Re: [Sidrops] draft-ietf-sidrops-rpki-has-no-identity-00

George Michaelson <ggm@algebras.org> Wed, 12 May 2021 23:45 UTC

Return-Path: <ggm@algebras.org>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A1533A1A88 for <sidrops@ietfa.amsl.com>; Wed, 12 May 2021 16:45:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=algebras-org.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rRxQoYf6yRXX for <sidrops@ietfa.amsl.com>; Wed, 12 May 2021 16:45:43 -0700 (PDT)
Received: from mail-lj1-x22a.google.com (mail-lj1-x22a.google.com [IPv6:2a00:1450:4864:20::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 50E3F3A1A89 for <sidrops@ietf.org>; Wed, 12 May 2021 16:45:42 -0700 (PDT)
Received: by mail-lj1-x22a.google.com with SMTP id p12so31778857ljg.1 for <sidrops@ietf.org>; Wed, 12 May 2021 16:45:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=algebras-org.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=pJqZj7yv5n+qE9V0UsLGyei+YUK4Z9Ij0Sfl/NV614Y=; b=CNLZYSk1QnmIQGvTyCLYnXU5WUt/SOR0RxP3MS/9GFT5Vpd+JhITfNI3CFb5CSTkzF 7uziPAikT5kvPtgCabz5mlOJw/5CyGNzp1TPAF26op8utdldub9Loi0G9XAMqlrjvvDG YGWFZ/h9zTI5UHW7rrgIe/HsX2PNMnO34bYskv9jGhVmTapVN2JTR8ThbMEKratB22/L Zd8E1e/QCBoWuO94Ri5UmlxIZivdOeX3rsaTMI565vvNsY5Np8Tij9tbGAwgdqzKAumN rgwnJG2xCf6bBske1Yz2uCROu0edzkNvl8briKlTwrRasJh9ySNJpzTJNUs0Hz0QBMR9 q1Eg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=pJqZj7yv5n+qE9V0UsLGyei+YUK4Z9Ij0Sfl/NV614Y=; b=H+R6Wj0DgZ2mokTEOdBrS0Na9iUQIVETRM7Am+PhXVf6H9sy3Q58qpSs9AnaYk2rh5 OesdyHaOEUd+9zF267/CK8q6Q4ZIQnjAXbCFVdTuYw7GafC19RGkQR40Rzo0plbtMOkD ymK6ofF53+xw0NgZ6VXFUlZTLcV4/3EAXPsTX6hhL9t3XJuWZhG9S+wC4N4XPz+YdPLD +W4L+d7ruw6uv+T6gqpyNhZyAAZzcN5/IBwfUUGBFLOCn+vW24cWCjiG56o16xKORMcc +fBMiV8tHwCh5YcfRz2cvZGX+5gqBkx+iWzFK7svqPfDO9SmIEKc2Yy/z1Ffb/A5elHF xJbQ==
X-Gm-Message-State: AOAM533OpQqiCntOMYtKHFja47hvLhq7H4WKiLJ3XRlsIIxgOgY0LFMd E1DNmwjEQJuj/xMMKn53a3Q6bAjpHzVMs6Acl3/bLw==
X-Google-Smtp-Source: ABdhPJx5tAh5EQWe91BXML/P16sIl22Iujqgi7yXB0Cntdg87XCeB6uiVFWWV60JPG8Ce405iSmyI4Kle9bjEWJ+n/M=
X-Received: by 2002:a05:651c:1a4:: with SMTP id c4mr31405460ljn.112.1620863138827; Wed, 12 May 2021 16:45:38 -0700 (PDT)
MIME-Version: 1.0
References: <m2k0o6uqot.wl-randy@psg.com> <CAKr6gn3oCZBOP3L8AQWvH9Nk4fum-ycZCnHO_DUtgdx5M=z_+A@mail.gmail.com> <m2fsyuuofa.wl-randy@psg.com> <CAKr6gn18yGTrAiqPA2P+kc+JBt2Tf8D-G4Gf5WCnASm8vk1Fvg@mail.gmail.com> <m21raduy3s.wl-randy@psg.com> <CAKr6gn2tRD1M=MmZLxHraJHW2iYbn=_hAmyPke3fdpKJSnVRBw@mail.gmail.com> <24319C47-1513-46BC-A20E-232F80C8695B@vigilsec.com> <m2zgwzsreb.wl-randy@psg.com>
In-Reply-To: <m2zgwzsreb.wl-randy@psg.com>
From: George Michaelson <ggm@algebras.org>
Date: Thu, 13 May 2021 09:45:27 +1000
Message-ID: <CAKr6gn2m4=aPx_RaDHUSSvY-9S+JMpvjLSfoK+rg=SPyfR1xBw@mail.gmail.com>
To: Randy Bush <randy@psg.com>
Cc: Russ Housley <housley@vigilsec.com>, SIDR Operations WG <sidrops@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/MlNzhrklvoqHKWKF8D4tpNNHpJc>
Subject: Re: [Sidrops] draft-ietf-sidrops-rpki-has-no-identity-00
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 May 2021 23:45:48 -0000

