Re: [lamps] Revocation Request Format?

Ryan Sleevi <ryan-ietf@sleevi.com> Sat, 03 March 2018 18:34 UTC

Return-Path: <ryan-ietf@sleevi.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7BA9D1204DA for <spasm@ietfa.amsl.com>; Sat, 3 Mar 2018 10:34:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=sleevi.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SodtCDoAVAKZ for <spasm@ietfa.amsl.com>; Sat, 3 Mar 2018 10:34:17 -0800 (PST)
Received: from homiemail-a102.g.dreamhost.com (sub4.mail.dreamhost.com [69.163.253.135]) (using TLSv1.1 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2822D126D05 for <SPASM@ietf.org>; Sat, 3 Mar 2018 10:34:13 -0800 (PST)
Received: from homiemail-a102.g.dreamhost.com (localhost [127.0.0.1]) by homiemail-a102.g.dreamhost.com (Postfix) with ESMTP id BA3CD20047604 for <SPASM@ietf.org>; Sat, 3 Mar 2018 10:34:12 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sleevi.com; h=mime-version :references:in-reply-to:from:date:message-id:subject:to:cc :content-type; s=sleevi.com; bh=1R7iWHD8M7+oYb85sOQjCUGlQ+o=; b= HKMBh1v4O2MHYbhQAeCN5TDj2iF5Myp3/rZAbFwrY226Ew/f5x9LVBVXnos/Xdf9 k2WDcLl7JEOplK831ABPDeyjq+3w+e4O/k9r/kuW4ioQk3I5OGNcBW39kMvs5IDk t3Jr20BN4RgV/1MseP/Ohnwekg21VjJ4wDKZehu60jE=
Received: from mail-io0-f169.google.com (mail-io0-f169.google.com [209.85.223.169]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: ryan@sleevi.com) by homiemail-a102.g.dreamhost.com (Postfix) with ESMTPSA id 5E51F201702C2 for <SPASM@ietf.org>; Sat, 3 Mar 2018 10:34:12 -0800 (PST)
Received: by mail-io0-f169.google.com with SMTP id u84so13882123iod.9 for <SPASM@ietf.org>; Sat, 03 Mar 2018 10:34:12 -0800 (PST)
X-Gm-Message-State: AElRT7F/8+XfF7zybewtpAFO4Ua2xFXvFObjHdVay6/B87oJA139+bnM repa+DKSbJU/qJYUciUX8Xg00rEjBzcUWsW8FWY=
X-Google-Smtp-Source: AG47ELsdZeoY79zY6/SrUtNrhRkpD4uo83vj6qcYBabZjJmR3ejYebNB+3usFFZiFUKrt20zmVusZ40V6F1pn8vemsE=
X-Received: by 10.107.44.68 with SMTP id s65mr11934749ios.159.1520102051724; Sat, 03 Mar 2018 10:34:11 -0800 (PST)
MIME-Version: 1.0
References: <CAMm+LwjAP78hNL9Yaxqaf4K9RHYGk4M8ayJjCWt=F3_VN28cFQ@mail.gmail.com> <CAErg=HEK0aJm+Xb06px=vmfpyESetdRpe2x=q+Wca=9J8nErmw@mail.gmail.com> <CAK6vND8p55yNVoXO6_eJs1ooodVBAFZovJ84ou6uj_4qHt5DGA@mail.gmail.com> <CAMm+LwjKKqaG+OjSw3KaSvwymy6mvvyEDx1sMp2EGqXqvPSdjA@mail.gmail.com> <CAErg=HFBWaSV5-mJCBO8fLP3esfnseiqqJ_Fh1x78BW9=P-kUQ@mail.gmail.com> <26f237b9-bbe6-6efe-2a43-394d44e8334c@cs.tcd.ie> <CAErg=HH+B5+DcvPfUixy-3egm3zdhGjMangtAL0wixKE5PVkzw@mail.gmail.com> <62156108-02c7-054e-1311-855636e3fb52@cs.tcd.ie> <CAMm+LwixRjab9fWRYYzx_WJEMh-wua68tjxkVmHdjJVJkL8OQw@mail.gmail.com>
In-Reply-To: <CAMm+LwixRjab9fWRYYzx_WJEMh-wua68tjxkVmHdjJVJkL8OQw@mail.gmail.com>
From: Ryan Sleevi <ryan-ietf@sleevi.com>
Date: Sat, 03 Mar 2018 18:34:00 +0000
X-Gmail-Original-Message-ID: <CAErg=HE8jLA3ANJhwPw-zDhKaoqp7AnDRNRwaU0i332vuOTwHw@mail.gmail.com>
Message-ID: <CAErg=HE8jLA3ANJhwPw-zDhKaoqp7AnDRNRwaU0i332vuOTwHw@mail.gmail.com>
To: Phillip Hallam-Baker <phill@hallambaker.com>
Cc: Peter Bowen <pzbowen@gmail.com>, Ryan Sleevi <ryan-ietf@sleevi.com>, SPASM <SPASM@ietf.org>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
Content-Type: multipart/alternative; boundary="001a1139818cd0c3d205668656bb"
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/d4d3cv65RzJ1nxwmnpNWgXZUNos>
Subject: Re: [lamps] Revocation Request Format?
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 03 Mar 2018 18:34:20 -0000

