Re: [pkix] New draft-ietf-pkix-rfc2560bis-06

mrex@sap.com (Martin Rex) Sat, 27 October 2012 02:44 UTC

Return-Path: <mrex@sap.com>
X-Original-To: pkix@ietfa.amsl.com
Delivered-To: pkix@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 556CB21F86AF for <pkix@ietfa.amsl.com>; Fri, 26 Oct 2012 19:44:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.214
X-Spam-Level:
X-Spam-Status: No, score=-10.214 tagged_above=-999 required=5 tests=[AWL=0.035, BAYES_00=-2.599, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xu8bmlVIp7X3 for <pkix@ietfa.amsl.com>; Fri, 26 Oct 2012 19:44:40 -0700 (PDT)
Received: from smtpde02.sap-ag.de (smtpde02.sap-ag.de [155.56.68.140]) by ietfa.amsl.com (Postfix) with ESMTP id E63A721F86AC for <pkix@ietf.org>; Fri, 26 Oct 2012 19:44:39 -0700 (PDT)
Received: from mail.sap.corp by smtpde02.sap-ag.de (26) with ESMTP id q9R2iZp3003541 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Sat, 27 Oct 2012 04:44:35 +0200 (MEST)
In-Reply-To: <009301cdb395$4d4307f0$e7c917d0$@ditenity.com>
To: Piyush Jain <piyush@ditenity.com>
Date: Sat, 27 Oct 2012 04:44:33 +0200
X-Mailer: ELM [version 2.4ME+ PL125 (25)]
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="US-ASCII"
Message-Id: <20121027024433.90F6F1A301@ld9781.wdf.sap.corp>
From: mrex@sap.com
X-SAP: out
Cc: 'Peter Rybar' <peterryb@gmail.com>, pkix@ietf.org, 'Stefan Santesson' <stefan@aaa-sec.com>
Subject: Re: [pkix] New draft-ietf-pkix-rfc2560bis-06
X-BeenThere: pkix@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: mrex@sap.com
List-Id: PKIX Working Group <pkix.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pkix>, <mailto:pkix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pkix>
List-Post: <mailto:pkix@ietf.org>
List-Help: <mailto:pkix-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pkix>, <mailto:pkix-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 27 Oct 2012 02:44:41 -0000

Piyush Jain wrote:
> > 
> > The other thing you seem to totally discount is that not every breach of
> > the CAs security amounts to a full and thorough compromise, i.e. that the
> > attacker can get hold of an carry away the CA private signature key.
> 
> [Piyush] Here is the bulletin published by NIST that pertains to this issue
> http://csrc.nist.gov/publications/nistbul/july-2012_itl-bulletin.pdf
> NIST recommends revoking the certificate in case of impersonation and RA
> compromise and revoking the CA in case of CA system or CA private key
> compromise.
> 
> Let us know if/why you disagree with these recommendations and the kind of
> compromise in which this extension would make sense.

These recommendations are the longer version of

"CA compromise can not possibly happen.  If it happens anyhow, nuke the PKI"


There are two things to do here:

(1) do like NIST, openly admit that existing X.509/PKIX is defective
    describe the consequences for the installed base in case you're using
    X.509/PKIX.

(2) fix the architecture of X.509 so that the CA key is no longer
    an unavoidable single-point-of-failure, and that the authentication
    can be restored to secure operation after the breach is detected
    for existing/deployed PKI credentials for use with RPs that use
    (modified) OCSP for revocation checking, _even_ when the CA signing
    key plus the OCSP signing key were captured by the attacker.


I'm fully aware that patching/updating a huge installed base is going
to be a significant effort, and drag along for quite a while.
It is worthwhile and should be done.
Been there, still fixing... (rfc5746, TLS secure renegotiation).


I'm aware that original OCSP is limited in functionality to
essentially splitting CRL checking into two tasks, and that it
wasn't seen a chance to remediate the problem of a CA compromise
through an independent trust path.  So lets fix it.


-Martin