[TLS]Re: Trust Anchor Negotiation Surveillance Concerns and Risks
David Benjamin <davidben@chromium.org> Sat, 20 July 2024 04:24 UTC
Return-Path: <davidben@google.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 97176C14CE39 for <tls@ietfa.amsl.com>; Fri, 19 Jul 2024 21:24:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.403
X-Spam-Level:
X-Spam-Status: No, score=-9.403 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.148, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_SPF_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=chromium.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RmaP2-TSPT2c for <tls@ietfa.amsl.com>; Fri, 19 Jul 2024 21:24:20 -0700 (PDT)
Received: from mail-yb1-xb29.google.com (mail-yb1-xb29.google.com [IPv6:2607:f8b0:4864:20::b29]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 76D2BC151072 for <tls@ietf.org>; Fri, 19 Jul 2024 21:24:20 -0700 (PDT)
Received: by mail-yb1-xb29.google.com with SMTP id 3f1490d57ef6-dfef5980a69so2785455276.3 for <tls@ietf.org>; Fri, 19 Jul 2024 21:24:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; t=1721449459; x=1722054259; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=1c7Km7KXbWp49/doxZ/4rODKUcO0ZG8huGS/h/hYIkc=; b=gcyHL68G52/7WYNWLWM1IemnTWtLWbk0tpCfdt3p/4gE4bDhKkaQ7sF9Vg/V07RuyQ 6W13nLtS945ZjG0CG6S553TzzRzz9lDyrRIgAerKqsviFZwQ4kvORXM4K/gw/OdVbLyr ITveTMKykmuxHTjvdxLLEGPGDV7H6FBm8AzFE=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1721449459; x=1722054259; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=1c7Km7KXbWp49/doxZ/4rODKUcO0ZG8huGS/h/hYIkc=; b=NVONioY8qp+UYVwC+HzVgF4sd0GPIiwNc2UZJtE9jTbjwx8x+smHLZ6fR3LY5MCzgT BuD4htbQJ5oaOdnJ+w7PGd9LGNtLYZs5h6sE5fy1KEseUfjTfW4q+P+GrBard6SeIvD5 ybrcoXfc7jaMPdPbuIXwwHKFVp1XRdSUN7vkR2r/67Z0zflzhfl9xoOfYueOJUKjWWtB WOjVNnuE+8UjCukUg6T8Ek3FYiClQzf3Vf/jjDAaXL7Rg+3Mr57a4hr5UiZzwIrdd4vM +/AamJHY0bMgRNfsVnrNpYo1Yu9It+YFtaT55si+kw9KR73IqyRQfRrktMmMYTRy+iRw 7hZQ==
X-Forwarded-Encrypted: i=1; AJvYcCXASZc0B6oHc0nldJiVkw3kgSn2JdR1ip23uXP05WB1xsCiuQnlCT1AfVY7EmQO9qwtUvrdtiBPWzt8Lxw=
X-Gm-Message-State: AOJu0Yz2tw1MZ/qVNme/OgP58prWZ37VUhhi2Rz4Ql7Zbok3O0WXPduO eUUnYrierHW1iglo5fCq/0uyN/xIrH9LdwkCEgb4u9Tgrtk4kGl8kwZH7tPSINk9NxH+ql4bTYJ ZUE4N9UtWh5b6faFQbGzRJxfcgBLkxsvIyLWu2Sla2eGmRfup
X-Google-Smtp-Source: AGHT+IE8a9mxzAhtSHvdIx7CeUahPKhPxu5IZlAqkvSpJ2pC6cNfQD/MwQL5V8Xgdfi9jkfzeJstmYYWE4AhGf0zSAw=
X-Received: by 2002:a05:6902:72b:b0:e08:5ee3:7a03 with SMTP id 3f1490d57ef6-e087b33c8famr657309276.22.1721449458910; Fri, 19 Jul 2024 21:24:18 -0700 (PDT)
MIME-Version: 1.0
References: <CAD2nvsT4qWqudiv1C1wZn6rB4_s-9EDENq5TXEbxr_ygcMFjDQ@mail.gmail.com> <CAChr6Sw+gxK3dO29F9bsLTQReJz6LzT2hZb5O7LAXmKzQbKTSw@mail.gmail.com> <CACf5n7_29CNXLf+SmpKKOWkc_3Oi2BZqZ8irU+z=3btJns_1-Q@mail.gmail.com> <CAChr6SxJ3r88a4Aehv_5fsSWb1JApV6Lg4hfwdm0Oh5x04_shQ@mail.gmail.com> <479BA457-9001-4EBC-A84F-9E3EB71E809F@akamai.com>
In-Reply-To: <479BA457-9001-4EBC-A84F-9E3EB71E809F@akamai.com>
From: David Benjamin <davidben@chromium.org>
Date: Sat, 20 Jul 2024 00:24:08 -0400
Message-ID: <CAF8qwaCeX0CYeQdf=LTZVhiKS59G9i7mLrTA-Ky_z9Wg6jPXdQ@mail.gmail.com>
To: "Salz, Rich" <rsalz=40akamai.com@dmarc.ietf.org>
Content-Type: multipart/alternative; boundary="000000000000800e68061da62f01"
Message-ID-Hash: 3GSVXIX2MOYPQE3GU4NG43LTM7KKNFTY
X-Message-ID-Hash: 3GSVXIX2MOYPQE3GU4NG43LTM7KKNFTY
X-MailFrom: davidben@google.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Bob Beck <bbe@google.com>, Devon O'Brien <asymmetric=40google.com@dmarc.ietf.org>, "<tls@ietf.org>" <tls@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [TLS]Re: Trust Anchor Negotiation Surveillance Concerns and Risks
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/FuofXsM4k9i6S0MPJR0Qwj4lJpw>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>
Hi Rich, Have you read the second draft (draft-beck-trust-anchor-ids)? I think it's conceptually much simpler overall and is hopefully easier to wrap one's head around. There's no JSON structure or relying party / root program split or anything. The complexity of trust expressions doesn't come from the scope of the mechanism, or any of the things being discussed in this thread. It's simply the result of us trying to engineer around versioning lists of things. Somehow the server needs to correctly interpret ClientHellos from clients that are newer than its certificate, despite trust stores adding and removing CAs over time. That means needing to establish invariants across versions and rules for how