[TLS]Re: Trust Expressions Update

Kyle Nekritz <knekritz@meta.com> Mon, 22 July 2024 01:09 UTC

Return-Path: <prvs=2933f5dfe1=knekritz@meta.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D0B5C14F693; Sun, 21 Jul 2024 18:09:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.102
X-Spam-Level:
X-Spam-Status: No, score=-7.102 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=meta.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x6HXlGHOHZ_p; Sun, 21 Jul 2024 18:09:05 -0700 (PDT)
Received: from mx0b-00082601.pphosted.com (mx0b-00082601.pphosted.com [67.231.153.30]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4CE8CC14CEFC; Sun, 21 Jul 2024 18:09:05 -0700 (PDT)
Received: from pps.filterd (m0109331.ppops.net [127.0.0.1]) by mx0a-00082601.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 46LH4fNI012089; Sun, 21 Jul 2024 18:09:04 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=meta.com; h=from :to:subject:date:message-id:references:in-reply-to:mime-version :content-type:content-transfer-encoding; s=s2048-2021-q4; bh=lsP U0qKkY2w71nM0eSBHuadLw/Ae20sHkj+dmNZQPcU=; b=ltawgaKmO/HiwoudNox N9oGXcQ8VU12vHOhceTFrRTOPkOYIqS6o2yjkn5fB5lMxJGC8uQrKKbn7MJtdGFp 7yYj1A1mxw+L7UGf/Y2SRV6m7/XNxfYPh2YlI/v7DKaW2x4NqZEcFM8xXzzZW+J9 Q51E628m69oenEJV5WeUKpWdp1Bfgtl0W1lQWB9vEiG8Qj3XmV9VvA15eJILXqK4 2iBOyqmn4Kpn1nTnu7jAu61apPzNcES7qcuSgpj0jGHpvemcTHrWVX5R3nBtefEx RRuRKDbK4IyDLElzBp8IsZxduHhowxhg/nDHGDY8Xtbat3Vhm6cpBH/nhv7UecLe kAw==
Received: from nam11-bn8-obe.outbound.protection.outlook.com (mail-bn8nam11lp2172.outbound.protection.outlook.com [104.47.58.172]) by mx0a-00082601.pphosted.com (PPS) with ESMTPS id 40gb2xvsb2-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sun, 21 Jul 2024 18:09:04 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=N2570AmYjXsTDYQXIZLUOUa8+fNn/i/br7fUhePPQxQVhhiQExrysHdxmpif/9OiZGLTyyPgp3hqilMWqWIqUlfJtQTtIIXyygs8cmtVzsmIS0DlAI95JlMGdO0w6x9zpFAfCQ+qniAI8RRfDFwVFRL4rYZw2IZpJvUmDZAT0zs/rRK1MZl59DXnkdmm7ti9ZGbGbfG/paT7IqF6iJZJ9ZXMXGc23RN3L6zRQ9n4njnCuH7stcBt5w+i0BNcNMnV1hx00Spo96wNMZYJCZjloeh9zfRcwhrXlhvajk3V/nN/KOJkDhu7lN9wx0uizJQGS6+wLIvBoABXby7HnsdLSQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Y3/72FunvMcgG1LclKmtpLulFHZ9hLAJGxHYVo+RMVw=; b=u+0zvOMlG4Gt+rzlxg1cxy9flM5eGHZ1G7wgcpDBeLoRGN6uKIyejuIexUU/fzuhDt3PVdfcrEBuvSX7/Darx7AhTMZ4bW5NtWXD91FHJMZlade/c3TnjzuEe+1huoLK0o1nSY3KDi+OzhiTQ7dG8xeBFPjuBdLpvlHti7wjabdNOF83CkLgWD5fq9sJlBr5w/f4RqVa8sh99KxmwyYG8souPyM6XPYIR8qS8LXk7JdS+JD7cr+mmsPiae9JBobM2SUzFPPCzG0aoQWXVG9Q/09864+Im1mKYeHWTdFTg8qmh9yWEQyZkYGPuoH2l4vYoSj0F7fmCcfbBwTSDGI2qA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=meta.com; dmarc=pass action=none header.from=meta.com; dkim=pass header.d=meta.com; arc=none
Received: from SJ2PR15MB5671.namprd15.prod.outlook.com (2603:10b6:a03:4c1::19) by LV8PR15MB6668.namprd15.prod.outlook.com (2603:10b6:408:25b::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7762.29; Mon, 22 Jul 2024 01:09:02 +0000
Received: from SJ2PR15MB5671.namprd15.prod.outlook.com ([fe80::a025:a1d3:960b:9029]) by SJ2PR15MB5671.namprd15.prod.outlook.com ([fe80::a025:a1d3:960b:9029%6]) with mapi id 15.20.7762.027; Mon, 22 Jul 2024 01:09:01 +0000
From: Kyle Nekritz <knekritz@meta.com>
To: Dennis Jackson <ietf=40dennis-jackson.uk@dmarc.ietf.org>, "tls@ietf.org" <tls@ietf.org>
Thread-Topic: [TLS]Re: Trust Expressions Update
Thread-Index: AQHa2UhA6nbjkZTgKkCw2qHUViG0ArIB8aEw
Date: Mon, 22 Jul 2024 01:09:01 +0000
Message-ID: <SJ2PR15MB567121783E3A9ADD2B1215ECB6A82@SJ2PR15MB5671.namprd15.prod.outlook.com>
References: <CAF8qwaAZ6QeyO9TcbmDgO5mkeixc11pzDgEF=7-KdLWzCp_qWA@mail.gmail.com> <51545883-30f5-4735-b237-e2c48df2b1dd@dennis-jackson.uk>
In-Reply-To: <51545883-30f5-4735-b237-e2c48df2b1dd@dennis-jackson.uk>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: SJ2PR15MB5671:EE_|LV8PR15MB6668:EE_
x-ms-office365-filtering-correlation-id: 85ba0af1-13ce-4b0c-69d9-08dca9eadf1c
x-fb-source: Internal
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|366016|4022899009|376014|1800799024|38070700018;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SJ2PR15MB5671.namprd15.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(4022899009)(376014)(1800799024)(38070700018);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
MIME-Version: 1.0
X-OriginatorOrg: meta.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ2PR15MB5671.namprd15.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 85ba0af1-13ce-4b0c-69d9-08dca9eadf1c
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Jul 2024 01:09:01.0294 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 8ae927fe-1255-47a7-a2af-5f3a069daaa2
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: FG4rM6WhhGWZLpjTa+siwPHvvXGkIs0Dn8uTol7Q+E+pJh5BX7XAN9+H8Tb4dxFLCZSFtRTx7SfriRN7EN2QPw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: LV8PR15MB6668
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
X-Proofpoint-GUID: 7_SYNUo0tXH7xYwumc54qbDXi12252gh
X-Proofpoint-ORIG-GUID: 7_SYNUo0tXH7xYwumc54qbDXi12252gh
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1039,Hydra:6.0.680,FMLib:17.12.28.16 definitions=2024-07-21_22,2024-07-18_01,2024-05-17_01
Message-ID-Hash: 2INW2P56Y2FFWOG4ZX6DJW4SXZLZPPRI
X-Message-ID-Hash: 2INW2P56Y2FFWOG4ZX6DJW4SXZLZPPRI
X-MailFrom: prvs=2933f5dfe1=knekritz@meta.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [TLS]Re: Trust Expressions Update
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/A5FTbzuNzbgSIxQbAMpeGZdtDGI>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

