Re: [Sidrops] I-D Action: draft-ietf-sidrops-signed-tal-01.txt

Tim Bruijnzeels <tim@nlnetlabs.nl> Tue, 17 July 2018 21:52 UTC

Return-Path: <tim@nlnetlabs.nl>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7F440130E43 for <sidrops@ietfa.amsl.com>; Tue, 17 Jul 2018 14:52:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.131
X-Spam-Level:
X-Spam-Status: No, score=-1.131 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_NEUTRAL=0.779, T_DKIMWL_WL_MED=-0.01] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=nlnetlabs-nl.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bg4nMNZFI_aX for <sidrops@ietfa.amsl.com>; Tue, 17 Jul 2018 14:52:35 -0700 (PDT)
Received: from mail-it0-x230.google.com (mail-it0-x230.google.com [IPv6:2607:f8b0:4001:c0b::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7344B130E2C for <sidrops@ietf.org>; Tue, 17 Jul 2018 14:52:34 -0700 (PDT)
Received: by mail-it0-x230.google.com with SMTP id q20-v6so1343478ith.0 for <sidrops@ietf.org>; Tue, 17 Jul 2018 14:52:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nlnetlabs-nl.20150623.gappssmtp.com; s=20150623; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=AhhmHzGmM8/m7sJK9mAsUvgT6cNhd/C6OnsdQjKbZmA=; b=sS3J4EWsBOHE4em9/1eH2dKrcDNJGeHGPTs561MEFCW9JVaXM+39AuToA9szBHOG1x Oc4cMR9uoFE2XGmDNfF26Ar5na9bq3Te3393hxOq4QHoU7eRKLFrazCd1DzWVbbV9m0t RuYqdNPdXqwgxKGazDXoYtZfl3kYNZOI3sjVkepvFavSJxCBIOfhB2zkBbySykLZFSDp C0MMZhgQ2XFRi+Is4JJoXpbAYGt4BHItnao6bWQRH0+9QQQbqViyA3ILu+2Boaw6FMSt OtDzPUTevHVUBuR4R03re1BDDyE6TrcV+9icfRlIlv9WHtWh6aHcHxw+f4HCNmlog6Lw +Acg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=AhhmHzGmM8/m7sJK9mAsUvgT6cNhd/C6OnsdQjKbZmA=; b=FR5pwcClcO/i+B/K6ZX40gGx11bIphC3v87vutD6WrlkkR9DBraexpBEsg06IMTV/7 8N5OsMWBduzFStwz/BDcHNNa1v8usqnxY6IQ2fWD6rpzG2f+boiNd5qdQFEQdVdyQpiI 7yUyLqADoyEOl+fw+qajKKBWzHs5pvxpgo27gopOT0bVlTniNb9QU97/o1odnEYQnmju 51ngl5ejSwqlDup3zxGqBaWKlaP9vEGNPUlqf2CByulC8qnteNBiuUIsAZH2nCnIVMiN wQz/hDTHUf5e7eFWjG9d4nwScxBbEMjdwJ9kz5mDlriQo+0dSgInLb9hFkd/k3idcFk4 B80w==
X-Gm-Message-State: AOUpUlEDD52nJUKQ9dEOdEae+chCfz7gPQ9Eywoivun9CBzWEFWVlxYz qDN8Gorh9KegiOkrwoVFa4EJSSwPVkw=
X-Google-Smtp-Source: AAOMgpeTK97gzPyPy9FsgRQ/IVVoq9SdWhn2cecBS/X+Er5+6FH2UPeeOi4N6O/d9KFOjzWHw+2nLA==
X-Received: by 2002:a02:5658:: with SMTP id o85-v6mr3173332jab.135.1531864354317; Tue, 17 Jul 2018 14:52:34 -0700 (PDT)
Received: from ?IPv6:2001:67c:370:128:39af:6c5c:df41:8987? ([2001:67c:370:128:39af:6c5c:df41:8987]) by smtp.gmail.com with ESMTPSA id 16-v6sm369981itk.15.2018.07.17.14.52.33 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 17 Jul 2018 14:52:33 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 11.4 \(3445.8.2\))
From: Tim Bruijnzeels <tim@nlnetlabs.nl>
In-Reply-To: <20180717165827.GA14191@tomh-laptop>
Date: Tue, 17 Jul 2018 17:52:32 -0400
Cc: sidrops@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <AFFC2E31-6D59-4B21-A69F-A596BDA1B28D@nlnetlabs.nl>
References: <152846464123.15396.14579027912013078144@ietfa.amsl.com> <20180717165827.GA14191@tomh-laptop>
To: Tom Harrison <tomh@apnic.net>
X-Mailer: Apple Mail (2.3445.8.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/G1z89vp02fHNH4BQo5_JxTacpm8>
Subject: Re: [Sidrops] I-D Action: draft-ietf-sidrops-signed-tal-01.txt
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 21:52:38 -0000

