Re: [lamps] Call for adoption of draft-becker-guthrie-cert-binding-for-multi-auth-01
"Blumenthal, Uri - 0553 - MITLL" <uri@ll.mit.edu> Sun, 23 October 2022 03:01 UTC
Return-Path: <prvs=8295e92b58=uri@ll.mit.edu>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CCDDAC14CF1B for <spasm@ietfa.amsl.com>; Sat, 22 Oct 2022 20:01:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.906
X-Spam-Level:
X-Spam-Status: No, score=-1.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NeuVSrD6jjcT for <spasm@ietfa.amsl.com>; Sat, 22 Oct 2022 20:01:08 -0700 (PDT)
Received: from MX2.LL.MIT.EDU (mx2.ll.mit.edu [129.55.12.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D2EF2C14CF17 for <spasm@ietf.org>; Sat, 22 Oct 2022 20:01:07 -0700 (PDT)
Received: from LLEX2019-1.mitll.ad.local (llex2019-1.llan.ll.mit.edu [172.25.4.123]) by MX2.LL.MIT.EDU (8.17.1.5/8.17.1.5) with ESMTPS id 29N30kmg153839 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Sat, 22 Oct 2022 23:00:46 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector5401; d=microsoft.com; cv=none; b=y4rMvhlRBvDVlXivz6lyuXuTZoZOXcG7a1c4CJmcE56CHohXdWR7kXzJ1ExMPg1KWW9baw/WXNw096ckXyxm+byJ/iPfridCnMLRlvqM+FV3alkTK7WKn0GO9br0bhYgtACnGvuQoH3s0t8FIEiYJn8DT+6RIfbJZ/dFf+SuX9WfCARHeGvjOvr7EvHlsOYDU5mhA/vfd3yZ8/bneJ9+CKzNRu7mQIZSKytqD2dTA5HO0D4WLDwsciehmL2aMZeiVP0+3aydhxAEpiGL9IzXiG972S+1g6H4MuDt/WU/t+fcLzneu/G2wOCzsW4OEaydgDJ6euFu1EMCJyXLM3URfw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector5401; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=LkPaX7/2OJr3IqYK/P1WmAUibZfoWWWCBrczZlAojb0=; b=GuHdWFE2Tf0UFJKz/Bp560bo9SKju50ffE4GUr7R94sjl/vYV2KPaz3vaT6Gavp3rNJTwSYy4P3wmA24MhPvSdaMtI06eMn0xeG/Qz7XfMttXrYJLaFo+wQvk8C6JFjQ0EKTA29AZCjxDOT6kz42G3y1LRbWuU3xD5NfGJYiCxtfe0gOgNJ0nFPMJqajGyxr7Tjwfj4uB6o0TjnL0V2B8zg6GKGGXSAI+rchi4Bc8U0baeJgINPSxKaFNnmXF/Eto1vivqTfw6C0iygWzNh9lC5cy8jEdhe/dIufiatVRIfOry/AlsexNUn8Wbf37Y9YFKEtyq717yaSuHFtIcoTag==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ll.mit.edu; dmarc=pass action=none header.from=ll.mit.edu; dkim=pass header.d=ll.mit.edu; arc=none
From: "Blumenthal, Uri - 0553 - MITLL" <uri@ll.mit.edu>
To: "Kampanakis, Panos" <kpanos=40amazon.com@dmarc.ietf.org>, Michael Jenkins <m.jenkins.364706@gmail.com>
CC: Russ Housley <housley@vigilsec.com>, LAMPS <spasm@ietf.org>
Thread-Topic: [lamps] Call for adoption of draft-becker-guthrie-cert-binding-for-multi-auth-01
Thread-Index: AQHYyRooKEb5h41VkU2PY/dXkDcmM64WVOqAgAB5z4CAA/ZGgIAAtQkA///IDYA=
Date: Sun, 23 Oct 2022 03:00:58 +0000
Message-ID: <A9F70D16-145B-4D3E-92DF-9019A3D97803@ll.mit.edu>
References: <PH0PR00MB10003EC6A096FE0A363BBFB9F5459@PH0PR00MB1000.namprd00.prod.outlook.com> <PH0PR00MB10002A7A2850A1333B4F6C00F54A9@PH0PR00MB1000.namprd00.prod.outlook.com> <35BEB1D9-7EA5-4CD4-BADA-88CCB0E9E8F9@vigilsec.com> <25D23241-1390-4F21-B84F-29D3629A3368@vigilsec.com> <4835bc312c5540a99a9f4b51665e2f75@amazon.com> <CAC2=hnf9k9cHXrFFXXApPRvF8hNUmwFsX5onYneo8eBVoDWV0Q@mail.gmail.com> <4027a47b3b05438b8c02069bac280555@amazon.com>
In-Reply-To: <4027a47b3b05438b8c02069bac280555@amazon.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.66.22101101
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN0P110MB1419:EE_|BN0P110MB1029:EE_
x-ms-office365-filtering-correlation-id: 408e4516-ab50-49c8-0e05-08dab4a2cf97
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN0P110MB1419.NAMP110.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230022)(366004)(451199015)(26005)(8936002)(6512007)(5660300002)(110136005)(54906003)(76116006)(66946007)(66556008)(66476007)(66446008)(64756008)(8676002)(53546011)(4326008)(6506007)(40140700001)(166002)(38070700005)(99936003)(122000001)(38100700002)(2616005)(186003)(2906002)(33656002)(75432002)(86362001)(83380400001)(6486002)(966005)(71200400001)(498600001)(45980500001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha256"; boundary="B_3749324457_474261108"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN0P110MB1419.NAMP110.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 408e4516-ab50-49c8-0e05-08dab4a2cf97
