Re: [lamps] The Status of OCSP and its future

"Dr. Pala" <madwolf@openca.org> Fri, 25 October 2019 14:30 UTC

Return-Path: <madwolf@openca.org>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0979A12087A for <spasm@ietfa.amsl.com>; Fri, 25 Oct 2019 07:30:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id entIgDllFDYR for <spasm@ietfa.amsl.com>; Fri, 25 Oct 2019 07:30:42 -0700 (PDT)
Received: from mail.katezarealty.com (mail.katezarealty.com [104.168.158.213]) by ietfa.amsl.com (Postfix) with ESMTP id E6483120072 for <spasm@ietf.org>; Fri, 25 Oct 2019 07:30:42 -0700 (PDT)
Received: from localhost (unknown [127.0.0.1]) by mail.katezarealty.com (Postfix) with ESMTP id AC784374137D for <spasm@ietf.org>; Fri, 25 Oct 2019 14:30:42 +0000 (UTC)
X-Virus-Scanned: amavisd-new at katezarealty.com
Received: from mail.katezarealty.com ([127.0.0.1]) by localhost (mail.katezarealty.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id J1S0UlD1aZpC for <spasm@ietf.org>; Fri, 25 Oct 2019 10:30:41 -0400 (EDT)
Received: from Maxs-MBP-2.cablelabs.com (unknown [192.160.73.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.katezarealty.com (Postfix) with ESMTPSA id E17003741035 for <spasm@ietf.org>; Fri, 25 Oct 2019 10:30:40 -0400 (EDT)
To: spasm@ietf.org
References: <8c84cf2c-c192-c13b-17e5-7ae09b748530@openca.org> <84e130d2-2df2-2f96-0200-716b333a1390@primekey.com>
From: "Dr. Pala" <madwolf@openca.org>
Message-ID: <7c618415-21d7-64c8-e43d-2617d59185f4@openca.org>
Date: Fri, 25 Oct 2019 08:30:40 -0600
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:60.0) Gecko/20100101 Thunderbird/60.9.0
MIME-Version: 1.0
In-Reply-To: <84e130d2-2df2-2f96-0200-716b333a1390@primekey.com>
Content-Type: multipart/alternative; boundary="------------8CFEF79AFE0A650699745759"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/GHFUN4QNAUZdqRYgNuGDbZwBYk8>
Subject: Re: [lamps] The Status of OCSP and its future
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Oct 2019 14:30:45 -0000

Hi Tomas,

On 10/25/19 12:52 AM, Tomas Gustavsson wrote:
> On 2019-10-24 17:01, Dr. Pala wrote:
>> Hi All,
>>
>> I just wanted to start the conversation around the status of revocation
>> [...]
>> today, the larger the PKI is, the higher the costs of providing a good
>> revocation infrastructure is.
> As there are many PKIs today with 100M+ entities, some with and some
> without revocation infrastructure, I think it's a bit too broad claim
> for all use cases.
> It is certainly true of all operations, the larger the scale the larger
> infrastructure costs usually are, where OCSP I'd say is generally a very
> minor part.
> It differs from use case to use case though, I think it would be good
> for the discussion to provide more details on your problematic use case,
> architecture, use pattern etc. Many things are use case and
> implementation choice specific.

This is a good point - very practical approach. A sample use-case is our 
industry (Cable). In particular, in our industry, we leverage PKIs to 
secure the communication in our networks: each Cable Modem and DVRs come 
with one or more certificates from our infrastructure. This covers all 
modems from all vendors from all operators.

Our Network, though, are going through radical changes that are aimed at 
providing the 10Gig platform we just released the standard for. In 
particular, the new architectures will see an increasing number of 
"entities" that require authentication.

As you can see, our PKI tend to be larger than what you typically see in 
the Web PKI (quite small in comparison - even combining all providers), 
therefore improving the efficiency and reducing the costs is a big win 
for the industry in general and for the users since we can now provide 
OCSP responses with shorter validity periods, thus reducing the risk 
level of our Access Networks.

This is not the only use-case, though.

Many IoT environments are starting to use digital certificates for 
authentication at a scale. Some environments, like the Power Grid, are 
already deploying solutions that use certificates to protect the 
communication up to the customers' premises.

Another use-case that I am bringing forward is Cellular. In particular, 
we already have standardized the use of certificates in some 
environments (e.g., CBRS-A, 5G Fixed, etc.) and it is expected that by 
freeing the network authentication from the need of a physical SIM (and 
associated licensing costs) we will see more and more devices (e.g., Fix 
and Industrial) using this technology.

This said, I think that reducing the costs of providing revocation 
information is a good goal in general and can help reducing 
authentication risks by providing shorter validity responses.

>> Our approach stem from two practical considerations: the occasion to
>> provide optimized responses for the non-revoked case, and the
>> [...]
>>      planet :D
> What could a "range" of certificates be based on?
> (I consider sequential serialnumbers to be dead by now)

Our current approach is very simple. Take a CRL and produce (a) one 
response for each revoked certificate, and (b) one response for each 
range between revoked serial numbers. For example, if you have the 
following serial numbers revoked { 3, 5, 12 }, then you would sign 3 
responses for the 3 revoked certificates, plus the response from "0" to 
"3", two responses for the gaps between {3 and 5} and {5 and 12}, plus 
the last response for 5+. In this case, the number of revoked 
certificates is 3 and the number of signed responses is 2N + 1 = { 3 
revoked } + { 1 from 0 to the first entry } + { 2 gaps } + { 1 from last 
to infinity } = 7

Therefore, with this approach, if you are good at keeping the number of 
revoked certificates low, you can see how efficient this technique can 
be - especially when you revoked/valid certificate ratio is very low.

>
>>    * /*Providing Full Chain responses.*/ Although single OCSP responders
>>      can be authoritative for their own CA only, they can attach the
>>      responses for the full chain as additional data. If we add this
>>      possibility, then a single OCSP request can provide the
>>      client/server with the full chain of certificates up to the Root.
>>      This might be tricky in complex scenarios where cross-certification
>>      is used, but it would definitely work for the Web PKI and IoT use cases.
> If extra round-tripping is needed it is certainly a concern. This is
> also valid and discussed in the Web PKI case.
It is to be mentioned that providing the full chain is possible today - 
however, no clients I know leverages this option. This, I think, it is 
because of several factors (i.e., trust model, AIA in certificates, 
etc.) that, if you are interested, we can explore separately.
>> Given these considerations - and the fact that large PKIs are being
>> deployed, today, for the IoT case - we would like to start the
>> discussion around the current status of OCSP and possibly work on a
>> proposal for moving forward with a more efficient protocol.
> We do se working use cases with OCSP for huge number of devices, but in
> IoT it's all use case dependent so I'm interested in more on your use case.

I hope that I provided you with some compelling scenarios here - I think 
that by optimizing the provisioning of revocation information we can 
help not only our specific use cases, but also the deployment of 
revocation information infrastructures that are low-cost for 
environments where using CDNs, Load Balancers, etc. is not an option 
because of the cost :D

Thanks for the reply - I do really appreciate the feedback!

Cheers,
Max

-- 
Best Regards,
Massimiliano Pala, Ph.D.
OpenCA Labs Director
OpenCA Logo