Re: [pkix] [Technical Errata Reported] RFC5280 (7164)

Carl Wallace <carl@redhoundsoftware.com> Mon, 24 October 2022 11:16 UTC

Return-Path: <carl@redhoundsoftware.com>
X-Original-To: pkix@ietfa.amsl.com
Delivered-To: pkix@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 13A3DC14CF17 for <pkix@ietfa.amsl.com>; Mon, 24 Oct 2022 04:16:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=redhoundsoftware.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0GC-f-YpJoCP for <pkix@ietfa.amsl.com>; Mon, 24 Oct 2022 04:16:36 -0700 (PDT)
Received: from mail-qk1-x72d.google.com (mail-qk1-x72d.google.com [IPv6:2607:f8b0:4864:20::72d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 48C1AC1522CE for <pkix@ietf.org>; Mon, 24 Oct 2022 04:16:11 -0700 (PDT)
Received: by mail-qk1-x72d.google.com with SMTP id m6so5834680qkm.4 for <pkix@ietf.org>; Mon, 24 Oct 2022 04:16:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhoundsoftware.com; s=google; h=content-transfer-encoding:mime-version:in-reply-to:references :thread-topic:message-id:cc:to:from:subject:date:user-agent:from:to :cc:subject:date:message-id:reply-to; bh=wQaAP557NJE+ZNAVTUWuvFhh+RbFBR5b7gS43E9vN6o=; b=N1iNs+6hwjxOYdbhhon5fnh5VTeenFtpBZzVPmZHfZIQFTNKY2buirjbN+pFD6FWks ZKYIxj+0OuNIeo+t/eAiISwPqGTKJDQ7ozwkXesQGG93tGz979OQXzlKNBukdCbHuEeo uK1Tn/jZo2Lbl78+hifSzMYFtvwzLCGbVVDbU=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:in-reply-to:references :thread-topic:message-id:cc:to:from:subject:date:user-agent :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=wQaAP557NJE+ZNAVTUWuvFhh+RbFBR5b7gS43E9vN6o=; b=v69GjKzHXUlE0SdxAEdjT6bYK6c47jTLZ61LGHkd7dDsKUxd4owR6w/UkmO63pXl+M NtN+Vd3DBh1BFpwk6hVHdDWqfjYOOLz/qMNvVxE/iqB+lCjFtEpnczoYjjsTSAWCtSs5 JOS2UMW8I4n3aOhj9E0vytquJCeSDzH9osRYZcPIqJq1Tw1oRhM0glReqsoUfmI/R2fe /kZ4Juznmsj9LF4pmckSzjL8pWyZpT+p5/VAYVBcbUDi4nfdf6fzTa9z5orUPq+VPrK8 hpjen1fEsnJGFzhU1+6zCc/amz8PT/v+O81qBO5VO0E2iJ3NveBnpcD1EM7G7VuYYfpw SgUg==
X-Gm-Message-State: ACrzQf0Otb8TPl6yoOcaQ2ViWC92GCsnkYtpCFwfaWSSWt3jiNW5xMid mgOILtTS8WtV9Cuc45snkLoUAA==
X-Google-Smtp-Source: AMsMyM7I10cIycl9nMZI8VSlyt4gXqFFIickxJA4j4c/JLIvNWt1dd/3pqgU/noVUIZSuPfsn+7iZQ==
X-Received: by 2002:a05:620a:4310:b0:6ac:f9df:178d with SMTP id u16-20020a05620a431000b006acf9df178dmr22614468qko.773.1666610169766; Mon, 24 Oct 2022 04:16:09 -0700 (PDT)
Received: from [192.168.4.77] (pool-74-96-253-253.washdc.fios.verizon.net. [74.96.253.253]) by smtp.gmail.com with ESMTPSA id y9-20020a37f609000000b006ce7cd81359sm14374939qkj.110.2022.10.24.04.16.07 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Mon, 24 Oct 2022 04:16:08 -0700 (PDT)
User-Agent: Microsoft-MacOutlook/16.66.22101101
Date: Mon, 24 Oct 2022 07:16:06 -0400
From: Carl Wallace <carl@redhoundsoftware.com>
To: Tim Hollebeek <tim.hollebeek=40digicert.com@dmarc.ietf.org>, Russ Housley <housley@vigilsec.com>, "aaron@letsencrypt.org" <aaron@letsencrypt.org>
CC: "Roman D. Danyliw" <rdd@cert.org>, Stefan Santesson <sts@aaa-sec.com>, IETF PKIX <pkix@ietf.org>, Paul Wouters <paul.wouters@aiven.io>
Message-ID: <F94F156A-A44B-4844-8DB2-7C685E89DE3C@redhoundsoftware.com>
Thread-Topic: [pkix] [Technical Errata Reported] RFC5280 (7164)
References: <20221014193934.45A8855E27@rfcpa.amsl.com> <9169B4F8-2A03-4FEE-9D8A-32E8075999E0@vigilsec.com> <31D9F5ED-A87C-4061-A4FE-A6A1F598FA6B@vigilsec.com> <SJ0PR14MB5489BE68893D49A924E4648C832E9@SJ0PR14MB5489.namprd14.prod.outlook.com>
In-Reply-To: <SJ0PR14MB5489BE68893D49A924E4648C832E9@SJ0PR14MB5489.namprd14.prod.outlook.com>
Mime-version: 1.0
Content-type: text/plain; charset="UTF-8"
Content-transfer-encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/pkix/ajdl6giS0PvOjI-7ovK_pU8aMcU>
Subject: Re: [pkix] [Technical Errata Reported] RFC5280 (7164)
X-BeenThere: pkix@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: PKIX Working Group <pkix.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pkix>, <mailto:pkix-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pkix/>
List-Post: <mailto:pkix@ietf.org>
List-Help: <mailto:pkix-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pkix>, <mailto:pkix-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2022 11:16:41 -0000

