Re: [Trans] draft-ietf-trans-rfc6962-bis-31

Rashmi Jha <rashmij@microsoft.com> Wed, 26 June 2019 02:28 UTC

Return-Path: <rashmij@microsoft.com>
X-Original-To: trans@ietfa.amsl.com
Delivered-To: trans@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 090C412007C for <trans@ietfa.amsl.com>; Tue, 25 Jun 2019 19:28:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rvN8nnyOL5Sk for <trans@ietfa.amsl.com>; Tue, 25 Jun 2019 19:27:59 -0700 (PDT)
Received: from NAM02-SN1-obe.outbound.protection.outlook.com (mail-eopbgr770118.outbound.protection.outlook.com [40.107.77.118]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6B8AC120047 for <trans@ietf.org>; Tue, 25 Jun 2019 19:27:59 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=SXGovdcFKPpmCuwShO6nsxTkyYVE+s9EJ/AU2zIBXGr0DcffXfcrk1Sp0QnVt4/DkSOB7hm3YtrpuwiYluEt+eaaTbXzihzCoaF37AYZksMyYZ2lzxLCc+0MQOiL3jIXUihOLkJO9EZh9nVQzvW4a4K9XiZsq6o9V/VMFXxwMvHItSKWoTFG5gZvxHU0+BN4u7ed94RiTMsQRZHJQ8F8h1P3zxnW5ey06OyxVFI+B/MrRbOuIkEuxB5FoGFyBNUiTpzobIDYFUbyuVtTKgQSRq3u2OmtZhthfgnOeG/+ZTVZ3DKE7FB9xc8khuT6Vb7LUofE/F/+2X+2ts/wAea+vw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=cCRr0nhvj+gMcwRAYkG3aBTfuZXrlWn1n8iCNfTdjjk=; b=IHXrmwotOcaed1sVyZqjDx2ocppYsudUz+EO3Ut4M5lEbbYeXL7EyS9suxFU/lbedJGgDxYvy1Ag8Pyv+rC+NGnsLMU6xlLRXvso7oE3r4fUgJub/BkLIn+ZsO3iEAZ5wahli+mklgDHoZQa45fUwubvI9qkReNFoKnynrcsZv9SRKhUbEY/JwxnEm0YAOgLSAfJZ4w2QRHS55v8xIsQu7XTuJamuP7FpOrUFA0z9Aatiind0EDDahc9nSic2/BgRvpj6RcW0tc6WsUW4bxlW91FYmXuVYnH8yurR7IKZC6hkjB6JqkKbA+N6HyURcrush7Md0IrLH+vjYyv8s+RNg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=microsoft.com;dmarc=pass action=none header.from=microsoft.com;dkim=pass header.d=microsoft.com;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=cCRr0nhvj+gMcwRAYkG3aBTfuZXrlWn1n8iCNfTdjjk=; b=LNK+ObhUXWPuRr4B3rURiuAo2DxnEO3DnR6W4ZT5Dr0pCtJ/oIrno+3Jb4vubgXgj8sEe5Glr1UUYsAoM4AVg9n8vQ36yDyg+qSli54GpbgnntZvESAqTVd7q6i+BJ2KGEeTtFlrfEHAxqWTukfDqpG+v5xNReaCuOdqSCZevo8=
Received: from MWHPR21MB0846.namprd21.prod.outlook.com (2603:10b6:300:77::12) by MWHPR21MB0159.namprd21.prod.outlook.com (2603:10b6:300:78::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2052.4; Wed, 26 Jun 2019 02:27:57 +0000
Received: from MWHPR21MB0846.namprd21.prod.outlook.com ([fe80::7494:1d1:dd28:75fc]) by MWHPR21MB0846.namprd21.prod.outlook.com ([fe80::7494:1d1:dd28:75fc%3]) with mapi id 15.20.2008.017; Wed, 26 Jun 2019 02:27:57 +0000
From: Rashmi Jha <rashmij@microsoft.com>
To: Watson Ladd <watsonbladd@gmail.com>
CC: Eran Messeri <eranm@google.com>, Paul Wouters <paul@nohats.ca>, "trans@ietf.org" <trans@ietf.org>
Thread-Topic: [Trans] draft-ietf-trans-rfc6962-bis-31
Thread-Index: AdUm63nX6SEEUQM9QPCVcL3rkFMn6wADVmwAABXbiYABG3cTYAABCx+AAAB4q7A=
Date: Wed, 26 Jun 2019 02:27:57 +0000
Message-ID: <MWHPR21MB0846B70FF84DE41A3B16BB9AA7E20@MWHPR21MB0846.namprd21.prod.outlook.com>
References: <MWHPR21MB0846D2C92633AE28A7B012EAA7E50@MWHPR21MB0846.namprd21.prod.outlook.com> <alpine.LRH.2.21.1906191936520.28894@bofh.nohats.ca> <CALzYgEefnThirThr=LwvD-T=L_b1nmNSGG90kxffwb9rc8ry=g@mail.gmail.com> <MWHPR21MB084622793C06701F9A7CCD8CA7E20@MWHPR21MB0846.namprd21.prod.outlook.com> <CACsn0cn_RHjtUHzVvVporJPENteMLQnF+6tW-ncBnt+dR3CVdA@mail.gmail.com>
