From nobody Wed Jun 15 11:41:02 2022
Return-Path: <housley@vigilsec.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
 by ietfa.amsl.com (Postfix) with ESMTP id 5DD20C1594A9
 for <spasm@ietfa.amsl.com>; Wed, 15 Jun 2022 11:41:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.904
X-Spam-Level: 
X-Spam-Status: No, score=-1.904 tagged_above=-999 required=5
 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001,
 RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001,
 T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001,
 URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001]
 autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194])
 by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id ctrd5NG3im3O for <spasm@ietfa.amsl.com>;
 Wed, 15 Jun 2022 11:41:00 -0700 (PDT)
Received: from mail3.g24.pair.com (mail3.g24.pair.com [66.39.134.11])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256)
 (No client certificate requested)
 by ietfa.amsl.com (Postfix) with ESMTPS id CE548C15949B
 for <spasm@ietf.org>; Wed, 15 Jun 2022 11:39:52 -0700 (PDT)
Received: from mail3.g24.pair.com (localhost [127.0.0.1])
 by mail3.g24.pair.com (Postfix) with ESMTP id 3B917CF65A;
 Wed, 15 Jun 2022 14:39:50 -0400 (EDT)
Received: from [10.0.1.2] (pfs.iad.rg.net [198.180.150.6])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by mail3.g24.pair.com (Postfix) with ESMTPSA id 21C47CFC60;
 Wed, 15 Jun 2022 14:39:50 -0400 (EDT)
From: Russ Housley <housley@vigilsec.com>
Message-Id: <CAE07C5E-5F03-4AC1-AEA2-6A55DC11F59B@vigilsec.com>
Content-Type: multipart/alternative;
 boundary="Apple-Mail=_3B814415-3C5F-4C5D-94EC-7DB6998DAB9C"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.21\))
Date: Wed, 15 Jun 2022 14:39:49 -0400
In-Reply-To: <875yl1ooba.fsf@fifthhorseman.net>
Cc: LAMPS <spasm@ietf.org>
To: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
References: <877d8hx019.fsf@fifthhorseman.net>
 <7BA047D3-B499-4395-A8BB-99D5C816ADC6@vigilsec.com>
 <87sfoqdk94.fsf@fifthhorseman.net>
 <DC7741A3-D11A-4908-8A67-5A44007B4054@vigilsec.com>
 <875yl1ooba.fsf@fifthhorseman.net>
X-Mailer: Apple Mail (2.3445.104.21)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/czIJ_aOFNsXL7C_xDKbwqT58JgM>
Subject: Re: [lamps] draft-ietf-lamps-rfc3709bis-01 security, reliability,
 and privacy considerations
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime
 \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>,
 <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>,
 <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Jun 2022 18:41:02 -0000


--Apple-Mail=_3B814415-3C5F-4C5D-94EC-7DB6998DAB9C
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

DKG:

> Thanks for the more in-depth review, and for the concrete feedback and
> offered improvements on several different points.  It looks like many =
of
> the details i raised are now going to be addressed, although i don't
> know where to look for specific improvements to the draft.  i don't
> think an -03 has been released, and i don't know of any public =
revision
> control that i can use to confirm how specific text has been updated.

Correct.  I have -03 in an edit buffer, but I was hoping to hear back =
from you before posting it.

> This message comments on a few of the higher-level concerns, rather =
than
> going into the details:
>=20
> On Wed 2022-06-01 17:38:06 -0400, Russ Housley wrote:
>> I'm trying to achieve a balance in the changes.  I'd really like to
>> preserve as much of the original text in RFC 3709 as possible.  I'm
>> not trying to avoid clarity, but I am trying to avoid changes that =
are
>> purely editorial.
>=20
> I think this high-level decision is a mistake.  This document
> substantively changes RFC 3709 in some fairly significant ways,
> including the merging of RFC 6170's Certificate Image "Logotype", =
which
> is one of the primary ways that these embedded media are *not* =
logotypes
> at all.  Who benefits from its text being similar to RFC 3709?  Who
> would benefit from the standard being written to be read alone?

I do not agree.  I'd like to hear from my co-authors.

The biggest changes are the result of merging RFC 3709 and RFC 6170.  In =
fact, I looked at a diff, and there are very modest changes before =
Section 4.2, which is where the material from RFC 6170 begins.

> When this document is released, RFC 3709 (and 6170) will move to
> "obsolete" status, and this will be the canonical reference for any
> X.509 certificate with embedded media.  Please consider making the new
> canonical reference (this document) something that makes sense and
> stands on its own, without requiring the reader to already know the
> backstory behind how we got here.

