Re: [lamps] is the CSRattr ASN.1 broken or not ... Re: New Version Notification for draft-richardson-lamps-rfc7030-csrattrs-02.txt

Michael Richardson <mcr+ietf@sandelman.ca> Tue, 05 April 2022 17:39 UTC

Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 220E23A0E5C for <spasm@ietfa.amsl.com>; Tue, 5 Apr 2022 10:39:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.109
X-Spam-Level:
X-Spam-Status: No, score=-2.109 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=sandelman.ca
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NVHJ0-aYRm7M for <spasm@ietfa.amsl.com>; Tue, 5 Apr 2022 10:39:33 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [IPv6:2607:f0b0:f:3:216:3eff:fe7c:d1f3]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 54A5E3A0E3E for <spasm@ietf.org>; Tue, 5 Apr 2022 10:39:32 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by tuna.sandelman.ca (Postfix) with ESMTP id 9B90938B82; Tue, 5 Apr 2022 13:50:38 -0400 (EDT)
Received: from tuna.sandelman.ca ([127.0.0.1]) by localhost (localhost [127.0.0.1]) (amavisd-new, port 10024) with LMTP id Q4KI5Mw_aVeJ; Tue, 5 Apr 2022 13:50:37 -0400 (EDT)
Received: from sandelman.ca (obiwan.sandelman.ca [IPv6:2607:f0b0:f:2::247]) by tuna.sandelman.ca (Postfix) with ESMTP id 6E43138B7B; Tue, 5 Apr 2022 13:50:37 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=sandelman.ca; s=mail; t=1649181037; bh=57FFsxrw26t/UykHdMIv/r159l+QcgjoK4JYJ8fPQPU=; h=From:To:Subject:In-Reply-To:References:Date:From; b=u1CynbHIYFNT618+f7KOoABG3JNbqkgWHEuDMaY5PsWVfw5QPzlktPZ9hWl/SfeRD St7l4YlOwDdhXHjGqA3UInC3YVV8QmPp/u7PCya4yllIkwTAA5kNa/xdwACsGGqxZU p9pq9Rq4S6Jzyf6o5CygKgCelZq8gcSW7XulpHgZ13rAGsgvmcqnLvEyLWTJSlfhm8 x03wN6+vIeaUQbkQk4JBmGJWpnH+UCa0Xm9vx0VT9YXIxbXoUc8J3FAMs61KbqaUhT uDsQy7yuVTPUsk0ZeSBCTRohReyHB1NiPYGu9s/R5k5NoH8fcggNlK4eW5peLzmTZb QevnIn5Jf1mqA==
Received: from localhost (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id E245A12D; Tue, 5 Apr 2022 13:39:28 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: Russ Housley <housley@vigilsec.com>, David von Oheimb <David.von.Oheimb@siemens.com>, LAMPS WG <spasm@ietf.org>
In-Reply-To: <997A2058-20B5-4B95-AFFA-22FB145D798D@vigilsec.com>
References: <164667410940.12091.15394112688281514126@ietfa.amsl.com> <15416.1646681868@localhost> <D095D84D-9633-44BB-AA6F-440B8BC00F68@sn3rd.com> <5cfb6e20b225da072695a4f13088a8065203ca4e.camel@siemens.com> <9649E03B-99A8-420C-8D56-CC0CD0E5F8F8@vigilsec.com> <230008b3fdb35674f01eb37145a9e979d35a74b2.camel@siemens.com> <997A2058-20B5-4B95-AFFA-22FB145D798D@vigilsec.com>
X-Mailer: MH-E 8.6+git; nmh 1.7+dev; GNU Emacs 26.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature"
Date: Tue, 05 Apr 2022 13:39:28 -0400
Message-ID: <15796.1649180368@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/oE65p3-2Qlt5f4llSR6jY285SOI>
Subject: Re: [lamps] is the CSRattr ASN.1 broken or not ... Re: New Version Notification for draft-richardson-lamps-rfc7030-csrattrs-02.txt
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Apr 2022 17:39:38 -0000

Russ Housley <housley@vigilsec.com> wrote:
    > I do not understand why my approach leads to a backward compatibility
    > concern.

I'm not sure that your proposal does.
I think that David is just posting a strawman for the case where we think we
can't make it work.

    > Only if the same OID is being used in more than one way by
    > different implementations is there a concern.  If we can list those, we
    > might be able to just document the preferred approach and note the
    > other things that are seen in the wild.

The only question for me is clarifying what it means to request a value.
It sure feels like:

>> -  Requests to use a particular
>>    crypto system (e.g., certification of a public key based on a certain
>>    elliptic curve) are represented as an attribute, to be reflected as
>>    the AlgorithmIdentifier of the SubjectPublicKeyInfo, with a type

is a case where the Registrar/EST-server is telling the client to use a
particular value for the AlgorithmIdentifier.  Yes, that has knock-on effects
in making it pick a particular public key format!

But, it feels the same as the Registrar/EST-server telling the client what
dNSName to put into the SAN.

(Russ: I added you to the invite to the design team meeting tomorrow. Come if
you have time)


--
Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide