Re: [lamps] CMS: selection of key management technique to use for EnvelopedData

"Brockhaus, Hendrik" <hendrik.brockhaus@siemens.com> Wed, 11 January 2023 07:54 UTC

Return-Path: <hendrik.brockhaus@siemens.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EE3A7C14F75F for <spasm@ietfa.amsl.com>; Tue, 10 Jan 2023 23:54:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.098
X-Spam-Level:
X-Spam-Status: No, score=-7.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=siemens.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7ZddaS-gJr0W for <spasm@ietfa.amsl.com>; Tue, 10 Jan 2023 23:54:54 -0800 (PST)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-db3eur04on2089.outbound.protection.outlook.com [40.107.6.89]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DB84EC14F726 for <spasm@ietf.org>; Tue, 10 Jan 2023 23:54:53 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=lzpyR94A7civwGJe+XaF3q70yt2IzQ5T1ysUG9fZDlKg3GKQmsohfkdEgzg3TvulrcobO2kLJ9Ker8mC0yiOUFWCf+Y9DVTusomOHmhxP9RMj/J7AswQrp06YmoUsoiXc0FP9CSrp8VJDwRs70ya6D3323OGS9fWpAVyM+/THVXtvdUTRXlAvUA0Mrfie9tW7vjzrM8I4NuDAjSEJv59TUFgOUphU/z97yMlcqXQLRjhLw9GCETmTNm1Cr4FyTwKqhnBKy05Cki51TphPRQOMqGhN/qSZ9xVSI0JHIWiZxVhijXZ0WYIo/ohalPRsAVwGKCIzpQsK9I8U4luYsW0Qg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=mESG0aGGFn+6O1Ygs2qRCoq65scPsdtO9BNCy0C48UQ=; b=GYFLZRy2DHRF8LpDMDXWOvkwoBfBcYqFVGZiit9yRFdbd1AZbI0I7z1I7atIL4Ubm3jk50J134Om7OM/P0QBiZm4OUoV9Eoc82GSTTKAya4SVhTNLeMPd70P2ax0Soci2MI3/R4Et1wTvKZEftAZmKUKYfE6NMq8B46NxyBm+1BU7XBh9O0iyRca0RgiL6BtUT11dUcN9uTfNYztN/rGPqtzVsfA2lHliGUVAj6G3NljBz5Sl6UpgOKMH0xIni90eiG3njwS5ttXjqtziV2KCZhwIaTOMjbmLmOhjwHn2ulgr79ohXaIor9xZOKnd2aGhOowsK1PAC8f290SUG4FYA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=siemens.com; dmarc=pass action=none header.from=siemens.com; dkim=pass header.d=siemens.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=siemens.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=mESG0aGGFn+6O1Ygs2qRCoq65scPsdtO9BNCy0C48UQ=; b=VfdlStqfFaitvyCUMWoQ7xjwRwF984VcYyrCdElBooLE8zl3VOaghp+bneT+wE/zejBOgMQd+mekKPBknMXoEQQ6fEPgSMhDrWysaGpXAu0YXz6epQOBJeeZiAF/oT86S9up9wKlZuc3g+2wWxzwlDhxTYnM+ioxB/FZPQ2BxnYGtiLjVUT4SLCVkhE/XAGWaC1A5YXUvfOcDIQ2mv94f+yfTtY8p+GqF8Zt91g0Np7VQHcLSqYvkXJVMeE7+vikVNYiRBkho0sfjyFgZ6QCoa9ScMvvnwgClUdYmAP6aCVL/11dTm9XGZrjRMlMvT1Lojvr10W1Kez1fXgsa0FARQ==
Received: from GV2PR10MB6210.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:150:7d::8) by AS2PR10MB7837.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:20b:64c::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5986.18; Wed, 11 Jan 2023 07:54:49 +0000
Received: from GV2PR10MB6210.EURPRD10.PROD.OUTLOOK.COM ([fe80::cfed:9a7f:2568:206b]) by GV2PR10MB6210.EURPRD10.PROD.OUTLOOK.COM ([fe80::cfed:9a7f:2568:206b%6]) with mapi id 15.20.5986.018; Wed, 11 Jan 2023 07:54:48 +0000
From: "Brockhaus, Hendrik" <hendrik.brockhaus@siemens.com>
To: Russ Housley <housley@vigilsec.com>
CC: "Roman D. Danyliw" <rdd@cert.org>, LAMPS <spasm@ietf.org>, "von Oheimb, David" <david.von.oheimb@siemens.com>, "John.Gray@entrust.com" <John.Gray@entrust.com>
Thread-Topic: [lamps] CMS: selection of key management technique to use for EnvelopedData
