Re: [pkix] [Technical Errata Reported] RFC5280 (6414)

Rob Stradling <rob@sectigo.com> Thu, 28 January 2021 16:33 UTC

Return-Path: <rob@sectigo.com>
X-Original-To: pkix@ietfa.amsl.com
Delivered-To: pkix@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 589033A16A7 for <pkix@ietfa.amsl.com>; Thu, 28 Jan 2021 08:33:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.09
X-Spam-Level:
X-Spam-Status: No, score=-2.09 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=sectigo.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JrNLHZZKh2hQ for <pkix@ietfa.amsl.com>; Thu, 28 Jan 2021 08:33:54 -0800 (PST)
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (mail-dm6nam11on2056.outbound.protection.outlook.com [40.107.223.56]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 42DD13A1683 for <pkix@ietf.org>; Thu, 28 Jan 2021 08:33:49 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=VvClXnAUQlxo+QNQg3g0Zepw5WDwtKv4dnrtl/I8RA41z+QY58oBumpFSfW6NEH+9o/DmeeD4erc7G1YS6FRtklzsXLUpCjFfripo4t2ORVuRXtZisyYHrCRk5yve0dRxCNtrwik91agX3VczOYeoEWJnxj69LVMjRb71DKD68axqFWEZZQ00a+vIx4rD7zv3vwD5ZaBCYz9Mrlbv0L5lxyOFdicMVC1UZ5cSU3Wfs2CcwwkLDk2wYbPG8ESBoQ5cnDe7gCezwkbQ1gwLwK7zYm8nwBcUzjKjOvc3LBzcJJRAQtBQoVMgCRCyplhTFqR77rEKSaNGMi9+OZ2UIetyA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=47JXLVlZJ0wlN2fMO0f5hdl/1ff8er6CtdSL2qOdegc=; b=Uf4L0TJqQWM0F1DAUh1iF4y19zt4iE7ITLfK2PGe+krkrbTyNgW8ozLxg1bkjhifAWtqSK7MLwiexZYdiHyYnUWS2595pE+MGqI4idYbvxqfH6Y7+o3fU2Ro+jvNmKssNCFTSipw01Gj6AFFPSNMGl1eG2qhx5NrvkodG6czNeQ+mBCyKgPqzUzi3DxMM6RGCLEeIht8jerdVdMJcbanKjuAYkGIkKrAwrN9No7bxmSXoBWY1FG8RBrOCQwz6Y3I2plMv5KEKnK6dOOiVWgzzf4zLk2PZUTtzh6WC50+1NYor5x9/qFKNlZZUk4EnA3bYipX+kAI8sY7CU5j3iop1g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=sectigo.com; dmarc=pass action=none header.from=sectigo.com; dkim=pass header.d=sectigo.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sectigo.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=47JXLVlZJ0wlN2fMO0f5hdl/1ff8er6CtdSL2qOdegc=; b=cDorhG8GU/hpjt8fb1kM6VSjjXPw6OgRAc3xx2adot6t8Nf0oshrXHhr8E1nFlhpqHxxE3k/51sswhLyjyI6znJJsxpzhFWTF5wdPZTWC4ePIHi50Y+lvlGWAYWJj8H72nyb54g4CS4dqII/dX+5n98ftYLbHwPy+MpaM+jEu0U=
Received: from MW3PR17MB4122.namprd17.prod.outlook.com (2603:10b6:303:44::15) by MWHPR17MB1488.namprd17.prod.outlook.com (2603:10b6:300:d1::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3784.12; Thu, 28 Jan 2021 16:33:46 +0000
Received: from MW3PR17MB4122.namprd17.prod.outlook.com ([fe80::b57c:efe8:a784:534c]) by MW3PR17MB4122.namprd17.prod.outlook.com ([fe80::b57c:efe8:a784:534c%7]) with mapi id 15.20.3805.019; Thu, 28 Jan 2021 16:33:46 +0000
From: Rob Stradling <rob@sectigo.com>
To: Stefan Santesson <stefan@aaa-sec.com>, Russ Housley <housley@vigilsec.com>
CC: "Roman D. Danyliw" <rdd@cert.org>, Ben Kaduk <kaduk@mit.edu>, Stephen Kent <kent@bbn.com>, IETF PKIX <pkix@ietf.org>, David Cooper <david.cooper@nist.gov>, "wpolk@nist.gov" <wpolk@nist.gov>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
Thread-Topic: [Technical Errata Reported] RFC5280 (6414)
Thread-Index: AQHW9Yx3wI8XQ5en1Ue9Uza14jKQg6o9NDYAgAAAQK+AAALggIAAAz8AgAAA8Qk=
Date: Thu, 28 Jan 2021 16:33:46 +0000
Message-ID: <MW3PR17MB4122943B90E93EF330F495EEAABA9@MW3PR17MB4122.namprd17.prod.outlook.com>
References: <20210128154420.4B40EF40715@rfc-editor.org> <B9FCFEBF-78B0-4C82-9902-67D4E832C0C7@vigilsec.com> <MW3PR17MB41222702CF6B9D8440B468D3AABA9@MW3PR17MB4122.namprd17.prod.outlook.com> <A077CE9B-35E3-4FF2-BA3A-213122D59843@vigilsec.com>, <549A9111-F97A-4D42-A602-EF655C954915@aaa-sec.com>
In-Reply-To: <549A9111-F97A-4D42-A602-EF655C954915@aaa-sec.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: aaa-sec.com; dkim=none (message not signed) header.d=none;aaa-sec.com; dmarc=none action=none header.from=sectigo.com;
x-originating-ip: [146.198.249.196]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 26b42eb1-d0b3-4c41-0a8c-08d8c3aa7bd3
x-ms-traffictypediagnostic: MWHPR17MB1488:
x-microsoft-antispam-prvs: <MWHPR17MB14884CE8B170E5995542D140AABA9@MWHPR17MB1488.namprd17.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:7219;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MW3PR17MB4122.namprd17.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(396003)(366004)(136003)(346002)(376002)(39860400002)(9686003)(66556008)(66946007)(6506007)(55016002)(76116006)(166002)(83380400001)(64756008)(19627405001)(91956017)(7696005)(316002)(66446008)(86362001)(66476007)(966005)(4326008)(71200400001)(186003)(8676002)(66574015)(8936002)(5660300002)(110136005)(33656002)(54906003)(52536014)(2906002)(53546011)(26005)(45080400002)(55236004)(478600001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MW3PR17MB4122943B90E93EF330F495EEAABA9MW3PR17MB4122namp_"
MIME-Version: 1.0
X-OriginatorOrg: sectigo.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MW3PR17MB4122.namprd17.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 26b42eb1-d0b3-4c41-0a8c-08d8c3aa7bd3
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Jan 2021 16:33:46.0477 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0e9c4894-6caa-465d-9660-4b6968b49fb7
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: dgqsiPcYUYmsDGFgODsiPL+E0UmR7vqpn7De5vu5o6EFsyzLrDKZSt8co54bdRow/e+XlKHs/0abTUWOG83Qtg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR17MB1488
Archived-At: <https://mailarchive.ietf.org/arch/msg/pkix/SyyU2Ca6FCuXXX1OsYhvMrxY6Es>
Subject: Re: [pkix] [Technical Errata Reported] RFC5280 (6414)
X-BeenThere: pkix@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: PKIX Working Group <pkix.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pkix>, <mailto:pkix-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pkix/>
List-Post: <mailto:pkix@ietf.org>
List-Help: <mailto:pkix-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pkix>, <mailto:pkix-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2021 16:34:03 -0000