The fact that there are few changes in the prior to Section 4.2 helps =
someone that has already implemented RFC 3709 understand what changed.

> I'm not suggesting here that you change any technical wire format
> details, i'm suggesting that framing this document clearly ("purely
> editorial" changes) has a significant impact on its utility.
>=20
> The RFC development process is not about trying to produce minimal
> diffs.  It's about trying to produce a useful canonical resource.

Yes, we want a quality specification.  I am starting with the assumption =
that there was consensus for RFC 3709.

> If your goal for minimal diffs is about how someone needs to modify an
> RFC 3709 implementation to cover material in this draft, then the
> appropriate way to solve that problem is to ensure that the "Changes
> Since=E2=80=A6" subsection is adequate for the task.  New implementers =
shouldn't
> have to read or understand RFC 3709 to make sense of what's happening
> here.

The point that this document has few changes since RFC 3709 prior to =
Section 4.2 is proof that is not the case.

>>>> [re: "logotype data" vs. LogotypeData"]
>=20
> I think this is a major source of unnecessary confusion in the draft,
> and if the draft was re-titled/re-framed as something like "Multimedia
> in X.509 Certificates (historically called 'Logotypes')" then it would
> be relatively simple to change from "logotype data" to something like =
"a
> multimedia resource", thereby eliminating this source of confusion.

I've already said why I do not think that is the right approach.  That =
said, if others support this position, then I will bend to the =
consensus. (The consensus call will be made by Tim.)

>>> On Tue 2022-03-29 18:17:02 -0400, Daniel Kahn Gillmor wrote:
>>>> Furthermore, the draft doesn't do much to try to alleviate size =
concerns
>>>> at all -- it almost looks like an afterthought.  For example, if =
the
>>>> draft really wanted to prioritize minimizing certificate size, then =
it
>>>> would offer an ASN.1 native OCTET STRING representation for the =
embedded
>>>> objects, rather than stuffing another layer of base64-encoding with =
the
>>>> data: URL.
>>>=20
>>> I have seen no attempt to address this tradeoff.  The draft could
>>> mitigate at least some of the size concern by specifying a compact =
way
>>> to encode in-band data.  It does not do so, and it does not even try =
to
>>> justify why it does not do so.
>>=20
>> I do not think we should address this one.  Doing so would be a move
>> away from the syntax in RFC 3709.  At least that was the outcome from
>> my perspective from the exchange between you and Stefan on the LAMPS
>> WG mail list a few weeks ago.
>=20
> I agree that making such a change would introduce a new wire format, =
one
> not already currently supported by existing implementations.  I don't
> think it would invalidate existing certificates that use the
> base64-encoded data: URL format, but it would offer a way to reduce =
the
> incentive to make privacy-leaking network-based media retrieval a part
> of new certificates.
>=20
> If trying to improve privacy is not the goal of this draft, i can
> understand that, even though i think it is a disappointing missed
> opportunity.

I think that CAs will decide which of the approaches will be deployed in =
the certificates that they issue.  The much strengthed privacy =
considerations is giving them a lot more information to make this =
decision.

>>>> what i still don't understand, after several re-reads of the draft, =
is
>>>> why the LogotypeData can have more than one image and more than one
>>>> audio element.  Or maybe LogotypeData offers multiple distinct =
digital
>>>> representations of the same object by enclosing a sequence of
>>>> LogotypeImage objects?  but then i don't understand why there are
>>>> multiple LogotypeDetails objects within a LogotypeImage object.
>>>>=20
>>>> Maybe the draft itself could offer a succinct explanation of why =
each of
>>>> these layers is present?
>>>=20
>>> The rationale for every layer remains unclear to me after several
>>> re-reads of the draft and having this e-mail exchange.
>>=20
>> Again, changes to this are not on the table.  We are preserving =
compatibility with the syntax in RFC 3709.
>=20
> I don't think you're understanding me here.  I'm not asking for =
changes
> in the structure of the wire format.
>=20
> I have read (and re-read) the draft, and RFC 3709, and i am *still* =
not
> confident that I understand the rationale for every layer of SEQUENCE =
OF
> or SEQUENCE SIZE that appears in the ASN.1 structure.  It's possible
> that i'm particularly dense, but i doubt i'll be the only person in =
this
> situation.
>=20
> I'm not saying that this draft should change the wire format.  I'm
> saying that the draft could be much clearer about the rationale for =
each
> layer of arbitrary SEQUENCE.  Some of them are for different semantics
> of multimedia (the "SEQUENCE OF" in communityLogos or otherLogos); =
some
> of them are for differently-formatted variants of the same underlying
> visual or acoustic pattern (the "SEQUENCE OF" in LogotypeData); some =
of
> them are for different places to try fetching the same underlying =
octet
> stream (the "SEQUENCE SIZE"s in LogotypeReference or LogotypeDetails).
> Is that it?

