[Sidrops] Re: Notification for draft-spaghetti-sidrops-rpki-ta-tiebreaker

Ties de Kock <tdekock@ripe.net> Tue, 25 June 2024 10:06 UTC

Return-Path: <tdekock@ripe.net>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0D10CC169406 for <sidrops@ietfa.amsl.com>; Tue, 25 Jun 2024 03:06:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ripe.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PUUfSCK0vtc8 for <sidrops@ietfa.amsl.com>; Tue, 25 Jun 2024 03:06:20 -0700 (PDT)
Received: from mail-ed1-x52a.google.com (mail-ed1-x52a.google.com [IPv6:2a00:1450:4864:20::52a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AB136C1519AC for <sidrops@ietf.org>; Tue, 25 Jun 2024 03:06:20 -0700 (PDT)
Received: by mail-ed1-x52a.google.com with SMTP id 4fb4d7f45d1cf-57d10354955so5951985a12.1 for <sidrops@ietf.org>; Tue, 25 Jun 2024 03:06:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ripe.net; s=google1; t=1719309979; x=1719914779; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=cA84vAoUk4oXS8mhUx/myfQ3EyzPmZo3KLtC0RM6Xc8=; b=TJUsCQpy8fUhoBIOEJNwk6XfEGW1WaMj/+eY/8uADGput0FeA/9jzdvLVr/WNxyyVl TFLT6HD6QRhdKn7t2RY98CfNBCJMkQ4ez4ro9iLnqsUFObDBApYZoSBWUSwBbUnQ8oxe HivkNNU6Y0dLpSD2Hjrl3kZys874AupeCTCDoMr8k6BsHvEJpKdUAgiqW1+rBC3ZLeDz Hp75Ue+ugtubpzh2GHqN70PsdiuBzpm+TWh01xNpQKX27mfl9PTsrXe8uswOvk2qZO24 fIUOgZDr5dxL8RtGYTgUbU9L5+CRpa6N9kH4b/DhwFnZJOGh+XqRHxSfwwViX5RaxV60 eGEw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1719309979; x=1719914779; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=cA84vAoUk4oXS8mhUx/myfQ3EyzPmZo3KLtC0RM6Xc8=; b=EZ2XKg70Ti+gl6BqzZFKBhWSNOg4XNHeHL7mAKwxQiIywh9vFaYzMTcWi8MKMw9TSB J7gMElH7jKKYbv3M++DfzVbolnecc0Mu/hlLo2xhWUPVZNr409j4WEU0zisRbxQqHRJO jBtoBJrkHPAmHuLMR8O1tAOFIrH7Y7pJ0RUVynsTaZkas9aPdo1U/t9IP5PD0VAf6YL3 wtMBmXdfF3P/S62fxRWweL/uS0WN2B6C7dGO3OwkBy3RHZQMu7xaO8cb+N+FClu2fCbR WqDPrJNVZpY0tjoF3ztx++7i8b3e6toR63RGVLraRnO1RzlOYTwF2mcn6Y84fSlgPX+r KHFQ==
X-Forwarded-Encrypted: i=1; AJvYcCVlmngxezv5FgJD9ZZS5VzSo+xifvdAnrbACQZVmZONjutIVVuMAgkwBP3DBYFLwtoru9UBjiFRiblYSv7udpch
X-Gm-Message-State: AOJu0Yxu1lu6gZuylbBqrFhler5alvmBraUzyZLCR2Znia1ZAWr0MxYl 95mR1tsVR7rpEpSQvJWeUUBuLC5XPL336EkerA0kjJGgRk47C4AF8UxYaWaOdTmHhBHgm/HKcyd 49sZ0y3E+IV+b3geeVSDXfKCjTpOSVQrfoDziiQ==
X-Google-Smtp-Source: AGHT+IFwhwjIeTIDbw2gaRUZIgHhsKMPrweLctoUciIby00uDPOVtNshasWV0TNTeTQltme/AY5D0PdkjFKqWEk/UT0=
X-Received: by 2002:a50:cdc2:0:b0:57d:2207:a55 with SMTP id 4fb4d7f45d1cf-57d49cb2f8emr4578993a12.15.1719309978621; Tue, 25 Jun 2024 03:06:18 -0700 (PDT)
MIME-Version: 1.0
References: <ZnNtl9d7cnkMtK-1@snel> <86AF7299-8541-4652-A699-33AED2F73A60@ripe.net> <ZnP6RJ_Ek5ThsSnQ@snel> <4032C398-9611-4540-B375-DDB8D1E33726@ripe.net> <Znln3-EDsb48hNWa@snel> <ZnmnuCooWOpkY4XC@dwc-laptop.local> <Znpb0hosKXPdx4H0@snel>
In-Reply-To: <Znpb0hosKXPdx4H0@snel>
From: Ties de Kock <tdekock@ripe.net>
Date: Tue, 25 Jun 2024 12:06:07 +0200
Message-ID: <CANPYmgjdQBBjWTSOxg+mqttn1+_ixccLizF77PzDTYpSK2UQfw@mail.gmail.com>
To: Job Snijders <job=40fastly.com@dmarc.ietf.org>
Content-Type: text/plain; charset="UTF-8"
Message-ID-Hash: J7HZEQWB6VWPND7XZTWZVUXICPPMRRJX
X-Message-ID-Hash: J7HZEQWB6VWPND7XZTWZVUXICPPMRRJX
X-MailFrom: tdekock@ripe.net
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-sidrops.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "Dale W. Carder" <dwcarder@es.net>, Tim Bruijnzeels <tbruijnzeels@ripe.net>, sidrops@ietf.org
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [Sidrops] Re: Notification for draft-spaghetti-sidrops-rpki-ta-tiebreaker
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/yx4kHLRAVJfUDiKFCNC-W2RIdyo>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Owner: <mailto:sidrops-owner@ietf.org>
List-Post: <mailto:sidrops@ietf.org>
List-Subscribe: <mailto:sidrops-join@ietf.org>
List-Unsubscribe: <mailto:sidrops-leave@ietf.org>

