Re: [openpgp] Revocations of third-party certifications (TPK+"CRL") [was: draft-dkg-openpgp-abuse-resistant-keystore-04.txt]

Peter Gutmann <pgut001@cs.auckland.ac.nz> Thu, 29 August 2019 12:07 UTC

Return-Path: <pgut001@cs.auckland.ac.nz>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D9EE11200F1 for <openpgp@ietfa.amsl.com>; Thu, 29 Aug 2019 05:07:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.198
X-Spam-Level:
X-Spam-Status: No, score=-4.198 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=auckland.ac.nz
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OoqvG1FYJhnb for <openpgp@ietfa.amsl.com>; Thu, 29 Aug 2019 05:07:07 -0700 (PDT)
Received: from mx4-int.auckland.ac.nz (mx4-int.auckland.ac.nz [130.216.125.246]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0F0FC1200D5 for <openpgp@ietf.org>; Thu, 29 Aug 2019 05:07:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=auckland.ac.nz; i=@auckland.ac.nz; q=dns/txt; s=mail; t=1567080427; x=1598616427; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=LdXdb/CZUcK1a+mYUECjjle6zkkCM4eSPH+Skw3B9LI=; b=p3TBxLXbJKkeNSbbEiJW3Af2iz/cFjFHvl5nla6YcSlBwRyOBbDuL4hu BeIeWH/PdUoR8KkvAaqax7CK6eTnqk3m6T7agUZ4pPsLB+j4sAOxbBCL1 bjS0pNtc+CdSBLJT7AnmCUtrH9aSlZFubhRav0pk2OMft0lA0IanCNXYk slhNIBz9oGKEtgQjpHzJr5bxxKUdY/xiZ1GME7mmEfVvr5xPTSfHFyv0M aZNy/mS6a6PEEhRHeBiEGRBkjuO9ZLs56IAj8y4psYuG2KOYjvSUKYUft 3ziA4qTcCTmOm71o8nfuJ0z1i481mzEuDeD2kO/TXMSGL25L/5cFKY4PF A==;
X-IronPort-AV: E=Sophos;i="5.64,442,1559476800"; d="scan'208";a="79254181"
X-Ironport-HAT: MAIL-SERVERS - $RELAYED
X-Ironport-Source: 10.6.3.3 - Outgoing - Outgoing
Received: from smtp.uoa.auckland.ac.nz (HELO uxcn13-tdc-b.UoA.auckland.ac.nz) ([10.6.3.3]) by mx4-int.auckland.ac.nz with ESMTP/TLS/AES256-SHA; 30 Aug 2019 00:07:03 +1200
Received: from uxcn13-ogg-d.UoA.auckland.ac.nz (10.6.2.5) by uxcn13-tdc-b.UoA.auckland.ac.nz (10.6.3.3) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Fri, 30 Aug 2019 00:07:02 +1200
Received: from uxcn13-ogg-d.UoA.auckland.ac.nz ([10.6.2.5]) by uxcn13-ogg-d.UoA.auckland.ac.nz ([10.6.2.5]) with mapi id 15.00.1395.000; Fri, 30 Aug 2019 00:07:02 +1200
From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: Daniel Kahn Gillmor <dkg@fifthhorseman.net>, Jon Callas <joncallas@icloud.com>, "openpgp@ietf.org" <openpgp@ietf.org>
Thread-Topic: [openpgp] Revocations of third-party certifications (TPK+"CRL") [was: draft-dkg-openpgp-abuse-resistant-keystore-04.txt]
Thread-Index: AQHVWTV/erbesUqyBEGgz5pu3ZR1aqcOqf2AgAAsMACAAJLHAIAA+bAAgAGu20k=
Date: Thu, 29 Aug 2019 12:07:01 +0000
Message-ID: <1567080406573.66529@cs.auckland.ac.nz>
References: <156650274021.14785.10325255315266801149.idtracker@ietfa.amsl.com> <875zmodi1v.fsf@fifthhorseman.net> <8736hsdfm4.fsf@fifthhorseman.net> <CAF751FB-4AFD-4E64-AD8C-E04B3031F50D@icloud.com> <87zhju9qlb.fsf@fifthhorseman.net> <6057F53D-2251-4B92-997B-EF241C2F4EF3@icloud.com>, <87imqh9bgr.fsf@fifthhorseman.net>
In-Reply-To: <87imqh9bgr.fsf@fifthhorseman.net>
Accept-Language: en-NZ, en-GB, en-US
Content-Language: en-NZ
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [130.216.158.4]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/He7V1srCi_S6AWWjZwalKIk3iTI>
Subject: Re: [openpgp] Revocations of third-party certifications (TPK+"CRL") [was: draft-dkg-openpgp-abuse-resistant-keystore-04.txt]
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Aug 2019 12:07:10 -0000

Daniel Kahn Gillmor <dkg@fifthhorseman.net> writes:

>I'm looking for concrete guidance that we can offer to operators of keystores
>and clients of keystores today.

Maybe we can look at X.509 for an example.  During the interminable X.509
standardisation process, there was an equally interminable debate about
whether to make revocations easy (the emergency handbrake model) or hard (the
DoS-resistance model).  The DoS resistance guys won out protocol-wise, and CAs
won out business-wise because it costs money to deal with revocations so
discouraging them as much as possible cuts back on expenses.

In the 20-25 years since then, there have, to the best of my knowledge, been
zero malicious revocations.  I counted them, twice.  There have however been
vast numbers of certs not revoked that should have been, or revoked far too
late to do any good, typically for malware-signing, phishing, or just
lost/password forgotten/eaten by the cat/whatever where there's no proof of
malicious use but they should still have been declared invalid for general
hygiene reasons.

So at least for X.509 the emergency-handbrake model should have been the one
to use but, typically for X.509, they went with the wrong option.  When a bus
is about to crash, you need to stop it promptly, not argue about who is and
isn't authorised to hit the brakes.

Peter.