[secdir] Security review of draft-ietf-acme-email-smime-08

Hilarie Orman <hilarie@purplestreak.com> Thu, 16 July 2020 18:10 UTC

Return-Path: <hilarie@purplestreak.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 37D8C3A0B72; Thu, 16 Jul 2020 11:10:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.918
X-Spam-Level:
X-Spam-Status: No, score=-1.918 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EGmUtwS19ejK; Thu, 16 Jul 2020 11:10:04 -0700 (PDT)
Received: from out02.mta.xmission.com (out02.mta.xmission.com [166.70.13.232]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3CEE23A0B6E; Thu, 16 Jul 2020 11:10:00 -0700 (PDT)
Received: from in02.mta.xmission.com ([166.70.13.52]) by out02.mta.xmission.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from <hilarie@purplestreak.com>) id 1jw8KV-00082n-2B; Thu, 16 Jul 2020 12:09:59 -0600
Received: from [166.70.232.207] (helo=rumpleteazer.rhmr.com) by in02.mta.xmission.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.87) (envelope-from <hilarie@purplestreak.com>) id 1jw8KT-0004sP-LF; Thu, 16 Jul 2020 12:09:58 -0600
Received: from rumpleteazer.rhmr.com (localhost [127.0.0.1]) by rumpleteazer.rhmr.com (8.14.4/8.14.4/Debian-4.1ubuntu1) with ESMTP id 06GI4xRB000576; Thu, 16 Jul 2020 12:04:59 -0600
Received: (from hilarie@localhost) by rumpleteazer.rhmr.com (8.14.4/8.14.4/Submit) id 06GI4xAA000575; Thu, 16 Jul 2020 12:04:59 -0600
Date: Thu, 16 Jul 2020 12:04:59 -0600
Message-Id: <202007161804.06GI4xAA000575@rumpleteazer.rhmr.com>
From: Hilarie Orman <hilarie@purplestreak.com>
Reply-To: Hilarie Orman <hilarie@purplestreak.com>
To: iesg@ietf.org, secdir@ietf.org
Cc: draft-ietf-acme-email-smime.all@ietf.org
X-XM-SPF: eid=1jw8KT-0004sP-LF; ; ; mid=<202007161804.06GI4xAA000575@rumpleteazer.rhmr.com>; ; ; hst=in02.mta.xmission.com; ; ; ip=166.70.232.207; ; ; frm=hilarie@purplestreak.com; ; ; spf=none
X-XM-AID: U2FsdGVkX1+eNY+XTGVlic3OgCjHYAU2
X-SA-Exim-Connect-IP: 166.70.232.207
X-SA-Exim-Mail-From: hilarie@purplestreak.com
X-Spam-DCC: ; sa07 0; Body=1 Fuz1=1 Fuz2=1
X-Spam-Combo: **;iesg@ietf.org, secdir@ietf.org
X-Spam-Relay-Country:
X-Spam-Timing: total 1104 ms - load_scoreonly_sql: 0.07 (0.0%), signal_user_changed: 12 (1.1%), b_tie_ro: 10 (0.9%), parse: 1.06 (0.1%), extract_message_metadata: 6 (0.5%), get_uri_detail_list: 2.5 (0.2%), tests_pri_-1000: 3.3 (0.3%), tests_pri_-950: 1.49 (0.1%), tests_pri_-900: 1.12 (0.1%), tests_pri_-90: 109 (9.9%), check_bayes: 107 (9.7%), b_tokenize: 7 (0.6%), b_tok_get_all: 8 (0.7%), b_comp_prob: 3.2 (0.3%), b_tok_touch_all: 86 (7.8%), b_finish: 0.93 (0.1%), tests_pri_0: 959 (86.9%), check_dkim_signature: 0.56 (0.1%), check_dkim_adsp: 568 (51.4%), poll_dns_idle: 561 (50.8%), tests_pri_10: 2.2 (0.2%), tests_pri_500: 6 (0.6%), rewrite_mail: 0.00 (0.0%)
X-SA-Exim-Version: 4.2.1 (built Thu, 05 May 2016 13:38:54 -0600)
X-SA-Exim-Scanned: Yes (on in02.mta.xmission.com)
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/43fwda0CXo6UrbLrVlkalXlwecA>
Subject: [secdir] Security review of draft-ietf-acme-email-smime-08
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Jul 2020 18:10:06 -0000

Security review of 
Extensions to Automatic Certificate Management Environment for end user
S/MIME certificates
draft-ietf-acme-email-smime-08

Do not be alarmed.  I generated this review of this document as part
of the security directorate's ongoing effort to review all IETF
documents being processed by the IESG.  These comments were written
with the intent of improving security requirements and considerations
in IETF drafts.  Comments not addressed in last call may be included
in AD reviews during the IESG review.  Document editors and WG chairs
should treat these comments just like any other last call comments.

The abstract states:
  "This document specifies identifiers and challenges required to enable
  the Automated Certificate Management Environment (ACME) to issue
  certificates for use by email users that want to use S/MIME."

I would restate this as "a specification of a challenge/response
protocol that is part of issuing ACME certificates to email accounts."

There doesn't seem to be anything in particular that ties this
document to S/MIME.  It would certainly be useful for using S/MIME,
but it is not necessary to have it in the title.

The protocol under discussion is a small part of ACME, and it appears
to be what results immediately from a request for a certificate.  In
section 3, last paragraph, there is a brief allusion to this context,
in the mention of the email address in a "CSR".  This would be
usefully augmented by using the text as in ACME, i.e., "a PKCS#10
[RFC2986] Certificate Signing Request (CSR)."

There's an assumption that the ability to reply to a challenge email from
the certificate server demonstrates "control" of the email account,
and therefore the possession of the private key for the certificate
demonstrates to a third party the "control" of the email account.  

The security considerations note that the requester's email system
might not be secure, and that email accounts might be shared, but
there is reference to the "account owner".  I don't think that there
is a formal notion of an account owner for email, perhaps it shouldn't
be mentioned.  The protocol demonstrates that an entity can see email
sent to the email address and can respond from that email address.
That is not necessarily "control", so I would replace that term with
something more neutral, like "access".

The challenge message must be protected with S/MIME signing or DKIM
signing, and pass DMARC validation.  The response message must be DKIM
signed.  Are there any requirements on the the certificate issuer's or
requester's policy for DKIM/SPF/DMARC?

This layering of security mechanisms raises the question of what do
they accomplish?  The document recommends that email system
administrators use DNSSEC to protect records that protect email, but
it isn't required.  Under what circumstances should the email user
feel confident in the issued certificate?  If it is used with S/MIME,
how much confidence should the recipient have in the certificate?  The
answer depends on a lot of factors in the details of DNS and email
infrastructure for the certificate issuer and the certificate
requester.

The ACME specification has a detailed discussion of security.  By
introducing email into protocol, this extension seems to raise new
security considerations that should be addressed in similar detail.


Hilarie