Re: [lamps] Call for adoption for draft-ito-documentsigning-eku

Tadahiko Ito <tadahiko.ito.public@gmail.com> Thu, 18 November 2021 17:14 UTC

Return-Path: <tadahiko.ito.public@gmail.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 452E93A0542 for <spasm@ietfa.amsl.com>; Thu, 18 Nov 2021 09:14:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kuVozOGA3aUb for <spasm@ietfa.amsl.com>; Thu, 18 Nov 2021 09:14:38 -0800 (PST)
Received: from mail-io1-xd32.google.com (mail-io1-xd32.google.com [IPv6:2607:f8b0:4864:20::d32]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AB3233A052C for <spasm@ietf.org>; Thu, 18 Nov 2021 09:14:38 -0800 (PST)
Received: by mail-io1-xd32.google.com with SMTP id k21so8960155ioh.4 for <spasm@ietf.org>; Thu, 18 Nov 2021 09:14:38 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:from:date:message-id:subject:to; bh=7dmg+QFFHrDl7IwcZTB/Dmy4GDKqwfMEv/ldSyGQjII=; b=KEynhXY/piN+/9tvJNal2mYpJc06oenM1lFUNO8F2ZMHV8DMsLfoPPxJZJ/ZR2xg2f O5pphQOR0ukkyzBNg5vawJVCigi7s29nO2JOabxM/jBxejiOSH1MCKADgbu1f7V4nWPU Ygaped/oXB4oGkYXCZQ/QLjHgcgZ2mJeOIeygbyMy+DJH50yGt1OkvTsyvq4LXR0qktX bPwRsaeI6e7Ds0SOdJgW8PnhcveCXYXDs6GuPTRBrmAXgfw3ZuAuimUCPiNzr85UDM6i eGsUSafZcdNriXGN1YPz2Tsu6q7gHclMFWIHKT/1vQnRKEmfLbrtCRQCO0RLYnNkrHFB N43Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=7dmg+QFFHrDl7IwcZTB/Dmy4GDKqwfMEv/ldSyGQjII=; b=L+UumG5DlB+F4JziFdWlpWzqaT+74XdsOXfsymMIsgWJeYwOfe15YvDZHMeneopsbs CbnS+HVwnZbbMDRMw0LUVTsMglptQmF/DGXpsxbuhRNWhC2aM5ckmX7M+yIUJhiiqkYH sFz0N7q2+7v6pBi2RDDS4hSQ8D1FD1103rSwyl4VzTsupQGLziWgJ7omRYqSWEIGG74Q /QSVI2jD4I84gDxoH4NwMrtLOtbb4UtDVjjMGSHQ8x2V7UbnWnaBdyOyzhUwVg7YSPnY 6xtFYCwPy55n9o66zFffPbLH/GVQGBUh56rI07A+HnSFB0Om8Lbwc2TGOxft1UDyIb6A r5FQ==
X-Gm-Message-State: AOAM532WAdaGYtnFPYApQ0ugzxFtBZf70Z7Un7pZ/x4k889M+KujOs1c 4+56RqNlRjQHJUt4s4D+dQ1yst5J2oVwXTboGYOni3Gc4yw=
X-Google-Smtp-Source: ABdhPJyIJgXNCXz1hX2Kp4LeUduJetnMBZUcxk1tubSSjm1O/YidWqEcHrezQUlkfv+PJuS/kNbVngzj5DbPxT0UOlU=
X-Received: by 2002:a02:b813:: with SMTP id o19mr21928129jam.130.1637255677248; Thu, 18 Nov 2021 09:14:37 -0800 (PST)
MIME-Version: 1.0
From: Tadahiko Ito <tadahiko.ito.public@gmail.com>
Date: Fri, 19 Nov 2021 02:14:25 +0900
Message-ID: <CAFTXyYBA0M2qFiYhBYP6RU8eFWe5U=iXbexzzYFgcuzkUETzeA@mail.gmail.com>
To: stefan@aaa-sec.com, LAMPS WG <spasm@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000000c88ac05d1134bf2"
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/RSdrZXrtV0BPBupN8g0ymEbJTls>
Subject: Re: [lamps] Call for adoption for draft-ito-documentsigning-eku
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Nov 2021 17:14:43 -0000

Hi Stefan,

Thanks for your comments.

> I think that the only thing we could agree on in the end was that it
> probably was a huge mistake to try to bind a key to a purpose, as
> opposed to binding the key to a particular protocol

While binding each and every protocol does have challenges, as you seen in
the previous discussions, we are not opposed to that idea. For instance, in
a automated authentication system, it is effective to assign an EKU to a
protocol.
However, we recognize that there are some use cases where assigning a EKU
per protocol is not realistic. An example is with a PIV card which has
limited amount of slots which would not scale if there are too many EKUs
per protocol which equates to many keys on the card. This is one of the
cases we had in mind for having a general document signing EKU.

I think it is rational to bind EKUs to specific protocols for many use
cases.
However, as such practices become more widely use, some difficult-to-bind
applications would appear, and we need some choices for those application.
(I believe it is similar to basket clause in the legal systems, and common
approach to deal with classification.)
For example, as it was mentioned on slide 3 of IETF111's presentation and
also on the I-D, we have introduced, or rather, allowed a bad practice of
using email protection or code sign EKU for document signing to infest.
<
https://datatracker.ietf.org/meeting/111/materials/slides-111-lamps-sessa-general-purpose-eku-for-document-signing-00
>
We believe that our approach is a rational and valid way to solve this
problem by means other than making 5280bis.

> So my question is basically. What are the signer and the verifier
> supposed to do based on seeing or not seeing this EKU in a cert. That is
> not at all clear to me.

We believe beyond what we described in section 4 is something dependent on
the policy which the relying party or the relaying party software follows.
We gave enough room to accommodate myriads of policies hence, the name
“general”.

In this draft, we focused on describing the mechanism as much as possible
and tried to be policy neutral.
That should be defined by the policy body (if applicable). Also please note
that not all of the document signing schemes have governing policy bodies,
for example, the document signing in RFC8358.

> "Inclusion of this KeyPurposeId in a certificate indicates that the use
> of any Subject names in the certificate is restricted to use by a
> document signing."
>This is not compatible with the function of the EKU extension.

We received the same comment regarding this part and will be fixed in the
next revision.
We believe this does not affect the WG adoption.

Thanks,

Tadahiko