[pkix] Deployment Clarifications about RFC6960 - Section 2.2 and 4.4.8

"Dr. Massimiliano Pala" <massimiliano.pala@gmail.com> Thu, 13 November 2014 22:18 UTC

Return-Path: <massimiliano.pala@gmail.com>
X-Original-To: pkix@ietfa.amsl.com
Delivered-To: pkix@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DE2401ADF33 for <pkix@ietfa.amsl.com>; Thu, 13 Nov 2014 14:18:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.99
X-Spam-Level:
X-Spam-Status: No, score=-1.99 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001, T_HK_NAME_FM_DR=0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pZXxN9_F7lWB for <pkix@ietfa.amsl.com>; Thu, 13 Nov 2014 14:18:00 -0800 (PST)
Received: from mail-wg0-x230.google.com (mail-wg0-x230.google.com [IPv6:2a00:1450:400c:c00::230]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 126851AD6F3 for <pkix@ietf.org>; Thu, 13 Nov 2014 14:17:59 -0800 (PST)
Received: by mail-wg0-f48.google.com with SMTP id y19so7105961wgg.7 for <pkix@ietf.org>; Thu, 13 Nov 2014 14:17:57 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:subject :content-type:content-transfer-encoding; bh=gj2b9MhO7W/ifAPlptOI/mZqqTqt8jNtL3Mb2UY5RW4=; b=Y53VjHN5fkhZPeOE0U5bftYNdzAWDkwwHZg4Tv6bS1sHd5KFKQZIfmlFgYAOczpAP3 fIszt2VUAJPjYdHf9j+YrNV312ZEsqcPk5p2uS5ttIR5N1QmUZJVHi17b2UvXB3YK5om tOO5SNciL0Wk5XqRJS+mzt059+0GInvLBxrH/YbMiV1kWo2cgvrnKdUUAArL3GZTZdBA N79Pu1WZETEy1PnoPobw6I1WkY6qPQtmcrpjZK5V5SnrhAFxgsIy/Rdt7YS6LH6aO/Vc KabUniBkCMCMYSIJl4HeNuLdQo+OtMC4o6kQImh1xgfnCt3us4Rc0i6QDJqXLjnQlbqr zrZQ==
X-Received: by 10.180.100.129 with SMTP id ey1mr2237979wib.28.1415917077865; Thu, 13 Nov 2014 14:17:57 -0800 (PST)
Received: from dhcp-b737.meeting.ietf.org (dhcp-b737.meeting.ietf.org. [31.133.183.55]) by mx.google.com with ESMTPSA id e7sm4230428wjx.31.2014.11.13.14.17.55 for <pkix@ietf.org> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 13 Nov 2014 14:17:57 -0800 (PST)
Message-ID: <54652E19.8050903@gmail.com>
Date: Thu, 13 Nov 2014 12:18:01 -1000
From: "Dr. Massimiliano Pala" <massimiliano.pala@gmail.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "pkix@ietf.org" <pkix@ietf.org>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/pkix/dhFgfDSyVjiJD7TB90BLZyz4Yms
Subject: [pkix] Deployment Clarifications about RFC6960 - Section 2.2 and 4.4.8
X-BeenThere: pkix@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: PKIX Working Group <pkix.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pkix>, <mailto:pkix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pkix/>
List-Post: <mailto:pkix@ietf.org>
List-Help: <mailto:pkix-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pkix>, <mailto:pkix-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Nov 2014 22:18:06 -0000

Hello PKIX,

recently I have been asked to implement the "Extended Revoked 
Definition" in our implementation of the OCSP server (OpenCA). However, 
after reviewing RFC 6960 I have serious issues with that, and I would 
like to know what your opinions are about my concerns. Just to be 
precise: I do not want to re-open any work on this topic, but I would 
like to know if my concerns are sensible or if I should add support for it.

In particular, by extending the responsibilities of the OCSP responders 
to provide also information about the issuing status (instead of just 
the revocation information) we might have potential deployment issues - 
that is, for pre-computed responses, it seems difficult to make any 
useful use of the Extender Revoked extension. This also applies for 
other transport protocols that could be defined to make the OCSP 
responses easily accessible (e.g., OCSP over DNS or OCSP over LDAP - not 
currently standardized, but, I think, useful). If there are people who 
deployed support for this, could you please let me know how did you 
managed to make any use of this option ?

Also, I think there are some security considerations. The first one is 
about protecting against certificate enumeration. Originally, the OCSP 
standard was designed in such a way to protect the number of issued 
certificates. Since the request does not need to have the certificate in 
order to build the OCSP request (just the serial number and the issuing 
CA certificate), answering "Good" was seen as a protection against 
certificate enumeration. That is the same reason that pushed almost all 
Internet Certification Authorities to move from an incremental serial 
number to a randomized one few years ago. I have the impression that 
when the new RFC was issue, there was a lot of pressure to fix the issue 
of  compromised CAs that draw the integration of this feature into the 
new RFC (specifically coming from the the Web/Browsers world). To 
address that issue, other venues are also today explored (e.g., DANE, 
Certificate Pinning) that, I think, are more appropriate than OCSP 
(personal opinion). Is certificate enumeration not seen as a possible 
threat anymore ? If so, why CAs not going back to sequential serial 
numbers (easier to verify which certs have been issued since the S/N is 
unique and monotonic).

The second security consideration is about the source of trust for the 
validity information.

Historically, CRLs were the source of revocation information for the 
OCSP. The use of signed data establishes the trust with the CA so that 
nobody can change the revocation status by simply change a configuration 
file (which is not signed by the CA key) or a database entry. The use of 
the CA's Key is required (much simpler to monitor). This also enables 
the secure transfer across different OCSP responder and CAs (i.e., the 
OCSP can safely retrieve the CRLs, verify the signature from the CA and 
provide responses for CAs that are not tightly coupled with). 
Unfortunately there is no standard for a signed "white" list - this 
would be huge for many CAs. If CRLs are bad for sizes and they usually 
are 10% of the overall population of certificates, the list of valid 
certificates is quite huge and should be updated (and synchronized 
throughout all the OCSP server cloud) each time a new certificate is 
issued. This would mean that a CA has now to make 2 signatures each time 
a certificate is issued - one of which over a huge file (the white list 
itself). IF the "white" list is not updated and distributed to the OCSP 
responders as soon as the new certificates are issued, you will not be 
able to use the certificate until that happens (as noted in the security 
considerations). This approach adds, IMHO, a level of complexity that is 
not necessary. From the security considerations:

<<For this service to be effective, certificate-using systems must
    connect to the certificate status service provider.  In the event
    such a connection cannot be obtained, certificate-using systems could
    implement CRL processing logic as a fall-back position.>>

seems to address the point, however it does not mandate for any form of 
authentication to be performed on the source of information. That means, 
according to me, that the security of OCSP responders that use CRLs is 
definitely better that any unspecified "connection to the certificate 
status service provider". Isn't this an under-specification for the 
security considerations in the RFC ? If the source of "white-list" inf

Sorry for the long e-mail, please let me know your point of view (even 
offline).

As it is now, I would not implement the feature as I think it reduces 
the overall security of the OCSP infrastructure.

Cheers,
Max