Re: [Secdispatch] Consideration of draft-mavrogiannopoulos-pkcs8-validated-parameters

Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com> Mon, 16 July 2018 20:51 UTC

Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 240B6130E2C; Mon, 16 Jul 2018 13:51:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CmBMzvxTXXwd; Mon, 16 Jul 2018 13:51:47 -0700 (PDT)
Received: from mail-oi0-x241.google.com (mail-oi0-x241.google.com [IPv6:2607:f8b0:4003:c06::241]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2853B130DD0; Mon, 16 Jul 2018 13:51:47 -0700 (PDT)
Received: by mail-oi0-x241.google.com with SMTP id k12-v6so77416347oiw.8; Mon, 16 Jul 2018 13:51:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=TqbGK8DxsvZUZ+fiIj7wFqRxdayo3HtA0Fsy0S6JdwE=; b=X/Fy3KCQgMGWkOaIMuz8MPWDtadE9Km+N/0lVLi6w5G9KpJdLl+B3coRSNvU5JSj97 wDt4Xfl91SY2II+yLbJyh/0FjDnhgLuc7DiYSlBbfF/+Yn2wv1+3igQxks6kl+VvAyu8 BdTjv/CEC5F/YGD0m2yYCJXOncXHKvYHNzxo7Y73wYI0ixYRvdUeH/qawzEApQK7jKNg R8E7EP9AJP5v/CvDSftMcFzyf32G87OYIjJDtD6ob/f0DL8ibF/SeQAe/HX+8rWIW2EH LHfo8zvisl8dBa0CxRSpoPEldOsc5oGHTLF7nWbHqC5/LB2UH8JyYJg64YHTzUtCk3lc qi5w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=TqbGK8DxsvZUZ+fiIj7wFqRxdayo3HtA0Fsy0S6JdwE=; b=TP2YkH0RxiHXBHh//agKxtuHUXPTCL5HiSjqsbeeN8K0+s2A5M3Wn3r1TX2y9bb4di zqhNCCvAdT0mmj6riK+1j3ErebrYWrpTwntDBD37ym0GGpUxD5hXzxl0fKkdS+EdquZY W4xHkWknSINZprk5zKxsbju2gvdC8GHcqtDI88UDAyd8dz6lWO6891+HH/30t9KdpfO7 Jlk092C3XVry9+DbyrTANJ0jpWBias8wlAKNu/8p7pH/b0fKI4WisYgj6NPExDIwxRoH 1jw43v/zpwh1KMNfzqJ9WKG6pZWxR3/m3E5Dq+JQkOK95XCCbQuwhOeszA2UkV8v667c +feQ==
X-Gm-Message-State: AOUpUlFu++GJD5sT296yNEneE6sdFwa5Q0OQiAWmsAYQ3NMsZcEKbPTV ySM28emlKH2Kqs9f3Df0GnlnyQNXQ5n+fw1gLc8=
X-Google-Smtp-Source: AAOMgpe2W89i6TZZ+OGYBafA2kFMIVuWJMCEw/43vrUh6Pm3OXskf3ZAiBnAEnSfLcQ17bYddtNvsubgghkZXT08BOg=
X-Received: by 2002:aca:d088:: with SMTP id j8-v6mr1009507oiy.276.1531774306455; Mon, 16 Jul 2018 13:51:46 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:ac9:7ad0:0:0:0:0:0 with HTTP; Mon, 16 Jul 2018 13:51:06 -0700 (PDT)
In-Reply-To: <CAHbuEH41MgvVVVJ0LCYFCYV9B1puzCa7i3pqn4S0D_=X+x+pMg@mail.gmail.com>
References: <4ea4564734325aa74b5cd2bf42724327.squirrel@www.amsl.com> <20180702204056.GH22125@kduck.kaduk.org> <0D085250-8A16-4BEA-AB52-F240217351E8@vigilsec.com> <265078AB-95D5-44BB-8236-0B5856DCEA4B@seantek.com> <CAHbuEH41MgvVVVJ0LCYFCYV9B1puzCa7i3pqn4S0D_=X+x+pMg@mail.gmail.com>
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
Date: Mon, 16 Jul 2018 16:51:06 -0400
Message-ID: <CAHbuEH6WYt_1qN7RBeS1N2oXxusMi6pMLauMcQgnF+S+wm1=5w@mail.gmail.com>
To: Sean Leonard <dev+ietf@seantek.com>
Cc: IETF SecDispatch <secdispatch@ietf.org>, draft-mavrogiannopoulos-pkcs8-validated-parameters@ietf.org
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/IfWP4GhkgMFjmBTShZ6qUQG_rDo>
Subject: Re: [Secdispatch] Consideration of draft-mavrogiannopoulos-pkcs8-validated-parameters
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Jul 2018 20:51:50 -0000

Regrettably, I can't stay for the discussion due to a conflict, but am
wondering if a different title for this sort of draft might help in
the future?

Perhaps for drafts like this with the next attribute for PKCS#8,
something along the lines of: "Validation Parameter Extension for
PKCS#8 Objects" would help.

I do agree with this being appropriate for the ISE.