On Thu, May 13, 2021 at 5:06 AM Randy Bush <randy@psg.com> wrote:
> i am lost a few meters higher up; which is what i suspect you may be
> hinting.  at the start of this tangled thread, ggm asked us to include
> an example of useful "bridging" (ggm's term) MTA/RSC signing.
>
> if i had a cms blob signed by an INR CA and by X-CA or whatever, what
> can i do with it?  and i most definitely do not mean the mechanics of
> signing, proofs of possession, etc.

Sorry I ratholed. It was stupid.

>
> i do not see how it has more authority to issue an LOA for a PNI than
> would be granted by simply using X-CA.

The LOA, I never quite got why anyone is waving a PDF with a company
logo on it, to decide to do something. An RPKI signed LOA, means you
can show the IP addresses are legitimate. If its some kind of LOA-like
thing about an ASN, same-same: the RPKi can show you control the ASN.
But, what shows you're speaking for the logo on the corner of the LOA?

Thats how I came into "ok: something else has to certify that this
company letterhead really is provably about the company, and you have
authority to speak for the company" which is not about the INR, its
about the .. identity behind the LOA.

>
> perhaps if X-CA has been used to contract with the issuing RPKI CA, it
> could authorize modification of RPKI holdings; but no more so than just
> that X-CA.
>
> i suppose that if both signed a blob which somehow encoded that the RPKI
> INR signer was authorized to represent the X-CA signer in some
> restricted (i hope) class of transactions, the RPKI INR signer could
> then issue the LOA for the PNI.  this seems a tenuous and therefore
> dangerous chain (the blob's restrictions must be tested to include the
> authorization for the LOA[0]), with zero advantage over X-CA just
> signing the LOA.

Yes. You have to validate in both domains. It's tedious, but
certification is like that. Trust nothing. No?

> i keep looping, with the X-CA being the inescapable base real world
> authority.

Only of the identity assertion. It has no global validity, no testable
quality regarding disposition of the INR.

You really want the product of both. Thats the CMS, signed
independently by both, AS Russ Says, or some construct in the RTA/RSC
space which is 'nested'

>
> i think i'll go shopping. :)
>
> randy
>
> [0] - and who is going down the capybara hole of writing the rfc
>       describing the syntax and semantics of these authorizations and
>       restrictions?

Problem for another day. Never said it wasn't a problem, never said it
didn't need to be defined. Wanted to say, Can imagine future uses, and
used LOA to exemplify. the B2B cases, don't (yet) have an open-basis.
Its (specific)B to (customer)B and the context is private, and defined
.. elsewhere. The second identity is defined by the Business which
defines the transaction. in the case of AWS or kubectl, its JSON blob
bound and the identity part is being solved inside that REST protocol,
outside of RPKI with no reference. The signed object is that business
establishing you're entitled to say whats to happen to the INR, in
their preferred format.

Maybe I should have stuck to talking about B2B private, and ignored
the identity thing. You decided to stomp on Identity, believing
somebody was saying RPKI can "prove" it but that was never my intent:
RPKI can be *bound* to identity, or anything else, by CMS or other
mechanisms tying both into a common statement. You can bind an LOA
identity if you can prove it in some other PKI, to the specific INR,
by both PKI being used to sign something.

If you want identity or anything else *proven*, you have to use
another domain of validation.  Proof isn't the binding, its the
validation behind what has been said in the binding.

RPKI can't validate it. I never sought to say RPKI can prove identity: It can't.

-G