Re: [lamps] New drafts available - non-composite hybrid authentication, and binding certs
Ryan Sleevi <ryan-ietf@sleevi.com> Tue, 22 March 2022 23:11 UTC
Return-Path: <ryan.sleevi@gmail.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 543523A11EB
for <spasm@ietfa.amsl.com>; Tue, 22 Mar 2022 16:11:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.412
X-Spam-Level:
X-Spam-Status: No, score=-6.412 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.248,
FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.248,
HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001,
SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01,
URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id jseeouosfwat for <spasm@ietfa.amsl.com>;
Tue, 22 Mar 2022 16:11:41 -0700 (PDT)
Received: from mail-ua1-f47.google.com (mail-ua1-f47.google.com
[209.85.222.47])
(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id DBC6B3A11E3
for <spasm@ietf.org>; Tue, 22 Mar 2022 16:11:40 -0700 (PDT)
Received: by mail-ua1-f47.google.com with SMTP id 34so7579276uao.13
for <spasm@ietf.org>; Tue, 22 Mar 2022 16:11:40 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20210112;
h=x-gm-message-state:mime-version:references:in-reply-to:from:date
:message-id:subject:to:cc;
bh=h5BLGtuhDbPrfTea6fZNHr+d5qC35Z9THbWq+fFKUQw=;
b=TtlnDMpwkH4Rw5vMJDEIzRbG4zRs2WtfPOMWbZ226/NIDf9eNdYip1NaOH0Y/bCHLv
Lqvm9OznsLtsbRDDwHRtlT4APZPKR8Oad2LOOmnZlo5AB1q4NnshP/++jegIQecksxeT
4ZYdeoU8tEkE/vOs6HjuJrRab8Fn8yTdHqabjVh2cWhbz7USGdEqwMJ91Yor3lm05R2F
e1LtDBar3YJD65rdzl8c7auNeDIR43yLSD0UbMPfs6OZNfreYSebmilsqDrcIfE0ruwE
aLPNHQgWsA3XIyfzoj35TDCvZE9BNxXptVZnN5sXy3nqK9baKRoRtvJRWxY6dSQn+ciL
prOA==
X-Gm-Message-State: AOAM530Xw1fmyWeA6JBtylgjGQHFmOwK3IXSlWp6Yjzh2K6WCw7OgioR
H0x8TcliJjLft7nm2zNbd4SRmAtZOLk=
X-Google-Smtp-Source: ABdhPJys4kexeDRZtBTQpMAhhlZl03905PMHXASMdQibDcRx7f+Yo6fc1tkgFn0OGwD50R5mLseJjw==
X-Received: by 2002:ab0:4504:0:b0:351:2448:a093 with SMTP id
r4-20020ab04504000000b003512448a093mr9677028uar.121.1647990699625;
Tue, 22 Mar 2022 16:11:39 -0700 (PDT)
Received: from mail-vs1-f42.google.com (mail-vs1-f42.google.com.
[209.85.217.42]) by smtp.gmail.com with ESMTPSA id
i41-20020a0561220c6900b0033dde06ac10sm2680920vkr.43.2022.03.22.16.11.39
for <spasm@ietf.org>
(version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
Tue, 22 Mar 2022 16:11:39 -0700 (PDT)
Received: by mail-vs1-f42.google.com with SMTP id i63so16232233vsi.5
for <spasm@ietf.org>; Tue, 22 Mar 2022 16:11:39 -0700 (PDT)
X-Received: by 2002:a05:6102:14a2:b0:324:eb2a:d9ab with SMTP id
d34-20020a05610214a200b00324eb2ad9abmr7014352vsv.7.1647990699040; Tue, 22 Mar
2022 16:11:39 -0700 (PDT)
MIME-Version: 1.0
References: <SA0PR09MB72412B7DA4F1DDA68A40AD1EF1179@SA0PR09MB7241.namprd09.prod.outlook.com>
In-Reply-To: <SA0PR09MB72412B7DA4F1DDA68A40AD1EF1179@SA0PR09MB7241.namprd09.prod.outlook.com>
From: Ryan Sleevi <ryan-ietf@sleevi.com>
Date: Tue, 22 Mar 2022 19:11:26 -0400
X-Gmail-Original-Message-ID: <CAErg=HHCo_SSNmq111oUZjw-L+445jQrARUHDzjZExQZr02SJw@mail.gmail.com>
Message-ID: <CAErg=HHCo_SSNmq111oUZjw-L+445jQrARUHDzjZExQZr02SJw@mail.gmail.com>
To: "aebecke@uwe.nsa.gov" <aebecke=40uwe.nsa.gov@dmarc.ietf.org>
Cc: "spasm@ietf.org" <spasm@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000035ac1105dad6bc0b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/mjgo6NoNo0qqRjVE3r3zbhViJbE>
Subject: Re: [lamps] New drafts available - non-composite hybrid
authentication, and binding certs
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime
\(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>,
<mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>,
<mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2022 23:11:45 -0000
Could you explain the rationale a bit more for the IssuerAndSerialNumber
construction?