In-Reply-To: <CACsn0cn_RHjtUHzVvVporJPENteMLQnF+6tW-ncBnt+dR3CVdA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=True; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Owner=rashmij@microsoft.com; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2019-06-26T02:27:55.1635475Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=General; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Application=Microsoft Azure Information Protection; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=0130d2c4-7efd-45af-9b70-2e2f10bbd295; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Extended_MSFT_Method=Automatic
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rashmij@microsoft.com;
x-originating-ip: [2001:4898:80e8:0:1a3:6d3a:6ebd:fdbe]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: e4b4218c-59fe-4b13-da49-08d6f9dde6d9
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(4618075)(2017052603328)(7193020); SRVR:MWHPR21MB0159;
x-ms-traffictypediagnostic: MWHPR21MB0159:
x-ms-exchange-purlcount: 1
x-microsoft-antispam-prvs: <MWHPR21MB0159B26C3B77E72E98EC1069A7E20@MWHPR21MB0159.namprd21.prod.outlook.com>
x-o365-sonar-daas-pilot: True
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 00808B16F3
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39860400002)(346002)(366004)(136003)(376002)(396003)(13464003)(199004)(189003)(8936002)(6116002)(5660300002)(81166006)(25786009)(966005)(10290500003)(14444005)(66574012)(256004)(8990500004)(316002)(4326008)(64756008)(66446008)(2906002)(11346002)(68736007)(6306002)(54906003)(73956011)(66476007)(478600001)(486006)(76116006)(66556008)(446003)(22452003)(476003)(33656002)(14454004)(52536014)(8676002)(55016002)(81156014)(66946007)(1411001)(86362001)(10090500001)(99286004)(71190400001)(71200400001)(53936002)(9686003)(102836004)(52396003)(6246003)(305945005)(7736002)(6916009)(76176011)(7696005)(74316002)(53546011)(6506007)(186003)(229853002)(46003)(6436002); DIR:OUT; SFP:1102; SCL:1; SRVR:MWHPR21MB0159; H:MWHPR21MB0846.namprd21.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: 5BEvr4waQqnc/Ni1sNNB5DB2lBvvQGfV14DvcM1SlW4nOIHUiRp/OGZCZfc2WPCexv8EZ2QPWxkhvXardVkBX8vadbh5kRrqWTaw36qlffmE0Zgbc6hgQ6/GJsj89WNUEDGFQvCebwz07sAGTzWQTJmS+B+w/5ERHbCOc0QYMxPbaXeCOgQ3pn85Pd+sbwQVHfkcIQxdBKXbKynJtxRjw0UnFhHNoE8Q6Irs4kQl9g+4QOrKcHv5215uFRnWOK3ADYW1n7v5XrNqURQKxzDPYSE9w1UPznaXwM6tt3fFL6gh7fssF3vllbddyJw3W4/fbaTpAl3lI+N5lT7JzcTgJd/LMBatff0cApEvsSoG5EZmmYtGLQ9iCPTNJCQrlb3PD616dVdf6AU0N9gw1mNSDSWIS4mAOzaBfpsWw5vpPR8=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e4b4218c-59fe-4b13-da49-08d6f9dde6d9
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Jun 2019 02:27:57.4130 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: rashmij@microsoft.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR21MB0159
Archived-At: <https://mailarchive.ietf.org/arch/msg/trans/Q0cuocveurbFytpVXE0uCrCfmps>
Subject: Re: [Trans] draft-ietf-trans-rfc6962-bis-31
X-BeenThere: trans@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Public Notary Transparency working group discussion list <trans.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/trans>, <mailto:trans-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/trans/>
List-Post: <mailto:trans@ietf.org>
List-Help: <mailto:trans-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/trans>, <mailto:trans-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Jun 2019 02:28:03 -0000

