-Subscribe: <mailto:oauth-join@ietf.org>
List-Unsubscribe: <mailto:oauth-leave@ietf.org>

On Tue, Sep 17, 2024 at 1:02 PM Vladimir Dzhuvinov
<vladimir@connect2id.com> wrote:
>
> I frankly don't see how the central premise of PIKA - the reliance on a TLS web domain certificate - can be made to work in practice.
>
>
> Reasons: Infrastructure in the real world, mixing of concerns, conflict with CA policies and CAB Forum requirements, NIST etc guidance compliance issues.
>
>
> The argument - JWKs are already published at an HTTPS URL - so let's take the private key from the web reverse proxy (assuming there is no HSM) and start signing JWTs at some application with it - how I would be able to make this argument at some company X.
>
> When we look at how infrastructure is setup and administered - even if we here in the OAuth WG decide to say "using the private TLS key for other purposes is entirely okay" - there are significant practical issues with this. It's not just a matter of being theoretically able to cross from the app layer into the TLS layer. These two layers are typically managed by different departments in orgs, and there are good reasons to isolate them. I can't imagine being able to go to the admins and say, make me a copy of the private key so I can sign JWTs with it, or let me install this service on your infra to sign my JWTs.

Like it or not the Web PKI is the only system to prove domain control
via cryptographic means that exists. You can of course get another
cert for use for only this purpose: signing with the web servers cert
is not required in the current draft.

>
> Let's also think about the potential legal and compliance issues.
>
> CAs that issue certs that prove web domain control have policies. These policies are linked to the EKU values in the certs. Using the cert to sign stuff other than that expressly identified in the CA policy and the extKeyUsage fields can be seen as breaking those policies.

We've resolved this issue with Delegated Credentials, there's no
reason to think we can't do the same here. It really isn't a problem.

>
> https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf
>
> 3.6 Installation and Use of Your Certificate
>
> The purpose of Your Certificate is to authenticate and encrypt Internet communications.
>
> I'd also suggest to go and check whether the CA / Browser Forum, in its "Baseline Requirements for the Issuance and
> Management of Publicly‐Trusted TLS Server Certificates" does not stipulate an overarching policy for CAs that generally prohibits issue of TLS certs with additional EKU values.

Mozilla's CA policy specifically envisions the potential use of a root
certificate to sign intermediates that don't have the ServerAuth EKU
but could have a different one for this.
>
> Orgs that seek compliance with NIST and similar guidance are likely to see issue with this approach too. Documents like NIST Special Publication 800-57 / Recommendation for Key Management.
>
> I'm not in favour of adopting this spec as it is in the WG. Let's consider the practical situation apart from what seems technically possible.
>
> I made a diff between drafts 01 & 02 and noticed that in 02 the policy issues of using CA TLS certs for PIKA were probably recognised to some degree, in the "5.2. Signing Key Compromise" section.
>
> https://author-tools.ietf.org/iddiff?url1=draft-barnes-oauth-pika-00&url2=draft-barnes-oauth-pika-01&difftype=--html
>
> Apart from the "5.2. Signing Key Compromise" section, draft 02 that is now proposed for adoption is identical to the original 01 that wasn't adopted in June. It's okay to explain the intent to resubmit without changes, just as it's okay to disagree on a particular adoption. I get it that the topic of PIKA feels contentious.
>
>
> Vladimir Dzhuvinov


-- 
Astra mortemque praestare gradatim