Re: [Sidrops] I-D Action: draft-ietf-sidrops-signed-tal-01.txt

Christopher Morrow <christopher.morrow@gmail.com> Thu, 26 July 2018 06:03 UTC

Return-Path: <christopher.morrow@gmail.com>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4CEA7130EDE for <sidrops@ietfa.amsl.com>; Wed, 25 Jul 2018 23:03:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2quWDtGj7bQC for <sidrops@ietfa.amsl.com>; Wed, 25 Jul 2018 23:03:06 -0700 (PDT)
Received: from mail-vk0-x243.google.com (mail-vk0-x243.google.com [IPv6:2607:f8b0:400c:c05::243]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6BB14130DC2 for <sidrops@ietf.org>; Wed, 25 Jul 2018 23:03:06 -0700 (PDT)
Received: by mail-vk0-x243.google.com with SMTP id s17-v6so241396vke.10 for <sidrops@ietf.org>; Wed, 25 Jul 2018 23:03:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=YH3liCzj2zlrnMYxbabOovp/c2EpIta8kTUAL76bkDk=; b=mda50K9qddex+am3zk8Z75cw30hq7BSEjHenxT+/MTM6vOb9z5zHEL0fLofBFCdSKx dnujwpMSOagIkl5vyTRWefT/E9VOHQ3IcLgVwnnhpGe8THgSg3iuSxoNo2g6zJkAkLmc XaISB09z9a+7j72VvuBzxY+6aZ8P9ERyBQ3Rbq7Wet15AkGAZnfK5lc33TL5RNTvRClc kSfJt91e4hJl80dMs+jq6nGDrf39YmWR+UzA2OpCfJjw2ClG4eHZJS93XzeJ7twkeQjR PHOnlyi/qvpy359BLs4n9Rwy1WGNFLj8xyGAjrGP3GG8TtpHqs59QhwswylRoHh69gnX lmyQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=YH3liCzj2zlrnMYxbabOovp/c2EpIta8kTUAL76bkDk=; b=apNY2QqKINFH8u61WDPHOZTBeGIqKryaaasAv50bn63fbE1BedYyjWyPeNqycPc2yJ A8NjmduEGEge3Tx1hteLMzhzopUsDvI7mEHInOaDyd2wnoCnw8K3Se5dW0S1sUdZcn38 RZhxsEZhdizmbK95BHEplnFBP4mBDSOG8Ehnx6qhOBaw8QGLJCVcd9MepvEUs7zNtBWG mcg0v8pkMGjIQerLk8mI6zYr7KwKnB/K7q72HRcuiy1fWHV5FWRWsNyVuLDR3lnMVaGI 1/NCzySSe19XlskUBT+aOT+r9NCzjTbOMDaMJYkZ13YhHdab5w58ZWwjwqk66/VPpXDd kYkA==
X-Gm-Message-State: AOUpUlGt4vqJ3JGHl+9bqEhZCVbHVqtbgs2dMsykhmcWLuqs02S+HbBd LsYG7sNZdajdb0ztIQDqiUyv9naWS2LRPNRrci3bMA==
X-Google-Smtp-Source: AAOMgpdV6ATwzdJEzimFIlAv7oylAJnaVZIE0ZoJtp+6JaSLm01BJUOcHEDXQD4sWg67pV+33jM1oKClDrkOxgwMQ+U=
X-Received: by 2002:a1f:b449:: with SMTP id d70-v6mr319736vkf.160.1532584985373; Wed, 25 Jul 2018 23:03:05 -0700 (PDT)
MIME-Version: 1.0
References: <152846464123.15396.14579027912013078144@ietfa.amsl.com> <20180717165827.GA14191@tomh-laptop> <AFFC2E31-6D59-4B21-A69F-A596BDA1B28D@nlnetlabs.nl>
In-Reply-To: <AFFC2E31-6D59-4B21-A69F-A596BDA1B28D@nlnetlabs.nl>
From: Christopher Morrow <christopher.morrow@gmail.com>
Date: Thu, 26 Jul 2018 02:02:54 -0400
Message-ID: <CAL9jLaapseQt5jLE36s9BtoxYNptxeDJ3t4AG57U9Mkie_ESXA@mail.gmail.com>
To: tim@nlnetlabs.nl
Cc: tomh@apnic.net, sidrops@ietf.org
Content-Type: multipart/alternative; boundary="000000000000a433310571e0bf5e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/psmO0G7vWTfI7po6am6ZB-5kHsY>
Subject: Re: [Sidrops] I-D Action: draft-ietf-sidrops-signed-tal-01.txt
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Jul 2018 06:03:10 -0000

It occurs to me that ... we should have closed out the wglc for this
document prior to IETF week.
If this set of comments/edits is all done then we can send a new version of
the draft and forward things up the mgmt chain.

thoughts?

