Re: [secdir] [Emu] Secdir last call review of draft-ietf-emu-eaptlscert-06

Stefan Santesson <stefan@aaa-sec.com> Sat, 31 October 2020 22:03 UTC

Return-Path: <stefan@aaa-sec.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BEACE3A0656 for <secdir@ietfa.amsl.com>; Sat, 31 Oct 2020 15:03:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.893
X-Spam-Level:
X-Spam-Status: No, score=-1.893 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ihLuc2vbL3Rl for <secdir@ietfa.amsl.com>; Sat, 31 Oct 2020 15:03:37 -0700 (PDT)
Received: from smtp.outgoing.loopia.se (smtp.outgoing.loopia.se [93.188.3.37]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5F6303A0925 for <secdir@ietf.org>; Sat, 31 Oct 2020 15:03:36 -0700 (PDT)
Received: from s807.loopia.se (localhost [127.0.0.1]) by s807.loopia.se (Postfix) with ESMTP id 5454210C4708 for <secdir@ietf.org>; Sat, 31 Oct 2020 22:56:38 +0100 (CET)
Received: from s630.loopia.se (unknown [172.22.191.6]) by s807.loopia.se (Postfix) with ESMTP id 33DA62EBADFB; Sat, 31 Oct 2020 22:56:38 +0100 (CET)
Received: from s474.loopia.se (unknown [172.22.191.6]) by s630.loopia.se (Postfix) with ESMTP id 1D27C13B92DF; Sat, 31 Oct 2020 22:56:38 +0100 (CET)
X-Virus-Scanned: amavisd-new at amavis.loopia.se
Received: from s498.loopia.se ([172.22.191.6]) by s474.loopia.se (s474.loopia.se [172.22.190.14]) (amavisd-new, port 10024) with LMTP id Ho9_QOiu1V0C; Sat, 31 Oct 2020 22:56:37 +0100 (CET)
X-Loopia-Auth: user
X-Loopia-User: mailstore2@aaa-sec.com
X-Loopia-Originating-IP: 90.229.17.25
Received: from [10.0.1.104] (unknown [90.229.17.25]) (Authenticated sender: mailstore2@aaa-sec.com) by s498.loopia.se (Postfix) with ESMTPSA id C6D3A473233; Sat, 31 Oct 2020 22:56:33 +0100 (CET)
User-Agent: Microsoft-MacOutlook/16.42.20101102
Date: Sat, 31 Oct 2020 22:56:24 +0100
From: Stefan Santesson <stefan@aaa-sec.com>
To: Mohit Sethi M <mohit.m.sethi@ericsson.com>, Benjamin Kaduk <kaduk@mit.edu>
CC: "last-call@ietf.org" <last-call@ietf.org>, "draft-ietf-emu-eaptlscert.all@ietf.org" <draft-ietf-emu-eaptlscert.all@ietf.org>, "emu@ietf.org" <emu@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>
Message-ID: <E6F03204-2DD6-45A2-8C6E-02F41AEE5319@aaa-sec.com>
Thread-Topic: [Emu] Secdir last call review of draft-ietf-emu-eaptlscert-06
References: <160401318284.11167.6795105917637378641@ietfa.amsl.com> <20201030030415.GE39170@kduck.mit.edu> <12167567-9dc5-6161-abef-826b0a8b6602@ericsson.com> <2F8F716A-C063-4DF4-8384-BBD59C636C8A@aaa-sec.com> <36dd411f-853c-f7fb-957a-c6eb90be130b@ericsson.com>
In-Reply-To: <36dd411f-853c-f7fb-957a-c6eb90be130b@ericsson.com>
Mime-version: 1.0
Content-type: multipart/alternative; boundary="B_3687029795_1029242773"
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/VsBs7gliVF_UNKc6qNCjHkk-m8M>
Subject: Re: [secdir] [Emu] Secdir last call review of draft-ietf-emu-eaptlscert-06
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 31 Oct 2020 22:03:40 -0000

I think that is great!

 

Stefan Santesson 

 

From: Mohit Sethi M <mohit.m.sethi@ericsson.com>
Date: Saturday, 31 October 2020 at 15:19
To: Stefan Santesson <stefan@aaa-sec.com>, Mohit Sethi M <mohit.m.sethi@ericsson.com>, Benjamin Kaduk <kaduk@mit.edu>
Cc: "last-call@ietf.org" <last-call@ietf.org>, "draft-ietf-emu-eaptlscert.all@ietf.org" <draft-ietf-emu-eaptlscert.all@ietf.org>, "emu@ietf.org" <emu@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>
Subject: Re: [Emu] Secdir last call review of draft-ietf-emu-eaptlscert-06

 

Hi Stefan,

I made a minor update to reflect your feedback (https://github.com/emu-wg/eaptls-longcert/compare/3ac0a18..2093026):

Thus, the AIA extension can reduce the size of the certificate chain by only including a pointer to the issuer certificate instead of including the entire issuer certificate. However, it requires the side receiving the certificate containing the extension to have network connectivity (unless the information is already cached locally). Naturally, such indirection cannot be used for the server certificate (since EAP peers in most deployments do not have network connectivity before authentication and typically do not maintain an up-to-date local cache of issuer certificates).