At the top:

   LogotypeExtn ::=3D SEQUENCE {
      communityLogos  [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL,
      issuerLogo      [1] EXPLICIT LogotypeInfo OPTIONAL,
      subjectLogo     [2] EXPLICIT LogotypeInfo OPTIONAL,
      otherLogos      [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo
                             OPTIONAL }

All of them are available for display.  Ii is all oc the communities =
that are associated with this certificate, the issuer, the subject, and =
all of the other logos that are associated with the certificate.

I have not seen an actual certificate that uses all of this capability, =
but more of this capability could be used as logos become more =
prevalent.


Deeper in the structure:

   LogotypeData ::=3D SEQUENCE {
      image           SEQUENCE OF LogotypeImage OPTIONAL,
      audio           [1] SEQUENCE OF LogotypeAudio OPTIONAL }

Choose one image and one audio.

> If so, a clear summary or a set of examples that exercise each =
sequence
> would be a useful thing in the document.

I think I can do that.  I'll try to find the time.

Will an example that has two community logos (both to be displayed) and =
two subject logos (one to be displayed) be good enough to make this =
point?  Of course, they will all be bogus URLs under example.com =
<http://example.com/>, example.net <http://example.net/>, and =
example.org <http://example.org/>.

>> While the privacy improvements in TLS 1.3 are important, the Web PKI
>> has seen no adoption of RFC 3709.
>=20
> If you don't expect this to be in the WebPKI, then i think it might be
> useful for the document to observe some specific contexts where this
> mechanism is concretely useful.
>=20
> I also note that TLS 1.3 is not exclusively used by the Web.

Of course TLS 1.3 is used many places beyond the Web.

I am not opposed to logotypes being used in the Web, but it has not =
happened so far.

>>> draft-ietf-lamps-samples is now RFC 9216.  Please include some full
>>> X.509 test vectors.
>>=20
>> Some implementers that have found these examples sufficient.  I'd =
like
>> to hear from an implementer that the additional work would really be
>> helpful before putting in the effort.
>=20
> I don't think i've heard from any implementers at all, at least in
> on-list discussion, though i might have missed it.  Can you help me
> understand what effort is involved in including test vectors?  I would
> assume that any implementer -- of tooling for a CA, relying party, or
> subscriber -- has test vectors of their own for their own internal
> testing.  And presumably an easy way to generate such a thing as well.
> Can we not just reuse one of those?  Is there any reason to think that =
a
> sample certificate itself would be proprietary?

There are implementations.  I took this posting to be a public =
indication of an implementation:

=
https://mailarchive.ietf.org/arch/search/?qdr=3Da&start_date=3D&end_date=3D=
&email_list=3Dspasm&q=3Dfrom%3A%28Corey%29&as=3D1 =
<https://mailarchive.ietf.org/arch/search/?qdr=3Da&start_date=3D&end_date=3D=
&email_list=3Dspasm&q=3Dfrom:(Corey)&as=3D1>

>>>> v) "5. Type of Certificates" says:
>>>>=20
>>>>    logotypes MUST NOT be part of certification path validation or =
any
>>>>    type of automated processing.
>>>>=20
>>>>  but this seems to be in conflict with requirements like "The
>>>>  background image MUST allow black text to be clearly read when =
placed
>>>>  on top of the background image." which would presumably be =
enforced
>>>>  by the certificate issuer via automated processing.
>>>>=20
>>>>  Perhaps this is supposed to mean "any type of automated processing =
by
>>>>  the relying party" or "any type of automated processing during
>>>>  certificate validation"?
>>>=20
>>> This item (v) is also still not addressed.  Are we really saying =
that an
>>> issuer MUST NOT attempt to confirm (for example) that two formats of
>>> visual representation are actually roughly visually similar, using =
(for
>>> example) a conversion to raw pixels and then some sort of distance =
metric?
>>=20
>> I think you are misreading this one.  Path validation is specified in
>> Section 6 or RFC 5280.  I'll add an explicit reference.  This is not
>> saying anything whatsoever about the vetting that a CA might perform
>> prior to including the logotype data in the certificate.
>=20
> The text just says "or any type of automated processing", in addition =
to
> certification path validation.  This is one of several examples in the
> document where the document appears to implicitly refer to one
> particular party involved with a certificate (in this case, the =
relying
> party) but not considering how the text reads in the context of one of
> the other parties involved (e.g. the subscriber, the issuing =
authority,
> the resource host, an implementer, etc).
>=20
> That potential confusion makes it difficult to apply the document.
> Being explicit would be make it easier to use safely.