Thanks Watson.  Appreciate the response. 

1. We can surely argue critical or non-critical.  Named constraints can be critical or non-critical
2. Constraints are defined on Issuing CA as per RFC 5280.  See below RFC extract.
3. One of the CT issue is that the persona used to build the solution is thinking of only an application developer, site operator. The cloud scenario is a miss - The scenario is that I want to deploy my application in ~100 regions worldwide. I want to deploy my application at the same time across the world.
4. Wildcard - just  search or google it and there are numerous articles conveying the issue with wildcards. 

A question from my side : What is the role of this WG ? 


4.2.1.10.  Name Constraints

   The name constraints extension, which MUST be used only in a CA
   certificate, indicates a name space within which all subject names in
   subsequent certificates in a certification path MUST be located.
   Restrictions apply to the subject distinguished name and apply to
   subject alternative names.  Restrictions apply only when the
   specified name form is present.  If no name of the type is in the
   certificate, the certificate is acceptable.

-----Original Message-----
From: Watson Ladd <watsonbladd@gmail.com> 
Sent: Tuesday, June 25, 2019 6:56 PM
To: Rashmi Jha <rashmij@microsoft.com>
Cc: Eran Messeri <eranm@google.com>; Paul Wouters <paul@nohats.ca>; trans@ietf.org
Subject: Re: [Trans] draft-ietf-trans-rfc6962-bis-31

On Tue, Jun 25, 2019 at 6:51 PM Rashmi Jha <rashmij=40microsoft.com@dmarc.ietf.org> wrote:
>
> Name constraints itself if orthogonal to CT but both of these achieve the same goal.  Restrict a CA to issue certs for the domains they are suppose to. The difference is following :
>
> In CT, you log the cert into CT logs at the time of issuance of each 
> cert Name constrained is upfront where CA declares that I am going to issue certs only for ford.com, jaguar.com (hypothetically) and that’s it.

Criticial name constraints are I think still a nonstarter. 

>
>
>
> Named constraints CA shouldn’t need to log each time when a cert is issued.  Because the verification and monitor of whether the CA has complied with the goal is done offline or a different time in both the scenarios.

Are we talking about roots are are we talking about intermediates?
Because the following fun can happen:

1: Honest Achmed's trusted CA isues Dubious Constrained Intermediate with name constraints for "example.com"
2: Dubious Constrained Intermediate issues cert for example.com

Crucially Honest Achmed isn't actually honest and that cert is going to do terrible things. CT catches the issuance, name constraints do not.

>
>
>
> The draft doesn’t address what should be an alternative for folks who 
> don’t want CT
>
> CT adds burden for each certificate issuance. It adds ~7seconds to every cert issuance and it adds a new failure endpoint in the path.

What application has this delay be a problem and requires trust by browsers? (Which again this WG doesn't deal with).

