Re: [lamps] New drafts available - non-composite hybrid authentication, and binding certs
"aebecke@uwe.nsa.gov" <aebecke@uwe.nsa.gov> Tue, 29 March 2022 19:12 UTC
Return-Path: <aebecke@uwe.nsa.gov>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 03A8A3A1B9E
for <spasm@ietfa.amsl.com>; Tue, 29 Mar 2022 12:12:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level:
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1,
DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FROM_GOV_DKIM_AU=-0.001,
HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01,
URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key)
header.d=uwe.nsa.gov
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id A7McbK2XWo1E for <spasm@ietfa.amsl.com>;
Tue, 29 Mar 2022 12:12:14 -0700 (PDT)
Received: from GCC02-DM3-obe.outbound.protection.outlook.com
(mail-dm3gcc02on2062f.outbound.protection.outlook.com
[IPv6:2a01:111:f400:7d04::62f])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id 447243A1BB8
for <spasm@ietf.org>; Tue, 29 Mar 2022 12:12:13 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
b=CB5aDbW2JctaP9tFF5bq7+Oaa8VvMuyJv0f+ySLjJvqQQVpIN4v2F2NoPNE50vA5inZGnRA3OstGPyFouBwBG2fc6JiK/k7u0d75Pu6CLM88foFtbMXuDeYohWias9KEPXT9CJJv92HbQ3iv+BaBZ3LSS/USltcNfWTWtisRTIrpt9UuIJXuDIigRDc63m0E1G+gQvFVNggRYxCzoLvhF6ktnmB4Bq73K+M1lTLk4m/ltSq46R5t/lD44oneDc6QeKC8qcQ29cwRcq1/rYtcCHhAe3aX6Fl7Udb3hYFCzlIbQx91qF9L54g/cB+tZ3Pn6ZSfazolFc5rra//65DVFQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=Sn/z1aoccstWw9Y7O4MkR5ME8bpEIEHois8F3vOywzs=;
b=lFpDk0vyOaiXQ2T8Tqcl3vy8ORnmiAGS9BjrbVY8SFUEOBqB1KT1jMHdhcQ65a3joRMhpx7AZ60O+tghgcD760FfaNMxk+XDUOsAb5aXIS5ukZN7WlKB1iDvFmF9FMagXvlmbsSnL5krqzWhq6ChCLsABKt9UVacg7AiAtG4S5NKxnih0j+J1/GU5mcfLKOa4L0vsizvwlsPT0eNf+6wex+2wCCCfBiz52bYglOw1tq7epCvSzzqogw+VSqx2i96IWyor23WBvz34gzzbCZhYa2X3+isKQ7z2X14Wg3Bxo4mlDbNssCebMU+uo0MTaNtdvQ6dpxlr5uj3gtphmj2Tw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
smtp.mailfrom=uwe.nsa.gov; dmarc=pass action=none header.from=uwe.nsa.gov;
dkim=pass header.d=uwe.nsa.gov; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=uwe.nsa.gov;
s=selector1;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
bh=Sn/z1aoccstWw9Y7O4MkR5ME8bpEIEHois8F3vOywzs=;
b=WmZ4tyYlnnJ/Lmo45JcdXTNrwq0K0DvOGD54wEiXQSPmhBNERFkgfIkJn3XCMTaWGejm/wQTClIHO1jVC3LGRB/1AF5xJPZc1+MTvWnYWL4j0bHg+rGgl5ydC/Hy2WSCbzjE1IS5HmGa/8ZKj2vLsJgKYiF+F2+Suh3u5BJB+GsgSvAy/m4e4JhcoxZzrziROAg0LV5/f5O94M3lm8Gur1mvbaWlalqnGcLSvKjrG7v0rFjjwVxFVfKrBBAK8ihI674f8HA6G59pPlXiSq036BkYteSOc5JYWu2QDqx//zqyaqQmtYj6GMjH2H9DnY1rE4ZKZLWexGCOsX8O0v1xWQ==
Received: from SA0PR09MB7241.namprd09.prod.outlook.com (2603:10b6:806:7a::24)
by DM6PR09MB4694.namprd09.prod.outlook.com (2603:10b6:5:265::9) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17; Tue, 29 Mar
2022 19:12:10 +0000
Received: from SA0PR09MB7241.namprd09.prod.outlook.com
([fe80::c1c7:6c2b:3f1d:bbb4]) by SA0PR09MB7241.namprd09.prod.outlook.com
([fe80::c1c7:6c2b:3f1d:bbb4%7]) with mapi id 15.20.5102.023; Tue, 29 Mar 2022
19:12:09 +0000
From: "aebecke@uwe.nsa.gov" <aebecke@uwe.nsa.gov>
To: Ryan Sleevi <ryan-ietf@sleevi.com>
CC: "spasm@ietf.org" <spasm@ietf.org>
Thread-Topic: [lamps] New drafts available - non-composite hybrid
authentication, and binding certs
Thread-Index: AQHYPhZsKWTcCtspaEezW3V04zRZ9qzMCCIAgAJ+FVaAAByJgIAIIN96
Date: Tue, 29 Mar 2022 19:12:09 +0000
