Re: [Sidrops] Implementation report for draft-ietf-sidrops-signed-tal-12

Tom Harrison <tomh@apnic.net> Fri, 28 October 2022 05:42 UTC

Return-Path: <tomh@apnic.net>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9B089C14CE3E for <sidrops@ietfa.amsl.com>; Thu, 27 Oct 2022 22:42:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.108
X-Spam-Level:
X-Spam-Status: No, score=-2.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=apnic.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lcdacq1xk2tB for <sidrops@ietfa.amsl.com>; Thu, 27 Oct 2022 22:42:11 -0700 (PDT)
Received: from AUS01-SY4-obe.outbound.protection.outlook.com (mail-sy4aus01on2057.outbound.protection.outlook.com [40.107.107.57]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DD9C3C1522AF for <sidrops@ietf.org>; Thu, 27 Oct 2022 22:42:10 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=VC1CqaZMwmEU8fvX9vXXs0hn0P1ZSkg8qLgAzJS+S7f/6U+1u8kTCtzeWRdsa5kejHbdiszaEqeSjKcylvkuSvjUbrIyMYsUSxtwItAsPb2ttW6PtHPaQHKO/z0WquwGF0DAmw2QxqUTYgphzOAIrh8fcy5IbnZgZGpXfatbOu3SlqQ+x9AxbIHrCARfD/fZvNVb+O/d5fSW7Khe8Pg9kv0/ZJ/R46IB+CiwuDKdH1+QxxzXtmR5rHxdh+FjDdLT8Y3DfZ1ZK2VKsxoapxvCXErNpHdF10042pTB8QOqrsv+dIp1iN3eipdS5REOKAIE3wzn2yw6rwKObtqrCO7bYQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Rye6saZwyrq/O96K6NWM8FX80QfkPh7Ub33lBiGuavA=; b=k0xnM91V0bLioFdaQpqMDBL8LJw8p34BjogmfB85Fdu2hh9lTFCLUKy6wfnKfLseeYWm9dlU0aD73TrJZ2zWxTLk6PjXvbUWmw+5LM71/Dy9Ul6ON8OhgE2VP13ca6X3oZkMsgt8VJfSpWUdnVReEtL+SNizZnoloEP5u+g/0dHBXLkD5rCO5BPqGdvuLeaQKT2gVSXzJLejX/JMEWKakW4T3h5/V2+T2v3YTTCq0bpnHXtmQuFlEdVUPLg8zE8ST0gAxjEPD3kEShLB4LlkT2D9t8nPHH1mBp+L0Z2czKC7ejGy7Z6Ch5ZadKvkNTGjsBjjN+KPQOyF6N3UmR+Svw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=apnic.net; dmarc=pass action=none header.from=apnic.net; dkim=pass header.d=apnic.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apnic.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Rye6saZwyrq/O96K6NWM8FX80QfkPh7Ub33lBiGuavA=; b=QlxRrUlO3QmCq4qgqXvSF3VCLeFrWDYonQG4mfem5hmKmBb6l/UO9Qc3wcNWLefeMvwZlOntONjdHy1mHqbUaoWEm/elnUkZ6Ta4HJm85F0bCGbe0D4Rwzi0KrFfd/zopRbRZuX7lrR9wmHUs+o68f7wCz2ytvadXY/GQpv2S6g=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=apnic.net;
Received: from SYBP282MB0553.AUSP282.PROD.OUTLOOK.COM (2603:10c6:10:68::12) by ME4P282MB1335.AUSP282.PROD.OUTLOOK.COM (2603:10c6:220:91::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5769.15; Fri, 28 Oct 2022 05:42:06 +0000
Received: from SYBP282MB0553.AUSP282.PROD.OUTLOOK.COM ([fe80::b176:a5a6:3ba8:f170]) by SYBP282MB0553.AUSP282.PROD.OUTLOOK.COM ([fe80::b176:a5a6:3ba8:f170%5]) with mapi id 15.20.5746.028; Fri, 28 Oct 2022 05:42:06 +0000
Date: Fri, 28 Oct 2022 15:42:03 +1000
From: Tom Harrison <tomh@apnic.net>
To: Job Snijders <job=40fastly.com@dmarc.ietf.org>
Cc: sidrops@ietf.org
Message-ID: <Y1trq+xl9HG4gbjy@TomH-802418>
Mail-Followup-To: Job Snijders <job=40fastly.com@dmarc.ietf.org>, sidrops@ietf.org
References: <Y1KjDK4k64UBWra2@snel>
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <Y1KjDK4k64UBWra2@snel>
X-ClientProxiedBy: SY0PR01CA0014.ausprd01.prod.outlook.com (2603:10c6:10:1bb::17) To SYBP282MB0553.AUSP282.PROD.OUTLOOK.COM (2603:10c6:10:68::12)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: SYBP282MB0553:EE_|ME4P282MB1335:EE_
X-MS-Office365-Filtering-Correlation-Id: 46a45707-240a-42c7-b4df-08dab8a725bf
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SYBP282MB0553.AUSP282.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230022)(4636009)(7916004)(136003)(39840400004)(376002)(366004)(396003)(346002)(451199015)(26005)(9686003)(6512007)(6666004)(38100700002)(8676002)(966005)(6506007)(86362001)(316002)(8936002)(41300700001)(4326008)(66476007)(66556008)(66946007)(478600001)(6486002)(5660300002)(66574015)(83380400001)(33716001)(2906002)(186003)(67856001); DIR:OUT; SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 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
X-OriginatorOrg: apnic.net
X-MS-Exchange-CrossTenant-Network-Message-Id: 46a45707-240a-42c7-b4df-08dab8a725bf
X-MS-Exchange-CrossTenant-AuthSource: SYBP282MB0553.AUSP282.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Oct 2022 05:42:05.9810 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 127d8d0d-7ccf-473d-ab09-6e44ad752ded
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: rgJvtpStZFStpQ9teBwdDCGayryVnae0D9knbE9i8WDavhwpTEkYpUhlsJ2Ob2rL
X-MS-Exchange-Transport-CrossTenantHeadersStamped: ME4P282MB1335
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/qnPcJIA91FKVl2GNY16JwBZ0KiA>
Subject: Re: [Sidrops] Implementation report for draft-ietf-sidrops-signed-tal-12
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Oct 2022 05:42:15 -0000

