Re: [stir] OCSP and short-lived certs

Jack Rickard <jack.rickard@microsoft.com> Fri, 13 January 2023 16:19 UTC

Return-Path: <jack.rickard@microsoft.com>
X-Original-To: stir@ietfa.amsl.com
Delivered-To: stir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DFC8AC151719 for <stir@ietfa.amsl.com>; Fri, 13 Jan 2023 08:19:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.098
X-Spam-Level:
X-Spam-Status: No, score=-7.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aJu8LWi0jlla for <stir@ietfa.amsl.com>; Fri, 13 Jan 2023 08:19:36 -0800 (PST)
Received: from BN6PR00CU002-vft-obe.outbound.protection.outlook.com (mail-eastus2azon11021017.outbound.protection.outlook.com [52.101.57.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F0446C151533 for <stir@ietf.org>; Fri, 13 Jan 2023 08:19:35 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=UzmI+K4s07ju7vZ1RSE6f/7qxDc0NI/aPg604+9csZGMZC74zoJ28caYtWHbSs/ZNwJ5wXaJj48RCXK/u9excXxcuGojkRALnq7pYTwvMhl048ex11lqDym/MhvD3Xd7Px7KkVkp3T2Aj5C7QGG2SDyedfTAGb/CQG3QuY+8OMNbDU0L4/TAaDq0fb5Yfdvcq8K7TNxwQlBgnM+cZ5G9RFRZpwrExDs0sAsNKz2TI/72fY3gF7BSVEHGUVlbenyzZnqDFvKKQTx4UJPwHFG4lHWKQ9L4g5P6i5U1lMGyLmPo/vTUBu78hhQRI2Lv9Z+ZZOWA7ISkialVlEDapqVkmg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=MeXTQt6oECB4R7iPNWNs0KwSrCXXqAG6jZpE+nkD8yE=; b=KOVrDnogZ9ns48VcGvFpWvnnYpBHOPZVqEYqpAAMNI+eIX4FJYb0T8XcT5qOz8XR1yEs6Pl0wCvlGy/ca+fNv5ho3uqYQJwSn9NIUMMyiKs7Tb5ta2lTqwYuVRjx4wrsGKMUx9pkbZ0JTJoAxh6Dfl3csDU3o8yya8JJKSXuaIiJ0D8uEvCH4+A7Xk3jyUDXmqnHqph+yK1rCFisl1bX3MTtcvH96aGXs40T8kUyGDCx9PmCT0w23lHJla4Eb6H42t7aHB4tjWMBTaVI9fnqUS5TUYuRr8BddTTeMjwRy62ikrd/vRygIQ4JOJ581YcevVwTe4M8kmg3binG0LwVog==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MeXTQt6oECB4R7iPNWNs0KwSrCXXqAG6jZpE+nkD8yE=; b=L5m6p+GWcVn21wKylErtKa+iC8m0A12WMpAZdwqTw2REq+kVlCxgfhM2UJnGdmXwf6et4EwIoWZL0zLP2sng9UrDT4c6YnEEmOXyz6RuqtA/thCWvxqLlo2BMqlJnyTctw9t4Q+as+0laaKpnHtlPume4gP5G5Y1Dak41wVdV/c=
Received: from DM5PR00MB0390.namprd00.prod.outlook.com (2603:10b6:4:a0::26) by MW4PR00MB1551.namprd00.prod.outlook.com (2603:10b6:303:223::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6039.0; Fri, 13 Jan 2023 16:19:29 +0000
Received: from DM5PR00MB0390.namprd00.prod.outlook.com ([fe80::a3b0:2c4c:2c75:d5e0]) by DM5PR00MB0390.namprd00.prod.outlook.com ([fe80::a3b0:2c4c:2c75:d5e0%3]) with mapi id 15.20.6041.000; Fri, 13 Jan 2023 16:19:29 +0000
From: Jack Rickard <jack.rickard@microsoft.com>
To: "pierce@numeracle.com" <pierce@numeracle.com>, 'Jack Rickard' <jack.rickard=40microsoft.com@dmarc.ietf.org>, "'Peterson, Jon'" <jon.peterson@team.neustar>, 'IETF STIR Mail List' <stir@ietf.org>
CC: Simon Castle <simoncastle@microsoft.com>
Thread-Topic: [stir] OCSP and short-lived certs
Thread-Index: AQHZJ2rAa8oXh+Tpi0awmVtkeY6mlQ==
Date: Fri, 13 Jan 2023 16:19:03 +0000
Deferred-Delivery: Fri, 13 Jan 2023 16:17:58 +0000
Message-ID: <DM5PR00MB039001FFFD38EF085F79639188C29@DM5PR00MB0390.namprd00.prod.outlook.com>
References: <DM5PR00MB03929E33135A1AAE6CD5E4D888F59@DM5PR00MB0392.namprd00.prod.outlook.com> <057001d92609$36d8a870$a489f950$@numeracle.com>
In-Reply-To: <057001d92609$36d8a870$a489f950$@numeracle.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DM5PR00MB0390:EE_|MW4PR00MB1551:EE_
x-ms-office365-filtering-correlation-id: 7c4d5fa5-9dc1-4da1-c3fb-08daf581f294