On Tue, 25 Jun 2024 at 07:56, Job Snijders
<job=40fastly.com@dmarc.ietf.org> wrote:
>
> Dear Dale,
>
> On Mon, Jun 24, 2024 at 12:07:04PM -0500, Dale W. Carder wrote:
> > Thus spake Job Snijders (job=40fastly.com@dmarc.ietf.org) on Mon, Jun 24, 2024 at 02:34:39PM +0200:
> > > Tim and I had a meeting and talked this draft over, Tim suggested to
> > > remove the notion of 'local policy' (as this introduces ambiguity).
> > > Instead: if the validity period is considered equal, and the
> > > signature is good, use the newly-retrieved cert (if it differs from
> > > the locally cached copy).
> > >
> > > I incorporated this feedback in my edit buffer:
> > > https://github.com/job/draft-sidrops-rpki-ta-tiebreaker/commit/957080b9c279494564dd06e7bcaf714d7acb4c06
> >
> > As I read through -00, would it make sense for an implementation to
> > apply the tiebreaking only after other (local) validity checks pass?
> > If one TA object passes and the other fails, it would seem you don't
> > have a tie to break?
>
> In the abstract you might be right, but the issue is that we (me, Tim,
> others) have no idea what 'other local validity checks' practically
> speaking means. I'm not aware of any Relying Party implementation that
> "Perform other checks" in the manner that RFC 8630 describes.

I just recalled a local policy.

The RIPE NCC RPKI validator used to check that the serial number of the
certificate was higher than the one on the current certificate. I recall
this local policy because it caused problems, a new cert had a lower serial,
likely the case explained in [0].

You can probably also describe the variations between TLS libraries in how they
handle certificates as local policy.

I do not see a need to call this out. It just causes uncertainty
("is there anything I _need_ to add here?").

Kind regards,
Ties:

[0]: https://www.cs.auckland.ac.nz/~pgut001/pubs/x509guide.txt -
specifically a serial number with the highest bit set.

>
> If one TA object fails (for example, the newly retrieved object has an
> incorrect signature), then indeed there is no tie to break and the RP
> should use the previously fetched locally cached copy.
>
> > As tiebreaker-00 updates rfc8630 section 3, does there need to be
> > adjustment to the 8630 text beyond those numbered list items?  Does
> > the tiebreaking also apply in the case of multiple TA's in the TAL,
> > (would you want to grab them all and do the above logic) or is this
> > case different?
>
> If a TAL contains multiple URIs, all those URIs are supposed point to
> the same TA certificate object. RFC 8630 states "Where the TAL contains
> two or more TA URIs, the same self-signed CA certificate MUST be found
> at each referenced location."
>
> While it is technically trivial for RPs to fetch all URIs and confirm
> the fetched objects indeed are the same, and then run a process to
> select a candidate from the newly retrieved and locally cached copy, it
> would also double the network traffic for this operation. So far RP
> implementers have interpreted the presence of multiple URIs in a TAL to
> be for redundancy: if the HTTPS fetch fails, try rsync.
>
> I've not yet spotted more things in 8630 to update, but it is a fair
> question whether to do an 'update'-draft or a '-bis'-draft. I view as
> advantage of draft-ta-tiebreaker that it is a local-only improvement,
> doesn't change the TAL format/concept, and in that sense backwards
> compatible.
>
> Can you think of anything else you'd like to change in RFC 8630?
>
> Kind regards,
>
> Job
>
> _______________________________________________
> Sidrops mailing list -- sidrops@ietf.org
> To unsubscribe send an email to sidrops-leave@ietf.org