Re: [sidr] Stephen Farrell's Discuss on draft-ietf-sidr-rpsl-sig-11: (with DISCUSS and COMMENT)
Brian Haberman <brian@innovationslab.net> Thu, 19 May 2016 12:12 UTC
Return-Path: <brian@innovationslab.net>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 42F4212B004; Thu, 19 May 2016 05:12:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WyNtiF6hYnvy; Thu, 19 May 2016 05:11:58 -0700 (PDT)
Received: from uillean.fuaim.com (uillean.fuaim.com [206.197.161.140]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6F4AB12B015; Thu, 19 May 2016 05:11:58 -0700 (PDT)
Received: from clairseach.fuaim.com (clairseach-high.fuaim.com [206.197.161.158]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by uillean.fuaim.com (Postfix) with ESMTP id 49E8C880E4; Thu, 19 May 2016 05:11:58 -0700 (PDT)
Received: from clemson.local (unknown [76.21.129.88]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by clairseach.fuaim.com (Postfix) with ESMTP id 6D468328081A; Thu, 19 May 2016 05:11:57 -0700 (PDT)
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, Sandra Murphy <sandy@tislabs.com>
References: <20160518155109.14693.29705.idtracker@ietfa.amsl.com> <7398a12b-5f01-275f-7dc6-178c6b611891@innovationslab.net> <573C93CD.4040901@cs.tcd.ie> <2e4e9c39-06a9-43ea-eee7-1c0a0a67ad22@innovationslab.net> <18A984F0-BEAE-4B5D-99EB-90BA79249C49@tislabs.com> <573CDD5A.4030206@cs.tcd.ie>
From: Brian Haberman <brian@innovationslab.net>
Message-ID: <087861c3-d506-2ab8-0ecb-df09dc293678@innovationslab.net>
Date: Thu, 19 May 2016 08:11:50 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:45.0) Gecko/20100101 Thunderbird/45.1.0
MIME-Version: 1.0
In-Reply-To: <573CDD5A.4030206@cs.tcd.ie>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="mVM4Q03keGclJonLXu3l8hBMh9pAcj5Ix"
Archived-At: <http://mailarchive.ietf.org/arch/msg/sidr/yLLc_jsGvCNWOPayzCiuP3coMWw>
Cc: sidr-chairs@ietf.org, The IESG <iesg@ietf.org>, draft-ietf-sidr-rpsl-sig@ietf.org, sidr@ietf.org
Subject: Re: [sidr] Stephen Farrell's Discuss on draft-ietf-sidr-rpsl-sig-11: (with DISCUSS and COMMENT)
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidr/>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 May 2016 12:12:00 -0000
Hiya Stephen, On 5/18/16 5:23 PM, Stephen Farrell wrote: > > Hi Sandy, > > On 18/05/16 22:12, Sandra Murphy wrote: >> comments inline. speaking as a regular ol’ wg member >> >> On May 18, 2016, at 12:20 PM, Brian Haberman >> <brian@innovationslab.net> wrote: >> >>> Hiya Stephen, >>> >>> On 5/18/16 12:09 PM, Stephen Farrell wrote: >>>> >>>> Hiya, >>>> >>>> On 18/05/16 17:06, Brian Haberman wrote: >>>>> Hiya Stephen, >>>>> >>>>> On 5/18/16 11:51 AM, Stephen Farrell wrote: >>>>>> Stephen Farrell has entered the following ballot position >>>>>> for draft-ietf-sidr-rpsl-sig-11: Discuss >>>>>> >>>>>> When responding, please keep the subject line intact and >>>>>> reply to all email addresses included in the To and CC lines. >>>>>> (Feel free to cut this introductory paragraph, however.) >>>>>> >>>>>> >>>>>> Please refer to >>>>>> https://www.ietf.org/iesg/statement/discuss-criteria.html for >>>>>> more information about IESG DISCUSS and COMMENT positions. >>>>>> >>>>>> >>>>>> The document, along with other ballot positions, can be found >>>>>> here: >>>>>> https://datatracker.ietf.org/doc/draft-ietf-sidr-rpsl-sig/ >>>>>> >>>>>> >>>>>> >>>>>> ---------------------------------------------------------------------- >>>>>> >>>>>> > DISCUSS: >>>>>> ---------------------------------------------------------------------- >>>>>> >>>>>> >>>>>> >>>>>> > I'd like to check one thing - this may be needed for strict >>>>>> compliance with RPKI thing but it seems kinda weird to also >>>>>> impose that here, but anyway... >>>>>> >>>>>> Is 3.2 step 1 needed? That seems like useless complexity >>>>>> here. If it is needed, how does the verifier check that it's >>>>>> really a single-use? I don't see the point TBH. >>>>>> >>>>> >>>>> This text was driven by the statement in RFC 6487 (Section 