RE: request for WG to adopt draft-chadwick-webdav-00.txt as a work item

Stefan Santesson <stefans@microsoft.com> Fri, 07 September 2007 10:26 UTC

Return-path: <owner-ietf-pkix@mail.imc.org>
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1ITb2X-0004G9-BM for pkix-archive@lists.ietf.org; Fri, 07 Sep 2007 06:26:17 -0400
Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1ITb2V-0004or-MY for pkix-archive@lists.ietf.org; Fri, 07 Sep 2007 06:26:17 -0400
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l879LZwC050244 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 7 Sep 2007 02:21:37 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l879LZkd050243; Fri, 7 Sep 2007 02:21:35 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f
Received: from smtp-dub.microsoft.com (smtp-dub.microsoft.com [213.199.138.191]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l879LUA4050231 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for <ietf-pkix@imc.org>; Fri, 7 Sep 2007 02:21:34 -0700 (MST) (envelope-from stefans@microsoft.com)
Received: from DUB-EXHUB-C301.europe.corp.microsoft.com (65.53.213.91) by DUB-EXGWY-E801.partners.extranet.microsoft.com (10.251.129.1) with Microsoft SMTP Server (TLS) id 8.1.177.2; Fri, 7 Sep 2007 10:21:29 +0100
Received: from EA-EXMSG-C307.europe.corp.microsoft.com ([65.53.221.50]) by DUB-EXHUB-C301.europe.corp.microsoft.com ([65.53.213.91]) with mapi; Fri, 7 Sep 2007 10:21:29 +0100
From: Stefan Santesson <stefans@microsoft.com>
To: David Chadwick <d.w.chadwick@kent.ac.uk>, George Michaelson <ggm@apnic.net>
CC: "ietf-pkix@imc.org" <ietf-pkix@imc.org>
Date: Fri, 07 Sep 2007 10:21:26 +0100
Subject: RE: request for WG to adopt draft-chadwick-webdav-00.txt as a work item
Thread-Topic: request for WG to adopt draft-chadwick-webdav-00.txt as a work item
Thread-Index: AcfwuiSk7XJqBCUgSoGnPR2/oL5eWwAdCxZQ
Message-ID: <A15AC0FBACD3464E95961F7C0BCD1FF006A25BE158@EA-EXMSG-C307.europe.corp.microsoft.com>
References: <20070906121635.134112cf@garlique.algebras.org> <A15AC0FBACD3464E95961F7C0BCD1FF006A25BDE5E@EA-EXMSG-C307.europe.corp.microsoft.com> <20070906160757.4ccdf148@garlique.algebras.org> <A15AC0FBACD3464E95961F7C0BCD1FF006A25BDE83@EA-EXMSG-C307.europe.corp.microsoft.com> <20070906164906.77095d06@garlique.algebras.org> <46E050F2.4040307@kent.ac.uk>
In-Reply-To: <46E050F2.4040307@kent.ac.uk>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l879LYA3050237
Sender: owner-ietf-pkix@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-pkix/mail-archive/>
List-ID: <ietf-pkix.imc.org>
List-Unsubscribe: <mailto:ietf-pkix-request@imc.org?body=unsubscribe>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: b5216aa5b0df24d46eaed76d4f65aa31

David,

> It is true that an attacker
> could make a revoked cert appear to be not revoked by attacking the
> repository and re-installing a valid cert. But this would soon be
> discovered by the issuer and fixed probably in less time than the
> period between CRL issuances.

One can argue if this is good enough, but if the attacker has control over the web server, then he can re-install the cert as valid at the time of the attack (i.e. when the relying party is receiving the fake transaction and does the checking), and then remove it again to cover up his tracks. This could be done in a few seconds.

> Further, an attacker could not make a valid cert
> appear to be revoked because it cannot manufacture a genuine CRL that
> is needed at the CRL URL.

Which of your statements is true?
"It is true that an attacker could make a revoked cert appear to be not revoked"; or
"Further, an attacker could not make a valid cert appear to be revoked"

From how I read your document I don't need to create any CRL to make a revoked certificate appear non-revoked because only revoked certificates have a CRL of length 1, right?
So I could simply remove the CRL and re-install the certificate as non-revoked.

Your document states:
"*When* a certificate is revoked, it has a unique web page
(revocation URL) at which the revocation list (of length one) *SHOULD* be
found."