X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Oct 2022 03:00:58.6362 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 83d1efe3-698e-4819-911b-0a8fbe79d01c
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN0P110MB1029
X-Proofpoint-ORIG-GUID: RpmaSVg90uLgUXCOHtkVVhcmvBsX27yq
X-Proofpoint-GUID: RpmaSVg90uLgUXCOHtkVVhcmvBsX27yq
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.895,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2022-10-21_04,2022-10-21_01,2022-06-22_01
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=999 bulkscore=0 adultscore=0 phishscore=0 mlxscore=0 spamscore=0 suspectscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2209130000 definitions=main-2210230017
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/lyIPTRFZe2mmeP-BwjE3njl18NQ>
Subject: Re: [lamps] Call for adoption of draft-becker-guthrie-cert-binding-for-multi-auth-01
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 23 Oct 2022 03:01:11 -0000
It looks like there’s a legitimate use case for this extension, and a “Community Of Interest” that wants it. More importantly, people/organizations/CAs that don’t plan or want to support it, don’t need to (you see it – ignore it). So, no skin off anybody’s back to adopt it.
So far, I haven’t heard any technical reasons why this extension would be “universally bad”. Just stuff like “it does not make sense for my organization/business”, or “if I support it – it would interfere with my <whatever>”. To all of which a simple answer is “then don’t”. Let those who care, support it and use it.
The way I read this draft, it says “if you need to do explicit certificate binding, do it this way to be interoperable”. Which is fine with me – nobody would be forced to implement or support this extension.
So, I vote to adopt it for the above reasons.
> Mike said:
> So, I think Panos' question to Rebecca / Allie / Michael is: what is the advantage of relating two certs by an
> extension if they are already "related" by virtue of having the same issuer and DN or the same SAN?
I doubt they’d be related by the same issuer – but IMHO it’s reasonable in general to expect the same DN and/or SAN. But I can imagine situations when this would not be the case, and the only way to ascertain the binding would be this extension.
> Is there a case where some mischief would be caught by the Related Certs Extension that would otherwise be un-caught?
See above – you assume DN and SAN (and/or SAN?) would have to be the same, I think this assumption won’t always hold.
TNX
--
V/R,
Uri
There are two ways to design a system. One is to make it so simple there are obviously no deficiencies.
The other is to make it so complex there are no obvious deficiencies.
- C. A. R. Hoare
From: Spasm <spasm-bounces@ietf.org> on behalf of "Kampanakis, Panos" <kpanos=40amazon.com@dmarc.ietf.org>
Date: Saturday, October 22, 2022 at 22:22
To: Michael Jenkins <m.jenkins.364706@gmail.com>
Cc: Russ Housley <housley@vigilsec.com>, LAMPS <spasm@ietf.org>
Subject: Re: [lamps] Call for adoption of draft-becker-guthrie-cert-binding-for-multi-auth-01
I understand the draft. I had shared some technical concerns for issuers that would need to add the Related Cert Extension which had not been addressed.
But let’s say that the extension does not mean that the issuer has to do any additional checks which some are suggesting has pitfalls. Let’s say that as you are suggesting, the issuer just needs to check two signatures to confirm the requester has the private keys for both related public keys. Why do we need the extension anyway? The relation of the two certificates comes from the identity (CommonName or maybe some SANs) which should be the same.
Why not avoid the hassle of standardizing the extension in LAMPS? Entity X can get two certs issued independently. Then it sends them both along with two chains and two signatures in the TLS handshake. The verifier needs to verify both signatures and chains independentlyand confirm the identity in both certs (e.g. CN, SAN) match. In that case you only need to update TLS in the TLS WG and IKEv2 in the IPSECME WG and you don’t need to update X.509.