Thanks for the pointer to the discussion that predated the filing of the errata. To close the loop, it's here: https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/qhrGxLvyreU. 

On 10/24/22, 4:53 AM, "pkix on behalf of Tim Hollebeek" <pkix-bounces@ietf.org on behalf of tim.hollebeek=40digicert.com@dmarc.ietf.org> wrote:

    I think it should be rejected as well, but for different reasons.

    The discussion has been very interesting and helpful; for people who want further background, there's a thread about this on mozilla.dev.security-policy as well.  There certainly is potential for confusion in this area as one well-meaning individual has already been confused.  However, I think the proposed solution in this errata doesn't significantly improve the existing text.

    The reason I think it doesn't improve the existing text is because it relies a lot on various assumptions about how various words should be read, and changes some of them in the hope that fewer people will misread them in the future.  I think this is unlikely to succeed.  If we want to make improvements here, I think the errata would need to add more explicit clarifying statements about exactly what the issues are here and clarifying the original intent.  Errata are not supposed to change the meaning of the existing text, and we're tiptoeing in that direction here, trying to "improve" the text instead of fixing an error.  

    I think I'm leaning towards the idea that this is best handled at the policy level, and the wheels are already in motion to clarify in the Baseline Requirements what the exact expectations here are for the Web PKI.

    Also, having the errata rejected is in no way a value judgement on the filing of the errata.  The discussion was interesting and I think this has shown that this can be a productive way of handling confusion about the interpretation of RFC 5280 text in the future.