It won't necessarily unambiguously identify a certificate, in the absence
of a global directory. Within a multi-stakeholder PKI (like those deployed
on the Internet today), it's possible for two distinct entities to have the
same encoded issuer value, but be in possession of distinct keys. The path
algorithms involved in X.509 and PKIX are able to resolve this (by virtue
of signature checking to resolve which issuing CA), which also applies to
OCSP responses, but it seems like it wouldn't apply here. Broadly, the
assumption of X.509v3 that Issuer and Serial Number would be globally
unique and unambiguous didn't hold, as previous communications in the IETF
with the ITU revealed [1][2][3], and that Distinguished Names aren't, well,
Distinguished. Is there reason not to use a stronger binding (e.g. the hash
of the certificate being referenced)?
If two certificates, A and B, both identify the same Subject ("Subject
Foo"), but with different keys and numbering schemes, it seems that if a
bound certificate was issued to entity C, with IssuerAndSerial of "Subject
Foo":1 (referring to A), that B could issue a malicious certificate bearing
that same serial number, and have it be accepted as legitimate for C.
That said, I do feel I must be missing an important use case, because I'm
not fully sure I see the utility in this. Is it fair to say that the
assumption is that both certificates (the original and the bound
certificate) are participants in the same PKI hierarchy and same set of PKI
policies? If they weren't, it seems like the issuance of the
BoundCertificate may introduce operational considerations for the
renewal/replacement of the target/original certificate, in that replacement
of the original would necessitate issuing a new bound certificate. Wouldn't
that unintentionally affect the security considerations/agility of the
target/original certificate, in unanticipated and perhaps harmful ways?
Minimally, it seems such chains of binding would have to be ordered from
"slowest to fastest to replace", to mitigate, and that seems like a
relevant security consideration.
[1] https://www.ietf.org/proceedings/70/minutes/pkix.htm
[2] https://www.ietf.org/proceedings/70/slides/pkix-4.pdf
[3] https://datatracker.ietf.org/liaison/375/
On Tue, Mar 22, 2022 at 2:16 PM aebecke@uwe.nsa.gov <aebecke=
40uwe.nsa.gov@dmarc.ietf.org> wrote:
> Hi LAMPS,
>
> Two new drafts related to PQ migration are available here (note- these
> drafts are an update to the talk we gave at IETF112 in November) :
> https://datatracker.ietf.org/doc/draft-becker-guthrie-cert-binding-for-multi-auth/
> and
> https://datatracker.ietf.org/doc/draft-becker-guthrie-noncomposite-hybrid-auth/
>
>
>
> The noncomposite-hybrid-auth-00 draft is an informational draft that gives
> a general overview of hybrid authentication, and details the solution space
> of what we are calling non-composite type hybrid solutions for
> authentication.
>
> The cert-binding-for-multi-auth-00 draft defines a new CSR attribute,
> bindingRequest, and a new X.509 certificate extension, BoundCertificates,
> which together provide additional assurance that multiple certificates
> (used in non-composite hybrid authentication) each belong to the same end
> entity.
>
> Please feel free to provide any comments and feedback!
>
> Regards,
> Alie Becker + coauthors Rebecca Guthrie, Mike Jenkins
>
> ----
> Alison Becker, PhD
> Center for Cybersecurity Standards
> National Security Agency
> _______________________________________________
> Spasm mailing list
> Spasm@ietf.org
> https://www.ietf.org/mailman/listinfo/spasm
>
- [lamps] New drafts available - non-composite hybr… aebecke@uwe.nsa.gov
- Re: [lamps] New drafts available - non-composite … Ryan Sleevi
- Re: [lamps] New drafts available - non-composite … Kampanakis, Panos
- Re: [lamps] New drafts available - non-composite … David A. Cooper
- Re: [lamps] New drafts available - non-composite … aebecke@uwe.nsa.gov
- Re: [lamps] New drafts available - non-composite … Ryan Sleevi
- Re: [lamps] New drafts available - non-composite … aebecke@uwe.nsa.gov
- Re: [lamps] New drafts available - non-composite … aebecke@uwe.nsa.gov
- Re: [lamps] New drafts available - non-composite … aebecke@uwe.nsa.gov
- Re: [lamps] New drafts available - non-composite … Michael Richardson
- Re: [lamps] New drafts available - non-composite … Ryan Sleevi
- Re: [lamps] New drafts available - non-composite … aebecke@uwe.nsa.gov
- Re: [lamps] New drafts available - non-composite … Michael Richardson
- Re: [lamps] [EXTERNAL] New drafts available - non… Mike Ounsworth