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM5PR00MB0390.namprd00.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(376002)(346002)(39860400002)(366004)(136003)(396003)(451199015)(107886003)(66574015)(6666004)(53546011)(16799955002)(478600001)(86362001)(55016003)(6506007)(38070700005)(71200400001)(186003)(7696005)(8990500004)(166002)(99936003)(122000001)(82950400001)(38100700002)(82960400001)(9686003)(83380400001)(33656002)(9326002)(30864003)(316002)(8676002)(64756008)(66446008)(66476007)(76116006)(66946007)(44832011)(66556008)(4326008)(52536014)(66899015)(5660300002)(110136005)(8936002)(2906002)(41300700001)(10290500003)(579004); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 0bXNpHFKi7KTJPcSKGQqbO8QukmNo+ouaj2tajMnAyBCP+SBSj3vdejW4mWFLAsIVWzJqJPau4Klz7L+Nqm5E4Ph88CSVaTO1eGrYZpq/oWa4aXZxW2nAVrqPdwSrr7JBwahKRS3hq1IsWjrBqKBuGHKmwwS+rg93H0teabBYheuiptKhTRQP6mqGMYTSoWizETYKPn10x5BRaNN6EpEcv1YLG/L0b1cP9WClpom+/ZYjnodxkCXXohowDEbAeF9U8BWApxohgEWcmJWhMLThaUpxwnthbzSP6dOyT1MmcsKUJMUzL3QlJ/KwMPoTWSUe7KYQUC6CoSWUUDZxKb6RYtiR16msIIiDEeVMjrq3OiqTJdOca4ccK/IFlqjCtW8mP2gzsGHAa5TcY6aO+FdNlL8BsfxxNtLBbKtI2cxd2cIZMEprnoS6rlEfUe0WqEtjrlanIXG0FCbTEvcHwWC2HwZkxhnc0ePRR2WtZd3IS1Dp8AZwRw0m019UAewFrgigJMv/JXD5lumtrh8P41NYepY97Bhr+ep1Ot09VIKQVQoQPmCP1r4LswnF1UCs2GxtsBi9qYTfCWc080+ZF9XVAGDMTAtGSial8Td8752FW7ZbCsLeMHamMymNlzDrxl0jLppG/WgEyoplnQnMFlmldmgLfK0GIKMIpVHt4DidFGRUuEP7oTKgoquiZdCYvC54NiDEssVuD0uyj6MJejwn5dESbeHPan8ZyN0X1E8RxmgRbETlGvTG0TGeqR6n1xMB4FnlUcFfko97pV5uZqJuNrUQiLzYLX8Ni2iF5pm9JRly7K7s2cb3tZTbbLCZYvFGybUk+B5T6uTT1+jKhlvU47PTDT3hgf95mNmIuyZYDlBxuqSYRBfODVI4KC/elESOf1WR7ovi8hnRC0jBK8Lu6g8SYacQOB4SQUHDnP6y9EXHbqC8ALzKzbYbLq7x0tf4zyuvTatBFyFp3rkjhjgfDJ5ojuYioJ5Aa1FZ88NWO/wAUrn1BQKEnIByGULyA4Go01kFQlNvl4Ru5Ycb2PRUjO2q1V9/7QJeDrwFXSjO3RT107DaALqZ1L1dxg3Yz1zaLI2kaCifkXtwnUhBYFKWXlFUtph3Rviycq5GGxPkYyn0Bh+yPBzOi5/vKkH7rs//Uovqtwi9t+zZsW5/VSsIEf0MFxtpyHvceV7aRo1q/zE8QSR1ihcowzoNKcUX9zxV7BJ8GuB3xCu4JlrmnEQ9ro3oBPyKRB6XRnttwNBauGvS3P1hpWsjRSgexdXV8/p3iaIIPtD0b96UlLXKPS62vkjMUWOLtw13Vww6O79swXSd0M3w7Ue+E/qnCcaDF7O8MqXEKhZjXNTW81F0rOpU1ax3GaHCy7JXBXm3XfP801OW/yTFzkLl4eUOsOzVRcVGVfPSTRrR6rM+n6eiNdN7Y0i25zV4GHs1i5KOevt6I5bLV+q2rJnNSoPqiJiy1c6vgZs0JbnB2a91ez0lWuTFBjDVeYgnUbs+Ft9oGNOvPs5hF6qjmDFA/4Csmw6fHVMoBzEvsmk1+CUm3bDhC8djrO4J0cBXGSkrPpjapkr6n0CgEQSqispWYthnMqOh/blgCEe79CcXFdrTpzM/UfDHw==
Content-Type: multipart/related; boundary="_005_DM5PR00MB039001FFFD38EF085F79639188C29DM5PR00MB0390namp_"; type="multipart/alternative"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM5PR00MB0390.namprd00.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7c4d5fa5-9dc1-4da1-c3fb-08daf581f294
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Jan 2023 16:19:29.5611 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: rm++V1uu3ipQh/zlg0lnNt666iIycCmi6zhcZXdLvkkkjNdwj3q3tNb+AmVrQ4E4ATm7wmRr1GzDfoSkRJcBtIGebPbFQlMPZ7Id8+7oo/Q=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW4PR00MB1551
Archived-At: <https://mailarchive.ietf.org/arch/msg/stir/I8LDnrh8HM6kPUBhma2uSysYqP8>
Subject: Re: [stir] OCSP and short-lived certs
X-BeenThere: stir@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/stir>, <mailto:stir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stir/>
List-Post: <mailto:stir@ietf.org>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/stir>, <mailto:stir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Jan 2023 16:19:42 -0000