I am very confused by this comment.  Only relying parties perform =
certificate path construction and validation.

>> There already are subsections for each of the otherType OIDs.
>>=20
>> There is really one paragraph that for each of the the "three =
standard
>> logotype types". I cannot see how making those subsections would be
>> helpful.
>=20
> Having an explicit subsection (even if it contains only a single
> paragraph) per logotype context makes it easier for people to refer to
> them in discussions, or in comments in an implementation.
>=20
> It also makes a glance at the table of contents more informative, as =
the
> most prominent contextual uses are more visible, which in turn makes =
the
> document easier to follow.
>=20
> I can't see the downside to a clearer document structure.

As I already said at the top of this message, it helps with the diff.  =
The simple diff helps people that already implemented RFC 3709.

Russ



--Apple-Mail=_3B814415-3C5F-4C5D-94EC-7DB6998DAB9C
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" =
class=3D"">DKG:<div class=3D""><br class=3D""></div><div =
class=3D""><div><blockquote type=3D"cite" class=3D""><div class=3D""><div =
class=3D""><div class=3D"protected-part"><div =
class=3D"protected-content">Thanks for the more in-depth review, and for =
the concrete feedback and<br class=3D"">offered improvements on several =
different points. &nbsp;It looks like many of<br class=3D"">the details =
i raised are now going to be addressed, although i don't<br =
class=3D"">know where to look for specific improvements to the draft. =
&nbsp;i don't<br class=3D"">think an -03 has been released, and i don't =
know of any public revision<br class=3D"">control that i can use to =
confirm how specific text has been updated.<br =
class=3D""></div></div></div></div></blockquote><div><br =
class=3D""></div>Correct. &nbsp;I have -03 in an edit buffer, but I was =
hoping to hear back from you before posting it.</div><div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D""><div =
class=3D""><div class=3D"protected-part"><div =
class=3D"protected-content">This message comments on a few of the =
higher-level concerns, rather than<br class=3D"">going into the =
details:<br class=3D""><br class=3D"">On Wed 2022-06-01 17:38:06 -0400, =
Russ Housley wrote:<br class=3D""><blockquote type=3D"cite" class=3D"">I'm=
 trying to achieve a balance in the changes. &nbsp;I'd really like to<br =
class=3D"">preserve as much of the original text in RFC 3709 as =
possible. &nbsp;I'm<br class=3D"">not trying to avoid clarity, but I am =
trying to avoid changes that are<br class=3D"">purely editorial.<br =
class=3D""></blockquote><br class=3D"">I think this high-level decision =
is a mistake. &nbsp;This document<br class=3D"">substantively changes =
RFC 3709 in some fairly significant ways,<br class=3D"">including the =
merging of RFC 6170's Certificate Image "Logotype", which<br class=3D"">is=
 one of the primary ways that these embedded media are *not* =
logotypes<br class=3D"">at all. &nbsp;Who benefits from its text being =
similar to RFC 3709? &nbsp;Who<br class=3D"">would benefit from the =
standard being written to be read alone?<br =
class=3D""></div></div></div></div></blockquote><div><br =
class=3D""></div>I do not agree. &nbsp;I'd like to hear from my =
co-authors.</div><div><br class=3D""></div><div>The biggest changes are =
the result of merging RFC 3709 and RFC 6170. &nbsp;In fact, I looked at =
a diff, and there are very modest changes before Section 4.2, which is =
where the material from RFC 6170 begins.</div><div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D""><div =
class=3D""><div class=3D"protected-part"><div =
class=3D"protected-content">When this document is released, RFC 3709 =
(and 6170) will move to<br class=3D"">"obsolete" status, and this will =
be the canonical reference for any<br class=3D"">X.509 certificate with =
embedded media. &nbsp;Please consider making the new<br =
class=3D"">canonical reference (this document) something that makes =
sense and<br class=3D"">stands on its own, without requiring the reader =
to already know the<br class=3D"">backstory behind how we got here.<br =
class=3D""></div></div></div></div></blockquote><div><br =
class=3D""></div>The fact that there are few changes in the prior to =
