[TLS]Re: Trust Anchor Negotiation Surveillance Concerns and Risks
Watson Ladd <watsonbladd@gmail.com> Sat, 20 July 2024 04:39 UTC
Return-Path: <watsonbladd@gmail.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CBD29C14CE3B for <tls@ietfa.amsl.com>; Fri, 19 Jul 2024 21:39:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G_g_HIb3z-Vb for <tls@ietfa.amsl.com>; Fri, 19 Jul 2024 21:39:46 -0700 (PDT)
Received: from mail-wr1-x434.google.com (mail-wr1-x434.google.com [IPv6:2a00:1450:4864:20::434]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 01A89C14E513 for <tls@ietf.org>; Fri, 19 Jul 2024 21:39:45 -0700 (PDT)
Received: by mail-wr1-x434.google.com with SMTP id ffacd0b85a97d-3685a5e7d3cso1144333f8f.1 for <tls@ietf.org>; Fri, 19 Jul 2024 21:39:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1721450384; x=1722055184; darn=ietf.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=A1hSfDu25yttz1qhy56JdbJq/hpgxf01aXJXw4crBiM=; b=H6gbXFAE6P8xs3nlXz4anvDLFZwyU7mF3/PIU7V9GeKM5Ten6AWfaNet6uhhVhmFen Zdy8zqpNp1k/XqZgGK0BDwRWg43AlmUFL08wPpPcF1Vjh9Bc4gzIJq0dSBzq2/l5zarc ZuVoGeb346RvuZhaK4GLabhMDJHaJGYyyshVqaqZEB5yPJwmXCwixADFSZ0DTh+HecbZ Ij7eJrrA79BtpbhIQqCaFU6SDgBKayvqm1da5ku2+XxTSE6qe/nSMUdV44G8YV/0gmo5 wcI+C8V7sxQvhqv/LMeqPriovfxmOyEX9ZumCtKFSUo/Sd7bIoif97QpzkrM7zsxqarE 3MIg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1721450384; x=1722055184; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=A1hSfDu25yttz1qhy56JdbJq/hpgxf01aXJXw4crBiM=; b=t2rD6A3B2Ep+HTx0nrRaEJYRZE5mvRwwjHsaCh5DW6+Fmb72VMpml/fJynLDOntru5 dsAiwHCROhj3aKqYjXRkkMf0VP5Lgj5+oRy2Rv8DT4/519ubIsaGJIrb3/NZ3JltWw1B 83LeKSP0QO5nrszXAzxlFY5CPzXjVkGM5m0HHzSOrX/gjO6HQ2If5H+RTli/8YYz+ARk /DqMSJpZaRnKSikAaEE+kl7+BnHb5orHmeAH92M5FXiGjtY8LFp09F3sX5EwwHyB8+6Q OiMwb9CGMpt9ab3/3Y029Kc4TUihPwx5m4OiDKpQ38rPttU2TgBgPjXeBWDOaNtdPu7U o/fw==
X-Forwarded-Encrypted: i=1; AJvYcCUBocD8Hz5ybWIuly8eZ1l7Uhuip7pmocW60ROHuZaZQ4gfo4eZBeZp2oiKONgRLb1lzB6WYivwhbmfvBA=
X-Gm-Message-State: AOJu0Yz6hyuyrWb6zJs456WVGxchY9XUCtzoHkOGiBzrTUE63RCxz/AM geixjaKB+fMrwEyBhi7+3J9h2pKgfujpF3NXgCMX3Vx0e0U3OlJWttkt2jLJvrCyQolw2lJ3szo /UNzPQi4qm8yXVEDvjBP17LsSpUw=
X-Google-Smtp-Source: AGHT+IHa0qPgBBo2jI5rvsEMlcJEs0QGpjlv2vDQGTML2OV6kfN0OrHD4CIndljWR3JlnM61EBUkiBYqnL5SaQS0n6A=
X-Received: by 2002:a5d:40ca:0:b0:367:96c5:ae88 with SMTP id ffacd0b85a97d-369bae95e60mr246739f8f.31.1721450383994; Fri, 19 Jul 2024 21:39:43 -0700 (PDT)
MIME-Version: 1.0
References: <CAD2nvsT4qWqudiv1C1wZn6rB4_s-9EDENq5TXEbxr_ygcMFjDQ@mail.gmail.com> <CAChr6Sw+gxK3dO29F9bsLTQReJz6LzT2hZb5O7LAXmKzQbKTSw@mail.gmail.com> <CACf5n7_29CNXLf+SmpKKOWkc_3Oi2BZqZ8irU+z=3btJns_1-Q@mail.gmail.com> <CAChr6SxJ3r88a4Aehv_5fsSWb1JApV6Lg4hfwdm0Oh5x04_shQ@mail.gmail.com> <479BA457-9001-4EBC-A84F-9E3EB71E809F@akamai.com>
In-Reply-To: <479BA457-9001-4EBC-A84F-9E3EB71E809F@akamai.com>
From: Watson Ladd <watsonbladd@gmail.com>
Date: Fri, 19 Jul 2024 21:39:32 -0700
Message-ID: <CACsn0cmhsh-zeJOaa7xy_2crxgvhAF=nK9FqWxxf1dB2SMhMyQ@mail.gmail.com>
To: "Salz, Rich" <rsalz=40akamai.com@dmarc.ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Message-ID-Hash: PP3PDSTYNVSY37FVXGWG3LM7ZEQBR2UQ
X-Message-ID-Hash: PP3PDSTYNVSY37FVXGWG3LM7ZEQBR2UQ
X-MailFrom: watsonbladd@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Bob Beck <bbe@google.com>, Devon O'Brien <asymmetric=40google.com@dmarc.ietf.org>, TLS List <tls@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [TLS]Re: Trust Anchor Negotiation Surveillance Concerns and Risks
