[pkix] Key lookup service via draft-bhjl-x509-srv-00

Wei Chuang <weihaw@google.com> Tue, 22 March 2016 18:42 UTC

Return-Path: <weihaw@google.com>
X-Original-To: pkix@ietfa.amsl.com
Delivered-To: pkix@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A8C1812D7D8 for <pkix@ietfa.amsl.com>; Tue, 22 Mar 2016 11:42:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level:
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MYmeFLM0j5ux for <pkix@ietfa.amsl.com>; Tue, 22 Mar 2016 11:42:03 -0700 (PDT)
Received: from mail-vk0-x232.google.com (mail-vk0-x232.google.com [IPv6:2607:f8b0:400c:c05::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9047012D7D4 for <pkix@ietf.org>; Tue, 22 Mar 2016 11:42:03 -0700 (PDT)
Received: by mail-vk0-x232.google.com with SMTP id e185so265972143vkb.1 for <pkix@ietf.org>; Tue, 22 Mar 2016 11:42:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:date:message-id:subject:from:to:cc; bh=swuUsH7pqJ7zZMBfgxLrdrcTk3ICOgqZsS7GI/sN9sk=; b=dHkvJXLMeqbmxHx0O+ru4VrepOKkdIz+I9GBXJv+mh2331dwLixN30wRptRT4Q/CHd Klqy0zAbmuz4dU1o97HqE1CKFeJgbRSCyRQM6XqAKYVKm1TYbGn0y+RQX9F1UsAHLWry mICOfteIhkaimRM/jRFG1dd2nEAIkz9PzNDHvfm2TIw2rqYbtu+8lsj4a5IjQkBwssGo nqhmslzPS/4voWXAPnJdQW9iY+LoAtYuiI7FnoX3UrksJvg5vv5Ah7+C4YHj5/BiQjxH JErX/PtGyCVuwQ7g4qkM16H10xPhgT3wiHvJW/dP9DWFX94kFVYY00oeFACuJqZ4Uoa7 22Lw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:date:message-id:subject:from:to:cc; bh=swuUsH7pqJ7zZMBfgxLrdrcTk3ICOgqZsS7GI/sN9sk=; b=F6VPmSFh4Hkw58li1BYrePGkDe2jMVlwhgoqm4ymaOeUch5yUTzQW1KdcHHTbj53PI gABKuXVyoL/HwBTnSzL9pYhosxXMsEOaYI9ZLNTnhL8FMbpT8uz6lv6szXG1lb5d8V5j V5i3OZ+fpAzacspPqB/mikpP31TI83NH2YuAaof3kQAvB9XBmcA0ORCbFWR3tPrO5Phv 5pQT+vfAtpK/3uDf4bVuqVjrQx7QcecH0fL1jzEpT/j0nk66DR4vwrb+PKkib1YywV6z ePvvT0TAUUIyvmOTKIYfOeHNeT7pi3ZR+UkWV83ZfNM3mrooJ3PaDym347PK4ZHMwh3F BwMA==
X-Gm-Message-State: AD7BkJLwgQTgLTlbx7EYG/wfACYVw4q5FTJn2qsoRTkdj0OeW8sNeI3+l41+wEp8H6NzoBfg6v46Cy545X9QLQtf
MIME-Version: 1.0
X-Received: by 10.159.39.169 with SMTP id b38mr4610275uab.69.1458672122373; Tue, 22 Mar 2016 11:42:02 -0700 (PDT)
Received: by 10.159.36.179 with HTTP; Tue, 22 Mar 2016 11:42:02 -0700 (PDT)
Date: Tue, 22 Mar 2016 11:42:02 -0700
Message-ID: <CAAFsWK3HEXDgqONxBohBCGMKk2qMa230fxcNEaGhoTwQZVYQoQ@mail.gmail.com>
From: Wei Chuang <weihaw@google.com>
To: John Levine <johnl@taugh.com>, Brian Haberman <brian@innovationslab.net>
Content-Type: multipart/alternative; boundary="94eb2c123364b32639052ea791ca"
Archived-At: <http://mailarchive.ietf.org/arch/msg/pkix/t1zXGaMIZKRWNN8Die2epMR0X_k>
Cc: PKIX <pkix@ietf.org>, IETF SMIME <smime@ietf.org>
Subject: [pkix] Key lookup service via draft-bhjl-x509-srv-00
X-BeenThere: pkix@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: PKIX Working Group <pkix.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pkix>, <mailto:pkix-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pkix/>
List-Post: <mailto:pkix@ietf.org>
List-Help: <mailto:pkix-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pkix>, <mailto:pkix-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2016 18:42:05 -0000

(was from: why you shouldn't even try to canonicalize local parts)

On Sun, Mar 13, 2016 at 1:25 PM, John Levine <johnl@taugh.com> wrote:
>
>
> If you're going to do local signing, the reasonable way to publish the
> signing cert is with DNSSEC as I suggest in draft-bhjl-x509-srv-00
> section 5.
>

I think this draft (draft-bhjl-x509-srv-00
<https://tools.ietf.org/html/draft-bhjl-x509-srv-00>) very usefully defines
a means to lookup certificates for S/MIME users, and wonder if we could
discuss this.  As far as I can tell it hasn't been discussed else where.  I
also don't know if there are other similar proposals, and if a comparison
between this and other approaches has been done.  This or some other key
lookup service would be very helpful in enabling email message based
encryption/authentication.

The draft proposes a new DNS SRV record that defines a URL to lookup
certificate (both PKIX and PGP) over HTTPS for email.  As a key lookup
service this proposal resolves the barrier of an initial key lookup i.e.
given an email address for a person the sender has never corresponded with,
can provide a means to get their certificate.  Currently initial
conversations must happen in cleartext until the certificates are
exchanged.  Also as the author points out, this service can also provides a
means to potentially resolve potentially different email addresses for the
same user i.e. resolving capitalization differences or addresses with
subaddressing.  The draft proposes using DNSSEC to  authenticates and
protects the integrity of the the SRV record.

The draft is pretty complete but some of the description could be
expanded.  It doesn't define define behavior when the certificate is
missing or invalid.  Presumably some sort of HTTP error code?  What should
be the response when the key server is aware that the certificate has been
revoked, and there is no replacement?  The draft specifies that if multiple
certificates are returned, that they are embedded in a mime/multipart
format.  It may be useful to always return in this format even for a single
certificate.  The multipart format likely was to allow for multiple entity
certificates to be returned.  In another discussion it was mentioned
providing the full certificate chain to the trust anchor certificate would
be very helpful for interoperability as not everyone may have access to the
CA certificates.  Providing further structure via content-description could
allow for embedding full chains with multiple entity certificates.

The set of related things outside the main scope of the draft.  A tricky
problem with key lookup has been privacy.  The worry is that spammers or
phishers would try to use such a key discovery service to find more
victims.  Understandably the authors may want to keep the scope narrow but
ideas would certainly be welcome.  Another worry is that the security of
this proposal is based on DNSSEC which is only very slowly being deployed
and many clients may not be able to interoperate with that.  One purely
PKIX based trust solution may be to adapt the mechanism that Margolis used
in draft-margolis-smtp-sts-00
<https://tools.ietf.org/html/draft-margolis-smtp-sts-00> to mirror the SRV
record on an HTTPS served page as an intermediate step.

-Wei