[lamps] Q: Creating CSR for encryption-only cert?

"Blumenthal, Uri - 0553 - MITLL" <uri@ll.mit.edu> Tue, 04 October 2022 15:06 UTC

Return-Path: <prvs=827650c2f8=uri@ll.mit.edu>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 76738C14F733; Tue, 4 Oct 2022 08:06:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.907
X-Spam-Level:
X-Spam-Status: No, score=-6.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IWJtX8fKxEp5; Tue, 4 Oct 2022 08:06:07 -0700 (PDT)
Received: from MX2.LL.MIT.EDU (mx2.ll.mit.edu [129.55.12.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C581AC1522D2; Tue, 4 Oct 2022 08:06:01 -0700 (PDT)
Received: from LLEX2019-3.mitll.ad.local (llex2019-3.llan.ll.mit.edu [172.25.4.125]) by MX2.LL.MIT.EDU (8.17.1.5/8.17.1.5) with ESMTPS id 294F5ick011178 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Tue, 4 Oct 2022 11:05:44 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector5401; d=microsoft.com; cv=none; b=peEPDtgkEmG+4sDCQIV5Ycg+x+3Xg2VUs4Kp/ovz5+S6oIV+ygzjOripeTwihKah0F/kP3W58oTH5oOkvCnL8gPlsElC0aGi48UtXOjzXTuOKRsoMcQ3MwFWBSm3M3f6GHzCBIypdzDDgOCYhu6t/JLPkNg5FmmgCSDv1lGBwbKMf7LXQCHa5aVq09UnlPXnHCefkDU24fpG3WUrvKJgYY1gVAJ/D/jMh2qNvtERqYH38L6L9j0tqgUJu/ZTHnZE53Bh8g8au8YfpHRxCEGz6UemmE7A9piQSt+cKH7hiCQx927XqE7GqmG42rBU8UPS44eoPMC0shppZwRhE5iTGw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector5401; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=T7pa57mrXg+e+vZLbyXZaRS4IhxZ7yPzj7Hm/5xYCYg=; b=TzF4YNd3O23MVs0CC1UYy7CU8n9qYdMZ/oBkFl2fLgdJfmLm/7L79ZBV8DzehRmyfTdm027NOeKb+l9JN49S7D0QCURwJ4PvNWdNCiwDEmuf2SirDVxoOXwhfYvb2Gc00OiuGSF0ZeqxvGSWNdkJpP1/1zCLsonKsNIWJKh4q1kLHMXTBFL9cO8QKxP1Ls981rFxVu301Oj0kA7d56VQtiYipFeI6BVWIiHL85TMGCiqCDBGOBLCrZqra4CnOjKO+LH3HSd73diqsBs2rULizVp6BX86NKHua0IT0hh2oDSP/YTrBoiX0hE73oZw626gXRbA5JJMYzhpINmJHAfRoA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ll.mit.edu; dmarc=pass action=none header.from=ll.mit.edu; dkim=pass header.d=ll.mit.edu; arc=none
From: "Blumenthal, Uri - 0553 - MITLL" <uri@ll.mit.edu>
To: "spasm@ietf.org" <spasm@ietf.org>, "tls@ietf.org" <tls@ietf.org>
Thread-Topic: Creating CSR for encryption-only cert?
Thread-Index: AQHY2ALNqOarpOBlxEup5bJD5yzQOg==
Date: Tue, 04 Oct 2022 15:05:55 +0000
Message-ID: <73EB3E92-8DCC-450E-BC11-AD923383FEFA@ll.mit.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.65.22091101
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN0P110MB1419:EE_|BN0P110MB1417:EE_
x-ms-office365-filtering-correlation-id: edb4bb88-fce7-4b92-9a13-08daa619f028
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN0P110MB1419.NAMP110.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230022)(366004)(451199015)(64756008)(86362001)(99936003)(38070700005)(33656002)(66946007)(38100700002)(66556008)(66476007)(66446008)(450100002)(76116006)(110136005)(8936002)(83380400001)(5660300002)(2906002)(2616005)(71200400001)(498600001)(26005)(6512007)(8676002)(75432002)(122000001)(6506007)(186003)(6486002)(45980500001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: P2QY0r7a0Hm9zpJincvN2QOOnHaAXeM6ni5fNFjGZfOWeW22HPRTlvobkFZvYiEqlNEu2PY4uvsmr+uUaKP8CFCrSkYDMvbeVdjWHrLHCdTabM8D5Z9xypXzl2dB2Cq8gELQzU80zFYAvw5+PakztDoD3Tn/1WX7vX3ZbqAmZgQkhvrex17q7Nt2p7FcqSRWtXur/G0nhFuFpnyBbbP6VTNXSsJGgdMJQZFGTVLVc11lwejf0dSx4IOstgY2wswabzax8W6TynZRgyTUs8ifvGFQTuxfiCLAV8zxSbKG0v97VIHxNEh3pjtQiEGS7zOi3XM6o/XixTWGv3g9thw3Sryf9WSGcWkhO3ZwkRT/OcjekUuJ2vc4cpl+qyydOQ1d7unJwEebDcZVpSnCRpDU40+6t50gRf3dxxJ7jMPU1DE=
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha256"; boundary="B_3747726355_1796768109"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN0P110MB1419.NAMP110.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: edb4bb88-fce7-4b92-9a13-08daa619f028
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Oct 2022 15:05:55.9464 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 83d1efe3-698e-4819-911b-0a8fbe79d01c
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN0P110MB1417
X-Proofpoint-GUID: G8SgTs-LjNAf8beH1xKr-dl7QEnuva5l
X-Proofpoint-ORIG-GUID: G8SgTs-LjNAf8beH1xKr-dl7QEnuva5l
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.895,Hydra:6.0.528,FMLib:17.11.122.1 definitions=2022-10-04_06,2022-09-29_03,2022-06-22_01
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 bulkscore=0 suspectscore=0 adultscore=0 spamscore=0 malwarescore=0 mlxscore=0 phishscore=0 mlxlogscore=838 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2209130000 definitions=main-2210040098
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/sQXausIAkgtqT56eUffQow2d_Qo>
Subject: [lamps] Q: Creating CSR for encryption-only cert?
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Oct 2022 15:06:12 -0000

TL;DR
Need to create a CSR for a key pair whose algorithm does not allow signing (either because it’s something like Kyber, or because restriction enforced by HSM). How to do it?

Longer version:

There are several use cases that require certifying long-term asymmetric keys that are only capable of encryption/decryption – but not signing/verification. That could be either because the algorithm itself does not do signing, or because the private key is generated and kept in a secure hardware that enforces usage restriction. 

One example of a protocol that needs this is KEMTLS - which I hope is accepted, either as-is, or with simplification.

CSR is supposed to be signed by the corresponding private key to prove possession. Obviously, it cannot be done with a key such as described above. How is this problem addressed in the real world?  With AuthKEM and KEMTLS, how would these protocols get their certificates?

A short discussion of this issue on the OpenSSL mailing list brought up Certificate Management Protocol (CMP) and CRMF format. Is that where we're heading? Are the "big CAs" on board with it?

Thanks!
-- 
V/R,
Uri