Re: [stir] Review of draft-ietf-stir-passport-09

Eric Rescorla <ekr@rtfm.com> Sun, 30 October 2016 21:59 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: stir@ietfa.amsl.com
Delivered-To: stir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7B253129485 for <stir@ietfa.amsl.com>; Sun, 30 Oct 2016 14:59:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.593
X-Spam-Level:
X-Spam-Status: No, score=-0.593 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, TRACKER_ID=1.306] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CwTRfsN-PMcf for <stir@ietfa.amsl.com>; Sun, 30 Oct 2016 14:59:15 -0700 (PDT)
Received: from mail-yb0-x22d.google.com (mail-yb0-x22d.google.com [IPv6:2607:f8b0:4002:c09::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AE07F1293FE for <stir@ietf.org>; Sun, 30 Oct 2016 14:59:15 -0700 (PDT)
Received: by mail-yb0-x22d.google.com with SMTP id g68so53146710ybi.0 for <stir@ietf.org>; Sun, 30 Oct 2016 14:59:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=qs9pqjLuoW02lHN6Y1SDPFgPtL7PqwSHOa51L8UGgQc=; b=NS1bTIKsT0yT5KUUSwZOaGSCi1VXhuy8BbKtPWGOhkd+EBU4wLAGw5+2F1rbD5wSYu lPVe1URDCwCfmF+010azOuZEfj2psEBHamMbpI0kU9NinATpAlPJMtJi9uKVnuctxUQ0 xiO/fXhZXmwHt3VuzpeeB3z57I6r1cAnh7GnAcHvj059jWBjGdaNgl7JcOg0HrGuKZzc utA++MWvj8dYXtTCVQsRVLAp8k8ktHU3SChJJXMErZENnGUXK9so0Nx4VWGGr38Wiv3m 0wh8BjnswZ8eA8mDBOB+pj5W88c5QHjGDQwPUPm/KX272p3VkrvbsnblP5M1IkjuKl1l FV5Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=qs9pqjLuoW02lHN6Y1SDPFgPtL7PqwSHOa51L8UGgQc=; b=BwvMWMcAejjL4+6QtI6/BGfSW38knwSnfGfenNf0vHw4cvdCE1xpHyeXlKi5Fdfnts m6gad8LCmGnfKLpn1EHvNyXwvtB5C4Zf/62PRVV+WIiQEZZ3NFpptG7Z2xTqcTbIgAJx wYLpkdlXMsgaPD3WB2eNoca75vqlzARijkiyQ6+xfYglMnbV6Nvp9HW/dOkumZ3KJ1cb ijugzqH0BT0b31G4Igvaj3oppCaxS45YVAVGFefDIKZn3709aFYPDO47o40nnh05BS+C 2J++WJ1HnxILmdbk2VhITT6oKBL8Y4Bnk7kKDT98s8XRlNtVV2NuBp4onPRx822xmGVg /YPw==
X-Gm-Message-State: ABUngve0AnHxn19rZBU3AZ1vPcGQPiNNWN0MUe/sjdEzH1dCqPJbpe1PqCmRWYPoNYh538MqnTMO1Uerdw+5kA==
X-Received: by 10.37.246.9 with SMTP id t9mr5983656ybd.107.1477864754907; Sun, 30 Oct 2016 14:59:14 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.129.82.210 with HTTP; Sun, 30 Oct 2016 14:58:34 -0700 (PDT)
In-Reply-To: <6DBDA70B-586B-4383-853F-34675DC8BF2D@chriswendt.net>
References: <CABcZeBOH+L+AJC40s00tj5QLMOr4XHCkMckFh8tQ5Opsn5qtsQ@mail.gmail.com> <6DBDA70B-586B-4383-853F-34675DC8BF2D@chriswendt.net>
From: Eric Rescorla <ekr@rtfm.com>
Date: Sun, 30 Oct 2016 14:58:34 -0700
Message-ID: <CABcZeBPNkiugeWYnJzYHGUSwxX7XP3=+a2P5V-rUpi7Z0zgh6w@mail.gmail.com>
To: Chris Wendt <chris-ietf@chriswendt.net>
Content-Type: multipart/alternative; boundary="f403045db074be45cc05401c33c5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/stir/4KUHxG_28xecvWn3OEFG-lo-CEw>
Cc: "stir@ietf.org" <stir@ietf.org>
Subject: Re: [stir] Review of draft-ietf-stir-passport-09
X-BeenThere: stir@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/stir>, <mailto:stir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stir/>
List-Post: <mailto:stir@ietf.org>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/stir>, <mailto:stir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 30 Oct 2016 21:59:17 -0000

