Re: [Sidrops] I-D Action: draft-ietf-sidrops-signed-tal-01.txt

Tim Bruijnzeels <tim@nlnetlabs.nl> Thu, 26 July 2018 07:34 UTC

Return-Path: <tim@nlnetlabs.nl>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B47DB130DF2 for <sidrops@ietfa.amsl.com>; Thu, 26 Jul 2018 00:34:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.129
X-Spam-Level:
X-Spam-Status: No, score=-1.129 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_NEUTRAL=0.779, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=nlnetlabs-nl.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jViUgLRLXt-j for <sidrops@ietfa.amsl.com>; Thu, 26 Jul 2018 00:34:21 -0700 (PDT)
Received: from mail-ed1-x52d.google.com (mail-ed1-x52d.google.com [IPv6:2a00:1450:4864:20::52d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D15B2130DE3 for <sidrops@ietf.org>; Thu, 26 Jul 2018 00:34:20 -0700 (PDT)
Received: by mail-ed1-x52d.google.com with SMTP id b10-v6so729364eds.4 for <sidrops@ietf.org>; Thu, 26 Jul 2018 00:34:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nlnetlabs-nl.20150623.gappssmtp.com; s=20150623; h=mime-version:subject:from:in-reply-to:date:cc:message-id:references :to; bh=L+L7PTgaEkMh6M1qx+Wfr98hmnLGiqb8fG1HmV9QbJU=; b=o/rX9m3cU2o9Tlgkx16Oa8yjvUQvrZ53p6IIl9L8BLcRGZ9GZG1jyqaX7VQhCfhDMM gJTwU034I/0/eJ7FMXwssuUL3Sxtr1Jn4GG3mtCONbn18A13BBX36ewa6lsg96MBbzTc EWo2gMAQ4KFEpylmTOgw6A/3ulU0uaA3zEGNSCAVecjWmoMV7pDh4W1HsRn8haymNmjY ktlGpDuHnLaUYddccKr3DFEipzOUJQ+f1yhXaE+Q8t6ek/K5mMBMaizDAqgZmVnYsnTp m6OiciB3PL+8xZPxTAn7tDwdlBVSAzRzw5e995oFtlDEb5hwwEfzSpP/JT1ZL/CDDoa9 9bYw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=L+L7PTgaEkMh6M1qx+Wfr98hmnLGiqb8fG1HmV9QbJU=; b=AS90HlwL+113eliPF7nsR/8Xovk4F2qWoHHTJnMdHcQlZhfrZh/3r1MuutV40jEsWs A4r5MfrzB7vPqfe5HqTGcwQ7YgA9p/75QbYkyfGpZkFIVcgLn7orp5HhjfRMwJq3Xdk4 CRa+SyzfNQ+wVkBy5ucBRG1KNcmJmtL+YeSy9n83R3GygTK8cRM6Q3cZGKKAOFuW020A vHa4x00v6c5zkoTPVJuZGrXfgqkKpJVj6eASE2JkUpmwLCxle5FHj+Bw9aQ8TfX/xaLH yb6E+UIUZxdFDMTLgTkop6SI0xzSZGfmwysVJi1M11WNbtXsSMRZ9VDwW4g386Tkd0Ex 6tkQ==
X-Gm-Message-State: AOUpUlHI3KbihJH9sYOPlmNGo7ktwNHdUFH0eeb6xST6VBu4VR88Cg1h O1ZXEOWc4xBx9LNMaVat5dRmug==
X-Google-Smtp-Source: AAOMgpcFU30745WYUSExoHn53pNaDez2jQFYhs10gDv8zoy61HZi9OetXnFoE1AKirFrWSsiMqAzBw==
X-Received: by 2002:a50:cf81:: with SMTP id h1-v6mr1501749edk.35.1532590459398; Thu, 26 Jul 2018 00:34:19 -0700 (PDT)
Received: from ?IPv6:2a04:b900::1:2168:fbd9:cb78:4939? ([2a04:b900:0:1:2168:fbd9:cb78:4939]) by smtp.gmail.com with ESMTPSA id p40-v6sm697120eda.53.2018.07.26.00.34.18 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 26 Jul 2018 00:34:18 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_78279FDE-5A80-42F4-A359-262F580A63F4"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: Tim Bruijnzeels <tim@nlnetlabs.nl>
In-Reply-To: <CAL9jLaapseQt5jLE36s9BtoxYNptxeDJ3t4AG57U9Mkie_ESXA@mail.gmail.com>
Date: Thu, 26 Jul 2018 09:34:16 +0200
Cc: tomh@apnic.net, sidrops@ietf.org
Message-Id: <2D133A87-A328-4758-9452-929370F8F54E@nlnetlabs.nl>
References: <152846464123.15396.14579027912013078144@ietfa.amsl.com> <20180717165827.GA14191@tomh-laptop> <AFFC2E31-6D59-4B21-A69F-A596BDA1B28D@nlnetlabs.nl> <CAL9jLaapseQt5jLE36s9BtoxYNptxeDJ3t4AG57U9Mkie_ESXA@mail.gmail.com>
To: Christopher Morrow <christopher.morrow@gmail.com>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/ZyHVqURPT2IvylvbGgwzaNdco1Y>
Subject: Re: [Sidrops] I-D Action: draft-ietf-sidrops-signed-tal-01.txt
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Jul 2018 07:34:24 -0000

Hi Chris,

The last call was on 'draft-ietf-sidrops-https-tal-03’, see:
https://www.ietf.org/mail-archive/web/sidrops/current/msg00440.html <https://www.ietf.org/mail-archive/web/sidrops/current/msg00440.html>

There was a nit and a suggestion for clarification by Job Snijders that I would be happy to include in an update.