Stefan Santesson
Senior Program Manager
Windows Security, Standards


> -----Original Message-----
> From: David Chadwick [mailto:d.w.chadwick@kent.ac.uk]
> Sent: den 6 september 2007 21:12
> To: George Michaelson
> Cc: Stefan Santesson; ietf-pkix@imc.org
> Subject: Re: request for WG to adopt draft-chadwick-webdav-00.txt as a
> work item
>
> Hi George
>
> thankyou for raising the topic on the list (others have only privately
> engaged with me).
>
> The current draft does have multiple parts to it, which could be easily
> separated into separate IDs.
>
> i)the REST principles and definition of the AIA for the cert and CRL
> states/URL locations
>
> ii)the format of the directory structure in the repository (from the
> DN). As you noted, my proposal is only one of many ways of
> standardising
> this, and it isnt needed at all if push mode is used.
>
> iii) protocols for picking up the state information. One could use
> various different protocols for this, as well as webdav.
>
> Stefan is only partly correct in saying that revocation trust has moved
> from signed objects to the repository.  It is true that an attacker
> could make a revoked cert appear to be not revoked by attacking the
> repository and re-installing a valid cert. But this would soon be
> discovered by the issuer and fixed probably in less time than the
> period
> between CRL issuances. Further, an attacker could not make a valid cert
> appear to be revoked because it cannot manufacture a genuine CRL that
> is
> needed at the CRL URL. An attacker could make it appear that the cert
> that you are holding was never actually issued by attacking the
> repository and removing the cert from the cert URL. But this is no
> different to a DOS attack which both CRLs and OCSP are susceptible to
> and is considerably more difficult to engineer. Again, the issuer
> should
> be able to easily detect this. Signed objects are still
> essential to prove you have a certificate, in that if rubbish is posted
> at the cert URL, it would never be accepted, so it has to be a genuine
> signed certificate that is there.  Consequently an attacker could never
> manufacture a false credential without breaking the asymmetric
> encryption algorithm, in which case all of PKI is dead anyway.
>
> I am happy to revise the ID when we have an agreement on what changes
> should be made, and split it into several if required.
>
> We now have a fully working system using http (not SSL
> yet), implemented by a student, and the performance is impressive. Its
> also much easier to install than LDAP for example.
>
> regards
>
> David
>
> George Michaelson wrote:
> > On Thu, 6 Sep 2007 11:56:34 +0100
> > Stefan Santesson <stefans@microsoft.com> wrote:
> >
> >> A few answers and comments:
> >>
> >>> I don't see
> >>> aggressive use of the various existing CRL/OCSP check methods.
> >> We must have vastly different experience then. I see a very large
> >> deployment of PKI based on CRL and OCSP. However large amounts of
> >> certs are deployed where they are not very visible, for example to
> >> enable VPN or wireless networks. Public PKIs are still not very
> >> spread with exception of web-server certificates.
> >
> > right. I see webdave (that was a slip, which I will leave in for its
> > humour value in context) addressing the public space.
> >
> > I do not claim OCSP, CRLs are not used. I will believe you that  in
> > private contexts they get good deployment. I am also sure that very
> few
> > people in browserland consciously engage with CRLs or OCSP services,
> and
> > routinely click through warning boxes about server certificate name
> > mismatches, expiry, or lack of TA material behind the cert being
> > offered.
> >
> >
> >> It is my experience that OCSP and CRLs works very well in the vast
> >> majority of cases I see.
> >
> > That's good to know. Because the SIDR WG is about testing assertions
> > about the totality of the information in the repository, OCSP was not
> > high on my radar. access to CRLs, and efficient access to
> repositories
> > is, and web or webdav, in allowing mechanisms like cache time
> controls,
> > virtual hosting and streams of data, looked like a good longterm fit.
> >
> >>> I do think that webdav, being more generally deployed and useful,
> >>> may be enabling technology for certificate use.
> >> More specifically, what blocking factor for PKI deployment do you
> >> think would go away with this solution?
> >
> > public acceptance of the management side costs of maintaining
> > repositories. I regard the methods embedded in my current open source
> > systems as wildly ad-hoc. Since webdav is a given for the webserver
> > which is the public face of the certificate processes, making webdav
> be
> > used to publish and maintain the repository would be trivial. YMMV
> >
> >> Webdav does not have the greatest security story and here we are
> >> depending on that technology to provide reliable trustworthy
> >> information. I would like to see someone being expert on this
> >> technology vouching for its security properties.
