[lamps] A Mechanism for Encoding Differences in Paired Certificates ("Chameleon Certificates")

Corey Bonnell <Corey.Bonnell@digicert.com> Fri, 07 July 2023 12:11 UTC

Return-Path: <Corey.Bonnell@digicert.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A8C73C151077 for <spasm@ietfa.amsl.com>; Fri, 7 Jul 2023 05:11:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.996
X-Spam-Level:
X-Spam-Status: No, score=-6.996 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=digicert.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rBsGtiQXUm_X for <spasm@ietfa.amsl.com>; Fri, 7 Jul 2023 05:11:07 -0700 (PDT)
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (mail-bn7nam10on2114.outbound.protection.outlook.com [40.107.92.114]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 762A9C14CE27 for <spasm@ietf.org>; Fri, 7 Jul 2023 05:11:07 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=RErndyD7wJKiuX38zRVcgkETrD8ibcWM3RwwztzR4CgDN5RScM4ljDGTjrZh++RiH9fZdDAhPrCEwrUgeCXpkbTGg7sksmGgC2d7c6zd50jXuH6EAO/wLTXgSm4piy4tNV8VejnRruu3F4G4IfylzskjMsaOS7RLW8QWVC42/OImIsTCfLu4Ob2YO++ESA2ob7gB2zvcaxMhLh/BrncPsGy+p7wMNE/a/jCNdGrBIJlJl32ZL/Z33j3Qq+od/Ipg90wj69F3aVaGsN2aHzNwsxOlVf8c/JqtuKHJIsWAQLg1OqWzmDUM8YYtQAdlbrZlZWljvrYxSS3wNkQNUCgl6A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=sxeTLtUjKmepEmIYDZtOoIP42WlsuIz3zjY+B9CCYd8=; b=ipNwixUsiN56B7yg8nmDf3c7oRyqxSlQN+6RF9Y0BTCpDcISwXpZCXpHa3UzU/EmGYyaB/za+u+/Qc27T5MoOugDFeY5r7JU6Q1WWr2EuYgEejXBEmq/FuB/GZnZLF2NYJxxbbXWu7aggllcbd+yT3UvKhnbT7dmyaD7UsNdqa3JdSEUE0HOIB8Nck1UCYWAxpql5QPbqpCimmjVtwHodrXIkLPqY0Z8dpOLO8ziNBbTdfFB/8Rbp3EPiwwz/MiN+4x6MTFDC0kyIkr5c62RO7eUv6fmtnXpBO0tQ2iVtoHvPvCKiEeJvdFZTbJjMMx8kanmlmLZib96v47o/pg2Hg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=digicert.com; dmarc=pass action=none header.from=digicert.com; dkim=pass header.d=digicert.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=digicert.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=sxeTLtUjKmepEmIYDZtOoIP42WlsuIz3zjY+B9CCYd8=; b=tzvl5cYTESxshl/C05/KqilvZauFG/MAOBb9tTvsPnKNXkYZQbUTOkrvmJD/yJf5GxmDYRgAa9khCNAUBUIYBS/xKRwpKfUDivX1XEWVuihavWfr4lsZyIxigOCWbjzORQt/sLZmVdzacaupruKyNWGXWFp1Xui5yE5J9Z9PNblAupAbIMPzO4VXY174MoxnzbWvR5M3j184FW/RqbvJtgr6QaJBUp0/mFZvtCIAh9wqoKUKkCx8YGByfOM6yT/lBgNdITlSxXZAcj13RieDLzp0SqfmglivFAP1Za+dP/qwyhdmB5H1Pgwq5Ph7jVS1MWC/h6Acob8zFDu4hYfRaQ==
Received: from BN7PR14MB2178.namprd14.prod.outlook.com (2603:10b6:406:c7::31) by CY5PR14MB5581.namprd14.prod.outlook.com (2603:10b6:930:37::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6565.25; Fri, 7 Jul 2023 12:11:05 +0000
Received: from BN7PR14MB2178.namprd14.prod.outlook.com ([fe80::4e32:4256:1784:18b6]) by BN7PR14MB2178.namprd14.prod.outlook.com ([fe80::4e32:4256:1784:18b6%6]) with mapi id 15.20.6565.019; Fri, 7 Jul 2023 12:11:05 +0000
From: Corey Bonnell <Corey.Bonnell@digicert.com>
To: LAMPS WG <spasm@ietf.org>
Thread-Topic: A Mechanism for Encoding Differences in Paired Certificates ("Chameleon Certificates")
Thread-Index: AdmwzBk0cPPo1M0BT/aHpFCkRtTBHg==
Date: Fri, 07 Jul 2023 12:11:05 +0000
Message-ID: <BN7PR14MB21786285A44C0D60BE60906C922DA@BN7PR14MB2178.namprd14.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=digicert.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN7PR14MB2178:EE_|CY5PR14MB5581:EE_
x-ms-office365-filtering-correlation-id: dcc55b60-9afa-48fd-95ba-08db7ee33d32
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN7PR14MB2178.namprd14.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(136003)(366004)(346002)(39860400002)(376002)(396003)(451199021)(166002)(122000001)(38100700002)(86362001)(33656002)(38070700005)(55016003)(9326002)(8936002)(8676002)(41300700001)(9686003)(26005)(52536014)(966005)(5660300002)(71200400001)(6506007)(186003)(2906002)(83380400001)(76116006)(7696005)(66946007)(478600001)(316002)(66476007)(64756008)(66556008)(66446008)(6916009); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BN7PR14MB21786285A44C0D60BE60906C922DABN7PR14MB2178namp_"
MIME-Version: 1.0
X-OriginatorOrg: digicert.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN7PR14MB2178.namprd14.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: dcc55b60-9afa-48fd-95ba-08db7ee33d32
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Jul 2023 12:11:05.2375 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: cf813fa1-bde5-4e75-9479-f6aaa8b1f284
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: W1xWdqXdgFQptaUV2Jzr0IRLtNZruS7AjmWs510RnRGfRGLfkVBE2r5qzCSx53IqyFS0DRIz6QnE2OERXdqUI1Ht7zaMvVMWW3RUZZS3Pbw=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY5PR14MB5581
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/KNFpie80z_T3Tqes91AniUVCnUk>
Subject: [lamps] A Mechanism for Encoding Differences in Paired Certificates ("Chameleon Certificates")
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Jul 2023 12:11:11 -0000