Hope this is correct (and sufficient). 

--Mohit

On 10/30/20 4:40 PM, Stefan Santesson wrote:
Hi,
 
I think the text is great. 
However I'm not entirely convinced that AIA requires network connectivity at all times.
The AIA CA cert url is static and works fine as identifier for a locally cached cert
The fact that it is the correct cert is assured by the path validation process.
As such, the AIA works fine with a http cache implementation or similar or any other solution using locally stored data.
If used in a local corporate context, a cache mechanism could be provided with pre-loaded relevant certs.
 
But I don’t know how this may or may not interoperate with deployed base of EAP implementations.
 
Stefan Santesson 
 
On 2020-10-30, 14:48, "Mohit Sethi M" <mohit.m.sethi@ericsson.com> wrote:
 
    Hi Stefan,
 
    Thank you for the review. I have updated the draft in github 
    (https://github.com/emu-wg/eaptls-longcert). Here is the diff for your 
    convenience: 
    https://tools.ietf.org/rfcdiff?url1=https://tools.ietf.org/id/draft-ietf-emu-eaptlscert.txt&url2=https://emu-wg.github.io/eaptls-longcert/draft-ietf-emu-eaptlscert.txt.
 
    The following text was added:
 
    >    The size of certificates (and certificate chains) may also increase
    >    manifold in the future with the introduction of quantum-safe
    >    cryptography.  For example, lattice-based cryptography would have
    >    public keys of approximately 1000 bytes and signatures of
    >    approximately 2000 bytes.
    and in Section 4.2.5
 
    >    The Authority Information Access (AIA) extension specified in
    >    [RFC5280] can be used with end-entity and CA certificates to access
    >    information about the issuer of the certificate in which the
    >    extension appears.  For example, it can be used to provide the
    >    address of the OCSP responder from where revocation status of the
    >    certificate (in which the extension appears) can be checked. It can
    >    also be used to obtain the issuer certificate.  Thus, the AIA
    >    extension can reduce the size of the certificate chain by only
    >    including a pointer to the issuer certificate instead of including
    >    the entire issuer certificate.  However, it requires the side
    >    receiving the certificate containing the extension to have network
    >    connectivity.  Naturally, such indirection cannot be used for the
    >    server certificate (since the EAP peer in most deployments does not
    >    have network connectivity before authen
 
    Let me know what you think. I am not an expert on quantum cryptography 
    or on the AIA extension. I will wait for all the comments to come in 
    before submitting a new version.
 
    --Mohit
 
    On 10/30/20 5:04 AM, Benjamin Kaduk wrote:
    > Hi Stefan,
    >
    > Thanks for the review; it raises some good topics.
    > Replying on a couple points...
    >
    > On Thu, Oct 29, 2020 at 04:13:02PM -0700, Stefan Santesson via Datatracker wrote:
    >> Reviewer: Stefan Santesson
    >> Review result: Has Nits
    >>
    >> The document in general is good and well written.
    >>
    >> Some nits needs attention before publication as the general review also points
    >> out. Ex in the abstract "This document looks at the this problem"
    >>
    >> Some abbreviations needs to be spelled out at first usage, such as MTU (Maximum
    >> Transmission Unit)
    > MTU may actually be okay; per
    > https://www.rfc-editor.org/materials/abbrev.expansion.txt it is marked as
    > "well-known" and does not always need to be expanded.
    >
    >> On the content itself I have two questions:
    >>
    >> - Wouldn't it be relevant to also discuss the risks with regard to introduction
    >> of quantum safe crypto, if that leads to significantly increased key sizes? It
    >> could be troublesome if transition to a safer crypto is made impossible due to
    >> size limitations. - Would it be relevant to discuss usage of AIA extension as
    >> means of possibly excluding intermediary certs from the path as they could be
    >> located using AIA?
    >>
    >> Finally, I agree with the general review that this document reference quite
    >> some work in progress. If this document is to be published before these
    >> referenced works are concluded, are there alternatives to make the same point?
    > They seem to mostly be informative references, and so would not require us
    > to hold publication of this document.  It is probably still worth
    > considering if there are alternatives anyway, though.
    >
    > -Ben
    >
    > _______________________________________________
    > Emu mailing list
    > Emu@ietf.org
    > https://www.ietf.org/mailman/listinfo/emu