> >
> > That is also fair. It will be abundantly clear to the rest of the
> list
> > I am a consumer of certificate expertise, not an originator. I felt
> > that webdav over HTTP/TLS was adequately secure. If I am wrong, that
> > would of course change my feelings. But only in respect of the
> CRL/OCSP
> > side for relying parties. I am still interested in its use as a
> > provisioning method, where you own the link to the repository from
> the
> > certificate engine.
> >
> >>> um. I'm not sure I understand the difference. In practice, where
> >>> does an OCSP server get its information about certificate
> >>> revokation, if not from its own trust in a repository
> >>> infrastructure?
> >> I does not have to. It can use a signed CRL as source. When an OCSP
> >> server do access the CA database, it usually either sits on the
> local
> >> protected network together with the CA or use other security means
> to
> >> protect the integrity of that information.
> >>
> >> This is vastly different from a user accessing the webdav server
> over
> >> the public internet.
> >
> > As I said, I don't think webdav on HTTP/80 makes much sense for the
> > OCSP/CRL side of this. I would expect that configuring the specific
> > Webdav/HTTPS server certificate in was morally equivalent to
> accepting
> > the OCSP servers certification over its assertions.
> >
> > My main interest is repository PROVISIONING. The necessary aspects of
> > defining a namespace for mapping certificate DNs into the web, for a
> > web view of SIA/AIA, and the definition of a protocol for using
> webdav
> > to get the material ONTO the repository is where I am looking for a
> win.
> >
> > You are addressing the revocation side, and I do not disagree there
> are
> > issues. I would expect that a rewrite on the draft could separate
> into
> > now three parts
> >
> > 1) webdav as a trustable protocol, and REST models for the publishing
> >    process. Mainly about POST and DEL behaviours to write and remove
> >    information.
> >
> > 2) webdav as a trustable protocol, and REST models for the relying
> party
> >    side including the revokation issues. mainly about GET and the
> >    expectations in namespace to defined CRLs over sets of certs,
> beyond
> >    the one-cert CRL model.
> >
> > 3) namespace mapping from DN into the web URL. mainly about the
> >    principles, and the specific mapping for full DNs. As I said in
> >    my original mail, I don't think this is going to be applicable for
> >    all contexts, wide/flat namespaces may expect other mappings.
> >
> > I would be able to exploit 1) and 3). I do not see 2) as such a
> massive
> > problem it could not be entertained, but I can see as WG chair you
> are
> > not drawn there.
> >
> > If Dave isn't motivated to buy into this and the draft isn't going
> > anywhere I won't be making a stink. I just wanted to float the idea
> and
> > do a +1 on it.
> >
> > Its probably not worth more of your time right now Stefan. I won't
> post
> > any more for a bit.
> >
> >  cheers
> >
> > -george
> >
> >> Stefan Santesson
> >> Senior Program Manager
> >> Windows Security, Standards
> >>
> >>
> >>> -----Original Message-----
> >>> From: George Michaelson [mailto:ggm@apnic.net]
> >>> Sent: den 6 september 2007 12:38
> >>> To: Stefan Santesson
> >>> Cc: ietf-pkix@imc.org
> >>> Subject: Re: request for WG to adopt draft-chadwick-webdav-00.txt
> >>> as a work item
> >>>
> >>> On Thu, 6 Sep 2007 11:12:05 +0100
> >>> Stefan Santesson <stefans@microsoft.com> wrote:
> >>>
> >>>> Thanks for bringing this up George.
> >>>>
> >>>> As for all solutions to problems where there already exist other
> >>>> solutions to the same problems, it is important to determine why
> >>>> we need another solution to the same problem.
> >>>>
> >>> Yes. I certainly agree that 'just because we can' is not a good
> >>> basis for deciding to do things. However, there is something about
> >>> REST which I observe is being used by a wide community of people as
> >>> infrastructure technology, to build systems. Equally, webdav has
> >>> become something which is trivially available. And, it is
> >>> remarkably easy to deploy on the web server-side.
> >>>
> >>> So I see a useful convergence of desire (wide uptake of certificate
> >>> backed processes, which require access to repositories) and reality
> >>> (technologies which are easy to deploy, and can be used to
> bootstrap
> >>> and maintain certificate repositories). But it reflects my world
> >>> view. I haven't found widespread uptake of the more traditional
> >>> mechanisms that have been available to date. Like many others, I
> >>> don't see aggressive use of the various existing CRL/OCSP check
> >>> methods. I do think that webdav, being more generally deployed and
> >>> useful, may be enabling technology for certificate use.
> >>>
> >>>> There is a value to have a limited standardized set of ways to do
> >>>> things as it makes interoperability easier. Sometimes we choose to
> >>>> offer multiple solutions anyway, mostly to enable re-use of