Hi Pierce,

By "The certificate issuer has control over the TNs that the certificate can sign over." I meant that under all these approaches the issuer of the certificate has complete control over what TNs the certificate has authority over (as you'd hope given how certificate hierarchies work). In the IETF's model tn authority is mostly left up to the specific deployment. That's not to say that something like an LEI extension isn't useful, but I think it's outside the scope of this issue.

Thanks,
Jack

From: stir <stir-bounces@ietf.org> On Behalf Of pierce@numeracle.com
Sent: Wednesday, January 11, 2023 10:08 PM
To: 'Jack Rickard' <jack.rickard=40microsoft.com@dmarc.ietf.org>; 'Peterson, Jon' <jon.peterson@team.neustar>; 'IETF STIR Mail List' <stir@ietf.org>
Cc: Simon Castle <simoncastle@microsoft.com>
Subject: [EXTERNAL] Re: [stir] OCSP and short-lived certs

Hi Jack,

Your outline of options is very well written.  Thank you for taking the time to write it.

If I understand correctly, I think I disagree with one point.

You said:

Facts about all approaches:

  *   The certificate issuer has control over the TNs that the certificate can sign over.

I may misunderstand, but I assume "control over the TNs" means the certificate issuer is provably authoritative for the assignment of the TNs.  This can be true but does not have to be true and I assume in some cases it will not be true.

With encouragement for correction where my suppositions are wrong or flawed, I'll summarize use case aspects of delegate certs in the STIR/SHAKEN context to illuminate what might be unrealistic expectations about validating TNs in or referenced by delegate certs with or without OCSP or stapling in hopes that the context is helpful as the group considers the options.

The values in a TNAuthList OID are an index into an array which specifies the type of value in the OID (i.e., SPC, TN range, or a TN) and the respective SPC, TN range, or TN value.  There is one index value and one data type value per certificate.  Clause 4.1 of RFC 9060<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Frfc%2Frfc9060.html%23name-scope-of-delegation&data=05%7C01%7Cjack.rickard%40microsoft.com%7C363996ecc9274332e1a008daf42062d4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638090717274285007%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=3Q9MOuEkOL29FrkuA88CcGYAmSLZTTy7BC6ooSBW2ls%3D&reserved=0> "STIR Certificate Delegation" appears to permit additional TNAuthList entries, but the SHAKEN standards do not.

