[lamps] Draft New Version (was Re: [saag] Proposal for OCSP over DNS)

"Dr. Pala" <madwolf@openca.org> Thu, 26 October 2017 21:59 UTC

Return-Path: <madwolf@openca.org>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost []) by ietfa.amsl.com (Postfix) with ESMTP id B915413F60D; Thu, 26 Oct 2017 14:59:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.889
X-Spam-Status: No, score=-1.889 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_HK_NAME_DR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id DHnptkKB9M5l; Thu, 26 Oct 2017 14:59:14 -0700 (PDT)
Received: from mail.katezarealty.com (mail.katezarealty.com []) by ietfa.amsl.com (Postfix) with ESMTP id 96C6213F46E; Thu, 26 Oct 2017 14:59:14 -0700 (PDT)
Received: from localhost (unknown []) by mail.katezarealty.com (Postfix) with ESMTP id 509C43741015; Thu, 26 Oct 2017 21:59:14 +0000 (UTC)
X-Virus-Scanned: amavisd-new at katezarealty.com
Received: from mail.katezarealty.com ([]) by localhost (mail.katezarealty.com []) (amavisd-new, port 10024) with LMTP id lzoytQTzIki7; Thu, 26 Oct 2017 17:59:07 -0400 (EDT)
Received: from maxs-mbp.cablelabs.com (unknown []) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.katezarealty.com (Postfix) with ESMTPSA id 04D913740E16; Thu, 26 Oct 2017 17:59:06 -0400 (EDT)
To: saag@ietf.org, LAMPS <spasm@ietf.org>
References: <10f5c653-e2b7-9332-02b0-5528e6693582@openca.org> <3D9CC81C-404A-48D0-9F45-14829FADC646@vpnc.org> <58937108-5f04-5be8-bfe8-948dd4ea13dc@openca.org>
From: "Dr. Pala" <madwolf@openca.org>
Message-ID: <d1f58140-df3c-5219-f2b5-a2b9b552bafa@openca.org>
Date: Thu, 26 Oct 2017 15:59:06 -0600
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.4.0
MIME-Version: 1.0
In-Reply-To: <58937108-5f04-5be8-bfe8-948dd4ea13dc@openca.org>
Content-Type: multipart/alternative; boundary="------------08F6701D51A17113189BBF61"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/DTYsoq74f7G8MhK7TJnA5ySi9MA>
Subject: [lamps] Draft New Version (was Re: [saag] Proposal for OCSP over DNS)
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Oct 2017 21:59:17 -0000

Hi all,

I just want to let everybody know that we manage to send in the latest 
version of the draft that better organizes the text and incorporates the 
previous work / I-Ds into one:


comments, feedback, etc. always welcome :D


On 10/23/17 3:38 PM, Dr. Pala wrote:
> Hi Paul, all,
> the way I personally see this is not only related to Internet CAs / 
> website-oriented TLS, but also as a way to distribute the revocation 
> information in environments where entities (devices, software, etc.) 
> might be restricted from accessing the global Internet but still 
> allowed to query the DNS. Entities leveraging specific trust 
> environments (e.g., OCF, CMI, etc. ) might especially benefit from 
> this additional distribution mechanism (which is not in competition 
> with existing solutions :D)
> Beefing up CAs web infrastructures is what CAs have been doing so far 
> - AFAIK, however that comes at high operational costs that have to be 
> covered somehow :D I think that it will be useful to have an 
> alternative that can be as efficient (if not even more efficient), 
> distributed (info get closer to the client), and that comes at 
> (potentially) lower operational costs.
> Just my 2 cents...
> Cheers,
> Max
> On 10/23/17 3:13 PM, Paul Hoffman wrote:
>> On 23 Oct 2017, at 13:54, Dr. Pala wrote:
>>> we are currently working on specifying how to use DNS as a transport 
>>> protocol for revocation information for X509 certificates. In 
>>> particular, we are working on how to leverage the distributed nature 
>>> of DNS to efficiently (and at lower operational costs) distribute 
>>> OCSP responses to applications/devices/etc.
>>> We started this work sometime ago but never really had the time to 
>>> finish it. Now it seems we can focus more on the topic and would 
>>> like to discuss this work in a more public venue.
>>> We currently have two similar I-D submitted (that should probably be 
>>> re-edited and merged):
>>>  * https://datatracker.ietf.org/doc/draft-pala-odin/
>>>  * https://datatracker.ietf.org/doc/draft-pala-rea-ocsp-over-dns/
>>> EKR suggested that this may be another topic for the SEC-DISPATCH 
>>> meeting. Can we have 5-10 minutes for this @IETF100 ?
>> These sound like "we want HTTP over UDP to save latency, so we'll 
>> just substitute DNS". That's certainly an option, but it hasn't been 
>> a popular route in the IETF. Are the busy CAs asking for this? Is 
>> there a reason why they can't just beef up their web infrastructure 
>> (like their customers are)?
>> --Paul Hoffman
> -- 
> Best Regards,
> Massimiliano Pala, Ph.D.
> OpenCA Labs Director
> OpenCA Logo
> _______________________________________________
> saag mailing list
> saag@ietf.org
> https://www.ietf.org/mailman/listinfo/saag