Re: [sidr] Stephen Farrell's Discuss on draft-ietf-sidr-rpsl-sig-11: (with DISCUSS and COMMENT)

Brian Haberman <brian@innovationslab.net> Thu, 19 May 2016 12:18 UTC

Return-Path: <brian@innovationslab.net>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D543112DA0A; Thu, 19 May 2016 05:18:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Nhze2NisfQvW; Thu, 19 May 2016 05:18:22 -0700 (PDT)
Received: from uillean.fuaim.com (uillean.fuaim.com [206.197.161.140]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 97FE612DA25; Thu, 19 May 2016 05:18:18 -0700 (PDT)
Received: from clairseach.fuaim.com (clairseach-high.fuaim.com [206.197.161.158]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by uillean.fuaim.com (Postfix) with ESMTP id 87D19880E4; Thu, 19 May 2016 05:18:18 -0700 (PDT)
Received: from clemson.local (unknown [76.21.129.88]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by clairseach.fuaim.com (Postfix) with ESMTP id 8D76C328081A; Thu, 19 May 2016 05:18:17 -0700 (PDT)
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, Sandra Murphy <sandy@tislabs.com>
References: <20160518155109.14693.29705.idtracker@ietfa.amsl.com> <7398a12b-5f01-275f-7dc6-178c6b611891@innovationslab.net> <573C93CD.4040901@cs.tcd.ie> <2e4e9c39-06a9-43ea-eee7-1c0a0a67ad22@innovationslab.net> <18A984F0-BEAE-4B5D-99EB-90BA79249C49@tislabs.com> <573CDD5A.4030206@cs.tcd.ie> <087861c3-d506-2ab8-0ecb-df09dc293678@innovationslab.net>
From: Brian Haberman <brian@innovationslab.net>
Message-ID: <bea0048e-8d3e-2b37-38f9-dc2c2354da42@innovationslab.net>
Date: Thu, 19 May 2016 08:18:16 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:45.0) Gecko/20100101 Thunderbird/45.1.0
MIME-Version: 1.0
In-Reply-To: <087861c3-d506-2ab8-0ecb-df09dc293678@innovationslab.net>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="0ON6KIp5IDPrkFQPUaAFlUEH6VBngQ0oR"
Archived-At: <http://mailarchive.ietf.org/arch/msg/sidr/e_-JERZUosroB1pdV7Cp8lPiJFo>
Cc: sidr-chairs@ietf.org, The IESG <iesg@ietf.org>, draft-ietf-sidr-rpsl-sig@ietf.org, sidr@ietf.org
Subject: Re: [sidr] Stephen Farrell's Discuss on draft-ietf-sidr-rpsl-sig-11: (with DISCUSS and COMMENT)
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 May 2016 12:18:24 -0000

One further point... Dropping step 1 in section 3.2 is one part of this
change. I think that the fourth bullet in section 5 can be dropped as
well.  Thoughts?