3) >>>>> that says: >>>>> >>>>> The private key associated with an EE certificate is used to >>>>> sign a single RPKI signed object, i.e., the EE certificate is >>>>> used to validate only one object. >>>>> >>>>> Step 1 in 3.2 is there so that this approach follows the above >>>>> directive on the use of the RPKI infrastructure/certificates. >>>> >>>> Well... sure. But what is the benefit here? IIRC that was >>> >>> I *think* the benefit is supposed to be compliance with the RPKI >>> approach... >>> >>>> something related to making more fine-grained revocation possible >>>> or something which doesn't seem that useful here since a verifier >>>> will likely already have processed stuff already or am I mixed >>>> up? >>> >>> I don't think you are mixed up, but I will let others in SIDR chime >>> in… >> >> There was at one point in the history of resource certificates the >> idea that EE certs could be used multiple times. (EE certs even had >> their own manifests!) >> >> The signed object definition encapsulated the EE cert used to verify >> the signature. That revocation of the signed object could be >> accomplished by revoking the EE cert. Which meant that the EE cert >> should be used just to sign that one object, as Stephen says. >> (otherwise chaos ensues) >> >> As the only defined use of EE certs at the time of the publication of >> 6487 was the use to verify signed objects, the text about EE certs >> was reduced to just that necessary to support the single-use. >> >> This is different. The validity of the rpsl object is not tied to >> the validity of the EE cert. The comments from the wg were that this >> draft should talk about the syntax of the new attribute, not the >> authorization/semantics. So revocation of the EE cert in this case >> would/might not have the effect of revoking the rpsl object. I >> personally don’t think it likely that it ever will, but that’s IMHO >> only. >> >> So it is a moot question as to whether the single-use is a part of >> “the RPKI approach” for this rpsl-sig use. > > But that means that there is no reason to include the requirement > here then or am I missing something? Deleting that "step" in the > signing process would seem like a good idea so. (Assuming that > current implementers, if any, are fine with that.) As one implementer, I have no problem dropping this step. There is nothing in my RPSL code that enforces this (it is a function of the RPKI EE cert usage). > >> >>> >>>> >>>> If there's no benefit, it seems like that adds a bunch of CA code >>>> just for fun (or "compliance" maybe;-) >> >> curious: how would this single-use requirement add anything to the CA >> code? If the requirement is in 6487, the CA code would already have >> the checks. I ask only because I might be missing something. > > What I was trying to say was that requiring signers of this to > include all the CA code is the problem/oddity, esp if there's no > real benefit. > > So the single-use thing doesn't add to the CA code, it adds a > need for the CA code in the wrong place. > > And I guess if the spec says "once only" then I can well imagine > some poor verifier implementer keeping some kind of cache and > checking it'd not seen a signature before or something like that. > And that'd also be kinda pointless code too I think. I certainly don't do any type of checking at the verification step. Regards, Brian
- [sidr] Stephen Farrell's Discuss on draft-ietf-si… Stephen Farrell
- Re: [sidr] Stephen Farrell's Discuss on draft-iet… Brian Haberman
- Re: [sidr] Stephen Farrell's Discuss on draft-iet… Stephen Farrell
- Re: [sidr] Stephen Farrell's Discuss on draft-iet… Brian Haberman
- Re: [sidr] Stephen Farrell's Discuss on draft-iet… Stephen Farrell
- Re: [sidr] Stephen Farrell's Discuss on draft-iet… Sandra Murphy
- Re: [sidr] Stephen Farrell's Discuss on draft-iet… Stephen Farrell
- Re: [sidr] Stephen Farrell's Discuss on draft-iet… Brian Haberman
- Re: [sidr] Stephen Farrell's Discuss on draft-iet… Brian Haberman