[TLS]Re: Trust Anchor Negotiation Surveillance Concerns and Risks
Dennis Jackson <ietf@dennis-jackson.uk> Sun, 21 July 2024 23:04 UTC
Return-Path: <ietf@dennis-jackson.uk>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 876F5C151539 for <tls@ietfa.amsl.com>; Sun, 21 Jul 2024 16:04:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.805
X-Spam-Level:
X-Spam-Status: No, score=-2.805 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dennis-jackson.uk
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SaO3kXKJyALQ for <tls@ietfa.amsl.com>; Sun, 21 Jul 2024 16:04:25 -0700 (PDT)
Received: from mout-p-103.mailbox.org (mout-p-103.mailbox.org [IPv6:2001:67c:2050:0:465::103]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D39C6C14F69E for <tls@ietf.org>; Sun, 21 Jul 2024 16:04:23 -0700 (PDT)
Received: from smtp202.mailbox.org (smtp202.mailbox.org [IPv6:2001:67c:2050:b231:465::202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mout-p-103.mailbox.org (Postfix) with ESMTPS id 4WRzW62xYBz9sWM for <tls@ietf.org>; Mon, 22 Jul 2024 01:04:18 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dennis-jackson.uk; s=MBO0001; t=1721603058; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=F+XAZWsZ2NvIzB61KkRNjUVyo0JiX4HB6tLw7DvAJmE=; b=IqbmsfD3V7a6+j0mp6EWFaKZjKTFznw1BhpKTcJV6ljO3vXkB3wjoAZrA1BwSEVCz3ZvXS IvYtNF/9VM+e0Q76Bscx7BqUhnJCKpxgSeWKowEk70l0RmPgX7Q6JuxOue/MhZvCK6nlUd g4wszC8ULBOSdgNYMMkX6M8fXc57s//UBSjwcaiziLZo1k3hmNBEPZItvRyhsqDWK9jtAj OKyKAqvxVbdThvcqzjNsXSIHTUxOLsDyVnxxJNj2lRXfVjdaL7ySDrmKQvLXdvJ3SHvm0C nEJ3aQ77edQ7RvfTKebXrnyxauwmA8Lqd2tVWRO1iQ5w5ovYH28lYTlvNkYyXg==
Content-Type: multipart/alternative; boundary="------------MFArpNhCG32HMvWA1q00vA0P"
Message-ID: <bc1d3c40-c9d1-4827-b39e-f90101d7013e@dennis-jackson.uk>
Date: Sun, 21 Jul 2024 16:04:14 -0700
MIME-Version: 1.0
References: <CAD2nvsT4qWqudiv1C1wZn6rB4_s-9EDENq5TXEbxr_ygcMFjDQ@mail.gmail.com> <CAChr6Sw+gxK3dO29F9bsLTQReJz6LzT2hZb5O7LAXmKzQbKTSw@mail.gmail.com> <CACf5n7_29CNXLf+SmpKKOWkc_3Oi2BZqZ8irU+z=3btJns_1-Q@mail.gmail.com> <CAChr6SxJ3r88a4Aehv_5fsSWb1JApV6Lg4hfwdm0Oh5x04_shQ@mail.gmail.com> <479BA457-9001-4EBC-A84F-9E3EB71E809F@akamai.com> <CACsn0cmhsh-zeJOaa7xy_2crxgvhAF=nK9FqWxxf1dB2SMhMyQ@mail.gmail.com> <Zpu0reBpH3dtFYdf@LK-Perkele-VII2.locald> <CADQzZqtsj272Gt771Ef=VhS2+WvWKkct0Jx1=wmyS7kTu0ds1w@mail.gmail.com> <CAF8qwaB3VuWSYTi-gH99+N_cgi1ZAdMpzhrSE4=KTD5xbQMwXA@mail.gmail.com>
Content-Language: en-US
From: Dennis Jackson <ietf@dennis-jackson.uk>
To: TLS List <tls@ietf.org>
In-Reply-To: <CAF8qwaB3VuWSYTi-gH99+N_cgi1ZAdMpzhrSE4=KTD5xbQMwXA@mail.gmail.com>
X-Rspamd-Queue-Id: 4WRzW62xYBz9sWM
Message-ID-Hash: 5HLNU6N7KRD4HZVJKH7WV2VESHNV77QQ
X-Message-ID-Hash: 5HLNU6N7KRD4HZVJKH7WV2VESHNV77QQ
X-MailFrom: ietf@dennis-jackson.uk
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [TLS]Re: Trust Anchor Negotiation Surveillance Concerns and Risks
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/o8iBW1Z_7XG4Hzloxjk1ipFVYx4>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>
On 20/07/2024 11:23, David Benjamin wrote: > On Sat, Jul 20, 2024, 06:13 Mike Shaver <mike.shaver@gmail.com> wrote: > > > In what way are these non-web systems not allowed to use other PKI > models today? How would trust anchors provide that permission? > > > If the same server serves both embedded/IoT traffic and web browser > traffic, but we aim for the two to use different PKIs, the server > needs to arrange to serve different certificates to each. To do that, > we need trust anchor negotiation story. I'm not sure you're talking about the same systems as Mike. We've seen a number of recent incidents where CAs have delayed revocation of mis-issued certificates for 'critical' services that are not accessible on the public web [1]. The vast majority of these services could already migrate to a private PKI today but they simply don't have adequate incentives to make the small investment necessary. How would Trust Expressions or Trust Anchors change that? Even for the tiny fraction of IoT services that have the misfortune to be on the public web and also popular with browsers. I don't understand why you think Trust Anchor Negotiation is a competitive solution. The operator can choose at any time to start migrating their IoT devices to a new URL which is not shared with browser clients and uses a private PKI. This has the same outcome as T.E. / T.A., without needing to ship a new TLS library to the IoT devices. How would you sell an investment in deploying and operating Trust Anchors or Trust Expressions to these companies? I feel a lot of the conversation on the benefits of these proposals is being derailed by the large number of use cases you're jumping between. It might be very be productive to take Rich's suggestion on focusing on one or two key problems that you want to solve and invest some time in explaining how your proposals handle the critical aspects around adoption. Some key questions would be: Who are we asking to deploy these designs? What is the incentive for them to do the necessary work? This doesn't mean you have to abandon the other use cases, but I think one or two well-explained use cases covering the key details would be much more persuasive to the WG than the current barrage of 9 or 10 use cases which leave more questions than they answer [2]. Best, Dennis [1] e.g Entrust and Chunghwa Telecom [2] See also my previous comments https://github.com/dennisjackson/trust-negotiation-comments/blob/main/comments-on-usecases.md
- [TLS]Trust Anchor Negotiation Surveillance Concer… Devon O'Brien
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Rob Sayre
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Nick Harper
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… David Adrian
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Rob Sayre
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Nick Harper
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… David Benjamin
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Watson Ladd
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Mike Shaver
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… David Benjamin
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Ilari Liusvaara
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Ilari Liusvaara
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Mike Shaver
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… David Benjamin
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Mike Shaver
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Devon O'Brien
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Mike Shaver
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Ilari Liusvaara
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Watson Ladd
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Salz, Rich
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Rob Sayre
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… Dennis Jackson
- [TLS]Re: Trust Anchor Negotiation Surveillance Co… David Benjamin