Re: [pkix] Managing Long-Lived CA certs

"Dr. Pala" <director@openca.org> Mon, 17 July 2017 16:58 UTC

Return-Path: <director@openca.org>
X-Original-To: pkix@ietfa.amsl.com
Delivered-To: pkix@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 38CDB131C1F for <pkix@ietfa.amsl.com>; Mon, 17 Jul 2017 09:58:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.889
X-Spam-Level:
X-Spam-Status: No, score=-1.889 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_HK_NAME_DR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F_vDF5tAM57m for <pkix@ietfa.amsl.com>; Mon, 17 Jul 2017 09:58:41 -0700 (PDT)
Received: from mail.katezarealty.com (mail.katezarealty.com [104.168.158.213]) by ietfa.amsl.com (Postfix) with ESMTP id 34DC5131B4E for <pkix@ietf.org>; Mon, 17 Jul 2017 09:58:41 -0700 (PDT)
Received: from dhcp-8e48.meeting.ietf.org (dhcp-8e48.meeting.ietf.org [31.133.142.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.katezarealty.com (Postfix) with ESMTPSA id F1B783740A29; Mon, 17 Jul 2017 12:58:39 -0400 (EDT)
To: Carl Wallace <carl@redhoundsoftware.com>, pkix@ietf.org
References: <467c8936-f6aa-0853-878c-24fc8803c599@openca.org> <D5925287.981D0%carl@redhoundsoftware.com> <8fee3040-d629-762b-f5b0-b8e770911639@openca.org> <D5925FC2.98219%carl@redhoundsoftware.com>
From: "Dr. Pala" <director@openca.org>
Organization: OpenCA Labs
Message-ID: <4ce36bdb-a441-a3cf-8a2b-5ef1ff3f6bb3@openca.org>
Date: Mon, 17 Jul 2017 18:58:37 +0200
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.2.1
MIME-Version: 1.0
In-Reply-To: <D5925FC2.98219%carl@redhoundsoftware.com>
Content-Type: multipart/alternative; boundary="------------923C5C7E47AA402107EAEE25"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/pkix/aGnBDeEu50cPXNrrz-PmFSvhE34>
Subject: Re: [pkix] Managing Long-Lived CA certs
X-BeenThere: pkix@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: PKIX Working Group <pkix.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pkix>, <mailto:pkix-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pkix/>
List-Post: <mailto:pkix@ietf.org>
List-Help: <mailto:pkix-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pkix>, <mailto:pkix-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Jul 2017 16:58:43 -0000

Hi Carl, all,

yes, I agree with you that in a perfect world that would work... but 
lightbulbs and other small IoT will probably never do any OCSP.. so, 
this proposal is to address a problem that we are already seeing today 
and that device manufacturer are not really equipped to address and/or 
even understand it.

It is not a perfect solution, but a possible mitigation.. :D

What I understand from all the responses is that today nothing really 
exists, and there might be space for a simple proposal.. maybe in LAMPS 
or as an individual contribution. I personally think there is value for 
the IoT / Devices environment.

Thanks everybody for your replies!

Cheers,
Max


On 7/17/17 6:46 PM, Carl Wallace wrote:
> If the system is compromised, revoke all issued certs since you 
> stopped using the key (assuming the system compromise isn't such that 
> your efforts can be undone by the attacker). You could do this fairly 
> easily with OCSP and a whitelist of issued certs generated when the 
> private key stops being used for certificates. That begs a different 
> question. What about responder certs? Would there be a loophole for those?
>
> The upside feels light relative to the challenge of updating path 
> validation implementations and I tend to doubt enough implementations 
> would pick this up to obviate the need for one of the above steps 
> anyway – especially when considering a target is implementations that 
> are already incomplete.
>
> From: pkix <pkix-bounces@ietf.org <mailto:pkix-bounces@ietf.org>> on 
> behalf of "Dr. Pala" <director@openca.org <mailto:director@openca.org>>
> Organization: OpenCA Labs
> Date: Monday, July 17, 2017 at 12:29 PM
> To: <pkix@ietf.org <mailto:pkix@ietf.org>>
> Subject: Re: [pkix] Managing Long-Lived CA certs
>
>     Hi Carl,
>
>     you are totally right :D That case would be covered by the
>     revocation of the CA key. However, there are also other types of
>     compromises (e.g., the system is compromised, but the key is not -
>     certificates issued by non-authorized person).
>
>     Keep in mind that in the ecosystem where this happens (device
>     certs and many others) certificate revocation is not really
>     checked... this would limit the exposure for non-catastrophic
>     compromise events.
>
>     Does this make sense ? What do you think ?
>
>     Cheers,
>     Max
>
>     [*] = I know that checking revocation is still, regrettably, not
>     common...
>
>     On 7/17/17 5:42 PM, Carl Wallace wrote:
>>     [...]
>>     [CW] Wouldn't the protection need to come in the form of
>>     revocation? If the CA key is compromised, the validity period in
>>     certificates cannot be trusted. [...]
>
>     -- 
>     Best Regards,
>     Massimiliano Pala, Ph.D.
>     OpenCA Labs Director
>     OpenCA Logo
>     _______________________________________________ pkix mailing list
>     pkix@ietf.org <mailto:pkix@ietf.org>
>     https://www.ietf.org/mailman/listinfo/pkix 
>

-- 
Best Regards,
Massimiliano Pala, Ph.D.
OpenCA Labs Director
OpenCA Logo