Best regards,
Kathleen

On Mon, Jul 16, 2018 at 2:33 PM, Kathleen Moriarty
<kathleen.moriarty.ietf@gmail.com> wrote:
> On Mon, Jul 16, 2018 at 2:12 PM, Sean Leonard <dev+ietf@seantek.com> wrote:
>> I was reviewing the secdispatch agenda and came across this agenda item. I think it is a useful draft. ISE is an appropriate avenue.
>
> +1
> I also looked at this draft and think it's appropriate for an ISE
> publication.  It's a private extension and when on the SAAG list
> previously, there was little attention paid to it.
>
> I reached out to original PKCS authors (Russ already responded on his
> own), and they didn't see the need for IETF wide review either.  Here
> is the response:
>
> "The idea behind having an "Attributes" field in the PKCS #8
> PrivateKeyInfo object, similar to other X.500-era syntax, was to
> provide an easy way for applications to add information into the
> object.  The OID provides a unique identifier and has its own
> registration process.  The I-D proposes such an attribute.
>
> It seems reasonable to expect that people would want a way to publish
> the attributes they're using, without changing PKCS #8."
>
> I'm confused as to why it was held up as there isn't much information
> in the conflict review, hence checking back with PKCS authors.
> Additional text may be helpful to make these points more clear.
>
> Best regards,
> Kathleen
>
>>
>> I agree with point (2) about hashAlg. It should be AlgorithmIdentifier. Actually it should be DigestAlgorithmIdentifier, which is a subset of acceptable instances of AlgorithmIdentifier.
>>
>> With respect to point (1), note the spelling: Section 3 appears to be a typo. The CMS standard [RFC5652] tends to spell out “Algorithm”, such as “digestAlgorithm”, “contentEncryptionAlgorithm”, etc. “Alg” is the second most common, such as “bodyHashAlg”, “signAlg”, etc. (see, e.g., [RFC5752]).
>>
>> Sean
>>
>>> On Jul 2, 2018, at 5:20 PM, Russ Housley <housley@vigilsec.com> wrote:
>>>
>>> The Internet-Draft looks fine to me.  I think it should be published as an RFC.  I offer two minor comments/questions.
>>>
>>> (1) I think that the same ASN,1 should appear in Section 3 and Appendix B:
>>>
>>>      at-validation-parameters ATTRIBUTE :: {
>>>        TYPE ValidationParams
>>>        IDENTIFIED BY id-attr-validation-parameters }
>>>
>>>      id-attr-validation-parameters OBJECT IDENTIFIER ::        { 1 3 6 1 4 1 2312 18 8 1 }
>>>
>>>      ValidationParams :: SEQUENCE {
>>>        hashAlg OBJECT IDENTIFIER,
>>>        seed OCTET STRING }
>>>
>>> (2) Should the hashAlg be an AlgorithmIdentifier?  The current definition of OBJECT IDENTIFIER does not allow parameters.  I do not know of any hash algorithms that need parameters today, but there has been talk about such parameters over the years (see RFC 6210).  The safe thing to do seems to allow them, even though they are likely to be absent.
>>>
>>> Russ
>>>
>>>> On Jul 2, 2018, at 4:40 PM, Benjamin Kaduk <kaduk@mit.edu>; wrote:
>>>>
>>>> Hi folks,
>>>>
>>>> This is a super-short draft, but it seems potentially useful in some
>>>> scenarios (allowing for proof of primality to be included in-band in PKCS#8
>>>> objects).  Hopefully a few people can take a look...
>>>>
>>>> -Ben
>>>>
>>>> On Mon, Jun 18, 2018 at 03:02:49PM -0700, RFC ISE (Adrian Farrel) wrote:
>>>>> Hi SECDispatch,
>>>>>
>>>>> I'm the Independent Submissions Editor, and I have a couple of questions
>>>>> you could help me with.
>>>>>
>>>>> draft-mavrogiannopoulos-pkcs8-validated-parameters has been proposed for
>>>>> publication as an Independent Submission RFC. Along the way it was briefly
>>>>> discussed on the SAAG list where (my interpretation) there was no
>>>>> objection, but also no enthusiasm.
>>>>>
>>>>> During the IESG conflict review (cf. RFC 5742), the AD asked that the draft
>>>>> be considered by SECDispatch. I think the questions to be asked are:
>>>>>
>>>>> - Is this work that a body of people want to bring into the IETF to polish
>>>>> and publish? In other words, would *you* like to help work on the draft
>>>>> and find a venue in the IETF to do that work (here, a new WG, AD
>>>>> sponsored, ...)?
>>>>>
>>>>> - Is the proposed approach harmful in any way (especially to
>>>>> implementations of 5208 or 5958)?
>>>>>
>>>>> - Does the proposed extension constitute a security vulnerability of
>>>>> itself that is a cause for concern to anyone?
>>>>>
>>>>> We are somewhat used to 2 week review periods but owing to the unusual
>>>>> nature of this request and the run up to IETF-102 I suggest a four week
>>>>> period to make any determination. So please send your thought by Monday
>>>>> 16th July (which also gives you a chance to find me in person in
>>>>> Montreal). I've asked the chairs to help with any consensus calls should
>>>>> they prove necessary.
>>>>>
>>>>> Many thanks,
>>>>> Adrian
>>>>> --
>>>>> Adrian Farrel (ISE),
>>>>> rfc-ise@rfc-editor.org
>>>>>
>>>>> _______________________________________________
>>>>> Secdispatch mailing list
>>>>> Secdispatch@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/secdispatch
>>>>
>>>> _______________________________________________
>>>> Secdispatch mailing list
>>>> Secdispatch@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/secdispatch
>>
>> _______________________________________________
>> Secdispatch mailing list
>> Secdispatch@ietf.org
>> https://www.ietf.org/mailman/listinfo/secdispatch
>
>
>
> --
>
> Best regards,
> Kathleen



-- 

Best regards,
Kathleen