Return-Path: <hallam@gmail.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
 by ietfa.amsl.com (Postfix) with ESMTP id 0198B124217;
 Wed, 23 May 2018 18:22:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.402
X-Spam-Level: 
X-Spam-Status: No, score=-1.402 tagged_above=-999 required=5
 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
 FREEMAIL_FORGED_FROMDOMAIN=0.248, FREEMAIL_FROM=0.001,
 HEADER_FROM_DIFFERENT_DOMAINS=0.248, HTML_MESSAGE=0.001,
 RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001]
 autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key)
 header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44])
 by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id HrgE5COq54Nz; Wed, 23 May 2018 18:22:18 -0700 (PDT)
Received: from mail-ot0-x232.google.com (mail-ot0-x232.google.com
 [IPv6:2607:f8b0:4003:c0f::232])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (No client certificate requested)
 by ietfa.amsl.com (Postfix) with ESMTPS id 88B6C1289B0;
 Wed, 23 May 2018 18:22:18 -0700 (PDT)
Received: by mail-ot0-x232.google.com with SMTP id h8-v6so27516208otb.2;
 Wed, 23 May 2018 18:22:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; 
 h=mime-version:sender:in-reply-to:references:from:date:message-id
 :subject:to:cc;
 bh=kcOHHDm6TAnbHMzgvo5FmF/j9LwqnTogzSKbI3c70rI=;
 b=BIGogw8pyvQTuwF0wtjmHXYtYlar86nm0QZjnXZzXoI34oF+i6G7dl6dw5cXws6lBd
 YklcZfCJjnFbGZb62ugj6uQ/3Cc1K4we4/lCRetO36HaxT/84SEO1iXD+MK+Csk+udGu
 ZyLnZL3Yl2f71PJGvGwbh1cNz3eT4xIUJXlYdyg/uhg+RQ6JtNw/ci3JQepJjU2twwL7
 6a8TGFwP8BX8yBpKC3+Bw16o2HRbAblLUai9tFxCZQav3iQErkE2E2ayyOiCq8YQzlkf
 0m2VEp/JqEzapNvxH/GCvUwUcW3+HmSHiVM/2Xfe4VEjc2km26SAgVpBAQHCtVaPVJvT
 zE+g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:sender:in-reply-to:references:from
 :date:message-id:subject:to:cc;
 bh=kcOHHDm6TAnbHMzgvo5FmF/j9LwqnTogzSKbI3c70rI=;
 b=jmHy3gy0wBVGgelnBytXwnT8Mp9UAxifoWo72NldsR6yvGr4qCOhI5uKcLlEpGURVP
 kp7///et6h8WgOzOABW3WHyBtvgRZ+vjoSceHAZO4YFnOZbcX0sZI6KhU5a1Tfk+uje1
 4vYbAx1YSVP6BXJg0mtLPC51DzS7hPX5TUUwDD5Ojk1N23dzuxyWRtqjjjiEYeMvKlwM
 GppPCUjtIYJoo1iWTzWucQ8WYPoanWm/iidJdRWfXIxWPESSJ+Ycm/MB2we8A9ezStaF
 n9PnRpFtR+K13tqCrHxi62+Q8EaWuvHZMdtvkaDvzZT/RamWTgrbpBSjOFMVgJKgTD1S
 j6wA==
X-Gm-Message-State: ALKqPwcC49Bs0z4YF25J2HvbFLHffVt/v9z4+9oLzZL9/mE32lrIJsQr
 s+9h2Yy6hNJ5DdO0r+J83/Bb1rjUG84cqAWFmE0=
X-Google-Smtp-Source: AB8JxZom0e/SZv2vzjpHF6GqbIcBUhxutnOo35C10Gw3RwLr2UlEaIuYD1gS9CWbilpZtsQwZWtMxRvcMt5GpWfjKaU=
X-Received: by 2002:a9d:2511:: with SMTP id
 k17-v6mr3043074otb.129.1527124937737; 
 Wed, 23 May 2018 18:22:17 -0700 (PDT)
MIME-Version: 1.0
Sender: hallam@gmail.com
Received: by 2002:a9d:23:0:0:0:0:0 with HTTP;
 Wed, 23 May 2018 18:22:17 -0700 (PDT)
In-Reply-To: <CAHw9_i+uZr2h6hss89kOX6ig-hC+J6vtDrZLGD1p1AddYn=jTw@mail.gmail.com>
References: <152709543734.26876.14669273511731581188.idtracker@ietfa.amsl.com>
 <64EA6F18-9275-40FC-8FDE-3E12C4458EFB@gmail.com>
 <CAHw9_iJSB2Ui03+-JOtpfXEotqm_2Pm91gpaFbwtx=LbKgQ_Tw@mail.gmail.com>
 <C3E03496-0C4F-41D2-8927-9BE57512F5C2@vigilsec.com>
 <CAHw9_i+uZr2h6hss89kOX6ig-hC+J6vtDrZLGD1p1AddYn=jTw@mail.gmail.com>
From: Phillip Hallam-Baker <phill@hallambaker.com>
Date: Wed, 23 May 2018 21:22:17 -0400
