Re: [Sidrops] I-D Action: draft-ietf-sidrops-signed-tal-07.txt

Ben Maddison <benm@workonline.africa> Thu, 29 July 2021 13:07 UTC

Return-Path: <benm@workonline.africa>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B77A3A2227 for <sidrops@ietfa.amsl.com>; Thu, 29 Jul 2021 06:07:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, MSGID_FROM_MTA_HEADER=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=workonline.africa
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mYOEYsE2RyDf for <sidrops@ietfa.amsl.com>; Thu, 29 Jul 2021 06:07:11 -0700 (PDT)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80053.outbound.protection.outlook.com [40.107.8.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 92CE63A2225 for <sidrops@ietf.org>; Thu, 29 Jul 2021 06:07:10 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=IoNc778A6YdA0eGwBdvTpHX4hMfk9JGSk/U2rcjLdBwfZZu1dIqygMZW82pyzkxycERR0rOu/OGLlFrPg77b/HjOVkrvNERaDJCJiipazd0J8FvzzGuCYnK27RaReIvzRNgrK/dPuvooxSF3Rn0sNHGlvb0t9ZpQGiVxnbeLo8zbWWK+3U8UnJ3dMdMzO7PY6T6A8H/kZeZSao/RLI8UeDGmXacqJst62w1CvMtCtK+YDiG+ZnW7FtT3bOQOtH3x1Rvqlg7FRQHIAd/SFJ2wRbWV4bD6/c+iOHxFlIElrhAFVGCpHI7aLpuTir3Bp0pa/dGrx5nWbegu+7bOKd2Vbg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=TZpHJcvrsHBfLoeFAFbGf5HXg6psV3+9o9i4v9JLjhQ=; b=BNtahZQRMui5kiGVKlYhPZxDhQXZMSglRtnbdADRnyuEulsDbh8AIGpkiH/hLHmIsZiQzi6p3jlFZO9Kzmf3Y2K/92QDOO5DZTYOG4jfIb0upfKhoXl8SgrzTuQ2vHunjGRoMHT3eB2lA3zXgRR342qZx97C8eLAWpw981hgQ8nRxvCm0TntjgQWCu23o/BDMSjVoyZRd6dBD/6hDPrPvz+6vz+0TOgpFA0xJzXMLcFPVJcf84HT1LJ6eI6Vx0BIF7vQiNrNMeYlnVvrLednNIrJyUO4g0areW7mB4TSNBCw4ReWjoRunylpvfTbx7WrdBrF95dx/42D/XYNHPOiJQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=workonline.africa; dmarc=pass action=none header.from=workonline.africa; dkim=pass header.d=workonline.africa; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=workonline.africa; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=TZpHJcvrsHBfLoeFAFbGf5HXg6psV3+9o9i4v9JLjhQ=; b=bQfC2uaS4fyANsTA718CpdRYLqC5mMgT/lZcM6zqzIdUTywxop9fiIFLSxP4fsOkmurl3EqT4AWHewFbun1fGYoou3awLuXx7u4q6P+InLlWN2vLjBfQ3o6xr/IbV1OpbMsi35emJG45/3/jZrSJBW4zRRhVmEDTlB6ii66ozes=
Authentication-Results: nlnetlabs.nl; dkim=none (message not signed) header.d=none;nlnetlabs.nl; dmarc=none action=none header.from=workonline.africa;
Received: from PAXP190MB1518.EURP190.PROD.OUTLOOK.COM (2603:10a6:102:1cd::22) by PR3P190MB0841.EURP190.PROD.OUTLOOK.COM (2603:10a6:102:8f::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4373.21; Thu, 29 Jul 2021 13:07:07 +0000
Received: from PAXP190MB1518.EURP190.PROD.OUTLOOK.COM ([fe80::c5f8:90dd:9d84:97af]) by PAXP190MB1518.EURP190.PROD.OUTLOOK.COM ([fe80::c5f8:90dd:9d84:97af%5]) with mapi id 15.20.4373.022; Thu, 29 Jul 2021 13:07:07 +0000
Date: Thu, 29 Jul 2021 15:06:59 +0200
From: Ben Maddison <benm@workonline.africa>
To: Tim Bruijnzeels <tim@nlnetlabs.nl>
Cc: Russ Housley <housley@vigilsec.com>, SIDR Operations WG <sidrops@ietf.org>
Message-ID: <20210729130659.klftuj5kk7qgbkzb@benm-laptop>
References: <162397132033.32149.10121553443259737639@ietfa.amsl.com> <20210728214216.vuyds2blfjoqyjcw@benm-laptop> <2CFB0083-BCD3-4B7B-A55F-B0C7439C281C@vigilsec.com> <B868D5D0-C8B4-466F-9923-579365E45DD9@nlnetlabs.nl>
Content-Type: multipart/signed; micalg="pgp-sha512"; protocol="application/pgp-signature"; boundary="4h645gxisezw2enl"
Content-Disposition: inline
In-Reply-To: <B868D5D0-C8B4-466F-9923-579365E45DD9@nlnetlabs.nl>
X-ClientProxiedBy: CTXP275CA0045.ZAFP275.PROD.OUTLOOK.COM (2603:1086:100:1::33) To PAXP190MB1518.EURP190.PROD.OUTLOOK.COM (2603:10a6:102:1cd::22)
MIME-Version: 1.0
X-MS-Exchange-MessageSentRepresentingType: 1
Received: from localhost (105.233.97.54) by CTXP275CA0045.ZAFP275.PROD.OUTLOOK.COM (2603:1086:100:1::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4373.17 via Frontend Transport; Thu, 29 Jul 2021 13:07:06 +0000
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 14f6ee97-65d9-49c0-312b-08d95291c461
X-MS-TrafficTypeDiagnostic: PR3P190MB0841:
X-Microsoft-Antispam-PRVS: <PR3P190MB084192C704760225B92BE419C0EB9@PR3P190MB0841.EURP190.PROD.OUTLOOK.COM>
X-MS-Oob-TLC-OOBClassifiers: OLM:10000;
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PAXP190MB1518.EURP190.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(7916004)(136003)(396003)(376002)(346002)(366004)(39830400003)(8676002)(2906002)(478600001)(6496006)(21480400003)(38350700002)(44144004)(38100700002)(9686003)(8936002)(33716001)(66476007)(66946007)(53546011)(52116002)(66556008)(1076003)(186003)(316002)(6486002)(956004)(26005)(6666004)(54906003)(86362001)(4326008)(5660300002)(6916009)(83380400001)(46492011)(2700100001); DIR:OUT; SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 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
X-OriginatorOrg: workonline.africa
X-MS-Exchange-CrossTenant-Network-Message-Id: 14f6ee97-65d9-49c0-312b-08d95291c461
X-MS-Exchange-CrossTenant-AuthSource: PAXP190MB1518.EURP190.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Jul 2021 13:07:07.2396 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: b4e811d5-95e8-453a-b640-0fba8d3b9ef7
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: AT/4WBZM5IeRTLSrHgYd6zbsfgi5AGWXT9xrr40pTdwqcchkeBOrOaTVqh/B7fPZ6PTwFx2GONmRLrFze7XVWg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PR3P190MB0841
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/N3lrYxDTL-Wm8NoDmxaVM3WgCxI>
Subject: Re: [Sidrops] I-D Action: draft-ietf-sidrops-signed-tal-07.txt
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Jul 2021 13:07:18 -0000