According to the ATIS standards, TN ranges or a TN are put in a TNAuthList (onboard in a cert or referenced elsewhere) only when the certificate is a delegate certificate issued to a non-service provider by a service provider who is registered with the Secure Telephone Identity (STI) Policy Administrator (PA) and is acting in the role of a Subordinate CA (S-CA) notably without obligation in the STI-GA Certificate Policy to acquire an approved Certification Practice Statement (CPS) from the STI-PA.  Registered service providers populate the TNAuthList OID with their Service Provider Code (SPC).

There is no standard or governance policy framework for how provenance of TNs is established for a service provider issuing delegate certificates.  There is nothing in the process or the cert that proves the service provider acting in the role of Subordinate CA is authoritative for the assignment of the TNs in or referenced by the cert.  Also, number spoofing is legal (if not abused) and it is reasonable to assume delegate certs could be issued to support signing of legally spoofed numbers (by non-service providers).

The delegate certificate subject (noun) is not subject (verb) to any accredited form of vetting of real-world identity or reputation.  And there are no STI Certificate Transparency Logs to help prevent either accidental namespace overlaps, or intentional impersonation.

The subject (or holder) of a delegate certificate is explicitly not authorized to use the certificate for SHAKEN call signatures per clause 6 of ATIS-1000092<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Faccess.atis.org%2Fapps%2Fgroup_public%2Fdocument.php%3Fdocument_id%3D56801&data=05%7C01%7Cjack.rickard%40microsoft.com%7C363996ecc9274332e1a008daf42062d4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638090717274285007%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=UlwBv1uEsg8PpIIcCZmg8oq5uFmhgOwRTXj8%2Fe8BaOc%3D&reserved=0>.  The primary use of delegate certificates is assumed to be for RCD (and perhaps "div") PASSporT call signatures.  Delegate certificates for "RPH" PASSporT call authentication might also be used by certain government agencies, or for PSAP call-back.

The largest group of delegate certificate holders is anticipated to be enterprises, and the early adopters are anticipated to be outbound call centers who are originating calls on behalf of enterprises and whose call originations are most prone to accidental mislabeling or call blocking by terminating service provider anti-robocalling analytics engines.  It is assumed that by volunteering to self-identify with RCD call authentication, their calls can be more securely identified as compared to spoofed-versions of calls using the same calling numbers and therefore perhaps enjoy some decline in accidental mislabeling or call blocking.  And there is a commercial "branded calling" aspect wherein callers using RCD might also have name, company logo, and reason-for-calling data in (or referenced by) the RCD PASSporT displayed to the called party.

It is important to note outbound call centers are using calling TNs which:


  *   May be obtained from the call center voice service provider(s)
  *   May be obtained from TN providers (e.g., Toll Free numbers)
  *   May be obtained from call center enterprise (or government agency) customers  (i.e., BYOTN)
  *   May be a mix of any or all of the above
  *   May be managed in a pool and used in rotation of indeterminate periodicity for multiple enterprises (but probably not for more than one enterprise at a time)

Larger enterprises often have organizations with differing outbound calling needs (e.g., sales versus customer service) which may not coordinate acquisition or management of TNs and independently secure various outbound calling services.

It is important to note the number management and usage to better appreciate the challenges facing an AS service managing keys and the certs acquired from the appropriate STI-registered authoritative "owner" of TNs who are the only entities permitted to issue delegate certificates.  Also, important to note is some (most?) authoritative owners of TNs may have disinterest in operating an STI S-CA service.

To summarize:


  *   There are no regulatory or governance (or even "best practice) requirements for issuance of delegate certs with provable authoritative ownership of TNs
  *   There are no requirements for STI-registered service providers operating as an STI Subordinate Certification Authority (S-CA) to create and submit an audited CPS for approval by the STI-PA PMA or the STI-GA Technical Committee
  *   Some authoritative and registered service providers may not want to engage in S-CA service

Therefore, entrepreneurial service providers may legitimately elect to operate an S-CA providing delegate certificates as a service.  i.e., there is no prohibition preventing any registered service provider from minting delegate certificates with whatever TNs or TN ranges (by value or reference) as may be needed or desired by a customer wanting delegate certificates.

It is questionable what "validation" really means when validating telephone numbers by value or by reference with or without OCSP with or without stapling in the context of the real-world assignment and management of TNs and issuance and use of delegate certificates.

I will also note some service provider engineers have observed that the current state of standards and policy associated with issuance and use of delegate certificates are insufficient to their VS requirements policies.  i.e., they won't trust/verify PASSporTs verified with delegate certs without further qualification.