-chris

On Tue, Jul 17, 2018 at 5:52 PM Tim Bruijnzeels <tim@nlnetlabs.nl> wrote:

> Hi Tom,
>
> Thanks for testing and the feedback. Comments below.
>
> > On 17 Jul 2018, at 12:58, Tom Harrison <tomh@apnic.net> wrote:
> >
> > On Fri, Jun 08, 2018 at 06:30:41AM -0700, internet-drafts@ietf.org
> wrote:
> >> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> >> This draft is a work item of the SIDR Operations WG of the IETF.
> >>
> >>        Title           : RPKI signed object for TAL
> >>        Authors         : Tim Bruijnzeels
> >>                          Carlos Martinez
> >>        Filename        : draft-ietf-sidrops-signed-tal-01.txt
> >>        Pages           : 12
> >>        Date            : 2018-06-08
> >
> > I've updated our proof-of-concept to match the new draft.  Some
> > questions and minor suggestions:
> >
> > In section 3, there is:
> >
> >   The ASN.1 syntax for the Signed TAL eContent defined in
> >   Section 3.2.  (This is the payload that specifies the AS being
> >   authorized to originate routes as well as the prefixes to which
> >   the AS may originate routes.)
> >
> > The text in parentheses looks to be a cut-and-paste from the ROA
> > profile document (RFC 6482).
>
> Fixed in my edit buffer.
>
> > In section 4, there is "[t]his EE certificate MUST have a 'notAfter'
> > time that reflects the intended time that this Signed TAL will be
> > published", which on its face implies that the 'notAfter' should be
> > set to the time when the object is first published.  Changing it to
> > "reflects the intended time [or duration] for which this signed TAL
> > will be published" should make things clearer.
>
> Yes, you are right. The intention was duration. Fixed in the edit buffer.
>
> >
> > The SubjectPublicKeyInfo in the TAL structure has the type IA5String.
> > Is there some reason not to use the 'raw' SubjectPublicKeyInfo type
> > from RFC 5280?
>
> This is an oversight. It should just be the raw DER structure.
>
> > Since activationTime is not needed for an in-protocol reason at the
> > moment, it would be good to add a note to the draft that it's there to
> > prompt discussion/feedback about future dating.
> >
> > On future dating more generally, I think it's a good idea, since it
> > allows for in-band signalling about the rollover and would (hopefully)
> > encourage a wider set of users to test the new tree before it becomes
> > the 'official' tree.
>
> The current draft assumes that the TA tests things before publishing the
> new signed TAL object, and then I think it would be okay for RPs to follow
> this new TAL as soon as it’s available.
>
> But.. there may be good reasons for future dating / having a backup key.
>
> In that case I would suggest that we have a structure where the ‘current’
> TA key and URIs are always listed explicitly, pretty much like the document
> says now, but there is an optional similar structure with the intended
> ‘activationTime’ (informational only) for the new key.
>
> That way the roll can be prepared in advance. RPs could theoretically
> verify independently that things are okay - but I would like to avoid
> putting this burden on all RPs. Once things are okay to roll, the TA can
> update it’s signed TAL then to make the new key ‘current’ and RPs can
> follow.
>
> As I said at the mic HSMs can be used to protect against key theft. But
> keys (or card sets) can still be lost. If access to the new key is lost,
> then the TA can just choose not complete the roll - remove it, replace it
> with a new target key. If access to the current key is lost, then things
> get more difficult. Then the new key would have to be allowed to take over,
> e.g. automatically once the activation time is past?
>
> Explicit revocation of the old key is also possible, but would require
> that RPs constantly check these candidate keys. I am afraid this adds a lot
> of overhead.
>
> Comments and ideas are most welcome!
>
> Tim
>
>
>
>
>
>
> >
> > -Tom
> >
> > _______________________________________________
> > Sidrops mailing list
> > Sidrops@ietf.org
> > https://www.ietf.org/mailman/listinfo/sidrops
>
> _______________________________________________
> Sidrops mailing list
> Sidrops@ietf.org
> https://www.ietf.org/mailman/listinfo/sidrops
>