Re: [pkix] some comments on draft-ietf-pkix-est-01

Anders Rundgren <anders.rundgren@telia.com> Tue, 27 March 2012 10:49 UTC

Return-Path: <anders.rundgren@telia.com>
X-Original-To: pkix@ietfa.amsl.com
Delivered-To: pkix@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9525621F8975 for <pkix@ietfa.amsl.com>; Tue, 27 Mar 2012 03:49:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.441
X-Spam-Level:
X-Spam-Status: No, score=-3.441 tagged_above=-999 required=5 tests=[AWL=0.158, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2Vux7urfPJUv for <pkix@ietfa.amsl.com>; Tue, 27 Mar 2012 03:49:38 -0700 (PDT)
Received: from smtp-out12.han.skanova.net (smtp-out12.han.skanova.net [195.67.226.212]) by ietfa.amsl.com (Postfix) with ESMTP id A3C6521F896B for <pkix@ietf.org>; Tue, 27 Mar 2012 03:49:37 -0700 (PDT)
Received: from [192.168.0.200] (213.66.133.125) by smtp-out12.han.skanova.net (8.5.133) (authenticated as u36408181) id 4F5CB81D00468D87; Tue, 27 Mar 2012 12:49:34 +0200
Message-ID: <4F719B3D.10101@telia.com>
Date: Tue, 27 Mar 2012 12:49:33 +0200
From: Anders Rundgren <anders.rundgren@telia.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:11.0) Gecko/20120312 Thunderbird/11.0
MIME-Version: 1.0
To: Sean Turner <turners@ieca.com>
References: <4F718771.6060906@ieca.com>
In-Reply-To: <4F718771.6060906@ieca.com>
X-Enigmail-Version: 1.4
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Cc: pkix@ietf.org
Subject: Re: [pkix] some comments on draft-ietf-pkix-est-01
X-BeenThere: pkix@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: PKIX Working Group <pkix.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pkix>, <mailto:pkix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pkix>
List-Post: <mailto:pkix@ietf.org>
List-Help: <mailto:pkix-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pkix>, <mailto:pkix-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Mar 2012 10:49:38 -0000

Continuing this thread...

>From the abstract I would be interested in hearing what

 "simple Public Key Infrastructure clients"

actually refer to.

  "This profile, called Enrollment over Secure Transport (EST),
   describes a simple yet functional certificate management protocol"

If you combine all the options, it is not that simple anymore.
Is a client and server assumed to support all the options?
If not, how are they supposed to know which subset that can be used?
Looks like a rather configuration-dependent scheme IMHO.


  "K1 "Algorithm agility".  The protocol MUST support algorithm agility"

The author's opinion on what that means is flawed.  Although supporting
a bunch of TLS ciphers may be interesting, algorithm agility regarding
generated keys is a parameter that most (if not all) issuers care about.


  "5.3 Distribution of CA certificates
      Before engaging in enrollment operations, clients MUST request trust
      anchor information (in the form of certificates) by sending an HTTPS
      GET message to the EST base URI with the relative path extension
      '/CACerts'"

This mandatory requirement isn't particularly universal. A more
common method is that the user rather gets an option "accepting" the
root of the distributed certificate path.  In today's server-centric
world the CA of a *client certificate* often doesn't have any
meaning for the client/user at all.

Anders
PS. By thinking out loud I got an idea for KeyGen2!  Add an option
to the install certificate part of the protocol where the issuer may
claim that this root may be of interest to user.  By doing that KeyGen2
doesn't have to bother users with (for example) accepting VISA's EMV-root
since this a thing for the merchants/acquirers to care about. DS.

On 2012-03-27 11:25, Sean Turner wrote:
> Just a couple of comments the WG should consider:
> 
> Technical:
> 
> 1. the /simpleEnroll, /simpleReEnroll, and /serverKeyGen use PKCS#10s 
> for the request and return the certificate(s) in a mime media type.  In 
> many instances, the "normal" query/response for a certificate is a 
> PKCS#10 request followed by a PKCS#7 response, where the PKCS#7 is the 
> degenerate certs-only message.  Does anyone see any benefit in reusing 
> the PKCS#10/PKCS#7 model instead of PKCS#10/certificate?  Changing it 
> would align nicely/exactly with the simple PKI request/response from CMC.
> 
> 2. in s5.6.2, just use application/pkcs8 instead of 
> application/pkix-privkey.
> 
> Not so technical:
> 
> 1. appendix D really ought to be in its own document or in part of 
> draft-nourse-scep.
> 
> spt
> _______________________________________________
> pkix mailing list
> pkix@ietf.org
> https://www.ietf.org/mailman/listinfo/pkix
>