Re: [Rum] Configuration file

Brian Rosen <br@brianrosen.net> Thu, 22 October 2020 13:11 UTC

Return-Path: <br@brianrosen.net>
X-Original-To: rum@ietfa.amsl.com
Delivered-To: rum@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 49EEF3A0CC0 for <rum@ietfa.amsl.com>; Thu, 22 Oct 2020 06:11:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.887
X-Spam-Level:
X-Spam-Status: No, score=-1.887 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=brianrosen-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4WKVPLbjvMGZ for <rum@ietfa.amsl.com>; Thu, 22 Oct 2020 06:11:38 -0700 (PDT)
Received: from mail-qk1-x72c.google.com (mail-qk1-x72c.google.com [IPv6:2607:f8b0:4864:20::72c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 632B33A0C5E for <rum@ietf.org>; Thu, 22 Oct 2020 06:11:38 -0700 (PDT)
Received: by mail-qk1-x72c.google.com with SMTP id h140so1318653qke.7 for <rum@ietf.org>; Thu, 22 Oct 2020 06:11:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=brianrosen-net.20150623.gappssmtp.com; s=20150623; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=H/lReNynRMCI0gM7xb24g88lp0mo1qIusTCJ/rpnzcM=; b=ISWHAzFE6GaowMDQXnx0ZrRznjR1LhzqOlpmhIeuH1ZhFcnQqBZYVNyaBCflY5OXVD 0jfG8OqQ9JeFYdpuEKPdiyYxkopXKUX/WIA6am7cHuI1AG0s1ikfSJrsGJgvvg3lGFw/ 3gUpTnrpEfFIuXeEu8IqS5rNGHWMp8aLJuX009WIMbJRgON1uEbE5Ka7+l6MVruw90Hl bzXQHPI/pFx28Mmtlow5aswMhP1PLhM4zMEy1tbOG7JxoUox5y9dAVim1CCVf0UYrvaK LlAzFXEG02mYDxF+u58yv7/yYsN5dbQ0BVar/Eyi3AxoynhceXx2PeYAApOgad9Avdbr /QCA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=H/lReNynRMCI0gM7xb24g88lp0mo1qIusTCJ/rpnzcM=; b=JbfkOvYT/QkcC3EYTjrEqrorrs2dNgkJMFk8dpMg3jvsaKrYls3liiymzaggs5jI6o 3pSdF4N5aX6VDVi0gfHxkBYpi6Cm5/CtEMcxt08VguBxpi3brJf5wpeihvbP8xtVLGzJ 3Gk1TnoLjUIjVrVbTTBkkOUxVws6kXtZ9XWrda83t75tQPU7Uoih1ANx2VmkhMzjT6+M 1Mh9BkFztoHgxAUvJAjebj/AGZ7+yb7H0VvFAorDN12PEtPsbKGWf/0JroGyOhXfW9gD WF8NZkeldqGoJoLgbGhRbUE5xJ9pY9OeLCMuM/lw+hm+xqXSAlEeM3atR7YW29NJUpsy Mefg==
X-Gm-Message-State: AOAM533hhN3E0qszIGO2s837tpfNlSVrnjqE6xcb8jn3OlIYduX9WWEz FO/WO752PSl2SzE3MBLRWEryUA==
X-Google-Smtp-Source: ABdhPJyVb5xaJs9sNB41O3vW3/q7H+5rY7Yuly8R0s3yE68rMJvMudTkaafkWdT9c2hLgNu85XKieQ==
X-Received: by 2002:a05:620a:1322:: with SMTP id p2mr2167464qkj.211.1603372297429; Thu, 22 Oct 2020 06:11:37 -0700 (PDT)
Received: from brians-mbp-2871.lan (dynamic-acs-24-154-119-158.zoominternet.net. [24.154.119.158]) by smtp.gmail.com with ESMTPSA id d47sm946749qtk.53.2020.10.22.06.11.35 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Thu, 22 Oct 2020 06:11:36 -0700 (PDT)
From: Brian Rosen <br@brianrosen.net>
Message-Id: <7CB778CD-DB19-497B-9913-6FB4ACBFD941@brianrosen.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_62F9BCAF-65C5-4549-9EE0-9494E50946A7"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.1\))
Date: Thu, 22 Oct 2020 09:11:35 -0400
In-Reply-To: <3D97FDC3-7B80-4D16-A76B-11DC3562BEF9@edvina.net>
Cc: rum@ietf.org
To: "Olle E. Johansson" <oej@edvina.net>
References: <B8C4519D-60F7-4AA0-BE5F-2494578656DB@brianrosen.net> <64C1A076-27B1-49FB-B52D-A1E300FF7D0E@edvina.net> <A656092D-55B1-4C88-8161-BFE72C6D078D@brianrosen.net> <3D97FDC3-7B80-4D16-A76B-11DC3562BEF9@edvina.net>
X-Mailer: Apple Mail (2.3608.120.23.2.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/rum/kNfe33AwHx2NVOxHGMEq7XnC4q0>
Subject: Re: [Rum] Configuration file
X-BeenThere: rum@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Relay User Machine <rum.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rum>, <mailto:rum-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rum/>
List-Post: <mailto:rum@ietf.org>
List-Help: <mailto:rum-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rum>, <mailto:rum-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Oct 2020 13:11:46 -0000