Hi Tim,

On 07/29, Tim Bruijnzeels wrote:
> Hi all,
> 
> > On 29 Jul 2021, at 00:44, Russ Housley <housley@vigilsec.com> wrote:
> > 
> > 
> > 
> >> On 29 Jul 2021, at 7:42 am, Ben Maddison <benm=40workonline.africa@dmarc.ietf.org> wrote:
> >> 
> >> Hi all,
> >> 
> >> Re-iterating the comment that I made during the meeting, as requested...
> >> 
> >> Including the "revoked" flag *only* in the TAK object published by the
> >> "revoked" TA effectively gives anyone with access to that TA's private
> >> the key the ability to resurrect it and/or point RPs to a malicious
> >> successor TA.
> >> 
> >> Given that a prime motivation for a performing a key roll is a suspected
> >> key compromise, it is troubling that the key roll can be reversed by the
> >> compromised key!
> >> 
> >> Perhaps I am overlooking something?
> > 
> > I think we need to consider graceful transition from one trust anchor key to another separately from recovery from key compromise.
> 
> Indeed recovering from a key compromise (theft) is a different ball game altogether.
> 
> The primary motivation for starting this (when I was still at RIPE NCC and operating a TA) was to deal with the migration from one HSM vendor to another. So the intent is not to be able to deal with a *compromised* TA key (which hopefully would have been kept in an HSM) - but to allow that key A in HSM A can sign the transition to key B in HSM B and then be destroyed.
> 
Ack.
Re-reading with the benefit of your's and George's comments, the procedure
makes far more sense to me.

I think this needs spelling out far more explicitly throughout the
draft. It should not take email correspondence with the authors to
discern the intended use-case.

On reflection, I think that actually recommending that this
mechanism *not* be used in response to (suspected) key theft is
appropriate: better the TA goes away altogether for some period of time,
than risk an undetectable takeover.

Related to this, I also think "revoked" is a poor choice of word to
describe the status of the "old" TA.
For me, revoked means "no longer trustworthy", whereas in this procedure
the trust in the old key must be maintained for (at least) the purpose
of validating the TAK/MFT/CRL.
Perhaps "decommissioned" is a better choice, indicating that it will no
longer be used to issue new objects, and should be used only build a
chain to a successor.

Cheers,

Ben