> >>>> existing infrastructures.
> >>>>
> >>>> I would like to hear more about why it is important to add this to
> >>>> the menu of repository solutions and revocation mechanisms.
> >>> I'm going to have to think about that. I fear I am mainly looking
> at
> >>> parochial contexts, where I have web, and webdav, and REST coding
> >>> models, so being able to exploit that technology makes it far
> easier
> >>> for me to deploy a repository in the system-as-a-whole compared to
> >>> using one of the other mechanisms.
> >>>
> >>>> My personal concern about the presented approach is that it
> >>>> changes the trust mechanism for certificate revocation from
> >>>> signed objects (CRLs and OCSP responses) to trust in a repository
> >>>> infrastructure.
> >>> um. I'm not sure I understand the difference. In practice, where
> >>> does an OCSP server get its information about certificate
> >>> revokation, if not from its own trust in a repository
> >>> infrastructure?
> >>>
> >>> and, the WEBDAV exchange is using a signed transport. ok. I see
> Dave
> >>> did make that optional. that looks like a weakness to me. I would
> >>> expect that to be addressed, if the work was adopted.
> >>>
> >>>> That is, if I get a certificate in return from an expected
> >>>> location it is supposed to be valid. Yet, when revoked a 1 post
> >>>> CRL is examined making revocation CRL based. I don't think this
> >>>> fits with the model of CRL processing described in section 6.3 of
> >>>> RFC 3280.
> >>> Yes. a side effect of REST is the applicability of an item of data
> >>> is very contextually bound to its name-path in the REST url.
> >>>
> >>> I would have thought that we could be discussing alternative
> >>> approaches to make more traditional CRLs over collections of
> >>> objects explicit namepoints in REST.
> >>>
> >>> But, that kinda goes back to your base question: why another
> method?
> >>>
> >>> -George
> >>>
> >>>> Stefan Santesson
> >>>> Senior Program Manager
> >>>> Windows Security, Standards
> >>>>
> >>>>
> >>>>> -----Original Message-----
> >>>>> From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-
> >>>>> pkix@mail.imc.org] On Behalf Of George Michaelson
> >>>>> Sent: den 6 september 2007 08:47
> >>>>> To: ietf-pkix@imc.org
> >>>>> Subject: request for WG to adopt draft-chadwick-webdav-00.txt
> >>>>> as a work item
> >>>>>
> >>>>>
> >>>>>
> >>>>> I am very interested in the construction of a systematic
> >>>>> framework for webdav based publication protocols to be used to
> >>>>> publish into repositories. Other WG areas of work are
> >>>>> considering adoption of certificate based models which require
> >>>>> large, distributed repositories to be maintained, and will
> >>>>> imply a repository provisioning protocol.
> >>>>>
> >>>>> I therefore wish to propose the WG adopt
> >>>>> draft-chadwick-webdav-00.txt as a work item.
> >>>>>
> >>>>> I would also like to ask that the document be slightly
> >>>>> modified, to present two distinct parts in the proposal
> >>>>>
> >>>>> 1) that part which documents use of WEBDAV as a repository
> >>>>> publication protocol and the use of a REST model.
> >>>>>
> >>>>> 2) that part which discusses naming of the repository objects in
> >>> the
> >>>>>    repository, eg for use in the SIA and AIA fields, and the
> >>> related
> >>>>>    REST model name mapping.
> >>>>>
> >>>>> The reason I ask that it be re-worked in this way is that there
> >>>>> are other models of repository naming architecture which do not
> >>>>> have 'deep' RDN name structure in the certificate Subject name,
> >>>>> and are less ameanable to a deterministic mapping as Dave has
> >>>>> proposed. If the document is re-worked slightly to make it
> >>>>> plain that this is only one of many repository naming models,
> >>>>> it will be easier for related work to cite this document in
> >>>>> reference to part 1) use of WEBDAV and to draw up a distinct
> >>>>> repository name mapping function reflecting part 2) in spirit.
> >>>>>
> >>>>> I have some very minor concerns with stipulating the correct TLS
> >>>>> version to support virtual webhost naming in a secured
> >>>>> connection
> >>> to
> >>>>> the server during WEBDAV binding. I am sure these can be very
> >>> easily
> >>>>> addressed.
> >>>>>
> >>>>> Thanks to Dave Chadwick for writing this draft, and presenting
> >>>>> it
> >>> at
> >>>>> IETF69 Chicago.
> >>>>>
> >>>>> -George
> >>>>
> >
> >
>
> --
>
> *****************************************************************
> David W. Chadwick, BSc PhD
> Professor of Information Systems Security
> The Computing Laboratory, University of Kent, Canterbury, CT2 7NF
> Skype Name: davidwchadwick
> Tel: +44 1227 82 3221
> Fax +44 1227 762 811
> Mobile: +44 77 96 44 7184
> Email: D.W.Chadwick@kent.ac.uk
> Home Page: http://www.cs.kent.ac.uk/people/staff/dwc8/index.html
> Research Web site:
> http://www.cs.kent.ac.uk/research/groups/iss/index.html
> Entrust key validation string: MLJ9-DU5T-HV8J
> PGP Key ID is 0xBC238DE5
>
> *****************************************************************
>