On the surveillance risks, what differentiates trust negotiations from other existing negotiation mechanisms? Any negotiation mechanism comes with risks that it will be used to negotiate something problematic. It's not clear to me why trust negotiation is significantly different in this regard to named group negotiation, which also has a lot of relevance when talking about mass surveillance risk.

Do you see differences with trust negotiation, or in the specific negotiation mechanisms that are being proposed? Or would you have similar concerns if, say, we didn't already have named group negotiation, and were discussing adding that right now?

-----Original Message-----
From: Dennis Jackson <ietf=40dennis-jackson.uk@dmarc.ietf.org> 
Sent: Thursday, July 18, 2024 3:25 PM
To: tls@ietf.org
Subject: [TLS]Re: Trust Expressions Update

On 29/06/2024 00:14, David Benjamin wrote:

> We have published a second, related draft, TLS Trust Anchor 
> Identifiers. This draft outlines a separate mechanism we had 
> considered during the design of TLS Trust Expressions, and is intended 
> to solve many of the same problems that Trust Expressions does. Some 
> of the feedback we received about TLS Trust Expressions renewed our 
> interest in this approach.

I’ve reviewed the Trust Anchors draft and although I understand the motivation for an alternative to Trust Expressions, I feel many of the same concerns with Trust Expressions around effectiveness, complexity and risk of abuse apply equally to the Trust Anchors design.

I’ve produced two documents to outline these concerns and summarize mailing list conversation so far. The first [1] tackles the concerns about the risks of abuse and the second [2] tackles issues with the proposed use cases. I hope both are useful for folks wanting to come up to speed on the discussion on the mailing list ahead of the meeting next week.

> We are planning to add a further document on detailed risk scenarios, 
> as best as we can articulate them, regarding the “surveillance and 
> possible future legislation” discussions on the list. This document 
> isn’t quite ready but we will follow up with the list when it is.

I hope the mentioned summary [1] of the risks and concerns around Trust Expressions and Trust Anchors will be useful if you’re still planning to produce your own document tackling these issues. It covers the key concerns that were discussed on the mailing list, in particular, the risks of fragmenting the WebPKI, the risks of abuse for building domestic root programs for surveillance, and the impact of on client privacy by exposing the client’s root store.

> We added a PKI transition strategies document with a more detailed 
> discussion of some transition scenarios, and how various alternatives 
> we have considered apply to them:

I’ve tried to develop this discussion in my comments on the use cases [2]. In brief, although both drafts are positioned as solving a broad range of problems, I feel that many of the problems are quite minor and largely not well motivated. Further, examining the proposed use cases in detail suggests that both drafts rely on quite optimistic assumptions about deployment that will not be possible to satisfy in practice.

I do think managing the transition to a Post-Quantum WebPKI is perhaps the most interesting problem, but as discussed in the linked comments, I don’t think Trust Expressions or Trust Anchors offers an improvement over much simpler alternatives which are already widely supported and so do not incur the complex implementation, operational and organizational challenges of these proposals.

I’m also concerned that some of your comments in the explainer either misunderstand or misrepresent the existing approaches like Abridged Certificate Compression which functions quite differently to the way you claim.

For those heading to Vancouver, safe travels and see you next week!

Best,
Dennis


[1]
https://github.com/dennisjackson/trust-negotiation-comments/blob/main/concerns-and-risks.md

[2]
https://github.com/dennisjackson/trust-negotiation-comments/blob/main/comments-on-usecases.md

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-leave@ietf.org