Thread-Index: AQHZFV/jrsIQe/6GokCjtrmrn6LVBq56VtaAgAFZ+QCAAARhAIAAJhiAgAGgZACAGfvS4IAAqFwAgADYPJA=
Date: Wed, 11 Jan 2023 07:54:48 +0000
Message-ID: <GV2PR10MB6210852EEA10FB47686A42DBFEFC9@GV2PR10MB6210.EURPRD10.PROD.OUTLOOK.COM>
References: <b8c681f4f7e6728ecec2cb848e43f2228c4cba7a.camel@siemens.com> <db687565617dde5cc08fcedf0f39241255bb5ac8.camel@siemens.com> <E3949494-08FA-4558-8FFA-1FA7143FD61E@vigilsec.com> <c671f3550a3c422398ded9aa687432aabc9731e1.camel@siemens.com> <CAB18899-660F-4BC5-92FB-9A3B7AF7290D@vigilsec.com> <0aedcb9cef4436867986ae78baf64b56cd87c505.camel@siemens.com> <E81F066B-6541-4594-A35C-7553EA7B21CE@vigilsec.com> <GV2PR10MB6210C0E5B188ACFD762ABEF7FEFF9@GV2PR10MB6210.EURPRD10.PROD.OUTLOOK.COM> <354195C9-09DE-4F55-9BD5-8D08E57A4EB8@vigilsec.com>
In-Reply-To: <354195C9-09DE-4F55-9BD5-8D08E57A4EB8@vigilsec.com>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_Enabled=true; MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_SetDate=2023-01-11T07:54:46Z; MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_Method=Standard; MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_Name=restricted; MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_SiteId=38ae3bcd-9579-4fd4-adda-b42e1495d55a; MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_ActionId=12c47fc3-e9bd-4796-9c99-e448a45a8c5f; MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_ContentBits=0
document_confidentiality: Restricted
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=siemens.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: GV2PR10MB6210:EE_|AS2PR10MB7837:EE_
x-ms-office365-filtering-correlation-id: 0127e63d-7b42-4a92-874a-08daf3a91ce7
x-ld-processed: 38ae3bcd-9579-4fd4-adda-b42e1495d55a,ExtAddr
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:GV2PR10MB6210.EURPRD10.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230022)(4636009)(376002)(346002)(39860400002)(366004)(396003)(136003)(451199015)(6506007)(82960400001)(38100700002)(122000001)(53546011)(2906002)(478600001)(33656002)(9686003)(26005)(7696005)(186003)(5660300002)(71200400001)(316002)(38070700005)(8936002)(83380400001)(52536014)(55016003)(86362001)(41300700001)(64756008)(8676002)(76116006)(66446008)(54906003)(6916009)(66556008)(4326008)(66476007)(66946007); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: siemens.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: GV2PR10MB6210.EURPRD10.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 0127e63d-7b42-4a92-874a-08daf3a91ce7
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Jan 2023 07:54:48.4742 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 38ae3bcd-9579-4fd4-adda-b42e1495d55a
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: PQ+JPZG4y2j6tDYkP/4JswpODQsRlnwHQPWW2pdMwvkEGFBinEK+oicTB8PYmjNVhjgnFUf1H1CZFisr719fkk1SovvMO084x6E7Seu2w7o=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS2PR10MB7837
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/bHkAdMbg5NzlTOrKwXDffgAoDog>
Subject: Re: [lamps] CMS: selection of key management technique to use for EnvelopedData
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Jan 2023 07:54:58 -0000