> CT has 0 alternatives. There is no mechanism for redaction.
>
> (The only alternative to have subdomain level redaction is to use 
> wildcard which is just from the list of ‘what not to do’s’ in PKI. )

Wildcards are supported just fine. What's the application where this is a problem?
>
>
>
> CT drives an important industry-wide goal. There are other ways to achieve the same goal. And for organizations where each millisecond matters, the user agent should support an alternative rather than add load and failure point at their critical path of issuance.  Named constraints is within the books of PKI.  A CA can be held accountable like any other CA/Browser baseline requirements that if they issue certs outside of their constraints then they should take immediate action or get distrusted. It won’t be any different from a CA doing a wrong thing and got caught via CT monitors.
>
>
>
> This draft should prescribe an alternative to achieve the same goal which is achieved by CT and the details on that alternative can be covered somewhere else.
>
>
>
> Thanks, Rashmi Jha.
>
>
>
> From: Eran Messeri <eranm=40google.com@dmarc.ietf.org>
> Sent: Thursday, June 20, 2019 3:10 AM
> To: Paul Wouters <paul@nohats.ca>
> Cc: Rashmi Jha <rashmij@microsoft.com>; trans@ietf.org
> Subject: Re: [Trans] draft-ietf-trans-rfc6962-bis-31
>
>
>
> Paul made the point quite accurately - CT is orthogonal to name-constraining a CA, and can be used to validate the CA has adhered to the constrained names.
>
>
>
> Additionally, there's no way to signal to a user agent that  such a CA would be "exempt" from CT (some user agents have Enterprise controls to allow instances managed by the organization to not require CT for certain domains, though).
>
>
>
> On Thu, Jun 20, 2019 at 12:44 AM Paul Wouters <paul@nohats.ca> wrote:
>
> On Wed, 19 Jun 2019, Rashmi Jha wrote:
>
> > Have you looked into the options of not requiring CT for CAs which 
> > are constrained to a brief list of domains ? I understand this was considered in the past but couldn’t find details why this was not accepted.
>
> Whether or not to require CT is not part of the document. This seems 
> more like a question to browser vendors. The draft only states:
>
>
>     In addition, if TLS clients will not accept unlogged certificates,
>     then site owners will have a greater incentive to submit certificates
>     to logs, possibly with the assistance of their CA, increasing the
>     overall transparency of the system.
>
> The "if" there is important. It is not a decision made in this 
> document or this Working Group.
>
> The draft only lists the requirements and formats for when CT is used.
>
> > Named constraint by default provide the assurance as to what domains they will issue. CT becomes an additional network call in in issuance of certificate which can be prevented.
>
> Not "assurance", but "expectation". CT is there to confirm this 
> expectation. Surely, you want CT logs to show captured certificates 
> that were signed by a CA outside of that CA's own Named constraint policy?
>
> Additionally, if you skip accepting certificates within a named 
> constraint, what do you do when some CA claims ".com" as their named 
> constraint?
>
> Paul
>
> _______________________________________________
> Trans mailing list
> Trans@ietf.org
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.
> ietf.org%2Fmailman%2Flistinfo%2Ftrans&amp;data=02%7C01%7Crashmij%40mic
> rosoft.com%7C48af4c32534d4f589b8008d6f9d9796a%7C72f988bf86f141af91ab2d
> 7cd011db47%7C1%7C0%7C636971109771716859&amp;sdata=97MDIyztKi8%2FGCc6IZ
> urR1%2Bjgt7LF0BnQ7pHnIZNs%2Fw%3D&amp;reserved=0
>
> _______________________________________________
> Trans mailing list
> Trans@ietf.org
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.
> ietf.org%2Fmailman%2Flistinfo%2Ftrans&amp;data=02%7C01%7Crashmij%40mic
> rosoft.com%7C48af4c32534d4f589b8008d6f9d9796a%7C72f988bf86f141af91ab2d
> 7cd011db47%7C1%7C0%7C636971109771716859&amp;sdata=97MDIyztKi8%2FGCc6IZ
> urR1%2Bjgt7LF0BnQ7pHnIZNs%2Fw%3D&amp;reserved=0



--
"Man is born free, but everywhere he is in chains".
--Rousseau.