Re: [lamps] Warren Kumari's Block on charter-ietf-lamps-02-00: (with BLOCK and COMMENT)

Russ Housley <housley@vigilsec.com> Wed, 23 May 2018 20:00 UTC

Return-Path: <housley@vigilsec.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 91DC71277BB for <spasm@ietfa.amsl.com>; Wed, 23 May 2018 13:00:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vJmRb-dlVynU for <spasm@ietfa.amsl.com>; Wed, 23 May 2018 13:00:09 -0700 (PDT)
Received: from mail.smeinc.net (mail.smeinc.net [209.135.209.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6D608127010 for <spasm@ietf.org>; Wed, 23 May 2018 13:00:09 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.smeinc.net (Postfix) with ESMTP id A0E52300A23 for <spasm@ietf.org>; Wed, 23 May 2018 15:53:41 -0400 (EDT)
X-Virus-Scanned: amavisd-new at mail.smeinc.net
Received: from mail.smeinc.net ([127.0.0.1]) by localhost (mail.smeinc.net [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id 0ehtEuWQ7Mzb for <spasm@ietf.org>; Wed, 23 May 2018 15:53:38 -0400 (EDT)
Received: from a860b60074bd.home (pool-108-45-101-150.washdc.fios.verizon.net [108.45.101.150]) by mail.smeinc.net (Postfix) with ESMTPSA id 83A803005AE; Wed, 23 May 2018 15:53:37 -0400 (EDT)
From: Russ Housley <housley@vigilsec.com>
Message-Id: <C3E03496-0C4F-41D2-8927-9BE57512F5C2@vigilsec.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_D7057CA5-4FAF-434B-B5E2-0C585C262643"
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
Date: Wed, 23 May 2018 15:53:38 -0400
In-Reply-To: <CAHw9_iJSB2Ui03+-JOtpfXEotqm_2Pm91gpaFbwtx=LbKgQ_Tw@mail.gmail.com>
Cc: Yoav Nir <ynir.ietf@gmail.com>, spasm@ietf.org, lamps-chairs@ietf.org, IESG <iesg@ietf.org>
To: Warren Kumari <warren@kumari.net>
References: <152709543734.26876.14669273511731581188.idtracker@ietfa.amsl.com> <64EA6F18-9275-40FC-8FDE-3E12C4458EFB@gmail.com> <CAHw9_iJSB2Ui03+-JOtpfXEotqm_2Pm91gpaFbwtx=LbKgQ_Tw@mail.gmail.com>
X-Mailer: Apple Mail (2.3273)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/k47X1orzg6MrZl_vC-akBdr6_fQ>
Subject: Re: [lamps] Warren Kumari's Block on charter-ietf-lamps-02-00: (with BLOCK and COMMENT)
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 May 2018 20:00:12 -0000

Please see my response at the bottom of the message ...

> On May 23, 2018, at 3:31 PM, Warren Kumari <warren@kumari.net> wrote:
> 
> On Wed, May 23, 2018 at 1:39 PM Yoav Nir <ynir.ietf@gmail.com <mailto:ynir.ietf@gmail.com>> wrote:
> Hi Warren.
> 
> Since it was my draft and presentation at SecDispatch that led to this item, I feel I can answer this.  Inline.
> 
> > On 23 May 2018, at 20:10, Warren Kumari <warren@kumari.net <mailto:warren@kumari.net>> wrote:
> > 
> > Warren Kumari has entered the following ballot position for
> > charter-ietf-lamps-02-00: Block
> > 
> > When responding, please keep the subject line intact and reply to all
> > email addresses included in the To and CC lines. (Feel free to cut this
> > introductory paragraph, however.)
> > 
> > 
> > 
> > The document, along with other ballot positions, can be found here:
> > https://datatracker.ietf.org/doc/charter-ietf-lamps/ <https://datatracker.ietf.org/doc/charter-ietf-lamps/>
> > 
> > 
> > 
> > ----------------------------------------------------------------------
> > BLOCK:
> > ----------------------------------------------------------------------
> > 
> > "3. Specify the use of short-lived X.509 certificates for which no
> > revocation information is made available by the Certification Authority.
> > Short-lived certificates have a lifespan that is shorter than the time
> > needed to detect, report, and distribute revocation information, as a
> > result revoking them pointless."
> > 
> > This makes me twitch -- how short is "short”?
> 
> [YN] I expect this to be contentious within the working group, and I expect the exact cut-off point to be different from one use-case to another. For highly reliable systems with good clock synchronization “short” could be as low as an hour. For typical systems I think the likely lifetime will be between 1 day and 1 week.  IMHO it’s valid for the working group to leave the cut-off between “short” and “not short” to per-domain profiles, but I don’t think anything beyond 2 weeks would ever count as short.
> 
> > And how long is the time to
> > "detect, report, and distribute revocation information"? With e.g: CT,
> > misissued certificates may be visible before they are used in an attack,
> > decreasing the detection time.
> 
> [YN] Someone needs to see the certificate to add it to the log, and someone needs to find the certificate on the log and understand that it is mis-issued. And then someone needs to add it to the CRL / database that feeds the OCSP responder. And when this is updated, relying parties may have cached copies of older revocation information. Add it up and it can take days on the web.  In closed environments there may not be CT at all.  
> 
> 
> ​So, here you say: "Add it up and it can take days on the web." and above that you say: "For typical systems I think the likely lifetime will be between 1 day and 1 week.  [...] , but I don’t think anything beyond 2 weeks would ever count as short."
> 
> "1 week" minus "days" is still greater than zero, and so it still *seems* to me that removing revocation is a bad idea -- but, my role is (or should be!) to make sure that this charter doesn't conflict with other work (esp. ops work), that the charter "describes the specific problem or deliverables (a guideline, standards specification, etc.) it has been formed to address. WG charters state the scope of work for group, and lay out goals and milestones that show how this work will be completed." It is (IMO) the sponsoring ADs, the WGs and IETFs decision as to if the ideas themselves are acceptable.
> I'm not (yet!) so arrogant that I'm sure I know the right answer to everything, so I'd like to discuss this with EKR on the call tomorrow, and will clear my block once I've been assured process is being followed
> / this has been considered.

Warren:

I think the point you are missing is that it take time to process revocation and get the CRL published or OCSP responder updated.  This is always over a week because people do not revoke without doing due diligence.  So, letting the short-lived certificate expire without issuing a replacement will actually cause revocation to happen more quickly.

Russ