Hi Tom,

Thanks for testing and the feedback. Comments below.

> On 17 Jul 2018, at 12:58, Tom Harrison <tomh@apnic.net> wrote:
> 
> On Fri, Jun 08, 2018 at 06:30:41AM -0700, internet-drafts@ietf.org wrote:
>> A New Internet-Draft is available from the on-line Internet-Drafts directories.
>> This draft is a work item of the SIDR Operations WG of the IETF.
>> 
>>        Title           : RPKI signed object for TAL
>>        Authors         : Tim Bruijnzeels
>>                          Carlos Martinez
>>        Filename        : draft-ietf-sidrops-signed-tal-01.txt
>>        Pages           : 12
>>        Date            : 2018-06-08
> 
> I've updated our proof-of-concept to match the new draft.  Some
> questions and minor suggestions:
> 
> In section 3, there is:
> 
>   The ASN.1 syntax for the Signed TAL eContent defined in
>   Section 3.2.  (This is the payload that specifies the AS being
>   authorized to originate routes as well as the prefixes to which
>   the AS may originate routes.)
> 
> The text in parentheses looks to be a cut-and-paste from the ROA
> profile document (RFC 6482).

Fixed in my edit buffer.

> In section 4, there is "[t]his EE certificate MUST have a 'notAfter'
> time that reflects the intended time that this Signed TAL will be
> published", which on its face implies that the 'notAfter' should be
> set to the time when the object is first published.  Changing it to
> "reflects the intended time [or duration] for which this signed TAL
> will be published" should make things clearer.

Yes, you are right. The intention was duration. Fixed in the edit buffer.

> 
> The SubjectPublicKeyInfo in the TAL structure has the type IA5String.
> Is there some reason not to use the 'raw' SubjectPublicKeyInfo type
> from RFC 5280?

This is an oversight. It should just be the raw DER structure.

> Since activationTime is not needed for an in-protocol reason at the
> moment, it would be good to add a note to the draft that it's there to
> prompt discussion/feedback about future dating.
> 
> On future dating more generally, I think it's a good idea, since it
> allows for in-band signalling about the rollover and would (hopefully)
> encourage a wider set of users to test the new tree before it becomes
> the 'official' tree.

The current draft assumes that the TA tests things before publishing the new signed TAL object, and then I think it would be okay for RPs to follow this new TAL as soon as it’s available.

But.. there may be good reasons for future dating / having a backup key.

In that case I would suggest that we have a structure where the ‘current’ TA key and URIs are always listed explicitly, pretty much like the document says now, but there is an optional similar structure with the intended ‘activationTime’ (informational only) for the new key.

That way the roll can be prepared in advance. RPs could theoretically verify independently that things are okay - but I would like to avoid putting this burden on all RPs. Once things are okay to roll, the TA can update it’s signed TAL then to make the new key ‘current’ and RPs can follow.

As I said at the mic HSMs can be used to protect against key theft. But keys (or card sets) can still be lost. If access to the new key is lost, then the TA can just choose not complete the roll - remove it, replace it with a new target key. If access to the current key is lost, then things get more difficult. Then the new key would have to be allowed to take over, e.g. automatically once the activation time is past?

Explicit revocation of the old key is also possible, but would require that RPs constantly check these candidate keys. I am afraid this adds a lot of overhead.

Comments and ideas are most welcome!

Tim






> 
> -Tom
> 
> _______________________________________________
> Sidrops mailing list
> Sidrops@ietf.org
> https://www.ietf.org/mailman/listinfo/sidrops