Hello,
At the Hackathon at IETF 116 this March, several participants implemented the "Hybrid Catalyst" certificate extension processing initially documented in https://datatracker.ietf.org/doc/html/draft-truskovsky-lamps-pq-hybrid-x509-01<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/draft-truskovsky-lamps-pq-hybrid-x509-01__;!!FJ-Y8qCqXTj2!cVtZTmw5ofb7exW867tO1Dt4OX0FfRBXz3O4C7v8wqq2YU3w2jns1Cbv4RmGRJX9A50mtfKasgkkRiskmWZKMM5093s$> and later standardized in ITU-T X.509 10/2019. This implementation experience led several of us to explore alternative mechanisms to efficiently convey multiple keys and other attributes in a single X.509 certificate. The product of these discussions is the specification a mechanism informally called "Chameleon Certificates" at https://datatracker.ietf.org/doc/draft-bonnell-lamps-chameleon-certs/<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/draft-bonnell-lamps-chameleon-certs/__;!!FJ-Y8qCqXTj2!cVtZTmw5ofb7exW867tO1Dt4OX0FfRBXz3O4C7v8wqq2YU3w2jns1Cbv4RmGRJX9A50mtfKasgkkRiskmWZKD2A_ZP4$>. The mechanism that we developed allows for the differences between two related certificates to be encoded in a single extension within one of the certificates. Relying parties can then extract the other certificate using the information found in the extension.

The primary use case in mind is algorithm migration, in particular post-quantum algorithm migration. However, the mechanism can also be applied to other use cases, such as efficiently encoding a signing certificate and encryption certificate in one X.509 certificate.

Several folks are already planning to work on implementing this draft at the IETF 117 Hackathon, but we'd like to circulate this draft to this group for initial thoughts.

Thanks,
Corey on behalf of the authors