Re: [Sidrops] draft-ietf-sidrops-rpki-has-no-identity-00

Randy Bush <randy@psg.com> Tue, 11 May 2021 00:03 UTC

Return-Path: <randy@psg.com>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 070753A3010 for <sidrops@ietfa.amsl.com>; Mon, 10 May 2021 17:03:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JiE-EVcSbiaH for <sidrops@ietfa.amsl.com>; Mon, 10 May 2021 17:03:40 -0700 (PDT)
Received: from ran.psg.com (ran.psg.com [IPv6:2001:418:8006::18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 717DE3A300E for <sidrops@ietf.org>; Mon, 10 May 2021 17:03:40 -0700 (PDT)
Received: from localhost ([127.0.0.1] helo=ryuu.rg.net) by ran.psg.com with esmtp (Exim 4.90_1) (envelope-from <randy@psg.com>) id 1lgFs9-00068E-Vx; Tue, 11 May 2021 00:03:38 +0000
Date: Mon, 10 May 2021 17:03:37 -0700
Message-ID: <m2fsyuuofa.wl-randy@psg.com>
From: Randy Bush <randy@psg.com>
To: George Michaelson <ggm@algebras.org>
Cc: SIDR Operations WG <sidrops@ietf.org>
In-Reply-To: <CAKr6gn3oCZBOP3L8AQWvH9Nk4fum-ycZCnHO_DUtgdx5M=z_+A@mail.gmail.com>
References: <m2k0o6uqot.wl-randy@psg.com> <CAKr6gn3oCZBOP3L8AQWvH9Nk4fum-ycZCnHO_DUtgdx5M=z_+A@mail.gmail.com>
User-Agent: Wanderlust/2.15.9 (Almost Unreal) Emacs/26.3 Mule/6.0 (HANACHIRUSATO)
MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue")
Content-Type: text/plain; charset="US-ASCII"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/JbujixnIGf2kBO6XSBbtPw-RME4>
Subject: Re: [Sidrops] draft-ietf-sidrops-rpki-has-no-identity-00
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 May 2021 00:03:45 -0000

> If another mechanism can provide positive proof (eg an x509 identity
> certificate which lies under a non-RPKI TA you trust) then there is no
> barrier to countersigning an assertion over that proof (the public key
> and a nonce, for example) binding the INR you can validate inside the
> RPKI, and an identity which lies outside the RPKI.
> 
> and
> 
> No part of the RPKi validation can "prove" the identity in the
> signing. What it can do, is relate the INR in RPKI, to a specific
> assertion about identity. Validation of that assertion is not subject
> to RPKI validation. Validation of the INR which is being associated,
> is a function of the RPKI

are you trying to say

  the owner of some j random inr is attesting to some identity binding
  in some k random pki?

maybe a concrete example would help me wrap what is left of my head
around this.

there exists an rpki cert attesting to a holding of 192.83.230.0/24.
iij has a corporate x.509-based employee database in which i have a
cert.  so the unknown owner of 192.83.230.0/24 cross-signs (let's
leave out the ugnlies) my iij cert.  what is the real world meaning of
this?  in few small words.

or, what is the meaning if i cross-sign the cert for 203.119.101.18
from iij?

what are the attestations and what is the trust?

randy

---
randy@psg.com
`gpg --locate-external-keys --auto-key-locate wkd randy@psg.com`
signatures are back, thanks to dmarc header butchery