    -Tim

    > -----Original Message-----
    > From: pkix <pkix-bounces@ietf.org> On Behalf Of Russ Housley
    > Sent: Friday, October 14, 2022 10:17 PM
    > To: aaron@letsencrypt.org
    > Cc: Roman D. Danyliw <rdd@cert.org>; Stefan Santesson <sts@aaa-
    > sec.com>; IETF PKIX <pkix@ietf.org>; Paul Wouters <paul.wouters@aiven.io>
    > Subject: Re: [pkix] [Technical Errata Reported] RFC5280 (7164)
    > 
    > Upon further reflection,  I think the should be rejected.
    > 
    >    DistributionPoint ::= SEQUENCE {
    >         distributionPoint       [0]     DistributionPointName OPTIONAL,
    >         reasons                 [1]     ReasonFlags OPTIONAL,
    >         cRLIssuer               [2]     GeneralNames OPTIONAL }
    > 
    > The distributionPoint says where to get the CRL.
    > 
    > The reasons define the scope.
    > 
    > The cRLIssuer identifies the entity that signs and issues the CRL.
    > 
    > So, I believe the original text is correct.
    > 
    > Russ
    > 
    > 
    > > On Oct 14, 2022, at 4:03 PM, Russ Housley <housley@vigilsec.com> wrote:
    > >
    > > I see your point, but I think we should keep "if any"
    > >
    > > Russ
    > >
    > >
    > >> On Oct 14, 2022, at 3:39 PM, RFC Errata System <rfc-editor@rfc-
    > editor.org> wrote:
    > >>
    > >> The following errata report has been submitted for RFC5280, "Internet
    > >> X.509 Public Key Infrastructure Certificate and Certificate Revocation List
    > (CRL) Profile".
    > >>
    > >> --------------------------------------
    > >> You may review the report below and at:
    > >> https://www.rfc-editor.org/errata/eid7164
    > >>
    > >> --------------------------------------
    > >> Type: Technical
    > >> Reported by: Aaron Gable <aaron@letsencrypt.org>
    > >>
    > >> Section: 5.2.5
    > >>
    > >> Original Text
    > >> -------------
    > >>  If the distributionPoint field is absent, the CRL MUST contain
    > >> entries for all revoked unexpired certificates issued by the CRL
    > >> issuer, if any, within the scope of the CRL.
    > >>
    > >> Corrected Text
    > >> --------------
    > >>  If the distributionPoint field is absent, the CRL MUST contain
    > >> entries for all revoked unexpired certificates issued by the CRL
    > >> issuer.
    > >>
    > >> Notes
    > >> -----
    > >> The removed phrase does not appear in the original text that this
    > requirement is derived from, ITU-T Rec. X.509 (08/2005) Section 8.6.2.2: "If
    > the issuing distribution point field, the AA issuing distribution point field, and
    > the CRL scope field are all absent, the CRL shall contain entries for all revoked
    > unexpired public-key certificates issued by the CRL issuer."
    > >>
    > >> The removed phrase does not serve to create a stricter requirement;
    > rather it creates a looser requirement which allows a CRL which does contain
    > entries for all revoked unexpired certificates *within its scope* to not include
    > the distributionPoint field. Given that the distributionPoint field serves an
    > important security purpose in preventing substitution attacks, it is unlikely
    > that this loosening was the intent of the original authors.
    > >>
    > >> Instructions:
    > >> -------------
    > >> This erratum is currently posted as "Reported". If necessary, please
    > >> use "Reply All" to discuss whether it should be verified or rejected.
    > >> When a decision is reached, the verifying party can log in to change
    > >> the status and edit the report, if necessary.
    > >>
    > >> --------------------------------------
    > >> RFC5280 (draft-ietf-pkix-rfc3280bis-11)
    > >> --------------------------------------
    > >> Title               : Internet X.509 Public Key Infrastructure Certificate and
    > Certificate Revocation List (CRL) Profile
    > >> Publication Date    : May 2008
    > >> Author(s)           : D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley,
    > W. Polk
    > >> Category            : PROPOSED STANDARD
    > >> Source              : Public-Key Infrastructure (X.509)
    > >> Area                : Security
    > >> Stream              : IETF
    > >> Verifying Party     : IESG
    > >
    > 
    > _______________________________________________
    > pkix mailing list
    > pkix@ietf.org
    > https://www.ietf.org/mailman/listinfo/pkix

    _______________________________________________
    pkix mailing list
    pkix@ietf.org
    https://www.ietf.org/mailman/listinfo/pkix