Message-ID: <SA0PR09MB7241A0BD380AC0781D6E31D4F11E9@SA0PR09MB7241.namprd09.prod.outlook.com>
References: <SA0PR09MB72412B7DA4F1DDA68A40AD1EF1179@SA0PR09MB7241.namprd09.prod.outlook.com>
<CAErg=HHCo_SSNmq111oUZjw-L+445jQrARUHDzjZExQZr02SJw@mail.gmail.com>
<SA0PR09MB7241116708E9B97F14319E21F1199@SA0PR09MB7241.namprd09.prod.outlook.com>
<CAErg=HET4kn+zQvYp2thoMsV=GozugsPVRnRmpFxr551=6gwHA@mail.gmail.com>
In-Reply-To: <CAErg=HET4kn+zQvYp2thoMsV=GozugsPVRnRmpFxr551=6gwHA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
suggested_attachment_session_id: 13376c72-0368-3546-d556-7d7369759cbc
authentication-results: dkim=none (message not signed)
header.d=none;dmarc=none action=none header.from=uwe.nsa.gov;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 313c9763-6bda-49d5-dd78-08da11b80609
x-ms-traffictypediagnostic: DM6PR09MB4694:EE_
x-microsoft-antispam-prvs: <DM6PR09MB46948C9F5ED34AE1CD9C4CF9F11E9@DM6PR09MB4694.namprd09.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;
IPV:NLI; SFV:NSPM;
H:SA0PR09MB7241.namprd09.prod.outlook.com; PTR:; CAT:NONE;
SFS:(13230001)(4636009)(366004)(186003)(71200400001)(26005)(2906002)(52536014)(9686003)(38070700005)(5660300002)(8936002)(7696005)(6506007)(19627405001)(83380400001)(53546011)(86362001)(4326008)(508600001)(64756008)(122000001)(316002)(6916009)(66946007)(66556008)(66476007)(66446008)(76116006)(82960400001)(91956017)(8676002)(55016003)(33656002)(38100700002);
DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?vU3ZriFi9gEmqCzb8O2jMWD41FWVfDz46uAr2Y0IuckmCSFDyIwZZVvAnT?=
=?iso-8859-1?Q?MgIPtEsrWI7KGU05RkW+LzhK3xGVMK7A5WPTHrg/lt1swU7pFgUQi2Sgj2?=
=?iso-8859-1?Q?3VpWK7qUaGPpaP46BwTHewyKzg0th3XFLkSkXpOuMUM0DAo4K9KZIXmDi6?=
=?iso-8859-1?Q?+whQbKxEm4D1iWOHThqa+pN7E31H5ueVhsskSrqYqug3+r8vjJctIBYxw2?=
=?iso-8859-1?Q?yOhiMQhnROLq+TpHuB7GHQNrlQTnrdBo49lFRMu61e/ot+d4S72R3LgJuO?=
=?iso-8859-1?Q?Qrc5PnR4zdesuHtZAak44ganJVLNbg4eGGZrTHyqLiMwq+MUhmG50eWgR0?=
=?iso-8859-1?Q?O9KSplSD9TMJRqZgUpoRcnDc+69HIoRBhR30x2ATWA0NIaop/yALyPLLZF?=
=?iso-8859-1?Q?4wuP8OAx0czYm/TaWYygA6vaQ1RMhqgV6m9spUvxBD7s9zdDGs6YufUMvc?=
=?iso-8859-1?Q?fp6cum+75T3OeM6Ht2jrzAztVHIPRkGN2pd4hoaCGkoLr8A0zz6vBkwPIw?=
=?iso-8859-1?Q?Vov8aX9wzDcpn9FAigzOzqVbCB/M1mfG3PQfGyC3qtLu3Uz+OuX9ZLZGNR?=
=?iso-8859-1?Q?KLlyBPJ1LsAu7ALPsJ1cAlsOuDYXTea7UO3EOrt8qTfbvMnBsYp7OvIhSS?=
=?iso-8859-1?Q?one6m0TwJ0RU+9C2z2vdcDye8HQxjzbGU2A1Na8Vd4vp4/hq0bFQstcA6W?=
=?iso-8859-1?Q?vFupn/ro/piOiX9NSMbG/T4tJKb+yNApLRDOIkipR+oZwQwFw5qe+5wNmr?=
=?iso-8859-1?Q?ph2ZHKJcv7evIo7BQ+EO6tzLYDv9qfVVjZSlAjFt/jVPKD88pYdSmlkYO8?=
=?iso-8859-1?Q?t9LQ4xLuejYEli5uVLjgeN8bEO0TJ8O9wea3/oAjqPkjFuextTOpJKWRmt?=
=?iso-8859-1?Q?WoA5ttoroKNLPZbUx4nD9rziHyiuMkXtshvBCVT7KQqxKeXZZOKHoeKWcp?=
=?iso-8859-1?Q?+WcrZn59ZD12e4eqmE1uEoeRzE8CHUi27UB5Ovfq7nXXlDZ3/k/DXKI0L8?=
=?iso-8859-1?Q?kg43msHnt7Xgf6AD4ED+zVju+tlXuuK7v8LUUC6vGht8w+kQimk7I8YllJ?=
=?iso-8859-1?Q?RPpHDsOYVqhGNL0j2FSFCdXwfC0unjDfnnyMMhcvb6QA7COQ1esS5T5rdY?=
=?iso-8859-1?Q?H9qOxaBOnO7u87ionNqnnwSsj0CjMyexI7gzU6tky1Cb40jHcn8poXtnkW?=
=?iso-8859-1?Q?RuRIqXY9oPyLnroLI/owkcDzKE7DYkjFT8hNXM4O5RYf8nOPNEaohnzgYz?=
=?iso-8859-1?Q?WPft6QrJifWE4bHoykDEWwH2vkmfBQLLRS+rd2gYM0u8vaqvDVqpXvuLzb?=
=?iso-8859-1?Q?Qapw3XJcF55zaZTjtaXZuvzavwZSCR8I21HsQ1hqJJQefZWcSZj6LVrXmy?=
=?iso-8859-1?Q?13uOWRo7GaPLgxBRhXrQBo9bPaDF8UbJ+qPlyIAVTZxOA2LdKCeeXBmH8K?=
=?iso-8859-1?Q?68oSpn7NqJFLgqKNaF4+jfi0M1G9th6r78sflw1GZlOUMy0ZC+vOVzYbFd?=