The signed-tal document needs more work. I received useful feedback on list from Tom Harrison and Di Ma, and a good in-depth discussion with Rob Austein. I plan to upload a new version for further discussion in the coming weeks.

Tim




> On 26 Jul 2018, at 08:02, Christopher Morrow <christopher.morrow@gmail.com> wrote:
> 
> It occurs to me that ... we should have closed out the wglc for this document prior to IETF week.
> If this set of comments/edits is all done then we can send a new version of the draft and forward things up the mgmt chain.
> 
> thoughts?
> 
> -chris
> 
> On Tue, Jul 17, 2018 at 5:52 PM Tim Bruijnzeels <tim@nlnetlabs.nl <mailto:tim@nlnetlabs.nl>> wrote:
> Hi Tom,
> 
> Thanks for testing and the feedback. Comments below.
> 
> > On 17 Jul 2018, at 12:58, Tom Harrison <tomh@apnic.net <mailto:tomh@apnic.net>> wrote:
> > 
> > On Fri, Jun 08, 2018 at 06:30:41AM -0700, internet-drafts@ietf.org <mailto:internet-drafts@ietf.org> wrote:
> >> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> >> This draft is a work item of the SIDR Operations WG of the IETF.
> >> 
> >>        Title           : RPKI signed object for TAL
> >>        Authors         : Tim Bruijnzeels
> >>                          Carlos Martinez
> >>        Filename        : draft-ietf-sidrops-signed-tal-01.txt
> >>        Pages           : 12
> >>        Date            : 2018-06-08
> > 
> > I've updated our proof-of-concept to match the new draft.  Some
> > questions and minor suggestions:
> > 
> > In section 3, there is:
> > 
> >   The ASN.1 syntax for the Signed TAL eContent defined in
> >   Section 3.2.  (This is the payload that specifies the AS being
> >   authorized to originate routes as well as the prefixes to which
> >   the AS may originate routes.)
> > 
> > The text in parentheses looks to be a cut-and-paste from the ROA
> > profile document (RFC 6482).
> 
> Fixed in my edit buffer.
> 
> > In section 4, there is "[t]his EE certificate MUST have a 'notAfter'
> > time that reflects the intended time that this Signed TAL will be
> > published", which on its face implies that the 'notAfter' should be
> > set to the time when the object is first published.  Changing it to
> > "reflects the intended time [or duration] for which this signed TAL
> > will be published" should make things clearer.
> 
> Yes, you are right. The intention was duration. Fixed in the edit buffer.
> 
> > 
> > The SubjectPublicKeyInfo in the TAL structure has the type IA5String.
> > Is there some reason not to use the 'raw' SubjectPublicKeyInfo type
> > from RFC 5280?
> 
> This is an oversight. It should just be the raw DER structure.
> 
> > Since activationTime is not needed for an in-protocol reason at the
> > moment, it would be good to add a note to the draft that it's there to
> > prompt discussion/feedback about future dating.
> > 
> > On future dating more generally, I think it's a good idea, since it
> > allows for in-band signalling about the rollover and would (hopefully)
> > encourage a wider set of users to test the new tree before it becomes
> > the 'official' tree.
> 
> The current draft assumes that the TA tests things before publishing the new signed TAL object, and then I think it would be okay for RPs to follow this new TAL as soon as it’s available.
> 
> But.. there may be good reasons for future dating / having a backup key.
> 
> In that case I would suggest that we have a structure where the ‘current’ TA key and URIs are always listed explicitly, pretty much like the document says now, but there is an optional similar structure with the intended ‘activationTime’ (informational only) for the new key.
> 
> That way the roll can be prepared in advance. RPs could theoretically verify independently that things are okay - but I would like to avoid putting this burden on all RPs. Once things are okay to roll, the TA can update it’s signed TAL then to make the new key ‘current’ and RPs can follow.
> 
> As I said at the mic HSMs can be used to protect against key theft. But keys (or card sets) can still be lost. If access to the new key is lost, then the TA can just choose not complete the roll - remove it, replace it with a new target key. If access to the current key is lost, then things get more difficult. Then the new key would have to be allowed to take over, e.g. automatically once the activation time is past?
> 
> Explicit revocation of the old key is also possible, but would require that RPs constantly check these candidate keys. I am afraid this adds a lot of overhead.
> 
> Comments and ideas are most welcome!
> 
> Tim
> 
> 
> 
> 
> 
> 
> > 
> > -Tom
> > 
> > _______________________________________________
> > Sidrops mailing list
> > Sidrops@ietf.org <mailto:Sidrops@ietf.org>
> > https://www.ietf.org/mailman/listinfo/sidrops <https://www.ietf.org/mailman/listinfo/sidrops>
> 
> _______________________________________________
> Sidrops mailing list
> Sidrops@ietf.org <mailto:Sidrops@ietf.org>
> https://www.ietf.org/mailman/listinfo/sidrops <https://www.ietf.org/mailman/listinfo/sidrops>