From: Spasm <spasm-bounces@ietf.org> On Behalf Of Michael Jenkins
Sent: Saturday, October 22, 2022 11:33 AM
To: Kampanakis, Panos <kpanos=40amazon.com@dmarc.ietf.org>
Cc: Russ Housley <housley@vigilsec.com>; LAMPS <spasm@ietf.org>
Subject: RE: [EXTERNAL][lamps] Call for adoption of draft-becker-guthrie-cert-binding-for-multi-auth-01
CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you can confirm the sender and know the content is safe.
If there are no technical showstoppers, I don't understand the objection.
Mike and John have a well defined scheme, for which they have prototypes and apparent customers. So that will exist.
On the other hand, singleton certificates will also exist. The US DoD will have oceans of them. So will companies with limited resources that will balk at the idea of being sold something they already have bolted to something there's apparently lack of confidence in. Singleton certificates will exist irrespective of our draft; we are not creating a necessary precondition.
All our draft does is provide an indication of assurance that one certificate is related to another. The specific relation is that the entity controlling the private key in one certificate also controls the private key in another. Those certificates exist separately. The relative context of those certificates (validity period, etc) would have to be part of a transition plan.
If you don't like the mechanism, if you don't understand it, if it doesn't fit with your transition scheme, you don't have to implement it, or buy it. If you encounter it, you can ignore it. On the other hand, if it fits with your transition scheme, it can add some assurance. This is explained in the overview of the draft.
Mike Jenkins
NSA-CCSS
On Wed, Oct 19, 2022 at 11:03 PM Kampanakis, Panos <kpanos=40amazon.com@dmarc.ietf.org> wrote:
Hey Russ,
I have not been convinced either. My details for the operational challenges this draft would bring still remain. Willing to hear more counter-arguments from Rebecca and Mike to address the concerns or discuss it further.
-----Original Message-----
From: Spasm <spasm-bounces@ietf.org> On Behalf Of Russ Housley
Sent: Wednesday, October 19, 2022 3:47 PM
To: LAMPS <spasm@ietf.org>
Subject: RE: [EXTERNAL][lamps] Call for adoption of draft-becker-guthrie-cert-binding-for-multi-auth-01
CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you can confirm the sender and know the content is safe.
Several people spoke for adoption, and several people spoke against adoption. The I-D authors responded with a response to the concerns that were raise, and no one has responded to the authors. I would like to hear from the people that spoke against adoption. Are you swayed by the discussion that has taken place?
Russ
> On Sep 15, 2022, at 11:44 AM, Russ Housley <housley@vigilsec.com> wrote:
>
> There has been some discussion of https://datatracker.ietf.org/doc/draft-becker-guthrie-cert-binding-for-multi-auth/. During the discussion at IETF 114, we agree to have a call for adoption of this document.
>
> Should the LAMPS WG adopt “Related Certificates for Use in Multiple Authentications within a Protocol” indraft-becker-guthrie-cert-binding-for-multi-auth-01?
>
> Please reply to this message by Friday, 30 September 2022 to voice your support or opposition to adoption.
>
> On behalf of the LAMPS WG Chairs,
> Russ
>
_______________________________________________
Spasm mailing list
Spasm@ietf.org
https://www.ietf.org/mailman/listinfo/spasm
_______________________________________________
Spasm mailing list
Spasm@ietf.org
https://www.ietf.org/mailman/listinfo/spasm
--
Mike Jenkins
mjjenki@cyber.nsa.gov
443-598-7837
- [lamps] Call for adoption of draft-becker-guthrie… Russ Housley
- Re: [lamps] [EXTERNAL] Call for adoption of draft… Mike Ounsworth
- Re: [lamps] [EXTERNAL] Call for adoption of draft… Russ Housley
- Re: [lamps] Call for adoption of draft-becker-gut… Corey Bonnell
- Re: [lamps] Call for adoption of draft-becker-gut… Kampanakis, Panos
- Re: [lamps] Call for adoption of draft-becker-gut… Michael Jenkins
- Re: [lamps] Call for adoption of draft-becker-gut… Kampanakis, Panos
- Re: [lamps] Call for adoption of draft-becker-gut… Russ Housley
