Re: [lamps] Interest to standardize PKI REST APIs?

Tomas Gustavsson <tomas.gustavsson@primekey.com> Wed, 12 June 2019 06:44 UTC

Return-Path: <tomas.gustavsson@primekey.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C70651200B4 for <spasm@ietfa.amsl.com>; Tue, 11 Jun 2019 23:44:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=primekey.com header.b=uY9epfZD; dkim=pass (1024-bit key) header.d=primekey.com header.b=uY9epfZD
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1mgvopOTpA00 for <spasm@ietfa.amsl.com>; Tue, 11 Jun 2019 23:44:03 -0700 (PDT)
Received: from mail.primekey.com (mail.primekey.com [84.55.121.163]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 993CB120077 for <spasm@ietf.org>; Tue, 11 Jun 2019 23:44:02 -0700 (PDT)
Received: from mail.primekey.com (localhost [127.0.0.1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.primekey.com (Postfix) with ESMTPS id 674CD6AA0090 for <spasm@ietf.org>; Wed, 12 Jun 2019 08:43:55 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=primekey.com; s=mail; t=1560321835; bh=iuWYlqXXQj4/4jlcdWng49ny90DF2krWU3A9AQvFPDM=; h=Subject:To:References:From:Date:In-Reply-To:From; b=uY9epfZD6mtjAHO+nlaMmDP+nFfNvU3qHUB6AWfF8dBzl0WnLh1HUyXwR4ieS+2SA PcOgvRbLv8mgNfB4NVGQHS/OJ0mP90rQqRXE6NHYq0cid9oQ6rpFbutpORBNdvwMcp 0RGP6970vOJvnVHx5OgfNbCF1bspHe3drKwZXd7Y=
Received: from [10.11.0.8] (gatekeeper.primekey.se [84.55.121.162]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.primekey.com (Postfix) with ESMTPSA id F20926AA008D for <spasm@ietf.org>; Wed, 12 Jun 2019 08:43:54 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=primekey.com; s=mail; t=1560321835; bh=iuWYlqXXQj4/4jlcdWng49ny90DF2krWU3A9AQvFPDM=; h=Subject:To:References:From:Date:In-Reply-To:From; b=uY9epfZD6mtjAHO+nlaMmDP+nFfNvU3qHUB6AWfF8dBzl0WnLh1HUyXwR4ieS+2SA PcOgvRbLv8mgNfB4NVGQHS/OJ0mP90rQqRXE6NHYq0cid9oQ6rpFbutpORBNdvwMcp 0RGP6970vOJvnVHx5OgfNbCF1bspHe3drKwZXd7Y=
To: spasm@ietf.org
References: <AM0PR10MB24028210BCE560C64195A74EFE320@AM0PR10MB2402.EURPRD10.PROD.OUTLOOK.COM> <AM0PR10MB2402B5BB06E4FB59A8ECB16BFE060@AM0PR10MB2402.EURPRD10.PROD.OUTLOOK.COM> <AM0PR10MB2402C7C1AAA09EABF047F0CEFE1D0@AM0PR10MB2402.EURPRD10.PROD.OUTLOOK.COM> <29FAEBF1-2D67-469F-BE78-AF58F78D055E@vigilsec.com> <BN7PR11MB2547D526E00CE7C5DDCDB3E9C91E0@BN7PR11MB2547.namprd11.prod.outlook.com> <17374.1559083024@localhost> <HE1PR0701MB24447D45A6A7461DEC49FE7B9B1F0@HE1PR0701MB2444.eurprd07.prod.outlook.com> <12129.1559329924@localhost> <7f83213b-2e63-57f5-5a1a-956d47b58683@primekey.com> <AM0PR10MB2402726EDDA7074FEDFF917DFE100@AM0PR10MB2402.EURPRD10.PROD.OUTLOOK.COM> <6992.1559937612@localhost> <AM0PR10MB2402E1A22C3CB3D4507BE1E0FEEC0@AM0PR10MB2402.EURPRD10.PROD.OUTLOOK.COM>
From: Tomas Gustavsson <tomas.gustavsson@primekey.com>
Openpgp: preference=signencrypt
Autocrypt: addr=tomas.gustavsson@primekey.com; prefer-encrypt=mutual; keydata= mQENBEyuwwYBCAD31Jsxn1lf7rnFc7y3Ol+TE7pU7ohO78kMdoVrZdAMnU9W0P33GedbU+kF 8/RFq7HlXV8a91RkgtdcMAK8tSdtBKDGZCOJZm5qOZ/EHikY8k/7s1wgSQSF4hYSG/IABCCA W139joDFl4L3buWyk2lsYX1HDBpuXGDL5HFyu165T0ZVlt23T04xmAwpIHUViKUWw1QYnlRz s66Desn2WeP+X8/QlqF1zOTUXbgrThB1X/Oh2+wzP08HVoTQCzlrEMeb9x2k+oa8PtVdnflh nZKBtyyBkZxRoHG3tNKcaf7JLoadSXcSKSKvfApcsxpP2JpkQgIhLi3JWik/Z+RR2WD1ABEB AAG0MFRvbWFzIEd1c3RhdnNzb24gPHRvbWFzLmd1c3RhdnNzb25AcHJpbWVrZXkuY29tPokB NwQTAQgAIQUCWX8yTAIbIwULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgAAKCRBibcSbAEP+QGAU CAC82dn8XCQ8Ei7gxQAdRSc2imaP/388i/ObDMYhNhg5j4gXs3tkfxuCvhwkzskUFgOtmaEy uz/gIiVjQIsjQrHh5tl9M0q2tqbDHJpWfE6/SkXPUmTqQ0VGyq1MmZ3/zg2jSoll74qBSfdH V7sWugRXeCBxfaPeYo8DdPCGi27yrdL8zb3xkJ3BxPcDGNdkLm+Yza+qAOrssCD7MSLN+6Sd ML5Xcmw6pgRPlQ0aCsM7scrwgBNb7KrwxaqBxqwcuqF0NMgNjeiEHi2Oj3HOZdYU4Blk2GFq 9zHuCzTWumgNOlfksZ9K3ZMJBn6KLPot5bVXIKdnHwWRzoKMDxkSZjM5uQENBEyuwwYBCADZ 98eCFQ64zKo1OKkUgEJHO1JdsiqRO1znu6KyaTcd2vXfOCGkFFVBL+vjzzyyYV7Sg1/AaG4r l9TKJCwvx8mUmTJkKQspTfOj6AY33bmfMB/8LBYj2BjtxXyMucPjNTJqbL2r1HeGPV2nwyof MAyo2qcYuiLs20Ob7U8vooOV3GDDKEkXtJYZzTEU6qabGsepGIvMu770OZwvm4akQiCGe5sQ 4+/UH1pMZQNi+/fGbONFx+TUVMM8EkXD6dQ5WoL+xPabPjqiUmR7EBvg0uocr70Ag93tWk1d 4RgFcicjwMFcPg4TZ8Y/3Y7Nmbyo14+4SMNfNPFLgQMawL+cLLkdABEBAAGJAR8EGAECAAkC GwwFAlYXhXUACgkQYm3EmwBD/kA2igf/QNpPe7sLt3KdRD3x4cStxGjLCWyj7x1YLVnV4Nnu TvaNhC+KHx3uG39y1x3PJQwslpeSQ6JipOUmxeQjjGJGQZLV41L1PCJVhCL98Dinr6dJkYB7 cAVhfmW8PI51jiANExLZu8U5gnthj5CGv4428ODQgSoRI0demG3HmVCNrKdap+orhT8zRkq8 DuHTO01U7PKsfvQ2k8AqSAC/JjMOs1mpFe032IApXxlZkE+33Q3dE5BiJmICYg8hsRXvpKTm ZMCdNZJUQLq+XNpg6RtAPQIPMmCepXrE9M/KuH+jFS2G5+Hx5VBSM644E1G2i+HOPCVdHjof iaNi3V/ItEG3jw==
Message-ID: <c57f4ec5-539e-554a-3dcf-2bd73a1bf552@primekey.com>
Date: Wed, 12 Jun 2019 08:43:57 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1
MIME-Version: 1.0
In-Reply-To: <AM0PR10MB2402E1A22C3CB3D4507BE1E0FEEC0@AM0PR10MB2402.EURPRD10.PROD.OUTLOOK.COM>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/aJUh32D8gVCuNmBPrZ01GevWzrY>
Subject: Re: [lamps] Interest to standardize PKI REST APIs?
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Jun 2019 06:44:06 -0000