Thanks Stefan.  Yes, that's my intention.

________________________________
From: Stefan Santesson <stefan@aaa-sec.com>
Sent: 28 January 2021 16:30
To: Russ Housley <housley@vigilsec.com>; Rob Stradling <rob@sectigo.com>
Cc: Roman D. Danyliw <rdd@cert.org>; Ben Kaduk <kaduk@mit.edu>; Stephen Kent <kent@bbn.com>; IETF PKIX <pkix@ietf.org>; David Cooper <david.cooper@nist.gov>; wpolk@nist.gov <wpolk@nist.gov>; Stephen Farrell <stephen.farrell@cs.tcd.ie>
Subject: Re: [Technical Errata Reported] RFC5280 (6414)


CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you recognize the sender and know the content is safe.


Russ,



If I read the proposal correct Rob is providing text where the following is allowed:



  *   DS
  *   KA
  *   KE
  *   DS + KA
  *   DS + KE



And he argues that the current wording suggest that only the following is allowed:



  *   DS
  *   KA
  *   KE



Right?

(DS = digitalISignature, KA = keyAgreement, KE = keyEncipherment)



Stefan Santesson



From: Russ Housley <housley@vigilsec.com>
Date: Thursday, 28 January 2021 at 17:18
To: Rob Stradling <rob@sectigo.com>
Cc: "Roman D. Danyliw" <rdd@cert.org>, Ben Kaduk <kaduk@mit.edu>, Stephen Kent <kent@bbn.com>, IETF PKIX <pkix@ietf.org>, Stefan Santesson <stefan@aaa-sec.com>, David Cooper <david.cooper@nist.gov>, Tim Polk <wpolk@nist.gov>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
Subject: Re: [Technical Errata Reported] RFC5280 (6414)



Rob:



In my example, neither the keyEncipherment nor the keyAgreement bit is set.



Russ



On Jan 28, 2021, at 11:17 AM, Rob Stradling <rob@sectigo.com<mailto:rob@sectigo.com>> wrote:



Hi Russ.



I'm afraid I don't understand your objection.  Your use case of setting only the digitalSignature bit is permitted both by the Original Text and by my Proposed Text.  (With my Proposed Text, you would choose the "or" option of the "and/or" instead of the "and" option).



The reason for the erratum is that neither digitalSignature+keyEncipherment nor digitalSignature+keyAgreement seem to be permitted by the Original Text.



