Re: [lamps] Recharter Discussion

Ryan Sleevi <ryan-ietf@sleevi.com> Sat, 01 July 2017 04:14 UTC

Return-Path: <ryan-ietf@sleevi.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EBFCB13152E for <spasm@ietfa.amsl.com>; Fri, 30 Jun 2017 21:14:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.798
X-Spam-Level:
X-Spam-Status: No, score=-4.798 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-2.8, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=sleevi.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TxugJOIPl6kE for <spasm@ietfa.amsl.com>; Fri, 30 Jun 2017 21:14:31 -0700 (PDT)
Received: from homiemail-a106.g.dreamhost.com (sub4.mail.dreamhost.com [69.163.253.135]) (using TLSv1.1 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C1B32127F0E for <spasm@ietf.org>; Fri, 30 Jun 2017 21:14:31 -0700 (PDT)
Received: from homiemail-a106.g.dreamhost.com (localhost [127.0.0.1]) by homiemail-a106.g.dreamhost.com (Postfix) with ESMTP id 437A93000291E for <spasm@ietf.org>; Fri, 30 Jun 2017 21:14:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sleevi.com; h=mime-version :references:in-reply-to:from:date:message-id:subject:to:cc :content-type; s=sleevi.com; bh=2s8s+ek2yLT73LYeSUzlu4+5z3c=; b= duDQyiVfAQ/z0CpKRkhHNRr472fFBpYJGFPZmTRwgqxqmchk/DtupjUireJUod96 Q0516F/OA/OgetTQ94sMIN7sk+Kgwj2U7LjgGKeckp0g6VT2sofYJov7i+RWGqtB hy39h6nJ2LA3imh1thEiKJohZ+gQpXNhTTnD5mh0upM=
Received: from mail-wr0-f179.google.com (mail-wr0-f179.google.com [209.85.128.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: ryan@sleevi.com) by homiemail-a106.g.dreamhost.com (Postfix) with ESMTPSA id 1F11D30002902 for <spasm@ietf.org>; Fri, 30 Jun 2017 21:14:31 -0700 (PDT)
Received: by mail-wr0-f179.google.com with SMTP id c11so212107860wrc.3 for <spasm@ietf.org>; Fri, 30 Jun 2017 21:14:31 -0700 (PDT)
X-Gm-Message-State: AKS2vOxh3ivqQfadlpPlg99xbv50p0b/mqyybI9ges/syb/6vWS/xSAP SyDA3T08sbWpOsdwkLhK05vipZUmSg==
X-Received: by 10.223.146.195 with SMTP id 61mr13974780wrn.134.1498882469574; Fri, 30 Jun 2017 21:14:29 -0700 (PDT)
MIME-Version: 1.0
References: <D773A43E-2570-4187-A538-38440C756464@vigilsec.com> <CAMm+Lwh+2_rqkOBr1hF2WmgSijcTAQ8PSf4b5Vh=Cpgo8wZ_ug@mail.gmail.com> <E44CFB86-4F7D-4951-BEAD-41D1A6DD7B51@vigilsec.com> <CAMm+LwhJ4==xzjS=TROU1iQB5=bdM=s0e5nZT70k7DMyUoxhFw@mail.gmail.com> <6D0438F4-5C3B-4F28-A8FB-16B6CFA1C7CA@vigilsec.com> <d1145d7d-4d26-27f0-054c-c389f6858965@cs.tcd.ie> <CAMm+Lwi95CUiDZAHvGADHq40Uw-bJEmY3ZMZdaViHnvftm5oVQ@mail.gmail.com> <7298935b-3b4d-4794-8f40-acb188690e87@cs.tcd.ie> <CAMm+Lwhan6yY5MOoGVzMg7nv91aSOV5tg4EX4LV9U==GRCb=Ng@mail.gmail.com>
In-Reply-To: <CAMm+Lwhan6yY5MOoGVzMg7nv91aSOV5tg4EX4LV9U==GRCb=Ng@mail.gmail.com>
From: Ryan Sleevi <ryan-ietf@sleevi.com>
Date: Sat, 01 Jul 2017 04:14:18 +0000
X-Gmail-Original-Message-ID: <CAErg=HFFo0NFUNe2VWo8A4eYTpNieCKjPYU_A_R2JAR3V6CPag@mail.gmail.com>
Message-ID: <CAErg=HFFo0NFUNe2VWo8A4eYTpNieCKjPYU_A_R2JAR3V6CPag@mail.gmail.com>
To: Phillip Hallam-Baker <phill@hallambaker.com>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
Cc: LAMPS <spasm@ietf.org>, Russ Housley <housley@vigilsec.com>
Content-Type: multipart/alternative; boundary="94eb2c0da03228c73a055339c58a"
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/Tn5WxDNZPI8Hz-JVWk8gEU5IxDE>
Subject: Re: [lamps] Recharter Discussion
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Jul 2017 04:14:34 -0000

