Re: [stir] Review of draft-ietf-stir-passport-09

Chris Wendt <chris-ietf@chriswendt.net> Sun, 30 October 2016 21:03 UTC

Return-Path: <chris-ietf@chriswendt.net>
X-Original-To: stir@ietfa.amsl.com
Delivered-To: stir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 51432129480 for <stir@ietfa.amsl.com>; Sun, 30 Oct 2016 14:03:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.293
X-Spam-Level:
X-Spam-Status: No, score=-1.293 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, TRACKER_ID=1.306] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=chriswendt-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fDYL_Itb9fzi for <stir@ietfa.amsl.com>; Sun, 30 Oct 2016 14:03:56 -0700 (PDT)
Received: from mail-qk0-x236.google.com (mail-qk0-x236.google.com [IPv6:2607:f8b0:400d:c09::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8A3AD129428 for <stir@ietf.org>; Sun, 30 Oct 2016 14:03:56 -0700 (PDT)
Received: by mail-qk0-x236.google.com with SMTP id v138so52289866qka.0 for <stir@ietf.org>; Sun, 30 Oct 2016 14:03:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chriswendt-net.20150623.gappssmtp.com; s=20150623; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=kC8SQSYfEi6hi8DsOIRPGDeE0gmav/opyc6VBMtlsio=; b=YTX0ksgObPABKqaRBuANkrlfJSvdq+1ioz26oLGYqO9PFJrwJ16IXCqTHwhEuR5Of0 zPKg6hSFKc97txFWEnn8J8mXuG4CtsTglGg3uZTdXUDAbBwWVLLSzo03mbV0FELfveCx 1YHGWk1k3GRAzrvuDIrnB2gJH1IIvwP52PNjUuqDTnyd4TrAX7riz5icyIlj3O33TOKO Kt7H1t2DPH009lkHfQd+AOOqevySGatEzgE3Uch6D8iibyUBD7P0Gw6r5hWRqF5GkZMX L5Iqk36TMI6j92vwpHdRq3v8jknL1OPd1KLrLhz2DM24FjPHjESte3rA0waFyfaG9L2m mnRA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=kC8SQSYfEi6hi8DsOIRPGDeE0gmav/opyc6VBMtlsio=; b=R3X6BBmKlrDdZeN9BovQHYrcAIH+QNrQU8ACDQ0rmec0ebFK81BlOFmoKR6HXu40q+ hAFBuptf4iPGNLLb4T+Ov+dtOQftseTSKSyEf2v9cLoMW6gk0qRFau2l4aSJiHHF+Efj ZQ1upM8W8trNl1GKggIPHG5ThWEt2e1kq0ZUa+nPVoz6N182LxNf5bECX6iiikOK2Jgq b08Oz4lMZpMjylZ8e9s3xpztfcLPGAkXQAS/nnDFuAGSGT4fOq0OIlcDl/jefLbSBt82 33Ca/xBSN+42kGNyvv5vV5q1C3fSoMFiDr3yK3n3kcpv4r8aB/WXFM9ZL/vTr9H2l/a3 iruA==
X-Gm-Message-State: ABUngvd1KArbViOnIN166Jgp+mf/GV0nV1mWXDKDtxJXEgV5Y8h99HWD5sZkmFtbQWq1Qw==
X-Received: by 10.55.8.20 with SMTP id 20mr23497767qki.3.1477861435441; Sun, 30 Oct 2016 14:03:55 -0700 (PDT)
Received: from ?IPv6:2601:41:c101:9364:9cc8:a44f:1541:fc0d? ([2601:41:c101:9364:9cc8:a44f:1541:fc0d]) by smtp.gmail.com with ESMTPSA id 96sm7897333qkz.40.2016.10.30.14.03.54 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 30 Oct 2016 14:03:54 -0700 (PDT)
From: Chris Wendt <chris-ietf@chriswendt.net>
Message-Id: <6DBDA70B-586B-4383-853F-34675DC8BF2D@chriswendt.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_4F7D53DD-9B7D-4DD2-8288-03B5E724083B"
Mime-Version: 1.0 (Mac OS X Mail 10.1 \(3251\))
Date: Sun, 30 Oct 2016 17:03:53 -0400
In-Reply-To: <CABcZeBOH+L+AJC40s00tj5QLMOr4XHCkMckFh8tQ5Opsn5qtsQ@mail.gmail.com>
To: Eric Rescorla <ekr@rtfm.com>
References: <CABcZeBOH+L+AJC40s00tj5QLMOr4XHCkMckFh8tQ5Opsn5qtsQ@mail.gmail.com>
X-Mailer: Apple Mail (2.3251)
Archived-At: <https://mailarchive.ietf.org/arch/msg/stir/bFI7BPQULUniydDgQTjP6PM2pww>
Cc: "stir@ietf.org" <stir@ietf.org>
Subject: Re: [stir] Review of draft-ietf-stir-passport-09
X-BeenThere: stir@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/stir>, <mailto:stir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stir/>
List-Post: <mailto:stir@ietf.org>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/stir>, <mailto:stir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 30 Oct 2016 21:03:59 -0000