"Further qualification" can mean many things but one thing in particular it could mean and which is directly relevant to the outbound call center context is whether the Subject and/or other identity information as may be encoded into a certificate extension should reflect the fact that the outbound call center is the caller, but it is their enterprise or government agency customer that they are representing as an agent contracted to provide calling services on their behalf.  In a way both identities of the calling center and their enterprise/agency are calling.

A useful development would be to decide how those two calling identities should be encoded in the certificate and/or PASSporT and represented to the called party (or parties).  One way that might be accomplished was outlined in an informational contribution to the ATIS-1000092 v2 baseline which described the use of ISO 17442-2 Legal Entity Identifier (LEI) Object IDs in RFC 5280 certificates.

Lastly, I want to add a "+1" to Alec Fenichel's preference for the option of using "x5c" with stapled (single TN?) short-lived certificates.

Thank you again for your excellent work.

Best regards,


[cid:image001.png@01D92766.5BD01010]<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fpierce-gorman-4330201%2F&data=05%7C01%7Cjack.rickard%40microsoft.com%7C363996ecc9274332e1a008daf42062d4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638090717274441247%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=e%2BqrvHnYBraKMtQvjnReGirjTA8WrXiNW85OoXfNiN0%3D&reserved=0>
Pierce Gorman
Technical Staff Distinguished Member
pierce@numeracle.com<mailto:pierce@numeracle.com>

[cid:image002.png@01D92766.5BD01010]<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.numeracle.com%2F&data=05%7C01%7Cjack.rickard%40microsoft.com%7C363996ecc9274332e1a008daf42062d4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638090717274441247%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=csXXOT6U1pBzJzijqcpzc50CZWuX%2BmN81UQGvynGgd4%3D&reserved=0>
Stay Informed
Tuesday Talks Podcast<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.numeracle.com%2Ftuesday-talks&data=05%7C01%7Cjack.rickard%40microsoft.com%7C363996ecc9274332e1a008daf42062d4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638090717274441247%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=vy9Z25fvtlnBFbmrUG5YtVTPKfGoo3UdMgU6wYUDpDM%3D&reserved=0>  |  Insights<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.numeracle.com%2Finsights-blog%2Fall-articles&data=05%7C01%7Cjack.rickard%40microsoft.com%7C363996ecc9274332e1a008daf42062d4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638090717274441247%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=YAZeJv4v5ZlwTTGkE35qh4O63ChXrzlE03Y%2Fpckq%2B9Y%3D&reserved=0>


From: stir <stir-bounces@ietf.org<mailto:stir-bounces@ietf.org>> On Behalf Of Jack Rickard
Sent: Wednesday, January 4, 2023 4:42 AM
To: Peterson, Jon <jon.peterson@team.neustar<mailto:jon.peterson@team.neustar>>; IETF STIR Mail List <stir@ietf.org<mailto:stir@ietf.org>>
Cc: Simon Castle <simoncastle@microsoft.com<mailto:simoncastle@microsoft.com>>
Subject: [stir] OCSP and short-lived certs

Hi all,

I wanted to summarize the pros and cons of the different options around providing dynamic TN authorization for certificates, hopefully to clarify exactly what the differences are and guide us towards a destination.

Issues these are attempting to solve:

  1.  Existing certificate infrastructure doesn't cope well with rapidly changing TN assignments (such as number portability).
  2.  Some users want privacy about which numbers they own, currently they must provide a complete list to whoever sees their certificate.
  3.  The latency added by an arbitrary URI access on the call path is not acceptable to some use-cases.

Facts about all approaches:

  *   The certificate issuer has control over the TNs that the certificate can sign over.
  *   The certificate issuer must host a server allowing someone to dynamically query whether an entity has permission to use a telephone number.
  *   Someone is going to have to do a dynamic lookup at some point, making issue 3 mostly a question of cache-ability.

Existing by-ref using the AIA extension:
Sticking with the existing mechanism in RFC 8226 is an available option. This is where the Authority Information Access extension is used to host the TnAuthList on a remote server (controlled by the CA). In this solution the AS does not need to care about the TNs it owns at all, and the VS makes requests to the server hosted by the CA.
Pros:

  *   It already exists.
  *   HTTP caching headers could be used to indicate to the VS how long it is able to cache the information for.
Cons:

  *   This leaks the entire list of telephone numbers that a certificate has authority over.
  *   Any changes to TN ownership require a completely new document meaning cache times must be reasonably short.
  *   It is not required that the HTTP request contains caching information, making caching the response difficult.
  *   This partially reveals to the CA who you are calling.

