Re: [pkix] New draft-ietf-pkix-rfc2560bis-06

mrex@sap.com (Martin Rex) Mon, 22 October 2012 21:53 UTC

Return-Path: <mrex@sap.com>
X-Original-To: pkix@ietfa.amsl.com
Delivered-To: pkix@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2EA3521F88C7 for <pkix@ietfa.amsl.com>; Mon, 22 Oct 2012 14:53:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.204
X-Spam-Level:
X-Spam-Status: No, score=-10.204 tagged_above=-999 required=5 tests=[AWL=0.045, BAYES_00=-2.599, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U0kMe0xoPBdF for <pkix@ietfa.amsl.com>; Mon, 22 Oct 2012 14:53:31 -0700 (PDT)
Received: from smtpde01.sap-ag.de (smtpde01.sap-ag.de [155.56.68.170]) by ietfa.amsl.com (Postfix) with ESMTP id 540AD21F88B0 for <pkix@ietf.org>; Mon, 22 Oct 2012 14:53:24 -0700 (PDT)
Received: from mail.sap.corp by smtpde01.sap-ag.de (26) with ESMTP id q9MLrKaX007033 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 22 Oct 2012 23:53:20 +0200 (MEST)
In-Reply-To: <CANkYYy6nvWrE2U+xnnXa6kXu+WioE4+LZ+yd6cCiD8diBoHiLQ@mail.gmail.com>
To: Simon Tardell <simon@tardell.se>
Date: Mon, 22 Oct 2012 23:53:19 +0200
X-Mailer: ELM [version 2.4ME+ PL125 (25)]
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="US-ASCII"
Message-Id: <20121022215319.55EC71A2EB@ld9781.wdf.sap.corp>
From: mrex@sap.com
X-SAP: out
Cc: Peter Rybar <peterryb@gmail.com>, Stefan Santesson <stefan@aaa-sec.com>, pkix@ietf.org
Subject: Re: [pkix] New draft-ietf-pkix-rfc2560bis-06
X-BeenThere: pkix@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: mrex@sap.com
List-Id: PKIX Working Group <pkix.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pkix>, <mailto:pkix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pkix>
List-Post: <mailto:pkix@ietf.org>
List-Help: <mailto:pkix-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pkix>, <mailto:pkix-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Oct 2012 21:53:32 -0000

Simon Tardell wrote:
>
> I suggest that we use your current text plus that, if "revoked" is used
> to say "never issued/not in database", the revocationReason should be
> certificateHold and that revocationTime should be set to midnight Jan 1
> 1950 (or some other time before the rise of PKI).

I support the "revoked, ReasonCode=CertificateHold" for OCSP responders
that can not find proof/indication that the cert in question was properly
issued.

The CertificateHold reason code is vitally important, because otherwise
the CA would have to keep track of OCSP responses given out from the
CA's OCSP responder that declared a serial as "permanently revoked"
in order to ensure that the CA will never issue a cert with that serial
in the future.  Looks like an unnecessary and easily avoidable burden to me.


I don't like the particular date Jan 1, 1950, for safety, a date >= 1970
ought to be chosen (so that it does not get negative when converted
to time_t, which has potential to confuse some code).

And since the timestamp is a GeneralizedTime, the date ought to be
given in exactly that format, e.g.  "700101010101Z"


What also should be noted is that the optional OCSP SingleResponseExtension
"CrlID" must not be used when this "not issued" certificate was not
conveyed through a CRL--and there currently is no means to convey
proof-of-cert-existence through CRLs unless they're revoked, and in the
latter case there would be no "not issued" OCSP response to convey.


> 
> On the other hand, I think we should consider Denis' comment:
> 
> *Saying that the certificate has not been issued is not fully appropriate.*


I believe it is very inappropriate for the spec to make any assumptions
about why exactly the OCSP responder believes that a cert (serial) has not
ever been issued.  The reason can be manyfold.  Besides an accidental or
fraudulent deletion (attack), it may be something as simple as a
database software bug.

What we might want to say is that failures to access the database
of issued certs ought to result in an unknown rather than revoked
OCSP response.

The records of issuance, that the OCSP responder has access to,
need not contain the whole certificate.  The information may be
limited to serial numbers of issued certificates, and it SHOULD
include a hash of the cert (at least SHA-1, preferably SHA-256 as well).
In particular, the OCSP responder may not have access to the
validity of issued certs or any other certificate characteristics or
certificate attributes.


-Martin