Re: [OPSAWG] Fwd: New Version Notification for draft-ietf-opsawg-mud-21.txt

Eric Rescorla <ekr@rtfm.com> Fri, 18 May 2018 19:00 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A722C12E058 for <opsawg@ietfa.amsl.com>; Fri, 18 May 2018 12:00:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3BCTZunohB_w for <opsawg@ietfa.amsl.com>; Fri, 18 May 2018 12:00:21 -0700 (PDT)
Received: from mail-ot0-x231.google.com (mail-ot0-x231.google.com [IPv6:2607:f8b0:4003:c0f::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A477212E852 for <opsawg@ietf.org>; Fri, 18 May 2018 12:00:21 -0700 (PDT)
Received: by mail-ot0-x231.google.com with SMTP id m11-v6so10303954otf.3 for <opsawg@ietf.org>; Fri, 18 May 2018 12:00:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=284qurZlMEGFebArcsAASmpB/XNAurdLgSCl3IpYhY0=; b=mmGwfKTl++njKvDwoOU1JugxHesaGIrdo+ysgP5sjNCIkINfACQHkYQYTkIPwMo2EL 7uQ0Ehnr9DKqfXdC9Y7DyFUIvrlfpadwNZBDpXKFM+tUZTyw6qKFd3PQOolbiRu42tDm 0feNwA26lNIXjLHz7dnaByGZCSVC6YOmtbcPdUp+3tep6sZUQdsn3gwe/POTFpxC67WR oM0nAtEVKGK+1IVqOiNHCUJCyYL5ZQrj16EBp088qE5fdMSJ3KSyF1qgy2huSJmrrJhX LvKjF4IdS1ybSq9ouHxzilmWVyYBWWegmljpoM4nF07lUWzjRcCBGx/w6colTrbZM17x mGew==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=284qurZlMEGFebArcsAASmpB/XNAurdLgSCl3IpYhY0=; b=cvvq2LWF3wKrUXWt7ylraUBcrNnABb/QLW6FoPJah8/I/S1hEPOSXIoxkMpmP28VKg x0mfCZ5phRFabC/CrX++4qWxXsIYHs2oNmEsxdtBLSrOS/qEhnkom0HNl7vg0IY9g0xT tU22DAhGI9xFrLJTK9WEgKdjse7rgw0qiJp4xzKuxILuW909h4aE1jOXvgLz7jUayQFq oDJ0MjRJ3wN3savpw7qWQ5EBNuVAfM2mYurCiGfIgB9A6xHFj6gsFX398ZGrzCAcPjD/ 562nBU6xJFn6XLBJhBCXGUDAloOKdtky04WL+VrrvHlZJlvYPiRPqM5vWhM7OqYaE9+C Fq/w==
X-Gm-Message-State: ALKqPwdC+VQRXcXL9bFFAoLMXOWpGe6rRtB9Nx+qZEy/tD0ksabEHJQ3 Qne0gpbsF+fqac1gtEuTLzdrsHDiatgbIn4K+WfMww==
X-Google-Smtp-Source: AB8JxZo9y3Rg9vplbezRRPeAVoE9GJ5xthWDqBUo6N/XZQx9MMLsvebW2G1+7+lGa1beU4crREdm6RotOG8ALPTdmTc=
X-Received: by 2002:a9d:3694:: with SMTP id h20-v6mr7612605otc.176.1526670020948; Fri, 18 May 2018 12:00:20 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.201.118.130 with HTTP; Fri, 18 May 2018 11:59:40 -0700 (PDT)
In-Reply-To: <998ca370-69b1-cd29-15d8-25d2e55459e1@cisco.com>
References: <152657039204.7694.840577957694607451.idtracker@ietfa.amsl.com> <8bafe1e0-12af-6526-d16e-6d39fded3bf3@cisco.com> <0dc704d2-73a2-977f-08c8-8e0b01c3b57c@cisco.com> <CABcZeBPgiSi7rxPwj9XPECcD1SimZ1B=Xnym5tXoUkASFD2TGg@mail.gmail.com> <998ca370-69b1-cd29-15d8-25d2e55459e1@cisco.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Fri, 18 May 2018 11:59:40 -0700
Message-ID: <CABcZeBOqTQkqicN7exzk+_sqpYHAPx3TYa-BBF9uHj3qRafPqg@mail.gmail.com>
To: Eliot Lear <lear@cisco.com>
Cc: Joe Clarke <jclarke@cisco.com>, "opsawg@ietf.org" <opsawg@ietf.org>, IESG <iesg@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000049d2ea056c7f908e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/wFpScmhd5wmsQndgm_I02QPNILk>
Subject: Re: [OPSAWG] Fwd: New Version Notification for draft-ietf-opsawg-mud-21.txt
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 May 2018 19:00:30 -0000

On Fri, May 18, 2018 at 11:56 AM, Eliot Lear <lear@cisco.com> wrote:

> Hi EKR,
>
>
> On 18.05.18 19:57, Eric Rescorla wrote:
> > Eliot, > > The certificate part seems basically right (I think you
> should require specific KeyUsage bits).
> It's in there:
>
> It is expected that the Key Usage extension would contain "Digital
> Signature" and that the extended key usage would include either "code
> signing" or "email protection".
>
>
> This leaves a little a little flexibility.  I think this is sufficient,
> and compatible with existing CAs.
>

I disagree. This is going to lead to a lot of interop problems. You need to
actually specify the bits

> > Maybe I missed it, but I didn't see anything about the level of trust
you should have in cases where you can't reliably tie the endpoint's
transmissions to its certificate.
It's there but could be clearer:

OLD:

A
MUD manager MUST cease processing of that file it cannot validate the
chain of trust to a known trust anchor until an administrator has
given approval.


NEW:

A
MUD manager MUST cease processing of that file it cannot validate the
chain of trust to a known trust anchor or the MUDsigner until an
administrator has
given approval.


That is- throw an exception and let the admin sort it out.

This is about the file. I'm talking about IP/MAC forgery.

-Ekr


> Eliot
>