On Sat, Mar 3, 2018 at 12:07 PM Phillip Hallam-Baker <phill@hallambaker.com>
wrote:

> On Sat, Mar 3, 2018 at 1:29 AM, Stephen Farrell <stephen.farrell@cs.tcd.ie
> > wrote:
>
>>
>>
>> On 02/03/18 22:33, Ryan Sleevi wrote:
>> > That's why I think an effort to standardize there is bad, not good,
>> because
>> > it counterintuitively fragments the ecosystem, without addressing the
>> > general issue, which is in my view is moreso a matter of policy,
>> because of
>> > the inherent constraints of 2).
>>
>> FWIW, I don't agree with your conclusion that *any* standardisation
>> of revocation signals would be counter-productive, but I also don't
>> think we ought do any such standardisation unless there are a bunch
>> of CAs and writers of private key handling s/w who do in fact want
>> to use the same new format for revocation signalling. I don't see a
>> whole bunch of CAs and others wanting that right now.
>>
>> So in the short term, I think we agree as to what to (not) do:-)
>>
>
> ​At this point, the incident that motivated this proposal happened 4 days
> ago. So it would probably be a mistake to bang out a draft and promote it
> to RFC.​
>
> ​What I was most interested to know is if we had done the work already and
> the answer appears to be not in PKIX​ but possibly in ACME. It might just
> be that all we need to do is to add a few paragraphs to ACME and maybe get
> an IANA content type for whatever the standalone message blob is.
>
>
> I do think we will need to standardize because we are almost certain to
> want to pop these blobs in our CT logs at some point and it is in any case
> the right thing to do. One code path is always better than five code paths
> offering the same functionality.
>

It might be good to start with a Use Cases document first, to figure out
who the participants/constituents would be. This would align with Stephen’s
remark re: what writers of private key handling s/w should use. Considering
such solutions naturally preclude solving (some of) the “compromise”
scenarios that must be dealt with today, the merits of those use cases
could be independently evaluated before trying to shape such work.

I view the transparency aspect as similarly orthogonal - such transparency
is more beneficial for demonstrating the private key holder authorized a
revocation. In today’s Web PKI, that is a real problem with CAs
unilaterally revoking for specious reasons (“malware”, “customer stopped
paying monthly fee”, “we added a new domain name to the customer account”)
or Resellers, often misguided, requesting revocation per the terms of their
contract with the CA without regard to whether or not the Certificate
recipient desires it.

>