Re: [stir] Review of: draft-ietf-stir-passport-05

Eric Rescorla <ekr@rtfm.com> Sun, 28 August 2016 00:20 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: stir@ietfa.amsl.com
Delivered-To: stir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4DF6112D198 for <stir@ietfa.amsl.com>; Sat, 27 Aug 2016 17:20:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uCocyd3o2d9S for <stir@ietfa.amsl.com>; Sat, 27 Aug 2016 17:20:24 -0700 (PDT)
Received: from mail-yw0-x235.google.com (mail-yw0-x235.google.com [IPv6:2607:f8b0:4002:c05::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5A8A712D0CD for <stir@ietf.org>; Sat, 27 Aug 2016 17:20:24 -0700 (PDT)
Received: by mail-yw0-x235.google.com with SMTP id u134so68450805ywg.3 for <stir@ietf.org>; Sat, 27 Aug 2016 17:20:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=4JD0QzOCktqhKq3k4GbymGYNxqur7p2nST8fCenOz14=; b=evEYbYX0bYC874zYreKxTVEpNV4I6ilzkGvSJyIQeLEUFZ/m6797sX4mxxmQMR9Oqk 3nVCdlQqlhRnBbmTwj7dSyn5rwmZD2nnnYyrp6mYYB9n/A78/53cyfA+gYaINAyVCN4M tMnBDp6moIibvCMjFp8zxd9uETkcrP2t0GcCrlu92fJWPu7+MG+lC0qkst+c5H6tgio3 VBM9meF+BRow+nB35K5NXNlEWewfkV7fmSVrAOel6+MIBCGArSQ70C4z03AzA26LDQDQ HAyCsY6Cxe5YbJLp7lx3czXdybL8RJ7/c4vEDGtX2TkY07ymU1c5u2iyDI6GuDvy6n53 kI3Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=4JD0QzOCktqhKq3k4GbymGYNxqur7p2nST8fCenOz14=; b=Mb9dUJupRa9dT3uF7bNh20Daynm8uGLa8+/S3t3zgmcFT92HHlM8ixhPHp2wTsDZJr sihjeuBVAkmAGf5cg9XZfd2s6JvwgNDk05+cJ61cHBuZYtvH8vocvcsfCW0E+KkML8iZ Ca8eWfjYU4HGJtM2tw8XlFDcXqtjvT24BpzW8FYu0/UX88MPanXNKl3df2wwc2V/2n3Y ihj63QHTff3xiXo700GLrdc+nP1wliiVOxQNuUe6sQwcPUAqcfvuo35eMRYwMivP4/1d GDsxW/op2kx4o4NsQjnvN8wsG4FsIpJcc+y2iWH0XurrrKeBDkpwZo/lyEg66qCZDUud fsJw==
X-Gm-Message-State: AE9vXwPxWnmNO0wkVw+DbzE96WJU319keadXj26lm9834kQ4pigfbFLrUYQIClXxW1qEJ9olv30skpmgs/S5kQ==
X-Received: by 10.129.92.215 with SMTP id q206mr9655374ywb.8.1472343623700; Sat, 27 Aug 2016 17:20:23 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.129.48.193 with HTTP; Sat, 27 Aug 2016 17:19:43 -0700 (PDT)
In-Reply-To: <1c29f054-5b26-5327-b6bc-4f1ebfdcb8f2@bbiw.net>
References: <07e0eb16-6758-cdf1-c571-1f1ed768e741@dcrocker.net> <67A1F75C-DAA9-4E84-8C70-9A392A90FF6F@chriswendt.net> <8fd2cf67-5241-039a-e3a4-a9ad0928023a@dcrocker.net> <CABcZeBOYQG5JSRqDgnUCS66co1GjEE7pWf14qxJQWCOtqW+cwQ@mail.gmail.com> <1c29f054-5b26-5327-b6bc-4f1ebfdcb8f2@bbiw.net>
From: Eric Rescorla <ekr@rtfm.com>
Date: Sat, 27 Aug 2016 17:19:43 -0700
Message-ID: <CABcZeBMX41i2P5ccFQkOYjUrSxkkk-M_6P=UR54q4_WhUsXBrQ@mail.gmail.com>
To: Dave Crocker <dcrocker@bbiw.net>
Content-Type: multipart/alternative; boundary="001a114d85ceadcae3053b16b684"
Archived-At: <https://mailarchive.ietf.org/arch/msg/stir/Nk1ywGHlXXmUBHHmGzMe8b69As0>
Cc: Chris Wendt <chris-ietf@chriswendt.net>, "stir@ietf.org" <stir@ietf.org>
Subject: Re: [stir] Review of: draft-ietf-stir-passport-05
X-BeenThere: stir@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/stir>, <mailto:stir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stir/>
List-Post: <mailto:stir@ietf.org>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/stir>, <mailto:stir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 28 Aug 2016 00:20:26 -0000

On Sat, Aug 27, 2016 at 5:07 PM, Dave Crocker <dcrocker@bbiw.net> wrote:

> On 8/27/2016 4:52 PM, Eric Rescorla wrote:
>
>>
>>
>> On Sat, Aug 27, 2016 at 2:40 PM, Dave Crocker <dhc@dcrocker.net
>> <mailto:dhc@dcrocker.net>> wrote:
>>
>
>
>>             Is the timestamp the basis of claiming non-repudiation?
>>
>>
>>         Partially, depending on your interpretation of how
>>         non-repudiation is
>>         achieved.  The digital signature based on a certificate is the
>>         non-repudiation of the original assertion and signing of the
>> token.
>>
>>
>>     That seems to equate authentication with non-reputation of
>>     originator. But they aren't the same.
>>
>>
>> Do you mean "non-repudiation" here? I ask because "reputation" is also a
>> concept potentially in play here.
>>
>
> I'm using 'non-repudiation' because the spec uses that term.
>
> If the spec really means 'reputation', that opens a different set of
> concerns, since nothing in any of the 3 documents has to do with
> reputation, per se.


Just checking.


I think it would probably be fine to remove the term "non-repudiation"
>> from this spec, since it only appears in the abstract. Generally, it's
>> not that useful a concept for most security settings, especially when
>> one starts to ask questions about the legal context.
>>
>> With that said, given that these tokens are signed by their creator and
>> there is a timestamp to provide anti-replay, there is at least
>> potentially an important technical property being provided here, which
>> is that in the case where a passport creator signs a bogus passport, it
>> is possible to demonstrate that it did so, which is not a property
>> necessarily provided by authentication systems.
>>
>
> And I believe that was my original guess, although my very limited
> understanding of non-repudiation includes the significant burden of having
> the timestamp, itself, be validated by an independent authority. Otherwise,
> the signer could claim any time they want to...


That doesn't seem correct to me, at least if "independent" means someone
other than the relying party. The signature is itself a proof attaching the
signer's private key to the passport and to a claim by the signer about the
passport object's assertions being valid at the time in the timestamp. If
the relying party checks the timestamp and rejects it if it has a bogus
timestamp, then any acceptable passport will be relatively fresh and thus
will be usable as a proof of the signer's representation at the relevant
time. Overall, this seems less important than the freshness property wrt
authentication, but it's still a technical property.

-Ekr


> d/
>
>
> --
>
>   Dave Crocker
>   Brandenburg InternetWorking
>   bbiw.net
>