Re: [lamps] CSRATTRS specifying the SAN

Sean Turner <sean@sn3rd.com> Mon, 21 June 2021 17:29 UTC

Return-Path: <sean@sn3rd.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9FFE33A1281 for <spasm@ietfa.amsl.com>; Mon, 21 Jun 2021 10:29:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.199
X-Spam-Level:
X-Spam-Status: No, score=-0.199 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=sn3rd.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id go6dTjI94Luu for <spasm@ietfa.amsl.com>; Mon, 21 Jun 2021 10:29:36 -0700 (PDT)
Received: from mail-qt1-x82f.google.com (mail-qt1-x82f.google.com [IPv6:2607:f8b0:4864:20::82f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DED5B3A127C for <spasm@ietf.org>; Mon, 21 Jun 2021 10:29:35 -0700 (PDT)
Received: by mail-qt1-x82f.google.com with SMTP id g12so14024569qtb.2 for <spasm@ietf.org>; Mon, 21 Jun 2021 10:29:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sn3rd.com; s=google; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=e9/spbw3+YmoXxJrmBnDuPMa5qo3EqBJbbI61hRduXM=; b=mTGvxmI1C3KMbEPZBqG7US4X6buG0bfzLz7B5gMIaOeM0+UmCGmdDxDmRnSiTYeuuA 4jVYGIKv+iF2vcnEhteh1tZdoeociGZHN8rQYQE8GfBNxyCYbtVkXTqXsNfz2M5v5xNQ 4ez1rWPViUOe+o00lfw5cH/XwrF4wvounA7I4=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=e9/spbw3+YmoXxJrmBnDuPMa5qo3EqBJbbI61hRduXM=; b=uksFX7N53AWQgadZgLIQdcqG50peVhhwGyK5vJ+6+PVBmHBYbcE0y2ZwaZa5z+IC8h EQsoD7TSRDnEff5ScvOe9aX1Ogj/LqftC/peCo/DiC/3PK3+400r/Yft0FZdwd7cPL47 QSj9MVxol+3vfd85I2vGDgk/+wy2KOIEeHD2Fa/j7xP6jwXLOSxB8zFu+ghUjlXI+Byx Ox/H+nRlcCQ+2gaWTONleR15kENduWu/0+iCCXrvjXhYAQGpL/uUt96aO7CIjgAZw3UC TsMojk+9CDqlCuseX3G+KcNMJggpIB+sMCvnwl02rvx2zJ9GEfJv5FnE2MJdCvFnnctL Ek0Q==
X-Gm-Message-State: AOAM530Vwu1x0aiYaaZ+b2VD4ubgxCl65EkvqxjUv8wrbxE4JtlQSR/H IuFm6t5xrOXY+ytYfq/6GoflMQ==
X-Google-Smtp-Source: ABdhPJzgkK9mxZCJaCwNN/QYMaV7E5QwJcdxdN3oNjyz1jZt+7617zsna2zzMz/SMa2D/TML3+xcMg==
X-Received: by 2002:ac8:7b86:: with SMTP id p6mr24301431qtu.48.1624296573936; Mon, 21 Jun 2021 10:29:33 -0700 (PDT)
Received: from smtpclient.apple (pool-71-178-177-131.washdc.fios.verizon.net. [71.178.177.131]) by smtp.gmail.com with ESMTPSA id a5sm10665339qkd.93.2021.06.21.10.29.33 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Mon, 21 Jun 2021 10:29:33 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.100.0.2.22\))
From: Sean Turner <sean@sn3rd.com>
In-Reply-To: <26435.1623269725@localhost>
Date: Mon, 21 Jun 2021 13:29:32 -0400
Cc: SPASM <spasm@ietf.org>, Max Pritikin <pritikin@cisco.com>, anima@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <25C432F7-EDEE-4FEA-B871-5D7F9311BBF7@sn3rd.com>
References: <83844291-5785-434E-8956-3FF81ECD761C@cisco.com> <9820.1618358856@localhost> <MW3PR11MB47462121627A10A62E006497DB369@MW3PR11MB4746.namprd11.prod.outlook.com> <26435.1623269725@localhost>
To: Michael Richardson <mcr+ietf@sandelman.ca>
X-Mailer: Apple Mail (2.3654.100.0.2.22)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/YoM987OcyhjaAyqXRAQRwNQRoIU>
Subject: Re: [lamps] CSRATTRS specifying the SAN
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Jun 2021 17:29:41 -0000

Sorry for just getting to this now. I haven’t read upstream so if this gets answer there oops.

> On Jun 9, 2021, at 16:15, Michael Richardson <mcr+ietf@sandelman.ca> wrote:
> 
> Signed PGP part
> 
> Eliot has suggested that:
>      https://datatracker.ietf.org/doc/html/rfc7030#section-4.5.2
> does not appear to allow the returned CSR Attributes to contain a value.
> Please correct me if I'm understanding the problem wrong.

Oh yeah it does! The whole point of CSRattrs is to allow the client to say “hey RA/CA what do you want my CSR to look like”. The response could just be an OID or it can be an actual attribute with some values:

  Requests for descriptive information from the client are made
  by an attribute, to be represented as Attributes of the CSR, with
  a type indicating the [RFC2985] extensionRequest and the
  values indicating the particular attributes desired to be included
  in the resulting certificate’s extensions. 

Note the word “values” above.

I also figured that there might be brain dead EEs out there so instead of returning a string of attributes the EST server could just return the entire CSR - see Appendix B of RFC 8295. That way the EE would only need sign the request (for PoP).

