Re: [pkix] Derived Credentials. Was: Simple Certificate Enrollment Protocol (SCEP)

Anders Rundgren <anders.rundgren.net@gmail.com> Wed, 12 November 2014 18:11 UTC

Return-Path: <anders.rundgren.net@gmail.com>
X-Original-To: pkix@ietfa.amsl.com
Delivered-To: pkix@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 00F621A00BA for <pkix@ietfa.amsl.com>; Wed, 12 Nov 2014 10:11:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fTf18mzJGNFD for <pkix@ietfa.amsl.com>; Wed, 12 Nov 2014 10:11:43 -0800 (PST)
Received: from mail-wg0-x230.google.com (mail-wg0-x230.google.com [IPv6:2a00:1450:400c:c00::230]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 54CCF1A00E7 for <pkix@ietf.org>; Wed, 12 Nov 2014 10:11:30 -0800 (PST)
Received: by mail-wg0-f48.google.com with SMTP id y19so4106904wgg.35 for <pkix@ietf.org>; Wed, 12 Nov 2014 10:11:29 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=3MV3wY2SgAo9lhJB0tEC9jry9zvyV/BcPqNv6Qnkrqk=; b=ciyVbX3J/WtrBKaAQ3LsnEIkBwjON9AGDn6GAV5gSPVdlWJb3Di+W+MUYRxj9zDwyy N3MNB49gyNuDnS2KBY+bz5sEpO0NujUuJuFGJCjtTQ06EGTn2VPve1bwRq3DV0HluzH2 asg/fCpU2WsASTDuztPUByQz7aORTUpQf2ox3rWfQge5/WidO964o/yUkGYIMyX09vzH Jdz1RutRovBTLKP0x5CkzRtvd8/NAcKSprD5axQjORLEJRUxhufou5r6eTboOVrNGkc1 IMEwYzhfNVGaYa7cDL89oLDj6jDb3vnyWaNeMHjS49Bj7MC1UBYiGhkztfDyOiTsm5jX HzRw==
X-Received: by 10.180.99.1 with SMTP id em1mr52692761wib.29.1415815889161; Wed, 12 Nov 2014 10:11:29 -0800 (PST)
Received: from [192.168.1.79] (13.118.176.95.rev.sfr.net. [95.176.118.13]) by mx.google.com with ESMTPSA id g16sm21401778wjq.20.2014.11.12.10.11.27 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 12 Nov 2014 10:11:28 -0800 (PST)
Message-ID: <5463A2C9.3010105@gmail.com>
Date: Wed, 12 Nov 2014 19:11:21 +0100
From: Anders Rundgren <anders.rundgren.net@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Johannes Merkle <johannes.merkle@secunet.com>, "Max Pritikin (pritikin)" <pritikin@cisco.com>
References: <9A043F3CF02CD34C8E74AC1594475C739B9DB295@uxcn10-5.UoA.auckland.ac.nz> <D941FEB2-CC8D-4D9C-9496-F7C28B5E0C41@cisco.com> <54616B61.7000307@gmail.com> <703810FB-F786-4D7C-98EF-0DC6080CBEFB@cisco.com> <5462754A.4010802@gmail.com>, <5462DEE0.4010105@gmail.com> <DFD1E49C-A351-4763-A03C-5BD0F118E8CD@cisco.com> <54632785.8080702@gmail.com> <54639CAC.4080608@secunet.com>
In-Reply-To: <54639CAC.4080608@secunet.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/pkix/d9SJ6Iz_4Vk-E0qU7udDKq-KtGM
Cc: "Dr. Massimiliano Pala" <massimiliano.pala@gmail.com>, "pkix@ietf.org" <pkix@ietf.org>
Subject: Re: [pkix] Derived Credentials. Was: Simple Certificate Enrollment Protocol (SCEP)
X-BeenThere: pkix@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: PKIX Working Group <pkix.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pkix>, <mailto:pkix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pkix/>
List-Post: <mailto:pkix@ietf.org>
List-Help: <mailto:pkix-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pkix>, <mailto:pkix-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Nov 2014 18:11:54 -0000

On 2014-11-12 18:45, Johannes Merkle wrote:
> Anders Rundgren wrote on 12.11.2014 10:25:
>
>> AFAICT, end-to-end security with respect to the *key-container* is outside of all
>> PKIX enrollment protocols.
>
> you have stated that several times but still I don't understand the issue. Could you please elaborate on that? What
> exactly do you mean by "end-to-end security with respect to the key-container" and how should it be solved?
>

SM (Secure Messaging) is a standard feature in cards conforming to GlobalPlatform specifications.
Neither PKIX protocols, nor PKCS #11 support SM.

What it means is that you during provisioning have like a "TLS" channel with
the key container itself so that you know that the keys actually resides in the
designated device.

Regarding how to solve it, Google have managed in record-time gather just about
everybody from platform vendors, smart card manufacturers to VISA around their
U2F-concept which *presumes* end-to-end-security provisioning.  Somewhat simplified
the cert-req is counter-signed by a built-in attestation key which for obvious
reason is only allowed to sign such data.

I guess Apple use something similar for Apple Pay.

Anders