Re: [lamps] New drafts available - non-composite hybrid authentication, and binding certs

"aebecke@uwe.nsa.gov" <aebecke@uwe.nsa.gov> Tue, 29 March 2022 19:12 UTC

Return-Path: <aebecke@uwe.nsa.gov>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E09563A1B82 for <spasm@ietfa.amsl.com>; Tue, 29 Mar 2022 12:12:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.911
X-Spam-Level:
X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FROM_GOV_DKIM_AU=-0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=uwe.nsa.gov
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jxAS80F2O8f1 for <spasm@ietfa.amsl.com>; Tue, 29 Mar 2022 12:12:03 -0700 (PDT)
Received: from GCC02-DM3-obe.outbound.protection.outlook.com (mail-dm3gcc02on20601.outbound.protection.outlook.com [IPv6:2a01:111:f400:7d04::601]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 580613A1B83 for <spasm@ietf.org>; Tue, 29 Mar 2022 12:12:03 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ACkPkou9bVaf8we18qRaRHi1BcyR1YAQeDAWkKM6O3vdW3rgZhGXwDAotOAzOy015DQC9PVw/+Ny9J8Smreqnj53i9frgLiVGtWIKtG6uev87O21Qp0vScjzti9fMQLmVycZO3/oTQRDqAXYCjIaM4BdShqIvtSX3/xKUn2YiJdAl9aB9US/KGUcEf5M4wPUnJB0rJlQanM6kIIdjbzkSV1nJ/liY5pJmD2GqTz490GGrFvxoznj+dwSrhvvdCC5haffGUYvQXLwgu6KkJ0errAoApiVX3YnEFL0FKQHbaiLz43LidnEIuApgwo2ttEC7eI0YmhtalTIwIfDAMFOPQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=iijgPmUepOBd4sj5RVGo0gYvzj33iNcCga7lgnrC9fQ=; b=Sz5oPBZZlwN4yQ9I1pWLqFrxMERY4GWU8ocM5qjdn8FkYaXZj8uIR0TAy0++jFdYA8tAb1qAtVlBbUtAzavT1Nzegf+3PW6xRu5CpoyIqAguQdZY9y0S+yPB599V8MnkGSWymNeKzM6tQ5pj3cFssgUt+SFWb2iJUUqTsa8/zUKyHwjZottrTxmhIZa4wuoXrb43OpRedo0u1h54GV9UuOgh8NC/obrOMW85+JXrNLXmXS78Umg0VeshF5Qzs28OCa9nh2yBlKJsM53sFge4H8VFolzSb0jDDhQe8JL/Qatqfoa9BYMENyUTReNBbW2HScVi0++2zvxtatKrPGm+LA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=uwe.nsa.gov; dmarc=pass action=none header.from=uwe.nsa.gov; dkim=pass header.d=uwe.nsa.gov; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=uwe.nsa.gov; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=iijgPmUepOBd4sj5RVGo0gYvzj33iNcCga7lgnrC9fQ=; b=ZKpZzlwoyalAsVoTeQqHnTyca1/Ra28pB+puvq/Tf2SSYBV0sjkuW2zLR60yYcOBjjyqU6+f06lX3PEVzsKsIA99tIyIHXG9hXbrdXUJAdLnsrXpk02aZkRFGrv9NXWl4DXd1yuqEPRF6aqyrfXl8chhtyl4HKcTBvdMjSGT4beSRWity85qosjq+BjCl+j6K0cBOY5P3eI9LmIWgaCoL55y0r0ecLJJ0mlYSJcq1dll10yOkhrDB/wfeM8luOI1+oNTXU9E8pYn1UCZUqvaLeDEcgKSPojzthTkttxLZcXskpigAYRtRZkdzDN08uC0Su5ytxDSvsuhs85QvMM7qg==
Received: from SA0PR09MB7241.namprd09.prod.outlook.com (2603:10b6:806:7a::24) by SA1PR09MB8125.namprd09.prod.outlook.com (2603:10b6:806:178::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.16; Tue, 29 Mar 2022 19:12:02 +0000
Received: from SA0PR09MB7241.namprd09.prod.outlook.com ([fe80::c1c7:6c2b:3f1d:bbb4]) by SA0PR09MB7241.namprd09.prod.outlook.com ([fe80::c1c7:6c2b:3f1d:bbb4%7]) with mapi id 15.20.5102.023; Tue, 29 Mar 2022 19:12:02 +0000