=?iso-8859-1?Q?rs9TWk6yGgZkXdsIBxsI8dnlR6SH738pBshyItx/mKbF5PUK8ZQIlmv+We?=
=?iso-8859-1?Q?Yw08x4m/5htQ23JCklpFEI5gh6OtqmryEMAKMGhtqXnMcgQapZVM831R4A?=
=?iso-8859-1?Q?0v+PyqrDfdcaUof6tbta8wTqeWFlp/Z/Ptiun0w68PihjgRWEqUV1bc7ii?=
=?iso-8859-1?Q?muuZTeZPuKgLlcFwg74Zjcy/nDO8Awm16OQapubzjjR3oD8P6kIkUwZJ8n?=
=?iso-8859-1?Q?7/8FChvOMny0K0S0VEtkRnof9VpQDCBw73dzuvGN0+manuv9bSwRFzDaW7?=
=?iso-8859-1?Q?+CBE9/iShA=3D=3D?=
Content-Type: multipart/alternative;
boundary="_000_SA0PR09MB7241A0BD380AC0781D6E31D4F11E9SA0PR09MB7241namp_"
MIME-Version: 1.0
X-OriginatorOrg: uwe.nsa.gov
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SA0PR09MB7241.namprd09.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 313c9763-6bda-49d5-dd78-08da11b80609
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Mar 2022 19:12:09.8373 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: d61e9a6f-fc16-4f84-8a3e-6eeff33e136b
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR09MB4694
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/_sGWMukn34JYPKQv5hXKsWk-wHI>
Subject: Re: [lamps] New drafts available - non-composite hybrid
authentication, and binding certs
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime
\(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>,
<mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>,
<mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2022 19:12:26 -0000
We will include an example of what we mean by identity. If the certs are from different CAs, it is possible they use different practices to issue the certificates. The two certs are independently valid on their own, so if the verifier likes them both - great, if the verifier likes one and not the other, then it depends on if the implementation can fall back to using one cert, and whether or not the appropriate one is agreeable. The extension does not include another certificate by reference, it is a hint that the RA took care to determine that the private key for Cert B is under the control of the same entity as the private key for Cert A. One cert's validity is not dependent on any attributes or assertions from any other certificate. -Alie ________________________________ From: Ryan Sleevi <ryan-ietf@sleevi.com> Sent: Thursday, March 24, 2022 10:57 AM To: Alison Becker (GOV) <aebecke@uwe.nsa.gov> Cc: Ryan Sleevi <ryan-ietf@sleevi.com>om>; spasm@ietf.org <spasm@ietf.org> Subject: Re: [lamps] New drafts available - non-composite hybrid authentication, and binding certs On Thu, Mar 24, 2022 at 9:18 AM aebecke@uwe.nsa.gov<mailto:aebecke@uwe.nsa.gov> <aebecke@uwe.nsa.gov<mailto:aebecke@uwe.nsa.gov>> wrote: There is no presumption that all certificates are issued within the same PKI. There is a presumption that the endpoint will not accept certificates that it doesn't have a trust anchor for. This mechanism probably doesn't work well for endpoints with liberal trust anchor inclusion policy. Right, but to clarify, if I have one PKI that I use for, say, meat-person identity, and one PKI that I use for machine-identity, then those are functionally different PKIs as they're asserting different things. If I try to bind the machine-identity to the meat-person identity, then I can get into awkward situations depending on the ordering. That is, if I bind machine-to-meat, I may be in a good place, but if I bind meat-to-machine, then every time my machine identity changes, I'd need to reissue my