On Sun, Oct 30, 2016 at 2:03 PM, Chris Wendt <chris-ietf@chriswendt.net>
wrote:

> Hi Eric,
>
> Thanks.  Answers inline.
>
> -Chris
>
> On Oct 29, 2016, at 7:32 AM, Eric Rescorla <ekr@rtfm.com> wrote:
>
> OVERALL
> This document would be easier to read if it came with an example
> at the beginning (perhaps the one in 9.1).
>
> I've also been thinking about the use of a URL here. This has
> the result that it doesn't bind the certificate itself into the
> digital signature, but only the URL. So this implies that it's
> at least potentially possible to substitute one certificate
> for another with the same private key. Is that a concern here?
>
>
> Other than stolen private key scenarios, which are a concern whether you
> use URL or not, I’m not sure of a reason why someone would want to do this
> for legitimate reasons and there would be any concern for multiple
> certificates being able to validate a call, or whether someone with
> legitimate access to the private key and would want to use this technique
> illegitimately would be a valid scenario unless they are a bad actor in the
> first place.
>

Sorry for not being clear: my concern is that this might be used as an
attack. I don't immediately have one to hand, but....

-Ekr



S 4.3.
> Certificate chains are generally self-validating, so can you explain
> why you need HTTPS here? Clearly, it's good practice for confidentiality
> and to prevent other forms of attack, but still.
>
>
> https://tools.ietf.org/html/rfc7515#section-4.1.5 does call for it.  I
> could certainly remove the direct reference to this fact and leave it to
> the generic reference to RFC7515.  It also technically calls for server
> identity validation using RFC6125 as well.
>
>
>
>
> S 5.2.
>    {
>    "dest":{
>           "tn":["12125551212"],
>               "uri":["sip:alice@example.com",
>                   "sip:bob@example.net"]
>           },
>           "iat":"1443208345",
>           "orig":{"tn":"12155551212"}
>       }
>
> This indentation seems weird. Should you be outdenting the "uri" line.
>
>
> Simple format problem, fixed.
>
>
> S 5.2.2.
> Given the ambiguity about multiple fingerprints, you should probably
> cite the 4572-bis draft.
>
>
> Added.
>
>
>
> S 7.
>     The using protocol of the compact form of PASSporT MUST
>
> This "using protocol" language is pretty odd. Maybe define a specific
> term somewhere else? "application protocol"?
>
>
> The “using protocol” was a suggestion from JP, so i’ll let him answer that.
>
> S 9.
>    JSON, as a canonical format, can include spaces and line breaks, and
>    key value pairs can occur in any order.
>
> Doesn't this mean that JSON isn't canonical?
>
>
> good point :) fixed.
>
>
>
> S A.1, A.2
>
> These aren't actually X.509 structure. Also, the private key in S 8.1
> is in an OpenSSL-specific structure. Could you encode it in PKCS#8.
>
>
> Ok so I’ll do this:
>
> openssl pkcs8 -topk8 -nocrypt -in key.pem -out p8file.pem
>
> -----BEGIN PRIVATE KEY-----
> MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgi7q2TZvN9VDFg8Vy
> qCP06bETrR2v8MRvr89rn4i+UAahRANCAAQWfaj1HUETpoNCrOtp9KA8o0V79IuW
> ARKt9C1cFPkyd3FBP4SeiNZxQhDrD0tdBHls3/wFe8++K2FrPyQF9vuh
> -----END PRIVATE KEY——
>
> Correct?
>

That looks like it should be right.

-Ekr


>
>
>
> _______________________________________________
> stir mailing list
> stir@ietf.org
> https://www.ietf.org/mailman/listinfo/stir
>
>
>