Re: [Rum] Configuration file

"Olle E. Johansson" <oej@edvina.net> Wed, 21 October 2020 17:17 UTC

Return-Path: <oej@edvina.net>
X-Original-To: rum@ietfa.amsl.com
Delivered-To: rum@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB62B3A1281 for <rum@ietfa.amsl.com>; Wed, 21 Oct 2020 10:17:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vlPJFX9CQoX4 for <rum@ietfa.amsl.com>; Wed, 21 Oct 2020 10:17:09 -0700 (PDT)
Received: from smtp7.webway.se (smtp7.webway.se [212.3.14.205]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B96EE3A118F for <rum@ietf.org>; Wed, 21 Oct 2020 10:16:50 -0700 (PDT)
Received: from macbook-pro.webway.org (h-205-16.A165.corp.bahnhof.se [176.10.205.16]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp7.webway.se (Postfix) with ESMTPSA id 1060A2361; Wed, 21 Oct 2020 19:16:45 +0200 (CEST)
From: "Olle E. Johansson" <oej@edvina.net>
Message-Id: <3D97FDC3-7B80-4D16-A76B-11DC3562BEF9@edvina.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_30B500B8-4761-4BA7-963C-08621DFFB56C"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.1\))
Date: Wed, 21 Oct 2020 19:16:44 +0200
In-Reply-To: <A656092D-55B1-4C88-8161-BFE72C6D078D@brianrosen.net>
Cc: Olle E Johansson <oej@edvina.net>, rum@ietf.org
To: Brian Rosen <br@brianrosen.net>
References: <B8C4519D-60F7-4AA0-BE5F-2494578656DB@brianrosen.net> <64C1A076-27B1-49FB-B52D-A1E300FF7D0E@edvina.net> <A656092D-55B1-4C88-8161-BFE72C6D078D@brianrosen.net>
X-Mailer: Apple Mail (2.3608.120.23.2.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/rum/CgDi5eO4A5HXtCdmD_7DzRVoD74>
Subject: Re: [Rum] Configuration file
X-BeenThere: rum@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Relay User Machine <rum.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rum>, <mailto:rum-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rum/>
List-Post: <mailto:rum@ietf.org>
List-Help: <mailto:rum-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rum>, <mailto:rum-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Oct 2020 17:17:12 -0000

A problem that has to be solved is key rollover - how do you change the  keys if you have X certificates that signed them?
Well, you can generate new CSRs for each provider based on a new key pairs, which means that you will have certs
ready (while the old ones are still in use) and manage your own roll over.

/O

> On 21 Oct 2020, at 16:50, Brian Rosen <br@brianrosen.net> wrote:
> 
> This is actually a good idea I think.  The light bulb for me was “same key pair”.
> 
> So suppose the device generated a key pair, and used a local passcode or pass phrase to access the private key.  For each provider, the provider issues a cert, and that cert is used for TLS client authentication.  Same key pair for each provider, different cert.  It would work for any provider to issue a cert that other providers accepted, but it would be an easier “sell”, I think, if they each issued a cert to their customer.  The cert can be used with TLS to retrieve a per-provider configuration file as well as SIP operations.  Persistent TLS could be used to avoid requiring entering credentials often at the user end.
> 
> Would that be acceptable?
> 
> Brian
> 
>> On Oct 21, 2020, at 1:28 AM, Olle E. Johansson <oej@edvina.net <mailto:oej@edvina.net>> wrote:
>> 
>> 
>> 
>>> On 20 Oct 2020, at 21:15, Brian Rosen <br@brianrosen.net <mailto:br@brianrosen.net>> wrote:
>>> 
>>> This is still an open item and distinct from the “signed code” issue we’ve been discussing.
>>> 
>>> The current text describes a single file that can have multiple sets of provider configuration data.  This caters to the common case of a user having more than provider account.  The problem with the text is it has plaintext username/passwords, which is clearly wrong.
>>> 
>>> I see two solutions: require the local implementation to maintain a password (or other multi factor authentication, and encrypt the file so that the user needs to authenticate to access the file.  Paul is worried that the login data may be needed more frequently than is reasonable to enter the authentication data locally.  
>>> 
>>> The other is to maintain separate files in provider systems, with a common authentication mechanism in each provider to access the file.
>>> 
>>> I think Paul’s argument doesn’t really hold much water: no SIP device I know of requires re-authentication that requires user interaction very often, so whatever they do now is okay.  I think they just keep the data locally, secure enough to re-use when they need to.  So unlock once, good for a very long time.
>>> 
>>> I’m reluctant to require all providers use the new OAUTH2 solution, but if they were okay with it, that would be excellent.  We would need some notion of common username, but otherwise it would just work.  Seems way too different from how things work now.  Very attractive, secure, and user-friendly.
>> 
>> To add to your list: Don’t forget about using TLS client certs. It’s not very hard, can securely be provisioned using Oauth or other means
>> and can be re-issued often. For the telco business it’s unusal, but it’s frequently used in other solutions, like VPNs.
>> 
>> You can one per provider, based on the same key pair or separate key pairs.
>> 
>> /O
> 
> -- 
> Rum mailing list
> Rum@ietf.org
> https://www.ietf.org/mailman/listinfo/rum