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/6d7dUOPN6BT08K351QFDW8XVi7Q>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>
On Fri, Jul 19, 2024, 8:58 PM Salz, Rich <rsalz=40akamai.com@dmarc.ietf.org> wrote: > > I've read it before. I the main issue is that it says "trusted" a lot. > > > > Yeah, kinda snippy but not necessarily wrong. > > > > I’m a little skeptical of approaches that solve an entire problem space with one architecture. I’m more skeptical of enough people having the ability to read and understand the semantics of several pages of JSON object descriptions. I know I got MEGO[1] a copule of times while reading it. > > > > Can we simplify things and solve just one problem? Do that several times and you end up with the mess we have now, where the interplay of certificate serving and algorithm selection requires quite a dance to figure out, and is version dependent. Each additional factor to negotiate has to play in, and already assembling all the bits gets complicated. On top of that if we want the CA ecosystem to evolve, we have to deal with different clients trusting different things. And there are not a whole lot of ways to solve that. Using that mechanism to say "here is the bundle of stuff I expect" is much cleaner. > > > > For example, in some off-line discuissions others have mentioned that with PQ signatures being so big, there are policy decisions that clients might want to enforce – do you need SCT’s? Do you want OCSP stapling? Maybe it will be worthwhile to just think about what kind hybrid/PQ policies clients will want to express? > > > > [1] https://www.collinsdictionary.com/dictionary/english/mego > > > > _______________________________________________ > TLS mailing list -- tls@ietf.org > To unsubscribe send an email to tls-leave@ietf.org
- [TLS]Trust Anchor Negotiation Surveillance Concer… Devon O'Brien
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Rob Sayre
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Nick Harper
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… David Adrian
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Rob Sayre
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Nick Harper
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… David Benjamin
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Watson Ladd
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Mike Shaver
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… David Benjamin
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Ilari Liusvaara
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Ilari Liusvaara
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Mike Shaver
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… David Benjamin
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Mike Shaver
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Devon O'Brien
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Mike Shaver
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Ilari Liusvaara
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Watson Ladd
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Rob Sayre
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… David Benjamin