From: "aebecke@uwe.nsa.gov" <aebecke@uwe.nsa.gov>
To: "Kampanakis, Panos" <kpanos=40amazon.com@dmarc.ietf.org>, "spasm@ietf.org" <spasm@ietf.org>
Thread-Topic: [lamps] New drafts available - non-composite hybrid authentication, and binding certs
Thread-Index: AQHYPhZsKWTcCtspaEezW3V04zRZ9qzNE9jwgAmwK5o=
Date: Tue, 29 Mar 2022 19:12:02 +0000
Message-ID: <SA0PR09MB724171DB5A452D2376A639D8F11E9@SA0PR09MB7241.namprd09.prod.outlook.com>
References: <SA0PR09MB72412B7DA4F1DDA68A40AD1EF1179@SA0PR09MB7241.namprd09.prod.outlook.com> <6228987854ad47119b86ae1d0ad36ab6@EX13D01ANC003.ant.amazon.com>
In-Reply-To: <6228987854ad47119b86ae1d0ad36ab6@EX13D01ANC003.ant.amazon.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
suggested_attachment_session_id: d5d6e5a8-686b-e52d-f248-20825ea5ce8b
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=uwe.nsa.gov;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: de6b16f7-bdc5-4b5e-71a6-08da11b80172
x-ms-traffictypediagnostic: SA1PR09MB8125:EE_
x-microsoft-antispam-prvs: <SA1PR09MB8125958EE7711699835A853BF11E9@SA1PR09MB8125.namprd09.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: DVWW+qo6ggUIkRemJ9tbJHK8jRNwj/e4CVYWBPbUyZ9uuL2h9OgghRAIpEQM/WSxYNpKMUt1Phh0tAe73VwgMM3CBRo5q/PBe7F6s6zpIUIGy8AVg0IhUmr3Aro+1Rfi1dLmu1ktJzu6cO6k5ybFmmL4dIZB3RJ+FjhUtKpDrFzdHEIA5VbJH8Sd2ANYyXPD1j8dYi6/RVypWCsUey0Gu95ySmwTRI1Bx+qi2TSF63H1F2lDYpbOUJ5jRXUS9PX0fgq38PTThGOe3M5VdnBE9MjUduWU2oOtR/SJklyCrXMzfm/5pYqUIuXcowib2xicpwuVgGE7bX5At2iyVPnIqAGzicw4IELySWn1cMFQM7BgvfDGzTFM8YYGxjWQx6NOU8nPqaf9FR5g0AC7VnNkFwyIscUnjolERsP67OJ+VUJq20VVwNpKrMO52zt7+SJ4dx/KdAdaPBaEo2F8+xyMlRNmzZHPDfMmQe6BSlYi170dI7zflJYYqGzK6usOpkN7XXqPIpc8+QNJ9yztHwwuLa99ptQvNrs8FrqWU2lyZHkmzx/06CX048KqwkLEYddXiCEItpPHbP9zEVTIxXYpVG5r9HPZNn7Eis1pGhCNQ8QKQ1Z6njqcM3/ifqqnuNwsNyVCwfGQTLw+fbAuuubhFWhHaD935gPnQpxNHqqtaRnef12CQHb4m/EI8cpQZjjx8MO6WrzVahRf0M632IXHQoz3gN6JcblkV7gGS+IOFnB9u2YUAY2c6Mri1JG2k6DPzMXAJQ+0zyiP8GQHw0UU4P1xsPkakG1wUyCwqvl7SuA=
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SA0PR09MB7241.namprd09.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(38100700002)(86362001)(82960400001)(76116006)(19627405001)(7696005)(38070700005)(66446008)(66556008)(64756008)(66476007)(55016003)(166002)(122000001)(91956017)(9686003)(6506007)(316002)(66946007)(966005)(508600001)(53546011)(5660300002)(8676002)(71200400001)(2906002)(110136005)(26005)(186003)(83380400001)(33656002)(52536014)(8936002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?Windows-1252?Q?lPVr/UshqAsudojnDqvGeFo7eDnIO/e4lxVYIFFkQs5wfj3bL8tZMvh8?= =?Windows-1252?Q?cukrRp69OXswilUCcSPNZn8ddn8sBex0NMG+yl8Iy14AWWIPh8WFm1Ip?= =?Windows-1252?Q?RvTeIHjkVG0+X0VDhvudkrvHeaZZOe97Kqjh95xQrycopBpluhawAXi+?= =?Windows-1252?Q?yrKUdjRDJUSR5iFYjcgqyxHuFZNh/Su3sbggDJu5rS66l2TiJV/fvBcq?= =?Windows-1252?Q?V6Cmq5BdpbQFsbex32dLCTAI+ViL6I8Fhnv6yFmOqoxafNMRHtVg5jC0?