Re: [lamps] The Status of OCSP and its future
"Dr. Pala" <madwolf@openca.org> Fri, 25 October 2019 15:18 UTC
Return-Path: <madwolf@openca.org>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C9C41120123 for <spasm@ietfa.amsl.com>; Fri, 25 Oct 2019 08:18:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TU3gsr7K7HcT for <spasm@ietfa.amsl.com>; Fri, 25 Oct 2019 08:18:15 -0700 (PDT)
Received: from mail.katezarealty.com (mail.katezarealty.com [104.168.158.213]) by ietfa.amsl.com (Postfix) with ESMTP id 33E4E120105 for <spasm@ietf.org>; Fri, 25 Oct 2019 08:18:15 -0700 (PDT)
Received: from localhost (unknown [127.0.0.1]) by mail.katezarealty.com (Postfix) with ESMTP id EA051374288F; Fri, 25 Oct 2019 15:18:14 +0000 (UTC)
X-Virus-Scanned: amavisd-new at katezarealty.com
Received: from mail.katezarealty.com ([127.0.0.1]) by localhost (mail.katezarealty.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id nJHEJ5rvl9Be; Fri, 25 Oct 2019 11:18:14 -0400 (EDT)
Received: from Maxs-MBP-2.cablelabs.com (unknown [192.160.73.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.katezarealty.com (Postfix) with ESMTPSA id E4BFD3741074; Fri, 25 Oct 2019 11:18:13 -0400 (EDT)
To: Ryan Sleevi <ryan-ietf@sleevi.com>
Cc: LAMPS WG <spasm@ietf.org>
References: <8c84cf2c-c192-c13b-17e5-7ae09b748530@openca.org> <CAErg=HE6fJ3nfXhakckbf=ghJ6=kXQCmYy5_+LNHprqvYeEJFA@mail.gmail.com>
From: "Dr. Pala" <madwolf@openca.org>
Message-ID: <07ee43b6-a1b2-c2d4-2361-e6f87d0197c0@openca.org>
Date: Fri, 25 Oct 2019 09:18:13 -0600
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:60.0) Gecko/20100101 Thunderbird/60.9.0
MIME-Version: 1.0
In-Reply-To: <CAErg=HE6fJ3nfXhakckbf=ghJ6=kXQCmYy5_+LNHprqvYeEJFA@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------7E30010E0AE6F07E5C36392F"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/yS-a6XX7PauDo0CCBCY-hK7ecdE>
Subject: Re: [lamps] The Status of OCSP and its future
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Oct 2019 15:18:17 -0000
Hi Ryan, On 10/24/19 9:37 AM, Ryan Sleevi wrote: > > > On Thu, Oct 24, 2019 at 11:01 AM Dr. Pala <madwolf@openca.org > <mailto:madwolf@openca.org>> wrote: > > Hi All, > > I just wanted to start the conversation around the status of > revocation infrastructures and possible work we can be doing to > address some of new issues deriving [...]Our approach stem from > two practical considerations: the occasion to provide optimized > responses for the non-revoked case, and the possibility to reduce > the number of round trips required to retrieve the revocation > status for the full chain of certificates. > > Don't CRLs address this use case? Yes and No. "Yes" because CRLs provide the same type of information - you are correct :D "No" because CRLs provide all the information at once - the reason we have OCSP today is to address the "Large CRLs" problem. > That is, it's not clear "Why OCSP" vs "Why not something else" in your > overall message here. Well, I do not want to exclude the possibility to work on "something else" :D Our proposal is to provide a more efficient way to deliver the service that can still be used with current protocols (e.g., OCSP stapling) - this addresses the medium-term deployment and, we believe, provide an additional tool for the PKI architects when planning / designing the revocation infrastructure for their PKIs. If there are other proposals on the table for improving efficiency, it would be great to hear them - this can spark an healthy discussion around handling revocation in PKIX (maybe a dedicated WG if LAMPS is not the right place... ?) :D However, until then, our proposal is to work on something rather than not do anything :D > [ ...] > > On a conceptual level, how is the concept of "Signed status > information for a range of certificates" functionally or conceptually > different than a CRL, potentially sharded (e.g. by varying the > issuerDistributionPoint extension within the CRL and the > crlDistributionPoint within the range of certificates). > > As best I can tell, the only difference is that it allows the CA to > rebalance the ranges post-issuance, but it's unclear if that's either > good or desirable from a validator perspective. I think you got it right :D The main difference is that the issuerDistributionPoint is a static assignment and that might not be optimal. As you point out, it is a possibility today to do this, however there is no guarantee for the client that the target CRLs will not be big in size (since it is a static assignment, that is an unknown). Therefore, to provide the same level of flexibility, you might need to plan for thousands or even millions of different endpoints for a single CA. Conceptually, not a big issue. From a DevOps perspective... very scary, IMHO. > [...] > > Similarly, this is unclear the set of problems you're trying to solve. > Did you mean to provide status information about the full chain? Or > did you actually meant the full chain? > > Clients already presumably have the full chain, as they're using OCSP > in the context of RFC 5280 path validation. If the goal is to be able > to use this within protocols that make OCSP available (e.g. TLS), then > you already have the means to deliver the additional certificates. > > So I'm not sure how to interpret this suggestion here, and/or why OCSP > is somehow the appropriate technology for it. Sorry for the lack of clarity here - I meant providing the revocation information for the full chain, not the full chain itself :D In particular, although this is possible with today's protocol, it is a feature that is not used by clients. There might be several considerations as to why this is (my personal point of view is because of a series of different practical reasons - trust model, AIA in certificates, how path-building and validation is approached by crypto libraries). As discussed before, there might be some other technologies for this - our proposal is to provide an updated version of the OCSP that optimizes responses for the non-revoked case and lowers the operational requirements and costs associated with it. Does this address your questions ? Would you be interested in participating to the work ? Cheers, Max -- Best Regards, Massimiliano Pala, Ph.D. OpenCA Labs Director OpenCA Logo
- [lamps] The Status of OCSP and its future Dr. Pala
- Re: [lamps] The Status of OCSP and its future Ryan Sleevi
- Re: [lamps] The Status of OCSP and its future Phillip Hallam-Baker
- Re: [lamps] The Status of OCSP and its future Michael Richardson
- Re: [lamps] The Status of OCSP and its future Tomas Gustavsson
- Re: [lamps] The Status of OCSP and its future Dmitry Belyavsky
- Re: [lamps] The Status of OCSP and its future Tomas Gustavsson
- Re: [lamps] The Status of OCSP and its future Dr. Pala
- Re: [lamps] The Status of OCSP and its future Dr. Pala
- Re: [lamps] The Status of OCSP and its future Phillip Hallam-Baker
- Re: [lamps] The Status of OCSP and its future Dr. Pala
- Re: [lamps] The Status of OCSP and its future Dr. Pala
- Re: [lamps] The Status of OCSP and its future Ryan Sleevi
- Re: [lamps] The Status of OCSP and its future Phillip Hallam-Baker
- Re: [lamps] The Status of OCSP and its future Tomas Gustavsson