Re: [Sidrops] what to do when the CRL is hosed?

Job Snijders <job@ntt.net> Tue, 24 March 2020 16:54 UTC

Return-Path: <job@ntt.net>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D8BD93A0CF4 for <sidrops@ietfa.amsl.com>; Tue, 24 Mar 2020 09:54:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EhjZyiNsqP6a for <sidrops@ietfa.amsl.com>; Tue, 24 Mar 2020 09:54:54 -0700 (PDT)
Received: from mail4.sttlwa01.us.to.gin.ntt.net (mail4.sttlwa01.us.to.gin.ntt.net [204.2.238.64]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DF3573A0CE8 for <sidrops@ietf.org>; Tue, 24 Mar 2020 09:54:35 -0700 (PDT)
Received: from auth2-smtp.messagingengine.com (auth2-smtp.messagingengine.com [66.111.4.228]) by mail4.sttlwa01.us.to.gin.ntt.net (Postfix) with ESMTPSA id 00E70220162; Tue, 24 Mar 2020 16:54:34 +0000 (UTC)
Received: from compute3.internal (compute3.nyi.internal [10.202.2.43]) by mailauth.nyi.internal (Postfix) with ESMTP id 7043927C005A; Tue, 24 Mar 2020 12:54:32 -0400 (EDT)
Received: from imap1 ([10.202.2.51]) by compute3.internal (MEProxy); Tue, 24 Mar 2020 12:54:32 -0400
X-ME-Sender: <xms:Rzt6XvVsHw-cY_3QKUKs3e4iFDqQyPUEcPDk_96j9oOcEk7gN8l_dg>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedugedrudehuddgieefucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucenucfjughrpefofgggkfgjfhffhffvufgtsehttd ertderredtnecuhfhrohhmpedflfhosgcuufhnihhjuggvrhhsfdcuoehjohgssehnthht rdhnvghtqeenucffohhmrghinhepiigunhgvthdrtghomhenucevlhhushhtvghrufhiii gvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpehjohgsodhmvghsmhhtphgruhhthhhp vghrshhonhgrlhhithihqddutdegjeeludehkeegqddvfeeffeekfedvtddqjhhosgeppe hnthhtrdhnvghtsehsohgsohhrnhhoshhtrdhnvght
X-ME-Proxy: <xmx:Rzt6XvtTIL_fZLS6A9FrQ_6w0MaLLqLxl-WrSJEpeVzm1dBqn0oEEg> <xmx:Rzt6Xq5RNEsPgVLGn8ByayJlRZC5mq8ahOyH0fr147eLYO636OURmQ> <xmx:Rzt6XqSZe4m2uWwEZysYiMOC-1aAQg3hxJWEoHSe4k7ncDI9I_TZ1Q> <xmx:SDt6Xu-roXOUKVaVGrV4vJM57e1yO79MblswI5AKU8GrolwSTVKJEfKvA0U>
Received: by mailuser.nyi.internal (Postfix, from userid 501) id B67DCC200A5; Tue, 24 Mar 2020 12:54:31 -0400 (EDT)
X-Mailer: MessagingEngine.com Webmail Interface
User-Agent: Cyrus-JMAP/3.1.7-1021-g152deaf-fmstable-20200319v1
Mime-Version: 1.0
Message-Id: <7465c59f-fa10-4083-8e52-291cb47587f6@www.fastmail.com>
In-Reply-To: <7f54a255-643f-cd2d-12c2-da19562bbffa@verizon.net>
References: <9cc3a6a5-f9c8-23df-588e-48dee5db62d4@verizon.net> <3B7006DE-5366-47E7-9CD6-AF392F9ED0CC@nlnetlabs.nl> <6602d1a7-ecbf-73a0-21d8-1254fb2aff97@verizon.net> <253D1ED7-52D8-4A00-9D69-095E61D09C9F@nlnetlabs.nl> <db920115-e188-700f-ceb2-08cd2996046a@verizon.net> <3a683da4-42f9-28c6-f0dd-4d11d3c67857@ripe.net> <4fe26a30-4a08-41a5-be7f-0c5997230d0a@www.fastmail.com> <3B072025-68C5-4E62-9466-5122D483F691@nlnetlabs.nl> <20200324135828.GG60268@vurt.meerval.net> <20200324152009.6e6a2c3f@glaurung.nlnetlabs.nl> <20200324151101.GH60268@vurt.meerval.net> <7f54a255-643f-cd2d-12c2-da19562bbffa@verizon.net>
Date: Tue, 24 Mar 2020 17:54:09 +0100
From: Job Snijders <job@ntt.net>
To: Stephen Kent <stkent=40verizon.net@dmarc.ietf.org>, sidrops@ietf.org
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/Xi_ghPtIGaaAqatXWVLGh3FtoTs>
Subject: Re: [Sidrops] what to do when the CRL is hosed?
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Mar 2020 16:55:00 -0000

Kent,

On Tue, Mar 24, 2020, at 16:51, Stephen Kent wrote:
> Use of TLS, absent a CA compromise, protects against MITM attacks.

In a perfect world things are perfect? :-)

> The CA compromise you cited (DigiNotar) was serious because of the Web 
> PKI model, in which any trust anchor can issue a cert for any EE. Today, 
> with the use of cert pinning and cert transparency logs, the likelihood 
> of such attacks has very dramatically decreased in the Web PKI environment.

Yeah - I've seen tremendous improvements to Web PKI in the last few years. But still, CT logs are a reactive measure. In some countries operating systems may come with a compromised CA. A recent example: https://www.zdnet.com/article/kazakhstan-government-is-now-intercepting-all-https-traffic/

> Can you provide an example of one of the "crazier things" (relevant to 
> TLS and the Web PKI) hat have happened in the wild, and which are 
> applicable here?

I think there is no shortage of examples where the safety that should've been provided by TLS, was compromised because of a software defects or a misunderstanding in an implementation. This recently hit the news too: https://www.zdnet.com/article/lets-encrypt-to-revoke-3-million-certificates-on-march-4-due-to-bug/

I don't think this thread is not about whether TLS is perfect or not. I think most of us agree it is great we have an improved replacement for rsync in the pipeline. However, RPKI (as I understand it) was designed around being "self-contained" and the promise sort of seemed to be that regardless of the security (or insecurity) of the retrieval mechanism, a RPKI repository can and must be verified.

For the purpose discussion in SIDROPs, I think it is fair (and a necessity) to assume that MITMs are possible regardless of the repository retrieval mechanism in use.

Kind regards,

Job