Hi Job,

Your feedback and implementation work here are very helpful and much
appreciated, thanks.

On Fri, Oct 21, 2022 at 03:47:56PM +0200, Job Snijders wrote:
> Please add to Section 12 "Implementation Status":
> 
>    Responsible Organization: Job Snijders
>    Location: https://marc.info/?l=openbsd-tech&m=166635746808783&w=2
>    Description: A relying party implementation which can validate TAKs.
>    Level of Maturity: Mature. Trust Anchor operators are encouraged to
>       use rpki-client as part of smoke testing to help ensure high
>       levels of standards compliance when introducing changes, and use
>       rpki-client in a continuous monitoring fashion to help maintain
>       high levels of operational excellence.
>    Coverage: implementation includes all features except TAK acceptance
>       timers.
>    Contact information: Job Snijders <job@fastly.com>

Thanks, we'll add this to the document.

> Notes to the internet-draft authors:
> 
> 1/ Section 10.2 "TA Compromise" makes no sense to me. I'd like to
>    suggest to remove section 10.2 entirely. There is no such thing as an
>    adversary 'temporarily' being in control of Trust Anchor private key
>    material. Once a TA is discovered to be compromised, this discovery
>    should be widely announced (NANOG, RIPE Routing-WG, SIDROPS, etc);
>    and the community immediately should get to work to remove all TALs
>    pointing to the compromised TA (both in RP implementations, as well
>    in operating systems that bundle RPKI roots in a generic fashion such
>    as Debian/Ubuntu/OpenBSD/etc). However, organisation of responses to
>    TA compromise are out-of-scope for the signed-tal internet-draft.
> 
> 2/ Section 10.3: s/can be complementary/are complementary/
> 
> 3/ Section 11 lacks a Media Type registration. See RSC for an example:
>    https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-rpki-rsc#section-10.5
> 
> 4/ Section 10.1 should also mention certified destruction of
>    previously-current keypair materials.
> 
> 5/ Section 9 states "can only be relied on once a majority of RPs
>    support it". I don't believe concepts like 'herd immunity' apply in
>    this case, for example in the case of OpenBSD or Debian (where RPKI
>    roots are available to the system operator as non-RP-specific
>    manner); only the packager of the RPKI roots needs to be able to
>    support, and all Debian/OpenBSD users subsequently benefit from that
>    support being downstream. In other words, there are benefits to TAK
>    even if only a very small percentage of RPs support it.

We take your points here, and will make updates to address each of
them.  Some discussion of these during the next meeting may be useful,
too.

-Tom