= =?Windows-1252?Q?zt7dnrbbh2gF/dcOjobITMI9TI6LA/6YIGqIT4dq+xvM8UYFi52/7Nl+?= =?Windows-1252?Q?mr5hkTzg7E6uSAvOaY98bxqOHMamIsXxbHerxxn/d0fu8s11bk1Lhczf?= =?Windows-1252?Q?v58TA0PiL7R7HnEJuxFY1Ql2wJFqOcU7xkL08X41Fq9eDavrT0JXRi6N?= =?Windows-1252?Q?d13rc+Zus/xt156OpfUBxpuKst/te95tW3wKuHjYoGuC8N8+UeIHb3UP?= =?Windows-1252?Q?1iIuEPwiC+sKyoYMSJpRBcXEO771e/lbWNJlpffOm2Oh8osDD5D2Gb9q?= =?Windows-1252?Q?3aYfwFix62/tt1gyhJVYFbOvWsqO7i8ngvaUUb/Aok8hT9+KKxrgpj4n?= =?Windows-1252?Q?gb2DdQFKFUYMxZ3+YReiYTSuIO9r9ZV1+EXoqIk4dpc90kTRVJbp7Rlz?= =?Windows-1252?Q?fDUuhkQfFm4NEWCqVDM+28BS1/k5ZHRTzQh6u8BHU/wFs4omllQeaTl3?= =?Windows-1252?Q?WjV8bkUznOUjF389V4p5/uo7386sZRsPrgKvCJ6/YszpE3MxE0p0MXFp?= =?Windows-1252?Q?KrwtjJ/+vFkQw4nIiPc/8N5GAYpWfk7drL4qXZRPA+d32a5i+G1dHPTQ?= =?Windows-1252?Q?3y4yQv81ZG75QXw4nikpyHFuwNfEgXMAOF0ZAJa2SfOPn3qqAJTusnqu?= =?Windows-1252?Q?pOg4HAO25X7/FFz2vhXd/Bnj4851kVJ9KFvG4fiyY0iZGBFz5NC6imDi?= =?Windows-1252?Q?IKx1vn8EyfiuJ6x70EuubKSvf+FzA0HFCYnjm7YoKSqWTrgcSRvxJlfH?= =?Windows-1252?Q?sKdH/MP200k24ujMoSkM61PcV0f0aP/jf5b+BRVVr8Qiqdz3Stfp2TP7?= =?Windows-1252?Q?J+ri99imLm7KHYt1L8O0ThGmmJ6f6CP2Ccy7cp6+HNXu8gDX1zafslpj?= =?Windows-1252?Q?EbCxCTQqHaN9FQqE/fJd4+slPByh2wiQuIG957tfDb1vE4psUKz3YDfx?= =?Windows-1252?Q?jqthHO98IWsBSV4ubqXWo+BiTBwmXSmb31fpR2f6ZEZQSzmKrz4Tcbfv?= =?Windows-1252?Q?nUiAqJuM2LQkqp04fwMqVmDbL0rJpi+7NVENtXWnhC8wMyPX4fUfIUSB?= =?Windows-1252?Q?RiaQicXhe0X15j1ZuZJ7zudReY1x+o80uF2jImCqpAJUPcb785Z7zQm8?= =?Windows-1252?Q?jN+jQKeQAdA1OS14gohQ/K8rvQuUhPkRDaHJ/BgT54OyFJyir6vjOMHs?= =?Windows-1252?Q?v3ArQWm2mEN7qjfFhmqXXHRPj/qUIWNIRAe2Vzt4MsnXdeLFa2bm60g2?= =?Windows-1252?Q?vu61gBWCDg0KZNrlMBzcXQNYRDZUeLdBwdYKc5OMiCQ4pRn2HXqUOPcZ?= =?Windows-1252?Q?9hqVmQEcrjtz2B4Unw1KCW+XXIMC7PuXXZ5RGK+iOB8SnF7qbgbCAFE5?= =?Windows-1252?Q?x0nZ9ezmKByL916VbGPZhI1KDi0z0imRHIZrjBzgiumo5eSfZewEPQO6?= =?Windows-1252?Q?Uq34WGxjox/VDwG9XlNiFkVd0Ne8Ot5CwzRkI+KU8hHdube/dtt+UGsS?= =?Windows-1252?Q?IqF5xjDK+TgpRxD7jkWjqLMLCRCx5WU8v3Kg4Zhoi/r5dvh0/LGqCO2v?= =?Windows-1252?Q?jqWXxsvZ5mujeA=3D=3D?=
Content-Type: multipart/alternative; boundary="_000_SA0PR09MB724171DB5A452D2376A639D8F11E9SA0PR09MB7241namp_"
MIME-Version: 1.0
X-OriginatorOrg: uwe.nsa.gov
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SA0PR09MB7241.namprd09.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: de6b16f7-bdc5-4b5e-71a6-08da11b80172
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Mar 2022 19:12:02.1653 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: d61e9a6f-fc16-4f84-8a3e-6eeff33e136b
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR09MB8125
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/kcE21hiKz4aF-bNvdxrH89I016A>
Subject: Re: [lamps] New drafts available - non-composite hybrid authentication, and binding certs
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2022 19:12:09 -0000

