Re: [stir] Benjamin Kaduk's Discuss on draft-ietf-stir-enhance-rfc8226-03: (with DISCUSS and COMMENT)

Russ Housley <housley@vigilsec.com> Wed, 30 June 2021 16:27 UTC

Return-Path: <housley@vigilsec.com>
X-Original-To: stir@ietfa.amsl.com
Delivered-To: stir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E04883A220D for <stir@ietfa.amsl.com>; Wed, 30 Jun 2021 09:27:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MmzhQj-qzAuS for <stir@ietfa.amsl.com>; Wed, 30 Jun 2021 09:27:49 -0700 (PDT)
Received: from mail.smeinc.net (mail.smeinc.net [209.135.209.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C5F653A220E for <stir@ietf.org>; Wed, 30 Jun 2021 09:27:48 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.smeinc.net (Postfix) with ESMTP id 0116A3005D7 for <stir@ietf.org>; Wed, 30 Jun 2021 12:27:47 -0400 (EDT)
X-Virus-Scanned: amavisd-new at mail.smeinc.net
Received: from mail.smeinc.net ([127.0.0.1]) by localhost (mail.smeinc.net [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id azBZ8jSkJ0Ji for <stir@ietf.org>; Wed, 30 Jun 2021 12:27:42 -0400 (EDT)
Received: from a860b60074bd.fios-router.home (pool-141-156-161-153.washdc.fios.verizon.net [141.156.161.153]) by mail.smeinc.net (Postfix) with ESMTPSA id BC6A3300230; Wed, 30 Jun 2021 12:27:42 -0400 (EDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.21\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <3BC0966B-BA80-43FD-9893-30C9D64AB8AB@team.neustar>
Date: Wed, 30 Jun 2021 12:27:42 -0400
Cc: IETF STIR Mail List <stir@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <5B268430-AEEC-470E-A3AA-153B2E1F5B45@vigilsec.com>
References: <162491913776.24561.10295832590740387025@ietfa.amsl.com> <17CC8994-103E-4EA6-BF43-624F0A08FD5B@vigilsec.com> <20210629050839.GC17170@kduck.mit.edu> <A46901E1-E0B6-45FB-B70A-70771643BC5B@vigilsec.com> <20210629140724.GE17170@kduck.mit.edu> <43571C73-38E6-4B58-9BE6-536B83C35CCF@vigilsec.com> <BD2651EC-175A-45D3-A098-2B48A3B96BBE@nostrum.com> <1B56D3D0-C887-435E-A611-C01AD6D446EF@vigilsec.com> <559AFF0B-2CAD-4203-B383-CE49087D96C5@nostrum.com> <E59CDA6C-D54E-4041-933D-A47B491862EC@vigilsec.com> <7E6BED26-32EF-4545-A862-8C23B7A19CCD@nostrum.com> <62E5EAE7-5A33-4C8E-A17D-BD0CC25AE97F@vigilsec.com> <3BC0966B-BA80-43FD-9893-30C9D64AB8AB@team.neustar>
To: "Peterson, Jon" <jon.peterson=40team.neustar@dmarc.ietf.org>
X-Mailer: Apple Mail (2.3445.104.21)
Archived-At: <https://mailarchive.ietf.org/arch/msg/stir/363lY-oAh_9aJT2is-eNqDJPNWg>
Subject: Re: [stir] Benjamin Kaduk's Discuss on draft-ietf-stir-enhance-rfc8226-03: (with DISCUSS and COMMENT)
X-BeenThere: stir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/stir>, <mailto:stir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stir/>
List-Post: <mailto:stir@ietf.org>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/stir>, <mailto:stir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Jun 2021 16:27:55 -0000

Thanks Jon.

I understand that the EnhancedJWTClaimConstraints extension will support certificate delegation as well as other things.  In an 0ff-list message, I learned that the ATIS will be mandating support for the EnhancedJWTClaimConstraints extension in one of their documents.  So, this approach seems to be on target.

Russ

> On Jun 30, 2021, at 11:37 AM, Peterson, Jon <jon.peterson=40team.neustar@dmarc.ietf.org> wrote:
> 
> 
> I don't know that enhanced constraints need to be coupled that tightly to delegation. When delegation gets approved in the SHAKEN ecosystem (I wouldn't venture when exactly that will be), it would certainly make sense for SHAKEN specs to point to the enhanced constraints, but I'm not sure there's something we need to close in the IETF to make that possible. I think your Section 6 text looks fine. I guess I can also imagine non-delegation cases that could use enhanced constraints in the future as well, so I wouldn't necessarily want to make them so intertwined.
> 
> Jon Peterson
> Neustar, Inc.
> 
> On 6/29/21, 2:34 PM, "stir on behalf of Russ Housley" <stir-bounces@ietf.org on behalf of housley@vigilsec.com> wrote:
> 
>    Based on the comments from Ben Kaduk, I drafted the below guidance to CAs.
> 
>> 6.  Guidance to Certification Authorities
>> 
>> The EnhancedJWTClaimConstraints extension specified in this document
>> and the JWTClaimConstraints extension specified in [RFC8226] MUST NOT
>> both appear in the same certificate.
>> 
>> If the situation calls for mustExclude constraints, then the
>> EnhancedJWTClaimConstraints extension is the only extension that can
>> express the constraints.
>> 
>> On the other hand, if the situation does not call for mustExclude
>> constraints, then either the EnhancedJWTClaimConstraints extension or
>> the JWTClaimConstraints extension can express the constraints.  Until
>> such time as the EnhancedJWTClaimConstraints become widely
>> implemented, the use of the JWTClaimConstraints extension may be more
>> likely to be implemented.  This guess is based on the presumption
>> that the first specified extension will be implemented more widely in
>> the next few years.
> 
> 
>    The delegated certs activities lead to this document in the first place, so it seems appropriate to ask when people think that delegate certificates will be implement?  Will a future version of the delegated certificates document mandate the implementation of the EnhancedJWTClaimConstraints extension?  Do these answers to these questions offer any better guidance than the above?
> 
>    Russ
>