Re: [saag] post-X509 cryptographic identities

Tony Rutkowski <trutkowski.netmagic@gmail.com> Tue, 11 February 2020 21:27 UTC

Return-Path: <trutkowski.netmagic@gmail.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B6B4E120180 for <saag@ietfa.amsl.com>; Tue, 11 Feb 2020 13:27:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id onpDBuKdH1GH for <saag@ietfa.amsl.com>; Tue, 11 Feb 2020 13:27:07 -0800 (PST)
Received: from mail-qk1-x72b.google.com (mail-qk1-x72b.google.com [IPv6:2607:f8b0:4864:20::72b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9AB6512006F for <saag@ietf.org>; Tue, 11 Feb 2020 13:27:07 -0800 (PST)
Received: by mail-qk1-x72b.google.com with SMTP id a2so11192509qko.12 for <saag@ietf.org>; Tue, 11 Feb 2020 13:27:07 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:reply-to:subject:to:references:organization:message-id:date :user-agent:mime-version:in-reply-to:content-language; bh=Owmh4tfti2wmjiO3cPabJEd5hfKUuzIMBhOAViBAXLI=; b=JpYjvMsi7239sGfUCBjsai//iWx2gIB13KPSml3Ot+O1NrY/3wqlZTUV8NXUwSXIM1 YjfiyDwehkMXQJ77hs+/XErq/wgf+MGMdOBMf6qV0DQyi2LGurvqp9nfWXDSEjhU88WL RQPJF1wU+njz6PNKbJevUhPu7rrpML3XN6mai02nxYjOJxBqyt2Iv/gKeLBW2xvthPmV B4OnI3DUiy9lVF8aKYFoLzmQgt7G1CMY4FihUZjHDyMpynIUyX9a9EXs2zTj9oKmITAr IUJaZly6mYAw/ZgtWLKcVzHeJkIDuNal/1M7bzJH3LCAkgGnJe62QMZviDdHJXEX1DcM SLPw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:reply-to:subject:to:references:organization :message-id:date:user-agent:mime-version:in-reply-to :content-language; bh=Owmh4tfti2wmjiO3cPabJEd5hfKUuzIMBhOAViBAXLI=; b=oxDCtL4FaSPagU/PuTx0ShkPokXml/T17eDLRsHsHzdZpovErZEQVHDm6fJXQ3A9hB m14Vw2+NDsEJ43LG2VQEmfsMdtG0gJgatP25AdSJlkdCnZT2qSpxgK5QyGnOW9oBLr7h cgTtojudsst5YuCSCZKg8nuW8PyesKwSM8IC6KqB36pd1fPMB2+FUXAzj606i9dN66RT Ce+Q1A9QlSp1ro5CEyas0wvCXNgVa9X1KbJxTbXe2RlkYumy0TbAgxbVm/AXVX2Ul0Tj YPxH5u51iZ3KZbMYQeRAWFz+5evtbAAp7uHwzVvtuYroSSn3HNgxoHxYdM05GQc4Nxv1 9tFg==
X-Gm-Message-State: APjAAAWAasvduOQIB4fmVWRP3QGxto1l7jKQG9GSbPZejhh/iQhpYZ0v UYplaVLKtg0dzRDjBFOnSaJZhHyl
X-Google-Smtp-Source: APXvYqzQf691U/Jyn1N6tGwc+zQeOM9qhAIVx/VzwhMNbD9mR8JB8ThXlC5K3wH7oTMG1lWhQUF6Cw==
X-Received: by 2002:a37:be07:: with SMTP id o7mr4673038qkf.392.1581456426489; Tue, 11 Feb 2020 13:27:06 -0800 (PST)
Received: from [192.168.1.53] (pool-70-106-222-98.clppva.fios.verizon.net. [70.106.222.98]) by smtp.gmail.com with ESMTPSA id l6sm2859010qti.10.2020.02.11.13.27.05 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 11 Feb 2020 13:27:05 -0800 (PST)
From: Tony Rutkowski <trutkowski.netmagic@gmail.com>
X-Google-Original-From: Tony Rutkowski <trutkowski@netmagic.com>
Reply-To: trutkowski@netmagic.com
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, Michael Richardson <mcr+ietf@sandelman.ca>, saag@ietf.org
References: <157762745765.1150.7880025422884493076@ietfa.amsl.com> <2C5DFA70-AD0E-4139-B28E-2D4EDB6E5409@sinodun.com> <46BDE9EB-6306-4194-AFFA-7E9E6604765F@sinodun.com> <825b8c8e-7ee9-9276-d09e-9c006acf3804@ericsson.com> <CABcZeBOzJ2MRS8deZqN+e-o9tFDwgSrYK3_hmV-0pfO+L9oaVw@mail.gmail.com> <53c87d6b-cad1-3a80-291d-e2a896705da5@ericsson.com> <CABcZeBNJWmFTV==6sa0qnAPyRr4=6OiCacchzobE=RozHnqPdg@mail.gmail.com> <7901248e-c7dd-8a12-65df-f40415fde5e2@cs.tcd.ie> <26497.1581418516@dooku> <db922345-12f5-33f6-2d85-01e858078ad7@cs.tcd.ie>
Organization: Netmagic Associates LLC
Message-ID: <4e4ed137-a5b9-eb63-f879-ff5d4a482d26@netmagic.com>
Date: Tue, 11 Feb 2020 16:27:04 -0500
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:68.0) Gecko/20100101 Thunderbird/68.4.2
MIME-Version: 1.0
In-Reply-To: <db922345-12f5-33f6-2d85-01e858078ad7@cs.tcd.ie>
Content-Type: multipart/alternative; boundary="------------FD4AEBD6779F00656EA6B833"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/saag/x4n0XgU9e3R92pc6sl2tYqlvLf0>
Subject: Re: [saag] post-X509 cryptographic identities
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Feb 2020 21:27:10 -0000