Hi Eric,

Thanks.  Answers inline.

-Chris

> On Oct 29, 2016, at 7:32 AM, Eric Rescorla <ekr@rtfm.com> wrote:
> 
> OVERALL
> This document would be easier to read if it came with an example
> at the beginning (perhaps the one in 9.1).
> 
> I've also been thinking about the use of a URL here. This has
> the result that it doesn't bind the certificate itself into the
> digital signature, but only the URL. So this implies that it's
> at least potentially possible to substitute one certificate
> for another with the same private key. Is that a concern here?

Other than stolen private key scenarios, which are a concern whether you use URL or not, I’m not sure of a reason why someone would want to do this for legitimate reasons and there would be any concern for multiple certificates being able to validate a call, or whether someone with legitimate access to the private key and would want to use this technique illegitimately would be a valid scenario unless they are a bad actor in the first place.

> 
> 
> S 4.3.
> Certificate chains are generally self-validating, so can you explain
> why you need HTTPS here? Clearly, it's good practice for confidentiality
> and to prevent other forms of attack, but still.

https://tools.ietf.org/html/rfc7515#section-4.1.5 <https://tools.ietf.org/html/rfc7515#section-4.1.5> does call for it.  I could certainly remove the direct reference to this fact and leave it to the generic reference to RFC7515.  It also technically calls for server identity validation using RFC6125 as well.


> 
> 
> S 5.2.
>    {
>    "dest":{
>           "tn":["12125551212"],
>               "uri":["sip:alice@example.com <mailto:sip%3Aalice@example.com>",
>                   "sip:bob@example.net <mailto:sip%3Abob@example.net>"]
>           },
>           "iat":"1443208345",
>           "orig":{"tn":"12155551212"}
>       }
> 
> This indentation seems weird. Should you be outdenting the "uri" line.

Simple format problem, fixed.

> 
> S 5.2.2.
> Given the ambiguity about multiple fingerprints, you should probably
> cite the 4572-bis draft.

Added.

> 
> 
> S 7.
>     The using protocol of the compact form of PASSporT MUST
> 
> This "using protocol" language is pretty odd. Maybe define a specific
> term somewhere else? "application protocol"?
> 

The “using protocol” was a suggestion from JP, so i’ll let him answer that.

> S 9.
>    JSON, as a canonical format, can include spaces and line breaks, and
>    key value pairs can occur in any order.
> 
> Doesn't this mean that JSON isn't canonical?

good point :) fixed.

> 
> 
> S A.1, A.2
> 
> These aren't actually X.509 structure. Also, the private key in S 8.1
> is in an OpenSSL-specific structure. Could you encode it in PKCS#8.

Ok so I’ll do this:

openssl pkcs8 -topk8 -nocrypt -in key.pem -out p8file.pem

-----BEGIN PRIVATE KEY-----
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgi7q2TZvN9VDFg8Vy
qCP06bETrR2v8MRvr89rn4i+UAahRANCAAQWfaj1HUETpoNCrOtp9KA8o0V79IuW
ARKt9C1cFPkyd3FBP4SeiNZxQhDrD0tdBHls3/wFe8++K2FrPyQF9vuh
-----END PRIVATE KEY——

Correct?


> 
> _______________________________________________
> stir mailing list
> stir@ietf.org
> https://www.ietf.org/mailman/listinfo/stir