- Re: [lamps] Call for adoption of draft-becker-gut… Kampanakis, Panos
- Re: [lamps] Call for adoption of draft-becker-gut… John Gray
- Re: [lamps] Call for adoption of draft-becker-gut… Russ Housley
- Re: [lamps] Call for adoption of draft-becker-gut… Russ Housley
- Re: [lamps] Call for adoption of draft-becker-gut… Tomas Gustavsson
- Re: [lamps] Call for adoption of draft-becker-gut… Stephen Farrell
- Re: [lamps] [EXTERNAL] Re: Call for adoption of d… Mike Ounsworth
- Re: [lamps] [EXTERNAL] Re: Call for adoption of d… Rebecca Guthrie
- Re: [lamps] Call for adoption of draft-becker-gut… Russ Housley
- Re: [lamps] Call for adoption of draft-becker-gut… Stephen Farrell
- Re: [lamps] [EXTERNAL] Re: Call for adoption of d… Mike Ounsworth
- Re: [lamps] Call for adoption of draft-becker-gut… Kampanakis, Panos
- Re: [lamps] Call for adoption of draft-becker-gut… Michael Jenkins
- Re: [lamps] Call for adoption of draft-becker-gut… Kampanakis, Panos
- Re: [lamps] Call for adoption of draft-becker-gut… Mike Ounsworth
- Re: [lamps] Call for adoption of draft-becker-gut… Blumenthal, Uri - 0553 - MITLL
- Re: [lamps] Call for adoption of draft-becker-gut… Stephen Farrell
- Re: [lamps] Call for adoption of draft-becker-gut… Kampanakis, Panos
- Re: [lamps] Call for adoption of draft-becker-gut… Tomas Gustavsson
- Re: [lamps] Call for adoption of draft-becker-gut… Russ Housley
- Re: [lamps] Call for adoption of draft-becker-gut… Kampanakis, Panos
- Re: [lamps] Call for adoption of draft-becker-gut… Tomas Gustavsson
- Re: [lamps] Call for adoption of draft-becker-gut… Mike Ounsworth
- Re: [lamps] Call for adoption of draft-becker-gut… Tomas Gustavsson
- Re: [lamps] Call for adoption of draft-becker-gut… Mike Ounsworth
- [lamps] Call for adoption of draft-becker-guthrie… Russ Housley
- Re: [lamps] Call for adoption of draft-becker-gut… Kampanakis, Panos
- Re: [lamps] Call for adoption of draft-becker-gut… Mike Ounsworth
- Re: [lamps] Call for adoption of draft-becker-gut… aebecke@uwe.nsa.gov
- Re: [lamps] Call for adoption of draft-becker-gut… Kampanakis, Panos
- Re: [lamps] Call for adoption of draft-becker-gut… Mike Ounsworth
- Re: [lamps] Call for adoption of draft-becker-gut… Kampanakis, Panos
- Re: [lamps] Call for adoption of draft-becker-gut… Mike Ounsworth
- Re: [lamps] Call for adoption of draft-becker-gut… Carl Wallace
- Re: [lamps] Call for adoption of draft-becker-gut… Mike Ounsworth
- Re: [lamps] Call for adoption of draft-becker-gut… Kampanakis, Panos
- Re: [lamps] Call for adoption of draft-becker-gut… Mike Ounsworth
- Re: [lamps] Call for adoption of draft-becker-gut… Tomofumi Okubo
- Re: [lamps] Call for adoption of draft-becker-gut… Santosh Chokhani
- Re: [lamps] Call for adoption of draft-becker-gut… Carl Wallace
- Re: [lamps] Call for adoption of draft-becker-gut… Carl Wallace
- Re: [lamps] Call for adoption of draft-becker-gut… Tadahiko Ito
- Re: [lamps] Call for adoption of draft-becker-gut… Julien Prat
- Re: [lamps] Call for adoption of draft-becker-gut… Tim Hollebeek
- Re: [lamps] Call for adoption of draft-becker-gut… Mike Ounsworth
- Re: [lamps] Call for adoption of draft-becker-gut… Kampanakis, Panos
- Re: [lamps] Call for adoption of draft-becker-gut… Michael Richardson
- Re: [lamps] Call for adoption of draft-becker-gut… aebecke@uwe.nsa.gov
- Re: [lamps] Call for adoption of draft-becker-gut… Kampanakis, Panos
- Re: [lamps] Call for adoption of draft-becker-gut… Santosh Chokhani
- Re: [lamps] Call for adoption of draft-becker-gut… Michael Markowitz
- Re: [lamps] Call for adoption of draft-becker-gut… Mike Ounsworth
- Re: [lamps] Call for adoption of draft-becker-gut… Kampanakis, Panos
- Re: [lamps] Call for adoption of draft-becker-gut… Tomofumi Okubo
- Re: [lamps] Call for adoption of draft-becker-gut… Tim Hollebeek
- Re: [lamps] Call for adoption of draft-becker-gut… Kampanakis, Panos
- Re: [lamps] Call for adoption of draft-becker-gut… Seo Suchan
- Re: [lamps] Call for adoption of draft-becker-gut… Santosh Chokhani
- Re: [lamps] Call for adoption of draft-becker-gut… Tomofumi Okubo
- Re: [lamps] Call for adoption of draft-becker-gut… Santosh Chokhani
- Re: [lamps] Call for adoption of draft-becker-gut… Tomofumi Okubo
- Re: [lamps] Call for adoption of draft-becker-gut… Russ Housley