Section 4.2 helps someone that has already implemented RFC 3709 =
understand what changed.</div><div><br class=3D""><blockquote =
type=3D"cite" class=3D""><div class=3D""><div class=3D""><div =
class=3D"protected-part"><div class=3D"protected-content">I'm not =
suggesting here that you change any technical wire format<br =
class=3D"">details, i'm suggesting that framing this document clearly =
("purely<br class=3D"">editorial" changes) has a significant impact on =
its utility.<br class=3D""><br class=3D"">The RFC development process is =
not about trying to produce minimal<br class=3D"">diffs. &nbsp;It's =
about trying to produce a useful canonical resource.<br =
class=3D""></div></div></div></div></blockquote><div><br =
class=3D""></div>Yes, we want a quality specification. &nbsp;I am =
starting with the assumption that there was consensus for RFC =
3709.</div><div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D""><div class=3D""><div class=3D"protected-part"><div =
class=3D"protected-content">If your goal for minimal diffs is about how =
someone needs to modify an<br class=3D"">RFC 3709 implementation to =
cover material in this draft, then the<br class=3D"">appropriate way to =
solve that problem is to ensure that the "Changes<br class=3D"">Since=E2=80=
=A6" subsection is adequate for the task. &nbsp;New implementers =
shouldn't<br class=3D"">have to read or understand RFC 3709 to make =
sense of what's happening<br class=3D"">here.<br =
class=3D""></div></div></div></div></blockquote><div><br =
class=3D""></div>The point that this document has few changes since RFC =
3709 prior to Section 4.2 is proof that is not the case.</div><div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D""><div =
class=3D""><div class=3D"protected-part"><div =
class=3D"protected-content"><blockquote type=3D"cite" =
class=3D""><blockquote type=3D"cite" class=3D""><blockquote type=3D"cite" =
class=3D"">[re: "logotype data" vs. LogotypeData"]<br =
class=3D""></blockquote></blockquote></blockquote><br class=3D"">I think =
this is a major source of unnecessary confusion in the draft,<br =
class=3D"">and if the draft was re-titled/re-framed as something like =
"Multimedia<br class=3D"">in X.509 Certificates (historically called =
'Logotypes')" then it would<br class=3D"">be relatively simple to change =
from "logotype data" to something like "a<br class=3D"">multimedia =
resource", thereby eliminating this source of confusion.<br =
class=3D""></div></div></div></div></blockquote><div><br =
class=3D""></div>I've already said why I do not think that is the right =
approach. &nbsp;That said, if others support this position, then I will =
bend to the consensus. (The consensus call will be made by =
Tim.)</div><div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D""><div class=3D""><div class=3D"protected-part"><div =
class=3D"protected-content"><blockquote type=3D"cite" =
class=3D""><blockquote type=3D"cite" class=3D"">On Tue 2022-03-29 =
18:17:02 -0400, Daniel Kahn Gillmor wrote:<br class=3D""><blockquote =
type=3D"cite" class=3D"">Furthermore, the draft doesn't do much to try =
to alleviate size concerns<br class=3D"">at all -- it almost looks like =
an afterthought. &nbsp;For example, if the<br class=3D"">draft really =
wanted to prioritize minimizing certificate size, then it<br =
class=3D"">would offer an ASN.1 native OCTET STRING representation for =
the embedded<br class=3D"">objects, rather than stuffing another layer =
of base64-encoding with the<br class=3D"">data: URL.<br =
class=3D""></blockquote><br class=3D"">I have seen no attempt to address =
this tradeoff. &nbsp;The draft could<br class=3D"">mitigate at least =
some of the size concern by specifying a compact way<br class=3D"">to =
encode in-band data. &nbsp;It does not do so, and it does not even try =
to<br class=3D"">justify why it does not do so.<br =
class=3D""></blockquote><br class=3D"">I do not think we should address =
this one. &nbsp;Doing so would be a move<br class=3D"">away from the =
syntax in RFC 3709. &nbsp;At least that was the outcome from<br =
class=3D"">my perspective from the exchange between you and Stefan on =
the LAMPS<br class=3D"">WG mail list a few weeks ago.<br =
class=3D""></blockquote><br class=3D"">I agree that making such a change =
would introduce a new wire format, one<br class=3D"">not already =