> RFC8994 assignment of IPv6 ULA can not, as far as I can understand, work
> without assigning a value.  The Registrar must allocate a prefix for the new
> ACP node, and this has to go into the CSR in order for the CA to sign it.
> 
> (Yes, the Registrar has to *check* that the CSR contains the right value along
> the way too.  Yes, if the Registrar is ALSO the CA, then it can shortcut, but
> that's not in general true)
> 
> My unit testing code is at:
>  https://github.com/AnimaGUS-minerva/fountain/blob/master/spec/models/csr_attributes_spec.rb
> 
> 
> I found the ASN.1 code in section 4.5.2 beyond my understanding, so I muddled
> through, since fortunately, there was an example.
> 
>   CsrAttrs ::= SEQUENCE SIZE (0..MAX) OF AttrOrOID
>   AttrOrOID ::= CHOICE (oid OBJECT IDENTIFIER, attribute Attribute }
>   Attribute { ATTRIBUTE:IOSet } ::= SEQUENCE {
>        type   ATTRIBUTE.&id({IOSet}),
>        values SET SIZE(1..MAX) OF ATTRIBUTE.&Type({IOSet}{@type}) }
> 
> What I think that this says is that one can have:
>  a) a Sequence of stuff.

a sequence of stuff that might be empty

>  b) the stuff is either an OID.
>  c) or the stuff is a SEQUENCE [ type, value ].

> The complicated &id... is just saying that when you have some attribute type
> "FOO", then you can have the things that would be valid as values.  I'm
> actually rather amazed at this level of meta-programming. (Can CDDL do that?)

So this is the parameterized ASN.1 syntax. What you could so is define an IOSet of attributes. These attributes value values. But, yeah if it’s an attribute it’s an OID and the associated syntax. e.g.,

pKCS7PDU ATTRIBUTE ::= {
       WITH SYNTAX ContentInfo
       ID pkcs-9-at-pkcs7PDU
       }

   pkcs-9-at-pkcs7PDU OBJECT IDENTIFIER ::= {
       iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
       pkcs-9-at(25) 5
       }

The OID would be 1.2.840.113549.1.9.25.5

and the values (really only one) is:

PKIData ::= SEQUENCE {
       reqSequence        SEQUENCE SIZE(0..MAX) OF TaggedRequest
       }

> An example is provided:
>   MEEGCSqGSIb3DQEJBzASBgcqhkjOPQIBMQcGBSuBBAAiMBYGCSqGSIb3DQEJDjEJ
>   BgcrBgEBAQEWBggqhkjOPQQDAw==
> 
> %echo 'MEEGCSqGSIb3DQEJBzASBgcqhkjOPQIBMQcGBSuBBAAiMBYGCSqGSIb3DQEJDjEJBgcrBgEBAQEWBggqhkjOPQQDAw==' | base64 -d | dumpasn1 -
>  0  65: SEQUENCE {
>  2   9:   OBJECT IDENTIFIER challengePassword (1 2 840 113549 1 9 7)
> 13  18:   SEQUENCE {
> 15   7:     OBJECT IDENTIFIER ecPublicKey (1 2 840 10045 2 1)
> 24   7:     SET {
> 26   5:       OBJECT IDENTIFIER secp384r1 (1 3 132 0 34)
>       :       }
>       :     }
> 33  22:   SEQUENCE {
> 35   9:     OBJECT IDENTIFIER extensionRequest (1 2 840 113549 1 9 14)
> 46   9:     SET {
> 48   7:       OBJECT IDENTIFIER '1 3 6 1 1 1 1 22'
>       :       }
>       :     }
> 57   8:   OBJECT IDENTIFIER ecdsaWithSHA384 (1 2 840 10045 4 3 3)
>       :   }
> 
> 
> At 2, we have the OID "challengePassword", which tells the client that this
> attribute should be included (that's [b]).
> At 13-26, we have an attributed, ecPublicKey, with a *value* secp384r1.
> This tells the client what kind of things to sign with.  (that's [c])
> At 33, we have extensionRequest with oid value 1.3.6.1.1.1.1.22. (also [c])
> Finally, at 57, we have just the attribute ecdsaWithSHA384, which is telling
> the client to use SHA2-384.
> 
> In order to get this all right, I used the example above, made sure I could
> decode it, and then made sure that I could encode exactly that.

Yep!

> I have an example building the subjectAltName rfc822Name (yes, my code hasn't
> caught up to otherName as specified in RFC8994 yet) which is:
> 
> obiwan-[projects/pandora/fountain](2.6.6) mcr 10263 %dumpasn1 tmp/hellobulb0.der
>  0  32: SEQUENCE {
>  2  30:   SEQUENCE {
>  4   3:     OBJECT IDENTIFIER subjectAltName (2 5 29 17)
>  9  23:     SET {
> 11  21:       SEQUENCE {
> 13  19:         [1] {
> 15  17:           UTF8String 'hello@example.com'
>       :           }
>       :         }
>       :       }
>       :     }
>       :   }
> 
> I don't know what the [1] is actually, but possibly that's the rfc822Name.
> Yup, it is:
>  #        rfc822Name                      [1]     IA5String,   <-- this one

The one is the tag.

> So, I think that I'm entirely within spec for CSR Attributes, and I'd like to
> understand more from Owen and Eliot as to what problems they are having with
> CSR Attributes.
> 
> Eliot has suggested we do it all in JSON (CBOR?), and I would certainly be
> happy with that.
> 
> --
> Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 IøT consulting )
>           Sandelman Software Works Inc, Ottawa and Worldwide
> 
>