meat-person credential. In the context of the non-composite PQ, the ambiguity here is whether or not it's expected that both certificates are validated according to the same policies (e.g. CP/CPS and identities expressed). If my client has trust anchors for both meat and machine identity in the same protocol, things get messy, don't they? My uncertainty in the goal of this was in understanding whether the assumption here was that in the non-composite pair, whether one of the certificates undergoes less validation than the other. If not, wouldn't both certificates asserting the same identifier be sufficient, and the need for the binding disappear entirely? Concerning renewal, each certificate is valid on its own. The newer certificate would only need renewal on the expiration of the older certificate if a relying party still needed what that older certificate represented. The extension is just a hint to relying party that some care has been taken during issuance that the new cert is being issued to the same entity as the old cert. It is no stronger a hint than any PKI the relying party dares to trust. Well, not just expiration - revocation as well. That is, functionally, if I bind cert B to cert A, and Cert B's validity requires the assertions from Cert A, then by revoking Cert A, I've functionally made Cert B unusable. If I revoked Cert A because I was replacing it, then it means every time I replace A, I also need to replace B. The goal of this draft is to aid in multiple authentication (particularly for PQ migration) by ensuring that all certificates provided by a peer for authentication purposes are in fact owned by the same entity. I think "entity" is getting overloaded here. If Cert A is bound to a given identity (whether you express that in SAN or DN), and Cert B is also bound to that same identity, and the Issuer of A and B both follow the same policies, why is there a need for an explicit binding? The main use case I can see is if the Issuer of A and the Issuer of B are subject to different policies, and thus either the semantics of the identity expressed, or the level of assurance of the identity expressed, are expected to be different. And if that's the case, then it seems they couple security assumptions that the Issuer of A needs to consider, because the Issuer of B may be dependent upon A's assumptions/expressions. Does that make more sense?
- [lamps] New drafts available - non-composite hybr… aebecke@uwe.nsa.gov
- Re: [lamps] New drafts available - non-composite … Ryan Sleevi
- Re: [lamps] New drafts available - non-composite … Kampanakis, Panos
- Re: [lamps] New drafts available - non-composite … David A. Cooper
- Re: [lamps] New drafts available - non-composite … aebecke@uwe.nsa.gov
- Re: [lamps] New drafts available - non-composite … Ryan Sleevi
- Re: [lamps] New drafts available - non-composite … aebecke@uwe.nsa.gov
- Re: [lamps] New drafts available - non-composite … aebecke@uwe.nsa.gov
- Re: [lamps] New drafts available - non-composite … aebecke@uwe.nsa.gov
- Re: [lamps] New drafts available - non-composite … Michael Richardson
- Re: [lamps] New drafts available - non-composite … Ryan Sleevi
- Re: [lamps] New drafts available - non-composite … aebecke@uwe.nsa.gov
- Re: [lamps] New drafts available - non-composite … Michael Richardson
- Re: [lamps] [EXTERNAL] New drafts available - non… Mike Ounsworth