________________________________

From: Russ Housley <housley@vigilsec.com<mailto:housley@vigilsec.com>>
Sent: 28 January 2021 16:07
To: Rob Stradling <rob@sectigo.com<mailto:rob@sectigo.com>>
Cc: Roman D. Danyliw <rdd@cert.org<mailto:rdd@cert.org>>; Ben Kaduk <kaduk@mit.edu<mailto:kaduk@mit.edu>>; Stephen Kent <kent@bbn.com<mailto:kent@bbn.com>>; IETF PKIX <pkix@ietf.org<mailto:pkix@ietf.org>>; Stefan Santesson <stefan@aaa-sec.com<mailto:stefan@aaa-sec.com>>; David Cooper <david.cooper@nist.gov<mailto:david.cooper@nist.gov>>; wpolk@nist.gov<mailto:wpolk@nist.gov><wpolk@nist.gov<mailto:wpolk@nist.gov>>; Stephen Farrell <stephen.farrell@cs.tcd.ie<mailto:stephen.farrell@cs.tcd.ie>>
Subject: Re: [Technical Errata Reported] RFC5280 (6414)



CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you recognize the sender and know the content is safe.


Rob:

The proposed rewording of the comment is not correct.  Consider an ECDSA key that will be used with TLS 1.3.  In that case, only the digitalSignature key usage would be set.

I think the original OR is correct.

Russ


> On Jan 28, 2021, at 10:44 AM, RFC Errata System <rfc-editor@rfc-editor.org<mailto:rfc-editor@rfc-editor.org>> wrote:
>
> The following errata report has been submitted for RFC5280,
> "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile".
>
> --------------------------------------
> You may review the report below and at:
> https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Ferrata%2Feid6414&amp;data=04%7C01%7Crob%40sectigo.com%7Cdce250f148ea4d995db108d8c3a6ce56%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C637474468512413977%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=8hy5qssHrRM%2BEOM2NX8rEJSJqGV%2FWhu7top4hdmsXgU%3D&amp;reserved=0<https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Ferrata%2Feid6414&data=04%7C01%7Crob%40sectigo.com%7C375095cbbb5c46d8215808d8c3a9fff5%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C637474482205572588%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=n7IgeqJYQHXwaB1UEcUQzv3Bfu11TQnnBLZumkJ4jdU%3D&reserved=0>
>
> --------------------------------------
> Type: Technical
> Reported by: Rob Stradling <rob@sectigo.com<mailto:rob@sectigo.com>>
>
> Section: 4.2.1.12
>
> Original Text
> -------------
>   id-kp-serverAuth             OBJECT IDENTIFIER ::= { id-kp 1 }
>   -- TLS WWW server authentication
>   -- Key usage bits that may be consistent: digitalSignature,
>   -- keyEncipherment or keyAgreement
>
> Corrected Text
> --------------
>   id-kp-serverAuth             OBJECT IDENTIFIER ::= { id-kp 1 }
>   -- TLS WWW server authentication
>   -- Key usage bits that may be consistent: digitalSignature
>   -- and/or (keyEncipherment or keyAgreement)
>
> Notes
> -----
> In https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fzmap%2Fzlint%2Fissues%2F553&amp;data=04%7C01%7Crob%40sectigo.com%7Cdce250f148ea4d995db108d8c3a6ce56%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C637474468512413977%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=Kf06%2FZ9o9VIMBcNRiCOk2L%2FUNA7dlgCP6ywIYJZH37I%3D&amp;reserved=0<https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fzmap%2Fzlint%2Fissues%2F553&data=04%7C01%7Crob%40sectigo.com%7C375095cbbb5c46d8215808d8c3a9fff5%7C0e9c48946caa465d96604b6968b49fb7%7C0%7C0%7C637474482205572588%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=9nVGPOAgXuaBj09U2nxRVPTJxHaoKV3NNJNYTVJTxFk%3D&reserved=0> there's been some disagreement and confusion about how to correctly interpret the "or" in the Original Text.  "You can only set one of these three bits" is one interpretation, and it's hard to argue that this interpretation is inconsistent with the Original Text.
>
> However, digitalSignature+keyEncipherment makes sense for an RSA leaf certificate, and digitalSignature+keyAgreement makes sense for an ECC leaf certificate.  Both are widely used, to enable ephemeral and non-ephemeral TLS ciphersuites in conjunction with a single server certificate.
>
> Given that RFC5480 section 3 explicitly permits digitalSignature+keyAgreement in an ECC leaf certificate, I think it's likely that my proposed Corrected Text conveys the RFC5280 authors' intended meaning.
>
> Instructions:
> -------------
> This erratum is currently posted as "Reported". If necessary, please
> use "Reply All" to discuss whether it should be verified or
> rejected. When a decision is reached, the verifying party
> can log in to change the status and edit the report, if necessary.
>
> --------------------------------------
> RFC5280 (draft-ietf-pkix-rfc3280bis-11)
> --------------------------------------
> Title               : Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
> Publication Date    : May 2008
> Author(s)           : D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, W. Polk
> Category            : PROPOSED STANDARD
> Source              : Public-Key Infrastructure (X.509)
> Area                : Security
> Stream              : IETF
> Verifying Party     : IESG