On Fri, Jun 30, 2017 at 9:27 AM Phillip Hallam-Baker <phill@hallambaker.com>
wrote:

> On Fri, Jun 30, 2017 at 10:22 AM, Stephen Farrell <
> stephen.farrell@cs.tcd.ie> wrote:
>
>>
>> Hi Phill,
>>
>> On 29/06/17 17:54, Phillip Hallam-Baker wrote:
>> > On Thu, Jun 29, 2017 at 12:47 PM, Stephen Farrell <
>> stephen.farrell@cs.tcd.ie
>> >> wrote:
>> >
>> >>
>> >>
>> >> On 29/06/17 16:21, Russ Housley wrote:
>> >>> Do others have an opinion?
>> >>
>> >> The function sounds useful but perhaps better provided
>> >> via an API to a CT log (not sure). The reason I'd wonder
>> >> about that is that it's hard to see what code would
>> >> read this new value and not want more information than
>> >> that. A CT log API could provide more so might be more
>> >> useful (e.g. if an RP could ask "show me your history of
>> >> meta-data related to certs for example.com").
>> >>
>> >> Probably not that relevant, but similar information would
>> >> also exist in passive DNS DBs I guess.
>> >>
>> >
>> > ​There is always a cut off between the standardized parts and the rest.
>> >
>> > When I first proposed this, it was for human consumption. What I am
>> > thinking about now is rather more of a hook for likely proprietary AI
>> > systems reading it.​
>>
>> Right, that's why a CT API seems maybe more useful and (I think,
>> but I may be wrong), might be easier to get deployed.
>>
>> >
>> > ​Security is risk mitigation, not risk elimination. Right now we can
>> > eliminate what? 95% of phishing sites with free DV certs by simply
>> > rejecting any certs less than 5 days old. ​
>
>
Who is we?

Is this a statement of what you believe browsers should do, versus will?
Have you heard of or can provide evidence for any expression of support,
from any browser, for this philosophy?


>> >
>> >
>> > ​What we do next with the ​data is going to be important. But not
>> something
>> > we are going to be able to really work on at all, let alone standardize
>> > until after we have data.
>> >
>> > All I want to do right now is to instrument so we can start collecting
>> data.
>> >
>>
>> I'm not opposed to defining such a cert extension (which I
>> assume would be the end result) if there's likely to be
>> deployment. But I still think that given that CT logs will
>> have this info already, (and more, and covering >1 issuer)
>> a new CT API may be better than putting it in certs.
>>
>
> ​I don't really want to push everything into CT. This is not information
> that is going to be immediately available, you would have to do a lot of
> log crunching to validate.
>
> Given that some browsers won't do CRLs or OCSP, I can't see them using CT
> for pro-active checking before they accept the connection. Where I see the
> value of First Issued is to allow browsers to winnow out certs that are
> most likely OK and concentrate checking on those that might be a bit dodgy.
>

Are you aware of any browsers interested in this? This feels very much like
LogoType - which was intended for browsers (among others) and rightfully
not widely implemented.


> At any rate, putting an extension into the cert is pretty simple while
> changing the CT API to support short lived certs is likely to be a
> performance. I think that this is an easy win to get much of the return and
> takes the pressure off the CT end of things.
>

CT already has to deal with this. It does seem you're conflating two
unrelated things though, but perhaps I'm misunderstanding.

Perhaps it could be useful if you could explain what you believe the
browser security model to be, and how this supports what browsers are doing
or have expressed support for.

I do not see any value to this as an extension - and I can see undesirable
(and unreliable) data being added by CAs - so I'm curious to understand why
using CT is insufficient, especially for the proposed browser-run machine
learning reputation determination.