I'm not sure that properties such as self-contained protection is a good
fit for REST API. (one of) The key point (at least for me) of REST API
is the easiness of testing/development. You can use a Swagger web page
to test the API directly from a browser, and get copy-paste curl
commands to run in a script. Error responses are simple, human readable
JSON.
Using CMP, for example, as base will not make this possible. CMP works
well as it is imho, and I don't think it will become easier to use with
a new transport. The HTTP transport itself of CMP is easy enough (I like
it).

Of course PKCS#10 request and certificates/CRLs are self-contained
protected, but there is nothing similar for say revocation requests.

Simple use cases can use simple protocols, but it will be hard I think
to support complex use cases sẃith such. This is where CMP shines, for
complex use cases, and I have no ambition to replace CMP.

Regards,
Tomas

On 2019-06-12 07:49, Brockhaus, Hendrik wrote:
>> Michael Richardson <mcr+ietf@sandelman.ca>  wrote:
>>
>> Brockhaus, Hendrik <hendrik.brockhaus@siemens.com> wrote:
>>     > I think we need to first collect the required certificate management
>>     > use cases and check if they are addressed by existing protocols.
>>
>> I don't want to do that.  It's boiling the ocean.
> 
> IMHO knowing about the uses cases we want to address is not  'boiling the ocean'. If we want to come up with a solution that fits our needs, we should do this. Other vice we come up with a solution that looks nice, but cannot be used for major use cases. Like EST is an interesting approach for the last mile, but does not offer revocation, self-contained messages and end-to-end security. All are required in more complex scenarios.
> 
> I see the following requirements.
> - Enrollment, update und revocation
> - Local and central key generation
> - Confirmation of certificate enrollment/update
> - Polling for delayed delivery
> - Some general messages like GetCSRParam and RootCACertUpadate
> - Approval of request by intermediate RAs, e.g. by adding additional signatures
> - Security features
>   . Self-contained protection of requests/responses (end-to-end security)
>   . Proof-of-possession
>   . Proof-of-identity, e.g. signature, HMAC
>   . Replay protection, e.g. nonces
>   . Timeliness, e.g. timestamps
> 
> So there is no surprise. But some features like self-contains messages together with approval of an RA is not available in protocols like ACME and EST. So we can discuss extending these, or we utilize an existing protocol like CMP that already offers the above and adapt its transport and messages flow to REST.
> 
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm
>