Re: [Sidrops] what to do when the CRL is hosed?

Rob Austein <sra@hactrn.net> Mon, 23 March 2020 16:26 UTC

Return-Path: <sra@hactrn.net>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B0C243A0746 for <sidrops@ietfa.amsl.com>; Mon, 23 Mar 2020 09:26:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RFn8IEXh7lUC for <sidrops@ietfa.amsl.com>; Mon, 23 Mar 2020 09:26:41 -0700 (PDT)
Received: from khatovar.hactrn.net (khatovar.hactrn.net [IPv6:2001:418:8006::30]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8E31E3A048D for <sidrops@ietf.org>; Mon, 23 Mar 2020 09:26:41 -0700 (PDT)
Received: from minas-ithil.hactrn.net (c-73-47-196-134.hsd1.ma.comcast.net [73.47.196.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "nargothrond.hactrn.net", Issuer "Grunchweather Associates" (not verified)) by khatovar.hactrn.net (Postfix) with ESMTPS id AF7E9139BA for <sidrops@ietf.org>; Mon, 23 Mar 2020 16:26:39 +0000 (UTC)
Received: from minas-ithil.hactrn.net (localhost [IPv6:::1]) by minas-ithil.hactrn.net (Postfix) with ESMTP id 9B8FA2013DD7D4 for <sidrops@ietf.org>; Mon, 23 Mar 2020 12:26:38 -0400 (EDT)
Date: Mon, 23 Mar 2020 12:26:38 -0400
From: Rob Austein <sra@hactrn.net>
To: sidrops@ietf.org
In-Reply-To: <6602d1a7-ecbf-73a0-21d8-1254fb2aff97@verizon.net>
References: <20200224151532.GD19221@vurt.meerval.net> <20200224211531.GB60925@vurt.meerval.net> <20200225090338.10464b1a@glaurung.nlnetlabs.nl> <9cc3a6a5-f9c8-23df-588e-48dee5db62d4@verizon.net> <3B7006DE-5366-47E7-9CD6-AF392F9ED0CC@nlnetlabs.nl> <6602d1a7-ecbf-73a0-21d8-1254fb2aff97@verizon.net>
User-Agent: Wanderlust/2.15.9 (Almost Unreal) Emacs/26.3 Mule/6.0 (HANACHIRUSATO)
MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue")
Content-Type: text/plain; charset="US-ASCII"
Message-Id: <20200323162638.9B8FA2013DD7D4@minas-ithil.hactrn.net>
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/lFlmt_o9RTyGT-vis6nlv1lc-lY>
Subject: Re: [Sidrops] what to do when the CRL is hosed?
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Mar 2020 16:27:05 -0000

Unsurprisingly, I agree with Steve on this, particularly:

On Wed, 26 Feb 2020 12:03:33 -0500, Stephen Kent wrote:
...
> There are more cases one can analyze, but I think the basic approach
> is to stick with prior, validated CRLs and contact the CA that
> issued the questionable CRL, until the matter can be resolved.

As others have observed, there is no way the RP can know what the CA
intended when the data are inconsistent.  Furthermore, given that the
code which generates the CRLs is usually right next to the code that
generates manifests (they usually advance in lock-step), there's no
particular reason to assume consistency problems would be limited to
one or the other.

Trying to make sense out of an incoherent world is always going to be
part of the RP's job.  Falling back to older valid data has always
been part of the strategy for doing that in the RPKI, and at least the
first generation of RPKI validators all did that.  It's not perfect,
but it's better than an RP trying to guess which part of the protocol
to violate in an attempt to guess what a broken CA really meant.