both sides work with those invariants. That design, in turn, came from a desire to minimize server operator burden above all else. In most TLS ecosystems, there are far fewer root programs and CAs than server operators. So keeping the communication flow unchanged for server operators (static blob of data from the CA that one can deterministically interpret) is valuable. But the cost of doing so was to introduce a lot of coordination between root programs and CAs. Those entities are fewer and already need to coordinate, but it does sadly make the complete picture more complex. The other draft makes different tradeoffs in the course of solving the same problem. (As they are the same problem, most of the discussions of the goals and their implications are the same). It increases the server operator burden (a DNS extension in an ideal deployment), but we then remove this messy notion of "trust stores" and some of the limitations it implies on what the client can express. The overall system is simpler and, I think, much easier to understand. At the end of the day, the immediate problem both drafts target is quite simple: arrange for the server to pick a certificate path from one of the CAs that the client trusts. It's the same as every other parameter negotiation problem in TLS. You're right to observe we have a broad range of use cases in mind for this problem. However those come from the problem being solved, not individual pieces of the solution. Trust anchor negotiation problem is *the* essential problem when TLS intersects with PKIs. Removing use cases isn't going to simplify the mechanism. Indeed I think this is exactly the sign of targeting the right problem: a single primitive with a simple goal that is naturally applicable to a broad range of use cases in the problem space. (Cf how cipher suite negotiation can be used for a broad range of TLS transitions, or TCP's stream abstraction fits many protocols.) Hope that helps, David On Fri, Jul 19, 2024, 23:58 Salz, Rich <rsalz=40akamai.com@dmarc.ietf.org> wrote: > > - I've read it before. I the main issue is that it says "trusted" a > lot. > > > > Yeah, kinda snippy but not necessarily wrong. > > > > I’m a little skeptical of approaches that solve an entire problem space > with one architecture. I’m more skeptical of enough people having the > ability to read and understand the semantics of several pages of JSON > object descriptions. I know I got MEGO[1] a copule of times while reading > it. > > > > Can we simplify things and solve just one problem? > > > > For example, in some off-line discuissions others have mentioned that with > PQ signatures being so big, there are policy decisions that clients might > want to enforce – do you need SCT’s? Do you want OCSP stapling? Maybe it > will be worthwhile to just think about what kind hybrid/PQ policies clients > will want to express? > > > > [1] https://www.collinsdictionary.com/dictionary/english/mego > > > _______________________________________________ > TLS mailing list -- tls@ietf.org > To unsubscribe send an email to tls-leave@ietf.org >
- [TLS]Trust Anchor Negotiation Surveillance Concer… Devon O'Brien
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Rob Sayre
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Nick Harper
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… David Adrian
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Rob Sayre
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Nick Harper
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… David Benjamin
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Watson Ladd
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Mike Shaver
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… David Benjamin
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Ilari Liusvaara
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Ilari Liusvaara
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Mike Shaver
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… David Benjamin
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Mike Shaver
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Devon O'Brien
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Mike Shaver
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Ilari Liusvaara
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Watson Ladd
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Rob Sayre
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… David Benjamin