X-Google-Sender-Auth: cD2GCA6Rn9i7DwIZECvXXGNS01w
Message-ID: <CAMm+LwjuX53bYERBoSFKfEGpwqa+FtCgjoSJXdCK4MDXQY8U1Q@mail.gmail.com>
To: Warren Kumari <warren@kumari.net>
Cc: Russ Housley <housley@vigilsec.com>, SPASM <spasm@ietf.org>,
 lamps-chairs@ietf.org, 
 The IESG <iesg@ietf.org>, Yoav Nir <ynir.ietf@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000710b41056ce97b19"
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/ewsDCv0loXmy_ifI8wNfCqvHKs0>
Subject: Re: [lamps] Warren Kumari's Block on charter-ietf-lamps-02-00:
 (with BLOCK and COMMENT)
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime
 \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>,
 <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>,
 <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 May 2018 01:22:21 -0000

--000000000000710b41056ce97b19
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Wed, May 23, 2018 at 5:08 PM, Warren Kumari <warren@kumari.net> wrote:

>
>
> On Wed, May 23, 2018 at 3:53 PM Russ Housley <housley@vigilsec.com> wrote=
:
>
>> Please see my response at the bottom of the message ...
>>
>>
> =E2=80=8B... and mine even further down :-)=E2=80=8B
>
>> On May 23, 2018, at 3:31 PM, Warren Kumari <warren@kumari.net> wrote:
>>
>> On Wed, May 23, 2018 at 1:39 PM Yoav Nir <ynir.ietf@gmail.com> wrote:
>>
>>> Hi Warren.
>>>
>>> Since it was my draft and presentation at SecDispatch that led to this
>>> item, I feel I can answer this.  Inline.
>>>
>>> > On 23 May 2018, at 20:10, Warren Kumari <warren@kumari.net> wrote:
>>> >
>>> > Warren Kumari has entered the following ballot position for
>>> > charter-ietf-lamps-02-00: Block
>>> >
>>> > When responding, please keep the subject line intact and reply to all
>>> > email addresses included in the To and CC lines. (Feel free to cut th=
is
>>> > introductory paragraph, however.)
>>> >
>>> >
>>> >
>>> > The document, along with other ballot positions, can be found here:
>>> > https://datatracker.ietf.org/doc/charter-ietf-lamps/
>>> >
>>> >
>>> >
>>> > ---------------------------------------------------------------------=
-
>>> > BLOCK:
>>> > ---------------------------------------------------------------------=
-
>>> >
>>> > "3. Specify the use of short-lived X.509 certificates for which no
>>> > revocation information is made available by the Certification
>>> Authority.
>>> > Short-lived certificates have a lifespan that is shorter than the tim=
e
>>> > needed to detect, report, and distribute revocation information, as a
>>> > result revoking them pointless."
>>> >
>>> > This makes me twitch -- how short is "short=E2=80=9D?
>>>
>>> [YN] I expect this to be contentious within the working group, and I
>>> expect the exact cut-off point to be different from one use-case to
>>> another. For highly reliable systems with good clock synchronization
>>> =E2=80=9Cshort=E2=80=9D could be as low as an hour. For typical systems=
 I think the likely
>>> lifetime will be between 1 day and 1 week.  IMHO it=E2=80=99s valid for=
 the working
>>> group to leave the cut-off between =E2=80=9Cshort=E2=80=9D and =E2=80=
=9Cnot short=E2=80=9D to per-domain
>>> profiles, but I don=E2=80=99t think anything beyond 2 weeks would ever =
count as
>>> short.
