RE: request for WG to adopt draft-chadwick-webdav-00.txt as a work item

Stefan Santesson <stefans@microsoft.com> Thu, 06 September 2007 12:11 UTC

Return-path: <owner-ietf-pkix@mail.imc.org>
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1ITGCo-0001Vr-Qh for pkix-archive@lists.ietf.org; Thu, 06 Sep 2007 08:11:30 -0400
Received: from balder-227.proper.com ([192.245.12.227]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1ITGCn-00051E-AZ for pkix-archive@lists.ietf.org; Thu, 06 Sep 2007 08:11:30 -0400
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l86AulCM025677 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 6 Sep 2007 03:56:47 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.13.5/8.13.5/Submit) id l86AulT8025676; Thu, 6 Sep 2007 03:56:47 -0700 (MST) (envelope-from owner-ietf-pkix@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-pkix@mail.imc.org using -f
Received: from smtp-dub.microsoft.com (smtp-dub.microsoft.com [213.199.138.191]) by balder-227.proper.com (8.13.5/8.13.5) with ESMTP id l86AujMl025661 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for <ietf-pkix@imc.org>; Thu, 6 Sep 2007 03:56:46 -0700 (MST) (envelope-from stefans@microsoft.com)
Received: from DUB-EXHUB-C301.europe.corp.microsoft.com (65.53.213.91) by DUB-EXGWY-E801.partners.extranet.microsoft.com (10.251.129.1) with Microsoft SMTP Server (TLS) id 8.1.177.2; Thu, 6 Sep 2007 11:56:44 +0100
Received: from EA-EXMSG-C307.europe.corp.microsoft.com ([65.53.221.50]) by DUB-EXHUB-C301.europe.corp.microsoft.com ([65.53.213.91]) with mapi; Thu, 6 Sep 2007 11:56:44 +0100
From: Stefan Santesson <stefans@microsoft.com>
To: George Michaelson <ggm@apnic.net>
CC: "ietf-pkix@imc.org" <ietf-pkix@imc.org>
Date: Thu, 06 Sep 2007 11:56:34 +0100
Subject: RE: request for WG to adopt draft-chadwick-webdav-00.txt as a work item
Thread-Topic: request for WG to adopt draft-chadwick-webdav-00.txt as a work item
Thread-Index: AcfwchNvgChMUOuqRd+SLB3qBSXQcgAAGo+g
Message-ID: <A15AC0FBACD3464E95961F7C0BCD1FF006A25BDE83@EA-EXMSG-C307.europe.corp.microsoft.com>
References: <20070906121635.134112cf@garlique.algebras.org> <A15AC0FBACD3464E95961F7C0BCD1FF006A25BDE5E@EA-EXMSG-C307.europe.corp.microsoft.com> <20070906160757.4ccdf148@garlique.algebras.org>
In-Reply-To: <20070906160757.4ccdf148@garlique.algebras.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by balder-227.proper.com id l86AukMk025667
Sender: owner-ietf-pkix@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-pkix/mail-archive/>
List-ID: <ietf-pkix.imc.org>
List-Unsubscribe: <mailto:ietf-pkix-request@imc.org?body=unsubscribe>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 0cff8c3ec906d056784362c06f5f88c1

A few answers and comments:

> I don't see
> aggressive use of the various existing CRL/OCSP check methods.

We must have vastly different experience then. I see a very large deployment of PKI based on CRL and OCSP. However large amounts of certs are deployed where they are not very visible, for example to enable VPN or wireless networks. Public PKIs are still not very spread with exception of web-server certificates.

It is my experience that OCSP and CRLs works very well in the vast majority of cases I see.

> I do think that webdav, being more generally deployed and useful, may be
> enabling technology for certificate use.

More specifically, what blocking factor for PKI deployment do you think would go away with this solution?

Webdav does not have the greatest security story and here we are depending on that technology to provide reliable trustworthy information. I would like to see someone being expert on this technology vouching for its security properties.


> um. I'm not sure I understand the difference. In practice, where does
> an OCSP server get its information about certificate revokation, if not
> from its own trust in a repository infrastructure?

I does not have to. It can use a signed CRL as source. When an OCSP server do access the CA database, it usually either sits on the local protected network together with the CA or use other security means to protect the integrity of that information.

This is vastly different from a user accessing the webdav server over the public internet.