Hi Stephen,

Given the state of affairs today, the folks involved here as well as the 
IETF Trust are unlikely to avoid lawyering up.  You might also get the 
Trust to "insurance up" for you, and provide better guidance on high 
risk activities.  The previous treatment of the subject is now a bit old 
and was inclusive. https://www.ietf.org/jabber/logs/antitrust/  It also 
didn't treat other problem areas like tort liability.

This is also all assuming that there is no direct engagement from 
government authorities as they once did - which might actually be a good 
thing from an lawyering up and insurancing up standpoint. They assume 
the responsibility and provide the cover - which is what occurs in ITU-T 
X.509 activities.

-t


On 2020-02-11 4:05 PM, Stephen Farrell wrote:
> Hiya,
>
> As a quote of mine seems to have started this...
>
> On 11/02/2020 10:55, Michael Richardson wrote:
>> Stephen Farrell <stephen.farrell@cs.tcd.ie> wrote in a IETF-last call thread:
>>      > Anyway overall I take this as more evidence that
>>      > x.509-based pki has outlived it's useful lifetime.
>>      > Given the webpki needs CT (which it totally does)
>>      > and now maybe novel revocation mechanisms like this,
>>      > (as well as soon-to-be PQ schemes if we believe
>>      > what people tell us), I'd argue it may well be time
>>      > to try see if there's any consensus on a post-x.509
>>      > direction towards which to head.
>>
>> I agree with you strongly.
> Great.
>
> Unfortunately for me, I figure I disagree with the
> direction of almost all the discussion in the rest
> of this thread so far;-)
>
> - I like DNSSEC, but at ~1% penetration in 20 years
> it is not the answer, regardless of whether or not
> it ought be the answer. (Even so, continued effort
> to improve DNSSEC deployment by paying registrars
> etc is good as it does mitigate real vulnerabilities
> when deployed.)
> - I like some of PHB's ideas wrt his meshy thing,
> but I do not believe that a single all-encompassing
> model like that that starts from better crypto will
> fit all needs. I'd be happy to be wrong, but also
> surprised.
> - I like abstract discussions sometimes, but IIRC
> I think I've seen those more abstract points made
> various times over the years with them leading to
> nothing much.
> - While I probably got fed up with x.509 about the
> turn of the century after a decade of writing code
> for it, I recall that even before then I concluded
> it had been a pretty bad error to lawyer-up any of
> those discussions before we knew how to schlep the
> bits around, so I'd run a mile if someone wanted
> to start from there;-)
>
> For me, I'd be interested in starting with a much
> less ambitious goal, e.g. perhaps how to integrate
> PQ algs into TLS and SSH without x.509, or maybe
> whether we could do even better than ESNI inside
> HTTPSSVC, or maybe if there's a way to unify smime
> and pgp via new key packaging (that MUA folks would
> accept). Or other relatively modest but still quite
> hard things like those.
>
> If some set of similar designs addressing a few
> such concrete problems could be deployable alongside
> the current stuff, and people started coding 'em up,
> then we might be on to something.
>
> Cheers,
> S.
>
> _______________________________________________
> saag mailing list
> saag@ietf.org
> https://www.ietf.org/mailman/listinfo/saag