>>>
>>> > And how long is the time to
>>> > "detect, report, and distribute revocation information"? With e.g: CT=
,
>>> > misissued certificates may be visible before they are used in an
>>> attack,
>>> > decreasing the detection time.
>>>
>>> [YN] Someone needs to see the certificate to add it to the log, and
>>> someone needs to find the certificate on the log and understand that it=
 is
>>> mis-issued. And then someone needs to add it to the CRL / database that
>>> feeds the OCSP responder. And when this is updated, relying parties may
>>> have cached copies of older revocation information. Add it up and it ca=
n
>>> take days on the web.  In closed environments there may not be CT at al=
l.
>>>
>>>
>> =E2=80=8BSo, here you say: "Add it up and it can take days on the web." =
and
>> above that you say: "For typical systems I think the likely lifetime wil=
l
>> be between 1 day and 1 week.  [...] , but I don=E2=80=99t think anything=
 beyond 2
>> weeks would ever count as short."
>>
>> "1 week" minus "days" is still greater than zero, and so it still *seems=
*
>> to me that removing revocation is a bad idea -- but, my role is (or shou=
ld
>> be!) to make sure that this charter doesn't conflict with other work (es=
p.
>> ops work), that the charter "describes the specific problem or deliverab=
les
>> (a guideline, standards specification, etc.) it has been formed to addre=
ss.
>> WG charters state the scope of work for group, and lay out goals and
>> milestones that show how this work will be completed." It is (IMO) the
>> sponsoring ADs, the WGs and IETFs decision as to if the ideas themselves
>> are acceptable.
>> I'm not (yet!) so arrogant that I'm sure I know the right answer to
>> everything, so I'd like to discuss this with EKR on the call tomorrow, a=
nd
>> will clear my block once I've been assured process is being followed
>> / this has been considered.
>>
>>
>> Warren:
>>
>> I think the point you are missing is that it take time to process
>> revocation and get the CRL published or OCSP responder updated.  This is
>> always over a week because people do not revoke without doing due
>> diligence.  So, letting the short-lived certificate expire without issui=
ng
>> a replacement will actually cause revocation to happen more quickly.
>>
>>
> =E2=80=8BI remain unconvinced -- some years ago I purchased a =E2=80=8BDV=
 cert and, though
> a series of stupidly I managed to delete the private key[0]. The CA /
> reseller I was using had a friendly "Revoke" button which let me upload a
> new CSR and get a new cert within a few minutes. I'll happily admit that =
I
> didn't check if they actually added the old one to a CRL, a: I assumed th=
at
> they did and b: they did let me reissue without more $$$ - which was the
> only bit I actually cared about :-).
>
> Now that I've finished writing this it feels somewhat like: "I just the
> other day got=E2=80=A6 an Internet was sent by my staff at 10 o'clock in =
the
> morning on Friday. I got it yesterday [Tuesday]. Why? Because it got
> tangled up with all these things going on the Internet commercially." - T=
ed
> Stevens.
>
> W
> [0]: ejabberd wants the key, cert and intermediate certs all in a single
> .pem file -- while trying to make this I managed to overwrite the key  (I
> did 'cp * > kumari.net-combined.pem' instead of 'cat * >
> kumari.net-combined.pem')
>


=E2=80=8BRevocation at the request of the subject is easy to automate becau=
se they
gave consent.