Russ

Thank you for your quick feedback.
I will queue this change for draft-ietf-lamps-cmp-updates AUTH48 and
implement the related alignment in draft-ietf-lamps-lightweight-cmp-profile
with the next update.

BTW, there are two changes in the queue for draft-ietf-lamps-cmp-updates
AUTH48. Is there a way to already submit them to reflect them in the latest
version on datatracker?

Hendrik

> Von: Russ Housley <housley@vigilsec.com>
> 
> The proposed changes seem fine to me.
> 
> Russ
> 
> > On Jan 10, 2023, at 11:56 AM, Brockhaus, Hendrik
> <hendrik.brockhaus@siemens.com> wrote:
> >
> > Russ
> >
> > Thank you for this clarification on how to choose the right key
> > management technique.
> > As explained by David, we currently focus on the key usage in the
> > certificate used for protecting the certificate request message. As key
> > usage may be set wrongly in this certificate, this is not the best way to
> > specify which key management technique to use.
> > As explained in this mail thread we should point at the type of the public
> > key instead of the key usage extension.
> > Therefore, I propose the following clarification in the central key
> > generation section in draft-ietf-lamps-cmp-updates Section 2.7.
> >
> > OLD
> >   The choice of the key management technique to be used by the sender
> >   depends on the credential available at the recipient:
> >   *  Recipient's certificate that contains a key usage extension
> >      asserting keyAgreement: The content-encryption key will be
> >      protected using the key agreement key management technique, as
> >      specified in CMS section 6.2.2 [RFC5652].  This is the preferred
> >      technique.
> >   *  Recipient's certificate that contains a key usage extension
> >      asserting keyEncipherment: The content-encryption key will be
> >      protected using the key transport key management technique, as
> >      specified in CMS section 6.2.1 [RFC5652].
> >
> > NEW
> >   The choice of the key management technique to be used by the sender
> >   depends on the credential available at the recipient:
> >   *  Recipient's certificate with a public key that supports key agreement
> >       and where any given key usage extension allows keyAgreement: The
> >       content-encryption key will be protected using the key agreement
> >       key management technique, as specified in CMS Section 6.2.2
> >       [RFC5652].
> >   *  Recipient's certificate with a public key that supports key transport
> >       and where any given key usage extension allows keyEncipherment:
> >       The content-encryption key will be protected using the key
> >       transport key management technique, as specified in CMS Section
> >       6.2.1 [RFC5652].
> >
> > @Roman, I hope this clarification is OK to be implemented in AUTH48.
> > If not, please let me know.
> >
> > Implementing this change in draft-ietf-lamps-cmp-updates, we also
> > propose like to adapt draft-ietf-lamps-lightweight-cmp-profile Section
> > 4.1.6 accordingly.
> >
> > Hendrik
> >
> >> Von: Russ Housley <housley@vigilsec.com>
> >>
> >> David:
> >>
> >> I wonder why nobody brought this up before -
> >> maybe simply because cryptographically educated users of CMS know
> >> (and others should learn by failure) that RSA does not support key
> >> agreement and ECC does not support key transport.
> >>
> >> The CMS-related algorithm specifications make it pretty clear.  For
> >> example, RFC 5753 tells ho to use ECC Algorithms in CMS.  I do not see
> >> how an implementer would try to use KeyTransRecipientInfo after
> >> reading that document.
> >>
> >> Maybe some pointers are needed in CMP in the central key generation
> >> section.
> >>
> >> Russ
> >