currently supported by existing implementations. &nbsp;I don't<br =
class=3D"">think it would invalidate existing certificates that use =
the<br class=3D"">base64-encoded data: URL format, but it would offer a =
way to reduce the<br class=3D"">incentive to make privacy-leaking =
network-based media retrieval a part<br class=3D"">of new =
certificates.<br class=3D""><br class=3D"">If trying to improve privacy =
is not the goal of this draft, i can<br class=3D"">understand that, even =
though i think it is a disappointing missed<br class=3D"">opportunity.<br =
class=3D""></div></div></div></div></blockquote><div><br =
class=3D""></div>I think that CAs will decide which of the approaches =
will be deployed in the certificates that they issue. &nbsp;The much =
strengthed privacy considerations is giving them a lot more information =
to make this decision.</div><div><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D""><div class=3D""><div =
class=3D"protected-part"><div class=3D"protected-content"><blockquote =
type=3D"cite" class=3D""><blockquote type=3D"cite" class=3D""><blockquote =
type=3D"cite" class=3D"">what i still don't understand, after several =
re-reads of the draft, is<br class=3D"">why the LogotypeData can have =
more than one image and more than one<br class=3D"">audio element. =
&nbsp;Or maybe LogotypeData offers multiple distinct digital<br =
class=3D"">representations of the same object by enclosing a sequence =
of<br class=3D"">LogotypeImage objects? &nbsp;but then i don't =
understand why there are<br class=3D"">multiple LogotypeDetails objects =
within a LogotypeImage object.<br class=3D""><br class=3D"">Maybe the =
draft itself could offer a succinct explanation of why each of<br =
class=3D"">these layers is present?<br class=3D""></blockquote><br =
class=3D"">The rationale for every layer remains unclear to me after =
several<br class=3D"">re-reads of the draft and having this e-mail =
exchange.<br class=3D""></blockquote><br class=3D"">Again, changes to =
this are not on the table. &nbsp;We are preserving compatibility with =
the syntax in RFC 3709.<br class=3D""></blockquote><br class=3D"">I =
don't think you're understanding me here. &nbsp;I'm not asking for =
changes<br class=3D"">in the structure of the wire format.<br =
class=3D""><br class=3D"">I have read (and re-read) the draft, and RFC =
3709, and i am *still* not<br class=3D"">confident that I understand the =
rationale for every layer of SEQUENCE OF<br class=3D"">or SEQUENCE SIZE =
that appears in the ASN.1 structure. &nbsp;It's possible<br =
class=3D"">that i'm particularly dense, but i doubt i'll be the only =
person in this<br class=3D"">situation.<br class=3D""><br class=3D"">I'm =
not saying that this draft should change the wire format. &nbsp;I'm<br =
class=3D"">saying that the draft could be much clearer about the =
rationale for each<br class=3D"">layer of arbitrary SEQUENCE. &nbsp;Some =
of them are for different semantics<br class=3D"">of multimedia (the =
"SEQUENCE OF" in communityLogos or otherLogos); some<br class=3D"">of =
them are for differently-formatted variants of the same underlying<br =
class=3D"">visual or acoustic pattern (the "SEQUENCE OF" in =
LogotypeData); some of<br class=3D"">them are for different places to =
try fetching the same underlying octet<br class=3D"">stream (the =
"SEQUENCE SIZE"s in LogotypeReference or LogotypeDetails).<br =
class=3D"">Is that it?<br =
class=3D""></div></div></div></div></blockquote><div><br =
class=3D""></div>At the top:</div><div><br =
class=3D""></div><div><div>&nbsp; &nbsp;LogotypeExtn ::=3D SEQUENCE =
{</div><div>&nbsp; &nbsp; &nbsp; communityLogos &nbsp;[0] EXPLICIT =
SEQUENCE OF LogotypeInfo OPTIONAL,</div><div>&nbsp; &nbsp; &nbsp; =
issuerLogo &nbsp; &nbsp; &nbsp;[1] EXPLICIT LogotypeInfo =
OPTIONAL,</div><div>&nbsp; &nbsp; &nbsp; subjectLogo &nbsp; &nbsp; [2] =
EXPLICIT LogotypeInfo OPTIONAL,</div><div>&nbsp; &nbsp; &nbsp; =
otherLogos &nbsp; &nbsp; &nbsp;[3] EXPLICIT SEQUENCE OF =
OtherLogotypeInfo</div><div>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;OPTIONAL =
}</div><div><br class=3D""></div><div>All of them are available for =
display. &nbsp;Ii is all oc the communities that are associated with =
this certificate, the issuer, the subject, and all of the other logos =
that are associated with the certificate.</div><div><br =
