Re: [openpgp] 1PA3PC: first-party attested third-party certifications (making Key Server Prefs no-modify actionable)

Daniel Kahn Gillmor <dkg@fifthhorseman.net> Fri, 30 August 2019 05:15 UTC

Return-Path: <dkg@fifthhorseman.net>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DCD571200FA for <openpgp@ietfa.amsl.com>; Thu, 29 Aug 2019 22:15:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=fifthhorseman.net header.b=kVHdD6pH; dkim=pass (2048-bit key) header.d=fifthhorseman.net header.b=ew/dXDXl
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9ZrGVDCaIK7v for <openpgp@ietfa.amsl.com>; Thu, 29 Aug 2019 22:15:58 -0700 (PDT)
Received: from che.mayfirst.org (che.mayfirst.org [IPv6:2001:470:1:116::7]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C866D1200E3 for <openpgp@ietf.org>; Thu, 29 Aug 2019 22:15:57 -0700 (PDT)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=fifthhorseman.net; i=@fifthhorseman.net; q=dns/txt; s=2019; t=1567142156; h=from : to : subject : in-reply-to : references : date : message-id : mime-version : content-type : from; bh=1wLbO6H4+2tcxHciDI2sdHJT7sl5HhpcH9iyOPTtbdI=; b=kVHdD6pHmBdUx4itHa7evmP8u0rM7gIB5QCBFnb0Z42sHiGRklLCy6i6 nckKX/OOb1qdQnpnYaWHaz4uN+W6CQ==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=fifthhorseman.net; i=@fifthhorseman.net; q=dns/txt; s=2019rsa; t=1567142156; h=from : to : subject : in-reply-to : references : date : message-id : mime-version : content-type : from; bh=1wLbO6H4+2tcxHciDI2sdHJT7sl5HhpcH9iyOPTtbdI=; b=ew/dXDXlhAuCqN+kX8FZ5CSGgaMsu28MXPPCaxg0Up2lwRcDYM6Fu+7p bTGnX9miz44oic4SM3YUWdbXBc6GpW04iNrBgWhjUKWBK+CbXe84tHy6ik EuDjXioemu+3FtS4a+ZdZ05IrKDuTwMJ07Jj5xLx9L6Tqla//tpo3SbZf6 2zc38GsfuGfXeuZpIt16mn+jmGpZul6sxfsMVWlPOd4Qr+uItGG3uGpJbG 8Gkh8uYRjGDosAatSgjU0w8Ury8YRqVMUqem9aht6QBkJNvf77fwjhL34S wo8VZY/K9RNtCryHHynw1o+ZJJZldlNXDWc4jhz80pZ4viQjD8sg5g==
Received: from fifthhorseman.net (unknown [IPv6:2001:470:1f07:60d:c41:39ff:fef3:974f]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by che.mayfirst.org (Postfix) with ESMTPSA id 057A6F9A6; Fri, 30 Aug 2019 01:15:55 -0400 (EDT)
Received: by fifthhorseman.net (Postfix, from userid 1000) id A3A5A2025E; Fri, 30 Aug 2019 01:15:40 -0400 (EDT)
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
To: Ángel <angel@16bits.net>, openpgp@ietf.org
In-Reply-To: <1567132742.1695.16.camel@16bits.net>
References: <87tva1am9t.fsf@fifthhorseman.net> <87blw94tfg.fsf@wheatstone.g10code.de> <87h860ag31.fsf@fifthhorseman.net> <8736hjaovv.fsf@fifthhorseman.net> <1567132742.1695.16.camel@16bits.net>
Autocrypt: addr=dkg@fifthhorseman.net; prefer-encrypt=mutual; keydata= mDMEXEK/AhYJKwYBBAHaRw8BAQdAr/gSROcn+6m8ijTN0DV9AahoHGafy52RRkhCZVwxhEe0K0Rh bmllbCBLYWhuIEdpbGxtb3IgPGRrZ0BmaWZ0aGhvcnNlbWFuLm5ldD6ImQQTFggAQQIbAQUJA8Jn AAULCQgHAgYVCgkICwIEFgIDAQIeAQIXgBYhBMS8Lds4zOlkhevpwvIGkReQOOXGBQJcQsbzAhkB AAoJEPIGkReQOOXG4fkBAO1joRxqAZY57PjdzGieXLpluk9RkWa3ufkt3YUVEpH/AP9c+pgIxtyW +FwMQRjlqljuj8amdN4zuEqaCy4hhz/1DbgzBFxCv4sWCSsGAQQB2kcPAQEHQERSZxSPmgtdw6nN u7uxY7bzb9TnPrGAOp9kClBLRwGfiPUEGBYIACYWIQTEvC3bOMzpZIXr6cLyBpEXkDjlxgUCXEK/ iwIbAgUJAeEzgACBCRDyBpEXkDjlxnYgBBkWCAAdFiEEyQ5tNiAKG5IqFQnndhgZZSmuX/gFAlxC v4sACgkQdhgZZSmuX/iVWgD/fCU4ONzgy8w8UCHGmrmIZfDvdhg512NIBfx+Mz9ls5kA/Rq97vz4 z48MFuBdCuu0W/fVqVjnY7LN5n+CQJwGC0MIA7QA/RyY7Sz2gFIOcrns0RpoHr+3WI+won3xCD8+ sVXSHZvCAP98HCjDnw/b0lGuCR7coTXKLIM44/LFWgXAdZjm1wjODbg4BFxCv50SCisGAQQBl1UB BQEBB0BG4iXnHX/fs35NWKMWQTQoRI7oiAUt0wJHFFJbomxXbAMBCAeIfgQYFggAJhYhBMS8Lds4 zOlkhevpwvIGkReQOOXGBQJcQr+dAhsMBQkB4TOAAAoJEPIGkReQOOXGe/cBAPlek5d9xzcXUn/D kY6jKmxe26CTws3ZkbK6Aa5Ey/qKAP0VuPQSCRxA7RKfcB/XrEphfUFkraL06Xn/xGwJ+D0hCw==
Date: Fri, 30 Aug 2019 01:15:40 -0400
Message-ID: <87lfvb8c8z.fsf@fifthhorseman.net>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha512"; protocol="application/pgp-signature"
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/SV4anZqg6A7GpWCnxEX3T8Y3IMU>
Subject: Re: [openpgp] 1PA3PC: first-party attested third-party certifications (making Key Server Prefs no-modify actionable)
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Aug 2019 05:16:00 -0000