Stefan Santesson
Senior Program Manager
Windows Security, Standards


> -----Original Message-----
> From: George Michaelson [mailto:ggm@apnic.net]
> Sent: den 6 september 2007 12:38
> To: Stefan Santesson
> Cc: ietf-pkix@imc.org
> Subject: Re: request for WG to adopt draft-chadwick-webdav-00.txt as a
> work item
>
> On Thu, 6 Sep 2007 11:12:05 +0100
> Stefan Santesson <stefans@microsoft.com> wrote:
>
> >
> > Thanks for bringing this up George.
> >
> > As for all solutions to problems where there already exist other
> > solutions to the same problems, it is important to determine why we
> > need another solution to the same problem.
> >
>
> Yes. I certainly agree that 'just because we can' is not a good basis
> for deciding to do things. However, there is something about REST which
> I observe is being used by a wide community of people as infrastructure
> technology, to build systems. Equally, webdav has become something
> which is trivially available. And, it is remarkably easy to deploy on
> the web server-side.
>
> So I see a useful convergence of desire (wide uptake of certificate
> backed processes, which require access to repositories) and reality
> (technologies which are easy to deploy, and can be used to bootstrap
> and maintain certificate repositories). But it reflects my world view.
> I haven't found widespread uptake of the more traditional mechanisms
> that have been available to date. Like many others, I don't see
> aggressive use of the various existing CRL/OCSP check methods. I do
> think that webdav, being more generally deployed and useful, may be
> enabling technology for certificate use.
>
> > There is a value to have a limited standardized set of ways to do
> > things as it makes interoperability easier. Sometimes we choose to
> > offer multiple solutions anyway, mostly to enable re-use of existing
> > infrastructures.
> >
> > I would like to hear more about why it is important to add this to
> > the menu of repository solutions and revocation mechanisms.
>
> I'm going to have to think about that. I fear I am mainly looking at
> parochial contexts, where I have web, and webdav, and REST coding
> models, so being able to exploit that technology makes it far easier
> for me to deploy a repository in the system-as-a-whole compared to
> using one of the other mechanisms.
>
> > My personal concern about the presented approach is that it changes
> > the trust mechanism for certificate revocation from signed objects
> > (CRLs and OCSP responses) to trust in a repository infrastructure.
>
> um. I'm not sure I understand the difference. In practice, where does
> an OCSP server get its information about certificate revokation, if not
> from its own trust in a repository infrastructure?
>
> and, the WEBDAV exchange is using a signed transport. ok. I see Dave
> did make that optional. that looks like a weakness to me. I would
> expect that to be addressed, if the work was adopted.
>
> > That is, if I get a certificate in return from an expected location
> > it is supposed to be valid. Yet, when revoked a 1 post CRL is
> > examined making revocation CRL based. I don't think this fits with
> > the model of CRL processing described in section 6.3 of RFC 3280.
>
> Yes. a side effect of REST is the applicability of an item of data is
> very contextually bound to its name-path in the REST url.
>
> I would have thought that we could be discussing alternative approaches
> to make more traditional CRLs over collections of objects explicit
> namepoints in REST.
>
> But, that kinda goes back to your base question: why another method?
>
> -George
>
> > Stefan Santesson
> > Senior Program Manager
> > Windows Security, Standards
> >
> >
> > > -----Original Message-----
> > > From: owner-ietf-pkix@mail.imc.org [mailto:owner-ietf-
> > > pkix@mail.imc.org] On Behalf Of George Michaelson
> > > Sent: den 6 september 2007 08:47
> > > To: ietf-pkix@imc.org
> > > Subject: request for WG to adopt draft-chadwick-webdav-00.txt as a
> > > work item
> > >
> > >
> > >
> > > I am very interested in the construction of a systematic framework
> > > for webdav based publication protocols to be used to publish into
> > > repositories. Other WG areas of work are considering adoption of
> > > certificate based models which require large, distributed
> > > repositories to be maintained, and will imply a repository
> > > provisioning protocol.
> > >
> > > I therefore wish to propose the WG adopt
> > > draft-chadwick-webdav-00.txt as a work item.
> > >
> > > I would also like to ask that the document be slightly modified, to
> > > present two distinct parts in the proposal
> > >
> > > 1) that part which documents use of WEBDAV as a repository
> > > publication protocol and the use of a REST model.
> > >
> > > 2) that part which discusses naming of the repository objects in
> the
> > >    repository, eg for use in the SIA and AIA fields, and the
> related
> > >    REST model name mapping.
> > >
> > > The reason I ask that it be re-worked in this way is that there are
> > > other models of repository naming architecture which do not have
> > > 'deep' RDN name structure in the certificate Subject name, and are
> > > less ameanable to a deterministic mapping as Dave has proposed. If
> > > the document is re-worked slightly to make it plain that this is
> > > only one of many repository naming models, it will be easier for
> > > related work to cite this document in reference to part 1) use of
> > > WEBDAV and to draw up a distinct repository name mapping function
> > > reflecting part 2) in spirit.
> > >
> > > I have some very minor concerns with stipulating the correct TLS
> > > version to support virtual webhost naming in a secured connection
> to
> > > the server during WEBDAV binding. I am sure these can be very
> easily
> > > addressed.
> > >
> > > Thanks to Dave Chadwick for writing this draft, and presenting it
> at
> > > IETF69 Chicago.
> > >
> > > -George
> >
> >