class=3D""></div><div>I have not seen an actual certificate that uses =
all of this capability, but more of this capability could be used as =
logos become more prevalent.</div><div><br class=3D""></div><div><br =
class=3D""></div><div>Deeper in the structure:</div><div><br =
class=3D""></div><div><div>&nbsp; &nbsp;LogotypeData ::=3D SEQUENCE =
{</div><div>&nbsp; &nbsp; &nbsp; image &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; SEQUENCE OF LogotypeImage OPTIONAL,</div><div>&nbsp; &nbsp; =
&nbsp; audio &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; [1] SEQUENCE OF =
LogotypeAudio OPTIONAL }</div><div><br class=3D""></div><div>Choose one =
image and one audio.</div><div><br class=3D""></div></div><blockquote =
type=3D"cite" class=3D""><div class=3D""><div class=3D""><div =
class=3D"protected-part"><div class=3D"protected-content">If so, a clear =
summary or a set of examples that exercise each sequence<br =
class=3D"">would be a useful thing in the document.<br =
class=3D""></div></div></div></div></blockquote><div><br =
class=3D""></div>I think I can do that. &nbsp;I'll try to find the =
time.</div><div><br class=3D""></div><div>Will an example that has two =
community logos (both to be displayed) and two subject logos (one to be =
displayed) be good enough to make this point? &nbsp;Of course, they will =
all be bogus URLs under <a href=3D"http://example.com" =
class=3D"">example.com</a>, <a href=3D"http://example.net" =
class=3D"">example.net</a>, and <a href=3D"http://example.org" =
class=3D"">example.org</a>.</div><div><br class=3D""><blockquote =
type=3D"cite" class=3D""><div class=3D""><div class=3D""><div =
class=3D"protected-part"><div class=3D"protected-content"><blockquote =
type=3D"cite" class=3D"">While the privacy improvements in TLS 1.3 are =
important, the Web PKI<br class=3D"">has seen no adoption of RFC =
3709.<br class=3D""></blockquote><br class=3D"">If you don't expect this =
to be in the WebPKI, then i think it might be<br class=3D"">useful for =
the document to observe some specific contexts where this<br =
class=3D"">mechanism is concretely useful.<br class=3D""><br class=3D"">I =
also note that TLS 1.3 is not exclusively used by the Web.<br =
class=3D""></div></div></div></div></blockquote><div><br =
class=3D""></div>Of course TLS 1.3 is used many places beyond the =
Web.</div><div><br class=3D""></div><div>I am not opposed to logotypes =
being used in the Web, but it has not happened so far.</div><div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D""><div =
class=3D""><div class=3D"protected-part"><div =
class=3D"protected-content"><blockquote type=3D"cite" =
class=3D""><blockquote type=3D"cite" class=3D"">draft-ietf-lamps-samples =
is now RFC 9216. &nbsp;Please include some full<br class=3D"">X.509 test =
vectors.<br class=3D""></blockquote><br class=3D"">Some implementers =
that have found these examples sufficient. &nbsp;I'd like<br class=3D"">to=
 hear from an implementer that the additional work would really be<br =
class=3D"">helpful before putting in the effort.<br =
class=3D""></blockquote><br class=3D"">I don't think i've heard from any =
implementers at all, at least in<br class=3D"">on-list discussion, =
though i might have missed it. &nbsp;Can you help me<br =
class=3D"">understand what effort is involved in including test vectors? =
&nbsp;I would<br class=3D"">assume that any implementer -- of tooling =
for a CA, relying party, or<br class=3D"">subscriber -- has test vectors =
of their own for their own internal<br class=3D"">testing. &nbsp;And =
presumably an easy way to generate such a thing as well.<br class=3D"">Can=
 we not just reuse one of those? &nbsp;Is there any reason to think that =
a<br class=3D"">sample certificate itself would be proprietary?<br =
class=3D""></div></div></div></div></blockquote><div><br =
class=3D""></div>There are implementations. &nbsp;I took this posting to =
be a public indication of an implementation:</div><div><br =
class=3D""></div><div><a =
href=3D"https://mailarchive.ietf.org/arch/search/?qdr=3Da&amp;start_date=3D=
&amp;end_date=3D&amp;email_list=3Dspasm&amp;q=3Dfrom:(Corey)&amp;as=3D1" =
class=3D"">https://mailarchive.ietf.org/arch/search/?qdr=3Da&amp;start_dat=
e=3D&amp;end_date=3D&amp;email_list=3Dspasm&amp;q=3Dfrom%3A%28Corey%29&amp=