OCSP without stapling:
draft-ietf-stir-certificates-ocsp-03 - OCSP Usage for Secure Telephone Identity Certificates<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-ietf-stir-certificates-ocsp%2F&data=05%7C01%7Cjack.rickard%40microsoft.com%7C363996ecc9274332e1a008daf42062d4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638090717274441247%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=SBxFx4NDe4umzV0Ys8KOqc3mNTz2mWqnRJtgZPg4Jkg%3D&reserved=0>. This extends the OCSP protocol to allow a VS to query whether a certificate has authority over a specific originator. Note that existing implementations would likely treat OCSP enabled certs as invalid (due to not having the TNAuthList extension).
Pros:

  *   This can easily cope with rapidly changing numbers as each request only authorises one number for an arbitrarily short period of time.
  *   We could require the nextUpdate field to be present (I think) allowing the VS to know how long it may cache the information for.
Cons:

  *   This doesn't completely solve the privacy issue; an attacker could use the OCSP server to enumerate all TNs that a certificate owns.
  *   A verifier is unlikely to be able to cache OCSP statuses, as a cache is only useful if it sees multiple calls from the same originator.
  *   This adds complexity to the ecosystem as CA's must host OCSP servers and VSs must be enhanced to understand OCSP.

OCSP with stapling:
draft-peterson-stir-ocsp-staple-00 - OCSP Stapling for Secure Telephone Identity (ietf.org)<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-peterson-stir-ocsp-staple%2F&data=05%7C01%7Cjack.rickard%40microsoft.com%7C363996ecc9274332e1a008daf42062d4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638090717274441247%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=%2Fo1sQfexEyLKMjgl7C8JS4JlPXRR6fTwxEGY9vRRgcw%3D&reserved=0>. This is the same as OCSP without stapling but the AS places the OCSP response inside the PASSporT, so the VS does not have to retrieve it. Note that existing implementations would likely treat OCSP enabled certs as invalid (due to not having the TNAuthList extension).
Pros:

  *   Rapidly changing numbers can be easily dealt with, as in OCSP without stapling.
  *   The AS is in a much better position to always have all OCSP staples as it can be push notified of changes, and only needs to cache certificates for numbers for which it signs outgoing calls.
  *   This could completely protect the privacy of the certificate owner as the OCSP server does not have to be accessible on the internet.
Cons:

  *   This will make PASSporTs substantially larger as they must contain the OCSP staple.
  *   This adds complexity to the ecosystem as CAs must host OCSP servers and authentication & verification services must be enhanced to understand OCSP.

Short-lived certs without stapling:
The CA issues short-lived certs with restricted scopes, potentially only a few hours and a single TN. This is already supported by the existing standards; we may however want to specify some mechanism for obtaining these short-lived certs programmatically. This conceptually is very similar to the OCSP without stapling option above.
Pros:

  *   No new standards are required, and already works.
  *   This allows the most flexibility around what certificates you want to exist and how long those permissions last.
  *   If you only ever issue certificates containing a single TN then this allows complete privacy, assuming the certificate URLs are not guessable.
Cons:

  *   This will add a lot of latency as a verifier is unlikely to be able to cache these certs, as they will expire quickly and may not be reused to the same destination.
  *   Obtaining short lived certs is difficult as the AS and CA will need an API, we may be able to help by specifying something here. (A suggestion is ACME STAR although implementations generally use custom APIs here currently)

Short-lived certs with stapling:
This is identical to short-lived certs without stapling but the AS puts part of the certificate chain into the PASSporT; only the leaf needs to be stapled as the rest of the chain is more easily cached. This conceptually is very similar to OCSP with stapling.
Pros:

  *   This is likely backwards compatible with existing implementations; they would just have to retrieve the certificate rather than using the stapled one.
  *   This allows the most flexibility around what certificates you want to exist and how long those permissions last.
  *   If you only ever issue certificates containing a single TN then this allows complete privacy, assuming the certificate URLs are not guessable.
  *   The AS is in a much better position to always have all required certs as it can be push notified of changes, and only needs to cache certificates for numbers for which it signs outgoing calls.
Cons:

  *   This will make PASSporTs a lot larger (larger even than OCSP stapling) as they will contain at least one certificate.
  *   This adds complexity to the ecosystem as authenticators & CAs must communicate (again possibly ACME STAR) and verification services must be enhanced to understand stapled certs.


Thanks for reading if you got this far! I'd appreciate your opinion as these all look similar; I believe we need one of the stapling options, but there is little difference between the two options.

Jack