Re: [stir] Comments and Ready for Adoption: draft-peterson-stir-cert-delegation

Richard Barnes <rlb@ipv.sx> Fri, 19 April 2019 20:26 UTC

Return-Path: <rlb@ipv.sx>
X-Original-To: stir@ietfa.amsl.com
Delivered-To: stir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 86C28120175 for <stir@ietfa.amsl.com>; Fri, 19 Apr 2019 13:26:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ipv-sx.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Tjt4jlIbsE_I for <stir@ietfa.amsl.com>; Fri, 19 Apr 2019 13:26:42 -0700 (PDT)
Received: from mail-oi1-x231.google.com (mail-oi1-x231.google.com [IPv6:2607:f8b0:4864:20::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AA0B312004A for <stir@ietf.org>; Fri, 19 Apr 2019 13:26:42 -0700 (PDT)
Received: by mail-oi1-x231.google.com with SMTP id a6so4734153oie.5 for <stir@ietf.org>; Fri, 19 Apr 2019 13:26:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipv-sx.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=oVBdYQrnvpvzB+ZZfCRXzU/jz6brdOkN3dcE4zENa34=; b=J05+HnHwn8U9yBAdAa2nVewe3RruDcPLMiNufMSSrPGQ58A/G44S+KkLMS7Ax3J/Ph /THNWOnIxGwwIhGx6uYsJjw2Gy6L9w1Sv2PhoOwcPVy2VHQTHyu7EMIUtDyFQlZh13KJ p+e2aRAJsx7oTM4Pel8syPpLPlQGNb2DIfysVkhKRMSwJFVbMTNepSJoMH6Vx+vAJBle aKrUhNEGjVJ+yhUSD84+IS3yp3Y6AcXKk90MRIRUUhy4vMlxRN6/PO8QghZ20jku93zQ X+V9ny94chsFF6si1bELsqHV5JA4sOd20gUxVCAGKxvV5tR8sejMMMKU3m9VLRm37TO9 1mAg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=oVBdYQrnvpvzB+ZZfCRXzU/jz6brdOkN3dcE4zENa34=; b=Sl42flO+c5gGrIyUfBst4fshuQD32HP989kbugDqoCw49TMWeIehPifQkdapehubz6 /5WtIfu0pHvaudXv1u4sXK4k67AZYJoswtjfpLFtkcpzZElxDTvsBj2uzA+9j6uck4C+ 5GTauEpVa4zW7nxqqiLCMOkCx5jRyARGXDc0OxUFEzYNqQqBhr8s8mGm1IIOcYh2n6Bi nCfTSjzFi2S0HVxI9iJNRMcN2r9R7Xegbdnr++LnI5SJ5aox+WYLldo/kZft+DDygWkS xybCGKhLiN/l/T9Q+FueV2pweHqNMrcYBU+4vSpTiq9CCu60Din3e6aDz+IGEuNzKoJB zLJA==
X-Gm-Message-State: APjAAAXm6Au9H7JYkF/ETarEdIKiv1cn1z6o+v77HWzHltyK8V8jUAwd nCOXErCrXlke9VbPFVugWa8t8oPFmVBRMCDhVlQbgQ==
X-Google-Smtp-Source: APXvYqzBh15AT3yh1NDViztZwVJyf80loJnWP8FWizSmYx/6b1SiFwn3frm2c8s2oNv6lzEHCjGYN6CdO38WIblzzfg=
X-Received: by 2002:aca:b886:: with SMTP id i128mr2998673oif.169.1555705601661; Fri, 19 Apr 2019 13:26:41 -0700 (PDT)
MIME-Version: 1.0
References: <69ACDD9A-436B-4ED9-AA31-26431256334A@standardstrack.com>
In-Reply-To: <69ACDD9A-436B-4ED9-AA31-26431256334A@standardstrack.com>
From: Richard Barnes <rlb@ipv.sx>
Date: Fri, 19 Apr 2019 16:26:22 -0400
Message-ID: <CAL02cgQmOLoZvBmg1xZEdtBDp-a1RXjGu7foaVNyjWx90KsDPw@mail.gmail.com>
To: Eric Burger <eburger@standardstrack.com>
Cc: IETF STIR Mail List <stir@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000c3318d0586e7ef84"
Archived-At: <https://mailarchive.ietf.org/arch/msg/stir/PmytcrwCFnm16s3P2FUEGvTUZEM>
Subject: Re: [stir] Comments and Ready for Adoption: draft-peterson-stir-cert-delegation
X-BeenThere: stir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/stir>, <mailto:stir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stir/>
List-Post: <mailto:stir@ietf.org>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/stir>, <mailto:stir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Apr 2019 20:26:44 -0000

One point inline below...

On Fri, Apr 19, 2019 at 3:37 PM Eric Burger <eburger@standardstrack.com>
wrote:

> High level: it is ready for adoption as a work group item.
>
> Since it will need at least a name change, here are my comments at this
> point in its lifecycle.
>
>
> Section 3.1 says that a certificate path /should/ be validated. Under what
> circumstances would it be OK to not validate the chain?
>
> Section 4: an example chain, or at least a picture, would help
>
> Section 5: Does this mean that all certificates will have “ca” set? If so,
> would we not have to validate the entire chain? I.e., MUST in Section 3.1?
> If not, what stops a bad actor from generating a signing certificate for
> TNs it does not own?
>

Yes, lots of certificates will have the CA bit set.  That's just the PKI's
way of saying, "The holder of this certificate can delegate further".

Recall that there's a difference between a CA and a trust anchor.  Anyone
can be a CA and issue certificates, but the verifier should have a limited
set of CAs it will trust.  Then when you're presented a certificate, the
verification you need to do is that there's a way to chain from that
certificate to one of your trust anchors.

There is a somewhat intersting question around trust anchor configuration
here.  You probably never want to have a TA like you do in the Web PKI that
can vouch for any resources.  So we will want to have RPs scope TAs so that
they can only issue for some set of TNs.  For example, you might have a
national TN that is scoped to its country code.

The same problem arises in the RPKI with regard to IP addresses and AS
numbers, and there was a lot of wrangling since it's not clear what control
/ ownership structure you should align the PKI with there.  I'm pretty sure
there is some solution there, but unfortunately I've forgotten the details.

--Richard




>
> Section 7:
> I’d just refer to STIR’s text with respect there is no anonymity except
> for explicit anonymity (RFC 3325). However, if we have a delegated
> certificate chain, is there an issue with some information leakage? I would
> think not, because would one only use the delegation mechanism when one is
> explicitly NOT trying to be anonymous? I.e., use an asserted identity that
> may not be obvious to the connected service provider (in the SHAKEN sense)?
>
> _______________________________________________
> stir mailing list
> stir@ietf.org
> https://www.ietf.org/mailman/listinfo/stir
>