Thanks for the comments!
Yes, we see a main advantage to this approach being one migration as you described. There is definitely more work put onto the protocol using a non-composite approach, but it may be preferable to introducing changes at the PKI or cryptographic library level. We are definitely in agreement with you, the discussion will hinge on what is best appropriate for the use case.

-Alie
________________________________
From: Spasm <spasm-bounces@ietf.org> on behalf of Kampanakis, Panos <kpanos=40amazon.com@dmarc.ietf.org>
Sent: Wednesday, March 23, 2022 12:42 PM
To: aebecke@uwe.nsa.gov <aebecke=40uwe.nsa.gov@dmarc.ietf.org>rg>; spasm@ietf.org <spasm@ietf.org>
Subject: Re: [lamps] New drafts available - non-composite hybrid authentication, and binding certs


Thx for the drafts Alie.



Regarding draft-becker-guthrie-noncomposite-hybrid-auth<https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-becker-guthrie-noncomposite-hybrid-auth%2F&data=04%7C01%7Caebecke%40uwe.nsa.gov%7C3e9d6a7bd4d84d5e3ce608da0cec54ec%7Cd61e9a6ffc164f848a3e6eeff33e136b%7C0%7C0%7C637836506444366967%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=quBEWVmwzBE3gJ%2FjW6beqphCDqpGCkgfp%2FUmtmSoVUs%3D&reserved=0> , I guess the advantage of the approach seems to be that if you don’t trust the PQ signature yet, you won’t have to migrate twice, once with a composite algorithm cert and later with a pure PQ one.



I have to point out some disadvantages though compared to the PQ-composite option

- there is redundancy in the cert data sent over the wire in the PQ-hybrid case.

- the onus is pushed to the transport protocol which now has to do much more than support a new OID. Introducing two OIDs and two PKIs is the PQ-composite option. Not sure how to quantify which is more work.

- there is more complexity in tying the two identities together by using the new extension.



Imo the discussion becomes what do we consider easier and better to deploy and use, PQ-composite or PQ-noncomposite-hybrid.



Rgs,

Panos







From: Spasm <spasm-bounces@ietf.org> On Behalf Of aebecke@uwe.nsa.gov
Sent: Tuesday, March 22, 2022 2:17 PM
To: spasm@ietf.org
Subject: [EXTERNAL] [lamps] New drafts available - non-composite hybrid authentication, and binding certs



CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you can confirm the sender and know the content is safe.



Hi LAMPS,



  Two new drafts related to PQ migration are available here (note- these drafts are an update to the talk we gave at IETF112 in November) : https://datatracker.ietf.org/doc/draft-becker-guthrie-cert-binding-for-multi-auth/<https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-becker-guthrie-cert-binding-for-multi-auth%2F&data=04%7C01%7Caebecke%40uwe.nsa.gov%7C3e9d6a7bd4d84d5e3ce608da0cec54ec%7Cd61e9a6ffc164f848a3e6eeff33e136b%7C0%7C0%7C637836506444366967%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=uRePcx1q%2BAAbC%2BNuCUyAxUod6P1KJQ9lTjrAvAEHi%2Bw%3D&reserved=0> and https://datatracker.ietf.org/doc/draft-becker-guthrie-noncomposite-hybrid-auth/<https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-becker-guthrie-noncomposite-hybrid-auth%2F&data=04%7C01%7Caebecke%40uwe.nsa.gov%7C3e9d6a7bd4d84d5e3ce608da0cec54ec%7Cd61e9a6ffc164f848a3e6eeff33e136b%7C0%7C0%7C637836506444366967%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=quBEWVmwzBE3gJ%2FjW6beqphCDqpGCkgfp%2FUmtmSoVUs%3D&reserved=0>





The noncomposite-hybrid-auth-00 draft is an informational draft that gives a general overview of hybrid authentication, and details the solution space of what we are calling non-composite type hybrid solutions for authentication.



The cert-binding-for-multi-auth-00 draft defines a new CSR attribute, bindingRequest, and a new X.509 certificate extension, BoundCertificates, which together provide additional assurance that multiple certificates (used in non-composite hybrid authentication) each belong to the same end entity.



  Please feel free to provide any comments and feedback!



  Regards,

  Alie Becker + coauthors Rebecca Guthrie, Mike Jenkins



  ----

  Alison Becker, PhD

  Center for Cybersecurity Standards

  National Security Agency

T