;as=3D1</a></div><div><br class=3D""></div><div><blockquote type=3D"cite" =
class=3D""><div class=3D""><div class=3D""><div =
class=3D"protected-part"><div class=3D"protected-content"><blockquote =
type=3D"cite" class=3D""><blockquote type=3D"cite" class=3D""><blockquote =
type=3D"cite" class=3D"">v) "5. Type of Certificates" says:<br =
class=3D""><br class=3D""> &nbsp;&nbsp;&nbsp;logotypes MUST NOT be part =
of certification path validation or any<br class=3D""> =
&nbsp;&nbsp;&nbsp;type of automated processing.<br class=3D""><br =
class=3D""> &nbsp;but this seems to be in conflict with requirements =
like "The<br class=3D""> &nbsp;background image MUST allow black text to =
be clearly read when placed<br class=3D""> &nbsp;on top of the =
background image." which would presumably be enforced<br class=3D""> =
&nbsp;by the certificate issuer via automated processing.<br =
class=3D""><br class=3D""> &nbsp;Perhaps this is supposed to mean "any =
type of automated processing by<br class=3D""> &nbsp;the relying party" =
or "any type of automated processing during<br class=3D""> =
&nbsp;certificate validation"?<br class=3D""></blockquote><br =
class=3D"">This item (v) is also still not addressed. &nbsp;Are we =
really saying that an<br class=3D"">issuer MUST NOT attempt to confirm =
(for example) that two formats of<br class=3D"">visual representation =
are actually roughly visually similar, using (for<br class=3D"">example) =
a conversion to raw pixels and then some sort of distance metric?<br =
class=3D""></blockquote><br class=3D"">I think you are misreading this =
one. &nbsp;Path validation is specified in<br class=3D"">Section 6 or =
RFC 5280. &nbsp;I'll add an explicit reference. &nbsp;This is not<br =
class=3D"">saying anything whatsoever about the vetting that a CA might =
perform<br class=3D"">prior to including the logotype data in the =
certificate.<br class=3D""></blockquote><br class=3D"">The text just =
says "or any type of automated processing", in addition to<br =
class=3D"">certification path validation. &nbsp;This is one of several =
examples in the<br class=3D"">document where the document appears to =
implicitly refer to one<br class=3D"">particular party involved with a =
certificate (in this case, the relying<br class=3D"">party) but not =
considering how the text reads in the context of one of<br class=3D"">the =
other parties involved (e.g. the subscriber, the issuing authority,<br =
class=3D"">the resource host, an implementer, etc).<br class=3D""><br =
class=3D"">That potential confusion makes it difficult to apply the =
document.<br class=3D"">Being explicit would be make it easier to use =
safely.<br class=3D""></div></div></div></div></blockquote><div><br =
class=3D""></div>I am very confused by this comment. &nbsp;Only relying =
parties perform certificate path construction and =
validation.</div><div><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D""><div class=3D""><div =
class=3D"protected-part"><div class=3D"protected-content"><blockquote =
type=3D"cite" class=3D"">There already are subsections for each of the =
otherType OIDs.<br class=3D""><br class=3D"">There is really one =
paragraph that for each of the the "three standard<br class=3D"">logotype =
types". I cannot see how making those subsections would be<br =
class=3D"">helpful.<br class=3D""></blockquote><br class=3D"">Having an =
explicit subsection (even if it contains only a single<br =
class=3D"">paragraph) per logotype context makes it easier for people to =
refer to<br class=3D"">them in discussions, or in comments in an =
implementation.<br class=3D""><br class=3D"">It also makes a glance at =
the table of contents more informative, as the<br class=3D"">most =
prominent contextual uses are more visible, which in turn makes the<br =
class=3D"">document easier to follow.<br class=3D""><br class=3D"">I =
can't see the downside to a clearer document structure.<br =
class=3D""></div></div></div></div></blockquote></div><br =
class=3D""></div><div class=3D"">As I already said at the top of this =
message, it helps with the diff. &nbsp;The simple diff helps people that =
already implemented RFC 3709.</div><div class=3D""><br =
class=3D""></div><div class=3D"">Russ</div><div class=3D""><br =
class=3D""></div><div class=3D""><br class=3D""></div></body></html>=

--Apple-Mail=_3B814415-3C5F-4C5D-94EC-7DB6998DAB9C--

