Re: [Sidrops] draft-ietf-sidrops-rpki-has-no-identity-00

Randy Bush <randy@psg.com> Wed, 12 May 2021 19:07 UTC

Return-Path: <randy@psg.com>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C87133A0D05 for <sidrops@ietfa.amsl.com>; Wed, 12 May 2021 12:07:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TWTDX7IS1JWs for <sidrops@ietfa.amsl.com>; Wed, 12 May 2021 12:06:56 -0700 (PDT)
Received: from ran.psg.com (ran.psg.com [IPv6:2001:418:8006::18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 419973A0D06 for <sidrops@ietf.org>; Wed, 12 May 2021 12:06:56 -0700 (PDT)
Received: from localhost ([127.0.0.1] helo=ryuu.rg.net) by ran.psg.com with esmtp (Exim 4.90_1) (envelope-from <randy@psg.com>) id 1lguC4-0004BV-IW; Wed, 12 May 2021 19:06:52 +0000
Date: Wed, 12 May 2021 12:06:52 -0700
Message-ID: <m2zgwzsreb.wl-randy@psg.com>
From: Randy Bush <randy@psg.com>
To: Russ Housley <housley@vigilsec.com>
Cc: George Michaelson <ggm@algebras.org>, SIDR Operations WG <sidrops@ietf.org>
In-Reply-To: <24319C47-1513-46BC-A20E-232F80C8695B@vigilsec.com>
References: <m2k0o6uqot.wl-randy@psg.com> <CAKr6gn3oCZBOP3L8AQWvH9Nk4fum-ycZCnHO_DUtgdx5M=z_+A@mail.gmail.com> <m2fsyuuofa.wl-randy@psg.com> <CAKr6gn18yGTrAiqPA2P+kc+JBt2Tf8D-G4Gf5WCnASm8vk1Fvg@mail.gmail.com> <m21raduy3s.wl-randy@psg.com> <CAKr6gn2tRD1M=MmZLxHraJHW2iYbn=_hAmyPke3fdpKJSnVRBw@mail.gmail.com> <24319C47-1513-46BC-A20E-232F80C8695B@vigilsec.com>
User-Agent: Wanderlust/2.15.9 (Almost Unreal) Emacs/26.3 Mule/6.0 (HANACHIRUSATO)
MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue")
Content-Type: text/plain; charset="US-ASCII"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/dxZziEScg3ZKuS8noQAIME8MFQ4>
Subject: Re: [Sidrops] draft-ietf-sidrops-rpki-has-no-identity-00
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 May 2021 19:07:01 -0000

> I do not understand the value of the "nonce check".  CMS allows
> multiple parallel signatures.  See RFC 4853 for some clarifications,
> and see RFC 5752 when there are concerns about stripping one of the
> signatures.

i am lost a few meters higher up; which is what i suspect you may be
hinting.  at the start of this tangled thread, ggm asked us to include
an example of useful "bridging" (ggm's term) MTA/RSC signing.

if i had a cms blob signed by an INR CA and by X-CA or whatever, what
can i do with it?  and i most definitely do not mean the mechanics of
signing, proofs of possession, etc.

i do not see how it has more authority to issue an LOA for a PNI than
would be granted by simply using X-CA.

perhaps if X-CA has been used to contract with the issuing RPKI CA, it
could authorize modification of RPKI holdings; but no more so than just
that X-CA.

i suppose that if both signed a blob which somehow encoded that the RPKI
INR signer was authorized to represent the X-CA signer in some
restricted (i hope) class of transactions, the RPKI INR signer could
then issue the LOA for the PNI.  this seems a tenuous and therefore
dangerous chain (the blob's restrictions must be tested to include the
authorization for the LOA[0]), with zero advantage over X-CA just
signing the LOA.

i keep looping, with the X-CA being the inescapable base real world
authority.

i think i'll go shopping. :)

randy

[0] - and who is going down the capybara hole of writing the rfc
      describing the syntax and semantics of these authorizations and
      restrictions?

---
randy@psg.com
`gpg --locate-external-keys --auto-key-locate wkd randy@psg.com`
signatures are back, thanks to dmarc header butchery