Revocation for breach of terms of service is much more involved. The
complaint may be valid or it may be a DoS attack on the site. =E2=80=8B

--000000000000710b41056ce97b19
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_default" style=3D"font-size:small"><br=
></div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Wed, Ma=
y 23, 2018 at 5:08 PM, Warren Kumari <span dir=3D"ltr">&lt;<a href=3D"mailt=
o:warren@kumari.net" target=3D"_blank">warren@kumari.net</a>&gt;</span> wro=
te:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-=
left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr"><div style=3D"font-f=
amily:verdana,sans-serif"><br></div><br><div class=3D"gmail_quote"><span cl=
ass=3D""><div dir=3D"ltr">On Wed, May 23, 2018 at 3:53 PM Russ Housley &lt;=
<a href=3D"mailto:housley@vigilsec.com" target=3D"_blank">housley@vigilsec.=
com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"marg=
in:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1e=
x"><div style=3D"word-wrap:break-word">Please see my response at the bottom=
 of the message ...<div><br></div></div></blockquote><div><br></div></span>=
<div style=3D"font-family:verdana,sans-serif">=E2=80=8B... and mine even fu=
rther down :-)=E2=80=8B</div><div><div class=3D"h5"><blockquote class=3D"gm=
ail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,=
204,204);padding-left:1ex"><div style=3D"word-wrap:break-word"><div><div><b=
lockquote type=3D"cite"><div>On May 23, 2018, at 3:31 PM, Warren Kumari &lt=
;<a href=3D"mailto:warren@kumari.net" target=3D"_blank">warren@kumari.net</=
a>&gt; wrote:</div><div><div dir=3D"ltr"><br><div class=3D"gmail_quote"><di=
v dir=3D"ltr">On Wed, May 23, 2018 at 1:39 PM Yoav Nir &lt;<a href=3D"mailt=
o:ynir.ietf@gmail.com" target=3D"_blank">ynir.ietf@gmail.com</a>&gt; wrote:=
<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8=
ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Hi Warren.<br>
<br>
Since it was my draft and presentation at SecDispatch that led to this item=
, I feel I can answer this.=C2=A0 Inline.<br>
<br>
&gt; On 23 May 2018, at 20:10, Warren Kumari &lt;<a href=3D"mailto:warren@k=
umari.net" target=3D"_blank">warren@kumari.net</a>&gt; wrote:<br>
&gt; <br>
&gt; Warren Kumari has entered the following ballot position for<br>
&gt; charter-ietf-lamps-02-00: Block<br>
&gt; <br>
&gt; When responding, please keep the subject line intact and reply to all<=
br>
&gt; email addresses included in the To and CC lines. (Feel free to cut thi=
s<br>
&gt; introductory paragraph, however.)<br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; The document, along with other ballot positions, can be found here:<br=
>
&gt; <a href=3D"https://datatracker.ietf.org/doc/charter-ietf-lamps/" rel=
=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/<wbr>doc/cha=
rter-ietf-lamps/</a><br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; ------------------------------<wbr>------------------------------<wbr>=
----------<br>
&gt; BLOCK:<br>
&gt; ------------------------------<wbr>------------------------------<wbr>=
----------<br>
&gt; <br>
&gt; &quot;3. Specify the use of short-lived X.509 certificates for which n=
o<br>
&gt; revocation information is made available by the Certification Authorit=
y.<br>
&gt; Short-lived certificates have a lifespan that is shorter than the time=
<br>
&gt; needed to detect, report, and distribute revocation information, as a<=
br>
&gt; result revoking them pointless.&quot;<br>
&gt; <br>
&gt; This makes me twitch -- how short is &quot;short=E2=80=9D?<br>
<br>
[YN] I expect this to be contentious within the working group, and I expect=
 the exact cut-off point to be different from one use-case to another. For =
highly reliable systems with good clock synchronization =E2=80=9Cshort=E2=
=80=9D could be as low as an hour. For typical systems I think the likely l=
ifetime will be between 1 day and 1 week.=C2=A0 IMHO it=E2=80=99s valid for=
 the working group to leave the cut-off between =E2=80=9Cshort=E2=80=9D and=
 =E2=80=9Cnot short=E2=80=9D to per-domain profiles, but I don=E2=80=99t th=
ink anything beyond 2 weeks would ever count as short.<br>
<br>
&gt; And how long is the time to<br>
&gt; &quot;detect, report, and distribute revocation information&quot;? Wit=
h e.g: CT,<br>
&gt; misissued certificates may be visible before they are used in an attac=
k,<br>
&gt; decreasing the detection time.<br>
<br>
[YN] Someone needs to see the certificate to add it to the log, and someone=
 needs to find the certificate on the log and understand that it is mis-iss=