On Fri 2019-08-30 04:39:02 +0200, Ángel wrote:
> It may not have been clear the way to work with the no-modify flag, but
> I feel you are changing its meaning now. By making it mean "do not
> redistribute third-party certifications", the result is having old
> clients that yet the no.modify flag yet are unable to make the needed
> attestations.
> I think this should be a new keyserver preferences flag. Eg. it could be
> called attested-certifications-only or drop-unattested-certifications.

In practice, nearly every modern existing certificate has the
keyserver-no-modify flag set on it.  and also in practice, there are
*no* keyservers in play that do anything with that flag that i'm aware
of.

The other thing to note is that abuse-resistant keystores are
essentially forced to require something like this, even if the
certificates don't ask for it, or else they're open to arbitrary
certificate flooding attacks of the kind that SKS is basically
collapsing under.  See the discussion in the abuse-resistant-keystore
draft about various comparable proposals for more details.

So i'm not too worried about (at last) providing actionable followup for
this long-claimed-but-unactionable flag.

If anything, my bigger concern would be what happens for certificates
where the user deliberately *clears* that flag, and they can't find any
keystore willing to accept unattested third-party certifications anyway
:)

If there's a broader consensus on the list that we shouldn't explicitly
associate no-modify with a 1PA3PC mechanism, then i can drop that part
of the changes.  But i don't know that i would bother creating a new
keyserver preferences flag for it, since that would imply that all
existing certificates want to be floodable.  That doesn't seem like a
great outcome.

         --dkg