Regards,
Brian

On 5/19/16 8:11 AM, Brian Haberman wrote:
> Hiya Stephen,
> 
> On 5/18/16 5:23 PM, Stephen Farrell wrote:
>>
>> Hi Sandy,
>>
>> On 18/05/16 22:12, Sandra Murphy wrote:
>>> comments inline.  speaking as a regular ol’ wg member
>>>
>>> On May 18, 2016, at 12:20 PM, Brian Haberman
>>> <brian@innovationslab.net> wrote:
>>>
>>>> Hiya Stephen,
>>>>
>>>> On 5/18/16 12:09 PM, Stephen Farrell wrote:
>>>>>
>>>>> Hiya,
>>>>>
>>>>> On 18/05/16 17:06, Brian Haberman wrote:
>>>>>> Hiya Stephen,
>>>>>>
>>>>>> On 5/18/16 11:51 AM, Stephen Farrell wrote:
>>>>>>> Stephen Farrell has entered the following ballot position
>>>>>>> for draft-ietf-sidr-rpsl-sig-11: Discuss
>>>>>>>
>>>>>>> When responding, please keep the subject line intact and
>>>>>>> reply to all email addresses included in the To and CC lines.
>>>>>>> (Feel free to cut this introductory paragraph, however.)
>>>>>>>
>>>>>>>
>>>>>>> Please refer to
>>>>>>> https://www.ietf.org/iesg/statement/discuss-criteria.html for
>>>>>>> more information about IESG DISCUSS and COMMENT positions.
>>>>>>>
>>>>>>>
>>>>>>> The document, along with other ballot positions, can be found
>>>>>>> here: 
>>>>>>> https://datatracker.ietf.org/doc/draft-ietf-sidr-rpsl-sig/
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> ----------------------------------------------------------------------
>>>>>>>
>>>>>>>
>> DISCUSS:
>>>>>>> ----------------------------------------------------------------------
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>> I'd like to check one thing - this may be needed for strict
>>>>>>> compliance with RPKI thing but it seems kinda weird to also 
>>>>>>> impose that here, but anyway...
>>>>>>>
>>>>>>> Is 3.2 step 1 needed?  That seems like useless complexity 
>>>>>>> here.  If it is needed, how does the verifier check that it's
>>>>>>> really a single-use? I don't see the point TBH.
>>>>>>>
>>>>>>
>>>>>> This text was driven by the statement in RFC 6487 (Section 3)
>>>>>> that says:
>>>>>>
>>>>>> The private key associated with an EE certificate is used to
>>>>>> sign a single RPKI signed object, i.e., the EE certificate is
>>>>>> used to validate only one object.
>>>>>>
>>>>>> Step 1 in 3.2 is there so that this approach follows the above
>>>>>> directive on the use of the RPKI infrastructure/certificates.
>>>>>
>>>>> Well... sure. But what is the benefit here? IIRC that was
>>>>
>>>> I *think* the benefit is supposed to be compliance with the RPKI
>>>> approach...
>>>>
>>>>> something related to making more fine-grained revocation possible
>>>>> or something which doesn't seem that useful here since a verifier
>>>>> will likely already have processed stuff already or am I mixed
>>>>> up?
>>>>
>>>> I don't think you are mixed up, but I will let others in SIDR chime
>>>> in…
>>>
>>> There was at one point in the history of resource certificates the
>>> idea that EE certs could be used multiple times.  (EE certs even had
>>> their own manifests!)
>>>
>>> The signed object definition encapsulated the EE cert used to verify
>>> the signature.  That revocation of the signed object could be
>>> accomplished by revoking the EE cert.  Which meant that the EE cert
>>> should be used just to sign that one object, as Stephen says.
>>> (otherwise chaos ensues)
>>>
>>> As the only defined use of EE certs at the time of the publication of
>>> 6487 was the use to verify signed objects, the text about EE certs
>>> was reduced to just that necessary to support the single-use.
>>>
>>> This is different.  The validity of the rpsl object is not tied to
>>> the validity of the EE cert.  The comments from the wg were that this
>>> draft should talk about the syntax of the new attribute, not the
>>> authorization/semantics.  So revocation of the EE cert in this case
>>> would/might not have the effect of revoking the rpsl object.  I
>>> personally don’t think it likely that it ever will, but that’s IMHO
>>> only.
>>>
>>> So it is a moot question as to whether the single-use is a part of
>>> “the RPKI approach” for this rpsl-sig use.
>>
>> But that means that there is no reason to include the requirement
>> here then or am I missing something? Deleting that "step" in the
>> signing process would seem like a good idea so. (Assuming that
>> current implementers, if any, are fine with that.)
> 
> As one implementer, I have no problem dropping this step. There is
> nothing in my RPSL code that enforces this (it is a function of the RPKI
> EE cert usage).
> 
>>
>>>
>>>>
>>>>>
>>>>> If there's no benefit, it seems like that adds a bunch of CA code
>>>>> just for fun (or "compliance" maybe;-)
>>>
>>> curious: how would this single-use requirement add anything to the CA
>>> code?  If the requirement is in 6487, the CA code would already have
>>> the checks.  I ask only because I might be missing something.
>>
>> What I was trying to say was that requiring signers of this to
>> include all the CA code is the problem/oddity, esp if there's no
>> real benefit.
>>
>> So the single-use thing doesn't add to the CA code, it adds a
>> need for the CA code in the wrong place.
>>
>> And I guess if the spec says "once only" then I can well imagine
>> some poor verifier implementer keeping some kind of cache and
>> checking it'd not seen a signature before or something like that.
>> And that'd also be kinda pointless code too I think.
> 
> I certainly don't do any type of checking at the verification step.
> 
> Regards,
> Brian
>