ued. And then someone needs to add it to the CRL / database that feeds the =
OCSP responder. And when this is updated, relying parties may have cached c=
opies of older revocation information. Add it up and it can take days on th=
e web.=C2=A0 In closed environments there may not be CT at all.=C2=A0 <br>
<br></blockquote><div><br></div><div><div><font face=3D"verdana, sans-serif=
">=E2=80=8B</font>So, here you say: &quot;Add it up and it can take days on=
 the web.&quot; and above that you say: &quot;For typical systems I think t=
he likely lifetime will be between 1 day and 1 week. =C2=A0[...] , but I do=
n=E2=80=99t think anything beyond 2 weeks would ever count as short.&quot;<=
br><br>&quot;1 week&quot; minus &quot;days&quot; is still greater than zero=
, and so it still *seems* to me that removing revocation is a bad idea -- b=
ut, my role is (or should be!) to make sure that this charter doesn&#39;t c=
onflict with other work (esp. ops work), that the charter &quot;describes t=
he specific problem or deliverables (a guideline, standards specification, =
etc.) it has been formed to address. WG charters state the scope of work fo=
r group, and lay out goals and milestones that show how this work will be c=
ompleted.&quot; It is (IMO) the sponsoring ADs, the WGs and IETFs decision =
as to if the ideas themselves are acceptable.</div>I&#39;m not (yet!) so ar=
rogant that I&#39;m sure I know the right answer to everything, so I&#39;d =
like to discuss this with EKR on the call tomorrow, and will clear my block=
 once I&#39;ve been assured process is being followed<br>/ this has been co=
nsidered.</div></div></div></div></blockquote><div><br></div>Warren:</div><=
div><br></div><div>I think the point you are missing is that it take time t=
o process revocation and get the CRL published or OCSP responder updated.=
=C2=A0 This is always over a week because people do not revoke without doin=
g due diligence.=C2=A0 So, letting the short-lived certificate expire witho=
ut issuing a replacement will actually cause revocation to happen more quic=
kly.</div><div><br></div></div></div></blockquote><div><br></div></div></di=
v><div><div style=3D"font-family:verdana,sans-serif">=E2=80=8BI remain unco=
nvinced -- some years ago I purchased a =E2=80=8BDV cert and, though a seri=
es of stupidly I managed to delete the private key[0]. The CA / reseller I =
was using had a friendly &quot;Revoke&quot; button which let me upload a ne=
w CSR and get a new cert within a few minutes. I&#39;ll happily admit that =
I didn&#39;t check if they actually added the old one to a CRL, a: I assume=
d that they did and b: they did let me reissue without more $$$ - which was=
 the only bit I actually cared about :-).</div></div><div style=3D"font-fam=
ily:verdana,sans-serif"><br></div><div style=3D"font-family:verdana,sans-se=
rif">Now that I&#39;ve finished writing this it feels somewhat like: &quot;=
I just the other day got=E2=80=A6 an Internet was sent by my staff at 10 o&=
#39;clock in the morning on Friday. I got it yesterday [Tuesday]. Why? Beca=
use it got tangled up with all these things going on the Internet commercia=
lly.&quot; - Ted Stevens.</div><div style=3D"font-family:verdana,sans-serif=
"><br></div><div style=3D"font-family:verdana,sans-serif">W</div><div style=
=3D"font-family:verdana,sans-serif">[0]: ejabberd wants the key, cert and i=
ntermediate certs all in a single .pem file -- while trying to make this I =
managed to overwrite the key=C2=A0 (I did &#39;cp * &gt; kumari.net-combine=
d.pem&#39; instead of &#39;cat * &gt; <span style=3D"color:rgb(34,34,34);fo=
nt-family:verdana,sans-serif;font-size:13px;font-style:normal;font-variant-=
ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:no=
rmal;text-align:start;text-indent:0px;text-transform:none;white-space:norma=
l;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:=
initial;text-decoration-color:initial;float:none;display:inline">kumari.net=
-combined.pem</span>&#39;)</div></div></div></blockquote><div><br></div><di=
v><br></div><div><div class=3D"gmail_default" style=3D"font-size:small">=E2=
=80=8BRevocation at the request of the subject is easy to automate because =
they gave consent.</div><div class=3D"gmail_default" style=3D"font-size:sma=
ll"><br></div><div class=3D"gmail_default" style=3D"font-size:small">Revoca=
tion for breach of terms of service is much more involved. The complaint ma=
y be valid or it may be a DoS attack on the site. =E2=80=8B</div><br></div>=
<div><br></div><div>=C2=A0</div></div></div></div>

--000000000000710b41056ce97b19--