Yes, I think that would work fine.  We would have to write text that said that.  We also would probably want to have text that made the upload of CSRs automated.

Brian

> On Oct 21, 2020, at 1:16 PM, Olle E. Johansson <oej@edvina.net> wrote:
> 
> A problem that has to be solved is key rollover - how do you change the  keys if you have X certificates that signed them?
> Well, you can generate new CSRs for each provider based on a new key pairs, which means that you will have certs
> ready (while the old ones are still in use) and manage your own roll over.
> 
> /O
> 
>> On 21 Oct 2020, at 16:50, Brian Rosen <br@brianrosen.net <mailto:br@brianrosen.net>> wrote:
>> 
>> This is actually a good idea I think.  The light bulb for me was “same key pair”.
>> 
>> So suppose the device generated a key pair, and used a local passcode or pass phrase to access the private key.  For each provider, the provider issues a cert, and that cert is used for TLS client authentication.  Same key pair for each provider, different cert.  It would work for any provider to issue a cert that other providers accepted, but it would be an easier “sell”, I think, if they each issued a cert to their customer.  The cert can be used with TLS to retrieve a per-provider configuration file as well as SIP operations.  Persistent TLS could be used to avoid requiring entering credentials often at the user end.
>> 
>> Would that be acceptable?
>> 
>> Brian
>> 
>>> On Oct 21, 2020, at 1:28 AM, Olle E. Johansson <oej@edvina.net <mailto:oej@edvina.net>> wrote:
>>> 
>>> 
>>> 
>>>> On 20 Oct 2020, at 21:15, Brian Rosen <br@brianrosen.net <mailto:br@brianrosen.net>> wrote:
>>>> 
>>>> This is still an open item and distinct from the “signed code” issue we’ve been discussing.
>>>> 
>>>> The current text describes a single file that can have multiple sets of provider configuration data.  This caters to the common case of a user having more than provider account.  The problem with the text is it has plaintext username/passwords, which is clearly wrong.
>>>> 
>>>> I see two solutions: require the local implementation to maintain a password (or other multi factor authentication, and encrypt the file so that the user needs to authenticate to access the file.  Paul is worried that the login data may be needed more frequently than is reasonable to enter the authentication data locally.  
>>>> 
>>>> The other is to maintain separate files in provider systems, with a common authentication mechanism in each provider to access the file.
>>>> 
>>>> I think Paul’s argument doesn’t really hold much water: no SIP device I know of requires re-authentication that requires user interaction very often, so whatever they do now is okay.  I think they just keep the data locally, secure enough to re-use when they need to.  So unlock once, good for a very long time.
>>>> 
>>>> I’m reluctant to require all providers use the new OAUTH2 solution, but if they were okay with it, that would be excellent.  We would need some notion of common username, but otherwise it would just work.  Seems way too different from how things work now.  Very attractive, secure, and user-friendly.
>>> 
>>> To add to your list: Don’t forget about using TLS client certs. It’s not very hard, can securely be provisioned using Oauth or other means
>>> and can be re-issued often. For the telco business it’s unusal, but it’s frequently used in other solutions, like VPNs.
>>> 
>>> You can one per provider, based on the same key pair or separate key pairs.
>>> 
>>> /O
>> 
>> -- 
>> Rum mailing list
>> Rum@ietf.org <mailto:Rum@ietf.org>
>> https://www.ietf.org/mailman/listinfo/rum
>